id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0905.0024
Xiaoying Gan
Gan Xiaoying, Shan Da, Zhou Yuan, Zhang Wei, Qian Liang
Theoretical Analysis of Cyclic Frequency Domain Noise and Feature Detection for Cognitive Radio Systems
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In cognitive radio systems, cyclostationary feature detection plays an important role in spectrum sensing, especially in low SNR cases. To configure the detection threshold under a certain noise level and a pre-set miss detection probability Pf, it's important to derive the theoretical distribution of the observation variable. In this paper, noise distribution in cyclic frequency domain has been studied and Generalized Extreme Value (GEV) distribution is found to be a precise match. Maximum likelihood estimation is applied to estimate the parameters of GEV. Monte Carlo simulation has been carried out to show that the simulated ROC curve is coincided with the theoretical ROC curve, which proves the efficiency of the theoretical distribution model.
[ { "version": "v1", "created": "Thu, 30 Apr 2009 22:56:12 GMT" } ]
2009-05-04T00:00:00
[ [ "Xiaoying", "Gan", "" ], [ "Da", "Shan", "" ], [ "Yuan", "Zhou", "" ], [ "Wei", "Zhang", "" ], [ "Liang", "Qian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0036
Onur Ozan Koyluoglu
O. Ozan Koyluoglu and Hesham El Gamal
On the Secrecy Rate Region for the Interference Channel
Proceedings of the 2008 IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008), Cannes, France, Sept. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies interference channels with security constraints. The existence of an external eavesdropper in a two-user interference channel is assumed, where the network users would like to secure their messages from the external eavesdropper. The cooperative binning and channel prefixing scheme is proposed for this system model which allows users to cooperatively add randomness to the channel in order to degrade the observations of the external eavesdropper. This scheme allows users to add randomness to the channel in two ways: 1) Users cooperate in their design of the binning codebooks, and 2) Users cooperatively exploit the channel prefixing technique. As an example, the channel prefixing technique is exploited in the Gaussian case to transmit a superposition signal consisting of binning codewords and independently generated noise samples. Gains obtained form the cooperative binning and channel prefixing scheme compared to the single user scenario reveals the positive effect of interference in increasing the network security. Remarkably, interference can be exploited to cooperatively add randomness into the network in order to enhance the security.
[ { "version": "v1", "created": "Fri, 1 May 2009 02:32:48 GMT" } ]
2009-05-04T00:00:00
[ [ "Koyluoglu", "O. Ozan", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0044
Kiryung Lee
Kiryung Lee and Yoram Bresler
ADMiRA: Atomic Decomposition for Minimum Rank Approximation
A short version (arXiv:0901.1898) will be presented at ISIT'09
null
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the inverse problem that arises in compressed sensing of a low-rank matrix. Our approach is to pose the inverse problem as an approximation problem with a specified target rank of the solution. A simple search over the target rank then provides the minimum rank solution satisfying a prescribed data approximation bound. We propose an atomic decomposition that provides an analogy between parsimonious representations of a sparse vector and a low-rank matrix. Efficient greedy algorithms to solve the inverse problem for the vector case are extended to the matrix case through this atomic decomposition. In particular, we propose an efficient and guaranteed algorithm named ADMiRA that extends CoSaMP, its analogue for the vector case. The performance guarantee is given in terms of the rank-restricted isometry property and bounds both the number of iterations and the error in the approximate solution for the general case where the solution is approximately low-rank and the measurements are noisy. With a sparse measurement operator such as the one arising in the matrix completion problem, the computation in ADMiRA is linear in the number of measurements. The numerical experiments for the matrix completion problem show that, although the measurement operator in this case does not satisfy the rank-restricted isometry property, ADMiRA is a competitive algorithm for matrix completion.
[ { "version": "v1", "created": "Fri, 1 May 2009 03:55:00 GMT" }, { "version": "v2", "created": "Mon, 15 Jun 2009 17:52:32 GMT" } ]
2009-06-15T00:00:00
[ [ "Lee", "Kiryung", "" ], [ "Bresler", "Yoram", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0079
Thorsten Hehn
Thorsten Hehn, Johannes B. Huber, Olgica Milenkovic, Stefan Laendner
Multiple-Bases Belief-Propagation Decoding of High-Density Cyclic Codes
This full paper accompanies a letter submitted to "IEEE Transactions on Communications". It is intended to provide detailed information for interested readers of the letter. 24 pages, 6 figures
null
10.1109/TCOMM.2010.01.070468
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new method for decoding short and moderate length linear block codes with dense parity-check matrix representations of cyclic form, termed multiple-bases belief-propagation (MBBP). The proposed iterative scheme makes use of the fact that a code has many structurally diverse parity-check matrices, capable of detecting different error patterns. We show that this inherent code property leads to decoding algorithms with significantly better performance when compared to standard BP decoding. Furthermore, we describe how to choose sets of parity-check matrices of cyclic form amenable for multiple-bases decoding, based on analytical studies performed for the binary erasure channel. For several cyclic and extended cyclic codes, the MBBP decoding performance can be shown to closely follow that of maximum-likelihood decoders.
[ { "version": "v1", "created": "Fri, 1 May 2009 11:15:25 GMT" } ]
2016-11-15T00:00:00
[ [ "Hehn", "Thorsten", "" ], [ "Huber", "Johannes B.", "" ], [ "Milenkovic", "Olgica", "" ], [ "Laendner", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0106
R. Dean Malmgren
R. Dean Malmgren, Jake M. Hofman, Luis A. N. Amaral, Duncan J. Watts
Characterizing Individual Communication Patterns
9 pages, 6 figures, to appear in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'09), June 28-July 1, Paris, France
null
null
null
physics.soc-ph cs.CY physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The increasing availability of electronic communication data, such as that arising from e-mail exchange, presents social and information scientists with new possibilities for characterizing individual behavior and, by extension, identifying latent structure in human populations. Here, we propose a model of individual e-mail communication that is sufficiently rich to capture meaningful variability across individuals, while remaining simple enough to be interpretable. We show that the model, a cascading non-homogeneous Poisson process, can be formulated as a double-chain hidden Markov model, allowing us to use an efficient inference algorithm to estimate the model parameters from observed data. We then apply this model to two e-mail data sets consisting of 404 and 6,164 users, respectively, that were collected from two universities in different countries and years. We find that the resulting best-estimate parameter distributions for both data sets are surprisingly similar, indicating that at least some features of communication dynamics generalize beyond specific contexts. We also find that variability of individual behavior over time is significantly less than variability across the population, suggesting that individuals can be classified into persistent "types". We conclude that communication patterns may prove useful as an additional class of attribute data, complementing demographic and network data, for user classification and outlier detection--a point that we illustrate with an interpretable clustering of users based on their inferred model parameters.
[ { "version": "v1", "created": "Fri, 1 May 2009 15:37:34 GMT" } ]
2009-05-07T00:00:00
[ [ "Malmgren", "R. Dean", "" ], [ "Hofman", "Jake M.", "" ], [ "Amaral", "Luis A. N.", "" ], [ "Watts", "Duncan J.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0905.0192
Gilles Champenois
Gilles Champenois
Fuzzy Mnesors
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fuzzy mnesor space is a semimodule over the positive real numbers. It can be used as theoretical framework for fuzzy sets. Hence we can prove a great number of properties for fuzzy sets without refering to the membership functions.
[ { "version": "v1", "created": "Sat, 2 May 2009 09:23:33 GMT" } ]
2009-05-05T00:00:00
[ [ "Champenois", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.0197
Victor Marek
V.W. Marek and J.B. Remmel
An Application of Proof-Theory in Answer Set Programming
22 pages. Short version was published in ICLP08. New version slightly shorter than the previous version
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply proof-theoretic techniques in answer Set Programming. The main results include: 1. A characterization of continuity properties of Gelfond-Lifschitz operator for logic program. 2. A propositional characterization of stable models of logic programs (without referring to loop formulas.
[ { "version": "v1", "created": "Sat, 2 May 2009 10:43:30 GMT" }, { "version": "v2", "created": "Mon, 11 Jan 2010 20:12:14 GMT" } ]
2010-01-11T00:00:00
[ [ "Marek", "V. W.", "" ], [ "Remmel", "J. B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.0200
Paul M. Aoki
Paul M. Aoki, R.J. Honicky, Alan Mainwaring, Chris Myers, Eric Paulos, Sushmita Subramanian, Allison Woodruff
A Vehicle for Research: Using Street Sweepers to Explore the Landscape of Environmental Community Action
10 pages
Proc. ACM SIGCHI Conf. on Human Factors in Computing Systems, Boston, MA, Apr. 2009, 375-384. ACM Press
10.1145/1518701.1518762
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Researchers are developing mobile sensing platforms to facilitate public awareness of environmental conditions. However, turning such awareness into practical community action and political change requires more than just collecting and presenting data. To inform research on mobile environmental sensing, we conducted design fieldwork with government, private, and public interest stakeholders. In parallel, we built an environmental air quality sensing system and deployed it on street sweeping vehicles in a major U.S. city; this served as a "research vehicle" by grounding our interviews and affording us status as environmental action researchers. In this paper, we present a qualitative analysis of the landscape of environmental action, focusing on insights that will help researchers frame meaningful technological interventions.
[ { "version": "v1", "created": "Sat, 2 May 2009 11:42:50 GMT" } ]
2016-09-05T00:00:00
[ [ "Aoki", "Paul M.", "" ], [ "Honicky", "R. J.", "" ], [ "Mainwaring", "Alan", "" ], [ "Myers", "Chris", "" ], [ "Paulos", "Eric", "" ], [ "Subramanian", "Sushmita", "" ], [ "Woodruff", "Allison", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0905.0203
Paul M. Aoki
Rowena Luk, Matei Zaharia, Melissa Ho, Brian Levine, Paul M. Aoki
ICTD for Healthcare in Ghana: Two Parallel Case Studies
11 pages
Proc. IEEE/ACM Conf. on Information and Communication Technologies and Development, Doha, Qatar, Apr. 2009, 118-128. IEEE CS Press
10.1109/ICTD.2009.5426714
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper examines two parallel case studies to promote remote medical consultation in Ghana. These projects, initiated independently by different researchers in different organizations, both deployed ICT solutions in the same medical community in the same year. The Ghana Consultation Network currently has over 125 users running a Web-based application over a delay-tolerant network of servers. OneTouch MedicareLine is currently providing 1700 doctors in Ghana with free mobile phone calls and text messages to other members of the medical community. We present the consequences of (1) the institutional context and identity of the investigators, as well as specific decisions made with respect to (2) partnerships formed, (3) perceptions of technological infrastructure, and (4) high-level design decisions. In concluding, we discuss lessons learned and high-level implications for future ICTD research agendas.
[ { "version": "v1", "created": "Sat, 2 May 2009 11:54:52 GMT" } ]
2016-09-02T00:00:00
[ [ "Luk", "Rowena", "" ], [ "Zaharia", "Matei", "" ], [ "Ho", "Melissa", "" ], [ "Levine", "Brian", "" ], [ "Aoki", "Paul M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0905.0233
John Wright
John Wright, Arvind Ganesh, Shankar Rao, Yi Ma
Robust Principal Component Analysis: Exact Recovery of Corrupted Low-Rank Matrices
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn due to a critical error near equation (71). This error causes the entire argument of the paper to collapse. Emmanuel Candes of Stanford discovered the error, and has suggested a correct analysis, which will be reported in a separate publication.
[ { "version": "v1", "created": "Sat, 2 May 2009 22:35:46 GMT" }, { "version": "v2", "created": "Wed, 9 Dec 2009 17:11:00 GMT" } ]
2009-12-09T00:00:00
[ [ "Wright", "John", "" ], [ "Ganesh", "Arvind", "" ], [ "Rao", "Shankar", "" ], [ "Ma", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0266
Ren\'e Pfitzner
Erik Aurell, Ren\'e Pfitzner
Gaussian Belief with dynamic data and in dynamic network
5 pages, 7 figures
EPL (Europhysics Letters) 87, 68004, 2009
10.1209/0295-5075/87/68004
null
cs.AI cond-mat.stat-mech cs.IT math.IT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we analyse Belief Propagation over a Gaussian model in a dynamic environment. Recently, this has been proposed as a method to average local measurement values by a distributed protocol ("Consensus Propagation", Moallemi & Van Roy, 2006), where the average is available for read-out at every single node. In the case that the underlying network is constant but the values to be averaged fluctuate ("dynamic data"), convergence and accuracy are determined by the spectral properties of an associated Ruelle-Perron-Frobenius operator. For Gaussian models on Erdos-Renyi graphs, numerical computation points to a spectral gap remaining in the large-size limit, implying exceptionally good scalability. In a model where the underlying network also fluctuates ("dynamic network"), averaging is more effective than in the dynamic data case. Altogether, this implies very good performance of these methods in very large systems, and opens a new field of statistical physics of large (and dynamic) information systems.
[ { "version": "v1", "created": "Sun, 3 May 2009 15:26:43 GMT" } ]
2012-08-10T00:00:00
[ [ "Aurell", "Erik", "" ], [ "Pfitzner", "René", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0905.0283
Kevin Wortman
David Eppstein and Kevin A. Wortman
Optimal Embedding Into Star Metrics
12 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an O(n^3 log^2 n)-time algorithm for the following problem: given a finite metric space X, create a star-topology network with the points of X as its leaves, such that the distances in the star are at least as large as in X, with minimum dilation. As part of our algorithm, we solve in the same time bound the parametric negative cycle detection problem: given a directed graph with edge weights that are increasing linear functions of a parameter lambda, find the smallest value of lambda such that the graph contains no negative-weight cycles.
[ { "version": "v1", "created": "Sun, 3 May 2009 19:21:52 GMT" } ]
2009-05-05T00:00:00
[ [ "Eppstein", "David", "" ], [ "Wortman", "Kevin A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.0315
Lahatra Rakotondrainibe
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia (IETR), Gha\"is El Zein (IETR)
Millimeter-Wave System for High Data Rate Indoor Communications
5 pages
ISSCS 2009, Iasi : Roumanie (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the realization of a wireless Gigabit Ethernet communication system operating in the 60 GHz band. The system architecture uses a single carrier modulation. A differential encoded binary phase shift keying modulation and a differential demodulation scheme are adopted for the intermediate frequency blocks. The baseband blocks use Reed- Solomon RS (255, 239) coding and decoding for channel forward error correction (FEC). First results of bit error rate (BER) measurements at 875 Mbps, without channel coding, are presented for different antennas.
[ { "version": "v1", "created": "Mon, 4 May 2009 07:20:31 GMT" } ]
2010-11-10T00:00:00
[ [ "Rakotondrainibe", "Lahatra", "", "IETR" ], [ "Kokar", "Yvan", "", "IETR" ], [ "Zaharia", "Gheorghe", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.0316
Lahatra Rakotondrainibe
Lahatra Rakotondrainibe (IETR), I. Siaud (FT R&D), Y. Kokar (IETR), G. Zaharia (IETR), F. Brunet (FT R&D), E. Tanguy (IREENA), G. El Zein (IETR)
A low Complexity Wireless Gigabit Ethernet IFoF 60 GHz H/W Platform and Issues
6 pages
WWRF, Paris : France (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a complete IFoF system architecture derived from simplified IEEE802.15.3c PHY layer proposal to successfully ensure near 1 Gbps on the air interface. The system architecture utilizes low complexity baseband processing modules. The byte/frame synchronization technique is designed to provide a high value of preamble detection probability and a very small value of the false detection probability. Conventional Reed-Solomon RS (255, 239) coding is used for Channel Forward Error Correction (FEC). Good communication link quality and Bit Error Rate (BER) results at 875 Mbps are achieved with directional antennas.
[ { "version": "v1", "created": "Mon, 4 May 2009 07:21:18 GMT" } ]
2010-11-10T00:00:00
[ [ "Rakotondrainibe", "Lahatra", "", "IETR" ], [ "Siaud", "I.", "", "FT R&D" ], [ "Kokar", "Y.", "", "IETR" ], [ "Zaharia", "G.", "", "IETR" ], [ "Brunet", "F.", "", "FT R&D" ], [ "Tanguy", "E.", "", "IREENA" ], [ "Zein", "G. El", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.0317
Lahatra Rakotondrainibe
Lahatra Rakotondrainibe (IETR), Yvan Kokar (IETR), Gheorghe Zaharia (IETR), Gha\"is El Zein (IETR)
60 GHz High Data Rate Wireless Communication System
5 pages,
VTC Spring 2009, Barcelone : Espagne (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the design and the realization of a 60 GHz wireless Gigabit Ethernet communication system. A differential encoded binary phase shift keying modulation (DBPSK) and differential demodulation schemes are adopted for the IF blocks. The Gigabit Ethernet interface allows a high speed transfer of multimedia files via a 60 GHz wireless link. First measurement results are shown for 875 Mbps data rate.
[ { "version": "v1", "created": "Mon, 4 May 2009 07:22:12 GMT" } ]
2010-11-10T00:00:00
[ [ "Rakotondrainibe", "Lahatra", "", "IETR" ], [ "Kokar", "Yvan", "", "IETR" ], [ "Zaharia", "Gheorghe", "", "IETR" ], [ "Zein", "Ghaïs El", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.0363
Wojciech Mazurczyk
Wojciech Mazurczyk, Milosz Smolarczyk, Krzysztof Szczypiorski
Hiding Information in Retransmissions
12 pages, 12 figures, 6 tables
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a new steganographic method called RSTEG (Retransmission Steganography), which is intended for a broad class of protocols that utilises retransmission mechanisms. The main innovation of RSTEG is to not acknowledge a successfully received packet in order to intentionally invoke retransmission. The retransmitted packet carries a steganogram instead of user data in the payload field. RSTEG is presented in the broad context of network steganography, and the utilisation of RSTEG for TCP (Transport Control Protocol) retransmission mechanisms is described in detail. Simulation results are also presented with the main aim to measure and compare the steganographic bandwidth of the proposed method for different TCP retransmission mechanisms as well as to determine the influence of RSTEG on the network retransmissions level.
[ { "version": "v1", "created": "Mon, 4 May 2009 12:18:32 GMT" }, { "version": "v2", "created": "Tue, 5 May 2009 07:08:03 GMT" }, { "version": "v3", "created": "Thu, 14 May 2009 20:58:34 GMT" } ]
2009-05-14T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Smolarczyk", "Milosz", "" ], [ "Szczypiorski", "Krzysztof", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0905.0374
Jatin Thukral
Jatin Thukral and Helmut Boelcskei
Interference Alignment with Limited Feedback
5 pages, 0 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider single-antenna interference networks where M sources, each with an average transmit power of P/M, communicate with M destinations over frequency-selective channels (with L taps each) and each destination has perfect knowledge of its channels from each of the sources. Assuming that there exist error-free non-interfering broadcast feedback links from each destination to all the nodes (i.e., sources and destinations) in the network, we show that naive interference alignment, in conjunction with vector quantization of the impulse response coefficients according to the scheme proposed in Mukkavilli et al., IEEE Trans. IT, 2003, achieves full spatial multiplexing gain of M/2, provided that the number of feedback bits broadcast by each destination is at least M(L-1) log P.
[ { "version": "v1", "created": "Mon, 4 May 2009 12:42:49 GMT" }, { "version": "v2", "created": "Wed, 6 May 2009 13:56:26 GMT" } ]
2009-05-06T00:00:00
[ [ "Thukral", "Jatin", "" ], [ "Boelcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0385
Adnan Raja
Adnan Raja and Pramod Viswanath
Diversity-Multiplexing tradeoff of the Two-User Interference Channel
submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diversity-Multiplexing tradeoff (DMT) is a coarse high SNR approximation of the fundamental tradeoff between data rate and reliability in a slow fading channel. In this paper, we characterize the fundamental DMT of the two user single antenna Gaussian interference channel. We show that the class of multilevel superposition coding schemes universally achieves (for all fading statistics) the DMT for the two-user interference channel. For the special case of symmetric DMT, when the two users have identical rate and diversity gain requirements, we characterize the DMT achieved by the Han-Kobayashi scheme, which corresponds to two level superposition coding.
[ { "version": "v1", "created": "Mon, 4 May 2009 14:11:08 GMT" }, { "version": "v2", "created": "Tue, 8 Sep 2009 04:56:47 GMT" } ]
2009-09-08T00:00:00
[ [ "Raja", "Adnan", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0397
Nirmal Chakrabarti B
Nirmal B. Chakrabarti
A representation of non-uniformly sampled deterministic and random signals and their reconstruction using sample values and derivatives
9 pages, 7 figures, submitted to IEEE transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Shannon in his 1949 paper suggested the use of derivatives to increase the W*T product of the sampled signal. Use of derivatives enables improved reconstruction particularly in the case of non-uniformly sampled signals. An FM-AM representation for Lagrange/Hermite type interpolation and a reconstruction technique are discussed. The representation using a product of a polynomial and exponential of a polynomial is extensible to two dimensions. When the directly available information is inadequate, estimation of the signal and its derivative based on the correlation characteristics of Gaussian filtered noise has been studied. This requires computation of incomplete normal integrals. Reduction methods for reducing multivariate normal variables include multistage partitioning, dynamic path integral and Hermite expansion for computing the probability integrals necessary for estimating the mean of the signal and its derivative at points intermediate between zero or threshold crossings. The signals and their derivatives as measured or estimated are utilized to reconstruct the signal at a desired sampling rate.
[ { "version": "v1", "created": "Mon, 4 May 2009 14:59:53 GMT" } ]
2009-05-05T00:00:00
[ [ "Chakrabarti", "Nirmal B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0417
N. Prasanth Anthapadmanabhan
N. Prasanth Anthapadmanabhan and Alexander Barg
Two-Level Fingerprinting Codes
5 pages, 1 figure, Proc. 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 28 - July 3, 2009
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of two-level fingerprinting and traceability codes. In this setting, the users are organized in a hierarchical manner by classifying them into various groups; for instance, by dividing the distribution area into several geographic regions, and collecting users from the same region into one group. Two-level fingerprinting and traceability codes have the following property: As in traditional (one-level) codes, when given an illegal copy produced by a coalition of users, the decoder identifies one of the guilty users if the coalition size is less than a certain threshold $t$. Moreover, even when the coalition is of a larger size $s$ $(> t)$, the decoder still provides partial information by tracing one of the groups containing a guilty user. We establish sufficient conditions for a code to possess the two-level traceability property. In addition, we also provide constructions for two-level fingerprinting codes and characterize the corresponding set of achievable rates.
[ { "version": "v1", "created": "Mon, 4 May 2009 16:26:27 GMT" } ]
2009-05-05T00:00:00
[ [ "Anthapadmanabhan", "N. Prasanth", "" ], [ "Barg", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0440
Willie Harrison
Willie K Harrison and Steven W. McLaughlin
Tandem Coding and Cryptography on Wiretap Channels: EXIT Chart Analysis
11 pages, 5 figures, accepted at 2009 IEEE International Symposium on Information Theory (ISIT 2009)
null
10.1109/ISIT.2009.5205606
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional cryptography assumes an eavesdropper receives an error-free copy of the transmitted ciphertext. Wyner's wiretap channel model recognizes that at the physical layer both the intended receiver and the passive eavesdropper inevitably receive an error-prone version of the transmitted message which must be corrected prior to decryption. This paper considers the implications of using both channel and cryptographic codes under the wiretap channel model in a way that enhances the \emph{information-theoretic} security for the friendly parties by keeping the information transfer to the eavesdropper small. We consider a secret-key cryptographic system with a linear feedback shift register (LFSR)-based keystream generator and observe the mutual information between an LFSR-generated sequence and the received noise-corrupted ciphertext sequence under a known-plaintext scenario. The effectiveness of a noniterative fast correlation attack, which reduces the search time in a brute-force attack, is shown to be correlated with this mutual information. For an iterative fast correlation attack on this cryptographic system, it is shown that an EXIT chart and mutual information are very good predictors of decoding success and failure by a passive eavesdropper.
[ { "version": "v1", "created": "Mon, 4 May 2009 17:54:18 GMT" } ]
2015-09-24T00:00:00
[ [ "Harrison", "Willie K", "" ], [ "McLaughlin", "Steven W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0451
Yahav Nussbaum
Haim Kaplan and Yahav Nussbaum
Maximum Flow in Directed Planar Graphs with Vertex Capacities
12 pages, 5 figures
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an O(n log n) algorithm for finding a maximum flow in a directed planar graph, where the vertices are subject to capacity constraints, in addition to the arcs. If the source and the sink are on the same face, then our algorithm can be implemented in O(n) time. For general (not planar) graphs, vertex capacities do not make the problem more difficult, as there is a simple reduction that eliminates vertex capacities. However, this reduction does not preserve the planarity of the graph. The essence of our algorithm is a different reduction that does preserve the planarity, and can be implemented in linear time. For the special case of undirected planar graph, an algorithm with the same time complexity was recently claimed, but we show that it has a flaw.
[ { "version": "v1", "created": "Mon, 4 May 2009 18:55:56 GMT" } ]
2009-05-05T00:00:00
[ [ "Kaplan", "Haim", "" ], [ "Nussbaum", "Yahav", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.0484
Anton Zinoviev
Anton Zinoviev
Extended Bulgarian keyboard layouts
32 pages, in Bulgarian
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The old Bulgarian keyboard standard BDS 5237-78 was developed for use mostly on typewriter machines. The wide distribution of the computers forced the update of this standard. On one hand this is because of the need to support symbols such as the Bulgarian quotation marks, the Cyrillic letter I with grave accent, the long dash, etc. On the other hand the so called "phonetic layout" became popular and this layout is not standartized by BDS. In this work we are analyzing the possibilities to improve the keyboard layout according to BDS 5237-78, as well as the traditional phonetic layout. At the same time we are making a comparison with the new proposed Bulgarian keyboard layout standard BDS 5237:2006. We are proposing an algorithm for placement of additional symbols on the keys of the keyboard in a way that makes easy for the users to find the symbols even when they are not inscripted on the keys. We are giving formal definitions and illustrations of four keyboard layouts - three extended keyboard layouts for typing in "Cyrillic" mode (BDS, traditional phonetic and phonetic according to the new proposed BDS 5237:2006) and one extended layout for typing in "Latin" mode.
[ { "version": "v1", "created": "Mon, 4 May 2009 20:32:22 GMT" } ]
2009-05-06T00:00:00
[ [ "Zinoviev", "Anton", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0905.0541
Teng Li
Teng Li and Oliver M. Collins
Design and Analysis of Successive Decoding with Finite Levels for the Markov Channel
Accepted for publication at IEEE transaction on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a practical successive decoding scheme with finite levels for the finite-state Markov channels where there is no a priori state information at the transmitter or the receiver. The design employs either a random interleaver or a deterministic interleaver with an irregular pattern and an optional iterative estimation and decoding procedure within each level. The interleaver design criteria may be the achievable rate or the extrinsic information transfer (EXIT) chart, depending on the receiver type. For random interleavers, the optimization problem is solved efficiently using a pilot-utility function, while for deterministic interleavers, a good construction is given using empirical rules. Simulation results demonstrate that the new successive decoding scheme combined with irregular low-density parity-check codes can approach the identically and uniformly distributed (i.u.d.) input capacity on the Markov-fading channel using only a few levels.
[ { "version": "v1", "created": "Tue, 5 May 2009 07:43:33 GMT" } ]
2009-05-06T00:00:00
[ [ "Li", "Teng", "" ], [ "Collins", "Oliver M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0564
Diomidis Michalopoulos
Diomidis S. Michalopoulos, Athanasios S. Lioumpas, George K. Karagiannidis, and Robert Schober
Selective Cooperative Relaying over Time-Varying Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In selective cooperative relaying only a single relay out of the set of available relays is activated, hence the available power and bandwidth resources are efficiently utilized. However, implementing selective cooperative relaying in time-varying channels may cause frequent relay switchings that deteriorate the overall performance. In this paper, we study the rate at which a relay switching occurs in selective cooperative relaying applications in time-varying fading channels. In particular, we derive closed-form expressions for the relay switching rate (measured in Hz) for opportunistic relaying (OR) and distributed switch and stay combining (DSSC). Additionally, expressions for the average relay activation time for both of the considered schemes are also provided, reflecting the average time that a selected relay remains active until a switching occurs. Numerical results manifest that DSSC yields considerably lower relay switching rates than OR, along with larger average relay activation times, rendering it a better candidate for implementation of relay selection in fast fading environments.
[ { "version": "v1", "created": "Tue, 5 May 2009 09:28:58 GMT" }, { "version": "v2", "created": "Tue, 12 May 2009 10:32:45 GMT" } ]
2009-05-12T00:00:00
[ [ "Michalopoulos", "Diomidis S.", "" ], [ "Lioumpas", "Athanasios S.", "" ], [ "Karagiannidis", "George K.", "" ], [ "Schober", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0567
Serge Gaspers
Serge Gaspers and Matthias Mnich
Feedback Vertex Sets in Tournaments
null
null
null
null
cs.DM cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study combinatorial and algorithmic questions around minimal feedback vertex sets in tournament graphs. On the combinatorial side, we derive strong upper and lower bounds on the maximum number of minimal feedback vertex sets in an n-vertex tournament. We prove that every tournament on n vertices has at most 1.6740^n minimal feedback vertex sets, and that there is an infinite family of tournaments, all having at least 1.5448^n minimal feedback vertex sets. This improves and extends the bounds of Moon (1971). On the algorithmic side, we design the first polynomial space algorithm that enumerates the minimal feedback vertex sets of a tournament with polynomial delay. The combination of our results yields the fastest known algorithm for finding a minimum size feedback vertex set in a tournament.
[ { "version": "v1", "created": "Tue, 5 May 2009 09:45:24 GMT" }, { "version": "v2", "created": "Thu, 17 Jun 2010 22:03:31 GMT" }, { "version": "v3", "created": "Wed, 19 Oct 2011 12:07:02 GMT" } ]
2011-10-20T00:00:00
[ [ "Gaspers", "Serge", "" ], [ "Mnich", "Matthias", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0905.0586
Mohamed Abouelhoda
Mohamed Abouelhoda and Hisham Mohamed
WinBioinfTools: Bioinformatics Tools for Windows High Performance Computing Server 2008
null
null
null
null
cs.MS cs.CE q-bio.QM
http://creativecommons.org/licenses/by-nc-sa/3.0/
Open source bioinformatics tools running under MS Windows are rare to find, and those running under Windows HPC cluster are almost non-existing. This is despite the fact that the Windows is the most popular operating system used among life scientists. Therefore, we introduce in this initiative WinBioinfTools, a toolkit containing a number of bioinformatics tools running under Windows High Performance Computing Server 2008. It is an open source code package, where users and developers can share and add to. We currently start with three programs from the area of sequence analysis: 1) CoCoNUT for pairwise genome comparison, 2) parallel BLAST for biological database search, and 3) parallel global pairwise sequence alignment. In this report, we focus on technical aspects concerning how some components of these tools were ported from Linux/Unix environment to run under Windows. We also show the advantages of using the Windows HPC Cluster 2008. We demonstrate by experiments the performance gain achieved when using a computer cluster against a single machine. Furthermore, we show the results of comparing the performance of WinBioinfTools on the Windows and Linux Cluster.
[ { "version": "v1", "created": "Tue, 5 May 2009 12:04:12 GMT" } ]
2009-05-06T00:00:00
[ [ "Abouelhoda", "Mohamed", "" ], [ "Mohamed", "Hisham", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0905.0602
Michael Elberfeld
Michael Elberfeld
Perfect Phylogeny Haplotyping is Complete for Logspace
null
null
null
null
cs.CC q-bio.GN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Haplotyping is the bioinformatics problem of predicting likely haplotypes based on given genotypes. It can be approached using Gusfield's perfect phylogeny haplotyping (PPH) method for which polynomial and linear time algorithms exist. These algorithm use sophisticated data structures or do a stepwise transformation of the genotype data into haplotype data and, therefore, need a linear amount of space. We are interested in the exact computational complexity of PPH and show that it can be solved space-efficiently by an algorithm that needs only a logarithmic amount of space. Together with the recently proved L-hardness of PPH, we establish L-completeness. Our algorithm relies on a new characterization for PPH in terms of bipartite graphs, which can be used both to decide and construct perfect phylogenies for genotypes efficiently.
[ { "version": "v1", "created": "Tue, 5 May 2009 13:24:50 GMT" } ]
2009-05-06T00:00:00
[ [ "Elberfeld", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0905.0606
Clemens Novak
Clemens Novak, Peter Fertl, and Gerald Matz
Quantization for Soft-Output Demodulators in Bit-Interleaved Coded Modulation Systems
to be published at ISIT-2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study quantization of log-likelihood ratios (LLR) in bit-interleaved coded modulation (BICM) systems in terms of an equivalent discrete channel. We propose to design the quantizer such that the quantizer outputs become equiprobable. We investigate semi-analytically and numerically the ergodic and outage capacity over single- and multiple-antenna channels for different quantizers. Finally, we show bit error rate simulations for BICM systems with LLR quantization using a rate 1/2 low-density parity-check code.
[ { "version": "v1", "created": "Tue, 5 May 2009 13:50:33 GMT" } ]
2009-05-06T00:00:00
[ [ "Novak", "Clemens", "" ], [ "Fertl", "Peter", "" ], [ "Matz", "Gerald", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0619
Giuseppe Durisi
Giuseppe Durisi, Veniamin I. Morgenshtern, and Helmut B\"olcskei
On the Sensitivity of Noncoherent Capacity to the Channel Model
To be presented at IEEE Int. Symp. Inf. Theory 2009, Seoul, Korea
null
10.1109/ISIT.2009.5205806
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The noncoherent capacity of stationary discrete-time fading channels is known to be very sensitive to the fine details of the channel model. More specifically, the measure of the set of harmonics where the power spectral density of the fading process is nonzero determines if capacity grows logarithmically in SNR or slower than logarithmically. An engineering-relevant problem is to characterize the SNR value at which this sensitivity starts to matter. In this paper, we consider the general class of continuous-time Rayleigh-fading channels that satisfy the wide-sense stationary uncorrelated-scattering (WSSUS) assumption and are, in addition, underspread. For this class of channels, we show that the noncoherent capacity is close to the AWGN capacity for all SNR values of practical interest, independently of whether the scattering function is compactly supported or not. As a byproduct of our analysis, we obtain an information-theoretic pulse-design criterion for orthogonal frequency-division multiplexing systems.
[ { "version": "v1", "created": "Tue, 5 May 2009 14:58:01 GMT" } ]
2016-11-15T00:00:00
[ [ "Durisi", "Giuseppe", "" ], [ "Morgenshtern", "Veniamin I.", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0642
Martin Wainwright
S. Negahban, M. J. Wainwright
Simultaneous support recovery in high dimensions: Benefits and perils of block $\ell_1/\ell_\infty$-regularization
Presented in part at NIPS 2008 conference, Vancouver, Canada, December 2008
null
null
null
math.ST cs.IT math.IT stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the use of $\ell_{1}/\ell_{\infty}$-regularized regression for joint estimation of a $\pdim \times \numreg$ matrix of regression coefficients. We analyze the high-dimensional scaling of $\ell_1/\ell_\infty$-regularized quadratic programming, considering both consistency in $\ell_\infty$-norm, and variable selection. We begin by establishing bounds on the $\ell_\infty$-error as well sufficient conditions for exact variable selection for fixed and random designs. Our second set of results applies to $\numreg = 2$ linear regression problems with standard Gaussian designs whose supports overlap in a fraction $\alpha \in [0,1]$ of their entries: for this problem class, we prove that the $\ell_{1}/\ell_{\infty}$-regularized method undergoes a phase transition--that is, a sharp change from failure to success--characterized by the rescaled sample size $\theta_{1,\infty}(n, p, s, \alpha) = n/\{(4 - 3 \alpha) s \log(p-(2- \alpha) s)\}$. An implication of this threshold is that use of $\ell_1 / \ell_{\infty}$-regularization yields improved statistical efficiency if the overlap parameter is large enough ($\alpha > 2/3$), but has \emph{worse} statistical efficiency than a naive Lasso-based approach for moderate to small overlap ($\alpha < 2/3$). These results indicate that some caution needs to be exercised in the application of $\ell_1/\ell_\infty$ block regularization: if the data does not match its structure closely enough, it can impair statistical performance relative to computationally less expensive schemes.
[ { "version": "v1", "created": "Tue, 5 May 2009 16:28:50 GMT" } ]
2009-05-12T00:00:00
[ [ "Negahban", "S.", "" ], [ "Wainwright", "M. J.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0905.0677
Ivan Yu. Tyukin
Ivan Tyukin and Danil Prokhorov
Feasibility of random basis function approximators for modeling and control
null
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the role of random basis function approximators in modeling and control. We analyze the published work on random basis function approximators and demonstrate that their favorable error rate of convergence O(1/n) is guaranteed only with very substantial computational resources. We also discuss implications of our analysis for applications of neural networks in modeling and control.
[ { "version": "v1", "created": "Tue, 5 May 2009 19:45:13 GMT" } ]
2009-05-06T00:00:00
[ [ "Tyukin", "Ivan", "" ], [ "Prokhorov", "Danil", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.0721
Cemal Akcaba
Cemal Akcaba and Helmut Boelcskei
Diversity-Multiplexing Tradeoff in Fading Interference Channels
51 pages, submitted to IEEE Trans. Inf. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze two-user single-antenna fading interference channels with perfect receive channel state information (CSI) and no transmit CSI. We compute the diversity-multiplexing tradeoff (DMT) region of a fixed-power-split Han and Kobayashi (HK)-type superposition coding scheme and provide design criteria for the corresponding superposition codes. We demonstrate that this scheme is DMT-optimal under moderate, strong, and very strong interference by showing that it achieves a DMT outer bound that we derive. Further, under very strong interference, we show that a joint decoder is DMT-optimal and "decouples" the fading interference channel, i.e., from a DMT perspective, it is possible to transmit as if the interfering user were not present. In addition, we show that, under very strong interference, decoding interference while treating the intended signal as noise, subtracting the result out, and then decoding the desired signal, a process known as "stripping", achieves the optimal DMT region. Our proofs are constructive in the sense that code design criteria for achieving DMT-optimality (in the cases where we can demonstrate it) are provided.
[ { "version": "v1", "created": "Wed, 6 May 2009 13:29:04 GMT" } ]
2009-05-07T00:00:00
[ [ "Akcaba", "Cemal", "" ], [ "Boelcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0737
Ignacio Vega-Paez M en C
Ignacio Vega-Paez, Jose Angel Ortega, Georgina G. Pulido
REC language is a live on IBM1130 simulator, EL lenguaje REC esta vivo en el simulador de la IBM 1130
This work is archaeological reconstruction of REC/A language
null
null
IBP-TR2009-04
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
REC (Regular Expression Compiler) is a concise programming language development in mayor Mexican Universities at end of 60s which allows students to write programs without knowledge of the complicated syntax of languages like FORTRAN and ALGOL. The language is recursive and contains only four elements for control. This paper describes use of the interpreter of REC written in FORTRAN on IBM1130 Simulator from -Computer History Simulation- Project.
[ { "version": "v1", "created": "Wed, 6 May 2009 04:21:15 GMT" } ]
2009-05-07T00:00:00
[ [ "Vega-Paez", "Ignacio", "" ], [ "Ortega", "Jose Angel", "" ], [ "Pulido", "Georgina G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0905.0740
Ignacio Vega-Paez M en C
Gerardo Cisneros
A FORTRAN coded regular expression Compiler for IBM 1130 Computing System
This version of REC is archaeological reconstruction of REC/A language on IBM1130 Simulator (SIMH IBM 1130 Emulator and Disk Monitor System R2V12) from Computer History Simulation Project (www.ibm1130.org), also see REC language is a live for Ignacio Vega-Paez
Acta Mexicana de Ciencia y Tecnologia Vol. IV No. 1, page 30-86, 1970
null
IBP-Memo 2008-12
cs.CL cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
REC (Regular Expression Compiler) is a concise programming language which allows students to write programs without knowledge of the complicated syntax of languages like FORTRAN and ALGOL. The language is recursive and contains only four elements for control. This paper describes an interpreter of REC written in FORTRAN.
[ { "version": "v1", "created": "Wed, 6 May 2009 04:29:51 GMT" } ]
2011-07-12T00:00:00
[ [ "Cisneros", "Gerardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0905.0744
Hongkun Yang
Hongkun Yang, Bin Liu
Optimization of Energy Efficient Transmission in Underwater Sensor Networks
16 pages, 8 figures, in submission to Globecom'09
null
null
null
cs.NI
http://creativecommons.org/licenses/by-nc-sa/3.0/
Underwater communication is a challenging topic due to its singular channel characteristics. Most protocols used in terrestrial wireless communication can not be directly applied in the underwater world. In this paper, we focus on the issue of energy efficient transmission in underwater sensor networks (UWSNs) and analyze this problem in a rigorous and theoretical way. We formalize an optimization problem which aims to minimize energy consumption and simultaneously accounts for other performance metrics such as the data reliability and the communication delay. With the help of Karush-Kuhn-Tucker conditions (KKT conditions), we derive a simple and explicit, but nevertheless accurate, approximate solution under reasonable assumptions. This approximate solution provides theoretical guidelines for designing durable and reliable UWSNs. Our result also shows that reliability and communication delay are crucial factors to the energy consumption for transmission.
[ { "version": "v1", "created": "Wed, 6 May 2009 05:42:08 GMT" } ]
2009-05-07T00:00:00
[ [ "Yang", "Hongkun", "" ], [ "Liu", "Bin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.0747
Yoann Dieudonne
Yoann Dieudonn\'e (LaRIA, MIS), Franck Petit (LaRIA, LIP, INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme)
Self-stabilizing Determinsitic Gathering
null
null
null
null
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the possibility to deterministically solve the gathering problem (GP) with weak robots (anonymous, autonomous, disoriented, deaf and dumb, and oblivious). We introduce strong multiplicity detection as the ability for the robots to detect the exact number of robots located at a given position. We show that with strong multiplicity detection, there exists a deterministic self-stabilizing algorithm solving GP for n robots if, and only if, n is odd.
[ { "version": "v1", "created": "Wed, 6 May 2009 06:11:29 GMT" } ]
2009-05-07T00:00:00
[ [ "Dieudonné", "Yoann", "", "LaRIA, MIS" ], [ "Petit", "Franck", "", "LaRIA, LIP, INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0905.0749
Daniel Sidobre
Xavier Broqu\`ere (LAAS), Daniel Sidobre (LAAS), Ignacio Herrera-Aguilar (LAAS)
Soft Motion Trajectory Planner for Service Manipulator Robot
null
International Conference on Intelligent Robots and Systems, IROS 2008. IEEE/RSJ, Nice : France (2008)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human interaction introduces two main constraints: Safety and Comfort. Therefore service robot manipulator can't be controlled like industrial robotic manipulator where personnel is isolated from the robot's work envelope. In this paper, we present a soft motion trajectory planner to try to ensure that these constraints are satisfied. This planner can be used on-line to establish visual and force control loop suitable in presence of human. The cubic trajectories build by this planner are good candidates as output of a manipulation task planner. The obtained system is then homogeneous from task planning to robot control. The soft motion trajectory planner limits jerk, acceleration and velocity in cartesian space using quaternion. Experimental results carried out on a Mitsubishi PA10-6CE arm are presented.
[ { "version": "v1", "created": "Wed, 6 May 2009 06:12:28 GMT" } ]
2009-05-07T00:00:00
[ [ "Broquère", "Xavier", "", "LAAS" ], [ "Sidobre", "Daniel", "", "LAAS" ], [ "Herrera-Aguilar", "Ignacio", "", "LAAS" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0905.0768
Kunihiko Sadakane
Gonzalo Navarro, Kunihiko Sadakane
Fully-Functional Static and Dynamic Succinct Trees
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose new succinct representations of ordinal trees, which have been studied extensively. It is known that any $n$-node static tree can be represented in $2n + o(n)$ bits and a number of operations on the tree can be supported in constant time under the word-RAM model. However the data structures are complicated and difficult to dynamize. We propose a simple and flexible data structure, called the range min-max tree, that reduces the large number of relevant tree operations considered in the literature to a few primitives that are carried out in constant time on sufficiently small trees. The result is extended to trees of arbitrary size, achieving $2n + O(n /\polylog(n))$ bits of space. The redundancy is significantly lower than any previous proposal. Our data structure builds on the range min-max tree to achieve $2n+O(n/\log n)$ bits of space and $O(\log n)$ time for all the operations. We also propose an improved data structure using $2n+O(n\log\log n/\log n)$ bits and improving the time to the optimal $O(\log n/\log \log n)$ for most operations. Furthermore, we support sophisticated operations that allow attaching and detaching whole subtrees, in time $\Order(\log^{1+\epsilon} n / \log\log n)$. Our techniques are of independent interest. One allows representing dynamic bitmaps and sequences supporting rank/select and indels, within zero-order entropy bounds and optimal time $O(\log n / \log\log n)$ for all operations on bitmaps and polylog-sized alphabets, and $O(\log n \log \sigma / (\log\log n)^2)$ on larger alphabet sizes $\sigma$. This improves upon the best existing bounds for entropy-bounded storage of dynamic sequences, compressed full-text self-indexes, and compressed-space construction of the Burrows-Wheeler transform.
[ { "version": "v1", "created": "Wed, 6 May 2009 07:56:38 GMT" }, { "version": "v2", "created": "Fri, 15 May 2009 03:21:25 GMT" }, { "version": "v3", "created": "Wed, 26 May 2010 13:24:23 GMT" }, { "version": "v4", "created": "Mon, 7 Jun 2010 14:28:20 GMT" }, { "version": "v5", "created": "Fri, 24 Sep 2010 01:49:11 GMT" } ]
2010-09-27T00:00:00
[ [ "Navarro", "Gonzalo", "" ], [ "Sadakane", "Kunihiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.0792
Jan Treibig
Jan Treibig, Georg Hager
Introducing a Performance Model for Bandwidth-Limited Loop Kernels
8 pages
null
null
null
cs.PF cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a performance model for bandwidth limited loop kernels which is founded on the analysis of modern cache based microarchitectures. This model allows an accurate performance prediction and evaluation for existing instruction codes. It provides an in-depth understanding of how performance for different memory hierarchy levels is made up. The performance of raw memory load, store and copy operations and a stream vector triad are analyzed and benchmarked on three modern x86-type quad-core architectures in order to demonstrate the capabilities of the model.
[ { "version": "v1", "created": "Wed, 6 May 2009 10:55:04 GMT" } ]
2009-05-07T00:00:00
[ [ "Treibig", "Jan", "" ], [ "Hager", "Georg", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0905.0794
Weiguo Zhang
WeiGuo Zhang and GuoZhen Xiao
Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables
14 pages, 2 tables
IEEE Transactions on Information Theory, vol. 55, no. 12, pp. 5822-5831, December 2009
10.1109/TIT.2009.2032736
null
cs.IT cs.CR math.IT
http://creativecommons.org/licenses/by/3.0/
In this paper, a technique on constructing nonlinear resilient Boolean functions is described. By using several sets of disjoint spectra functions on a small number of variables, an almost optimal resilient function on a large even number of variables can be constructed. It is shown that given any $m$, one can construct infinitely many $n$-variable ($n$ even), $m$-resilient functions with nonlinearity $>2^{n-1}-2^{n/2}$. A large class of highly nonlinear resilient functions which were not known are obtained. Then one method to optimize the degree of the constructed functions is proposed. Last, an improved version of the main construction is given.
[ { "version": "v1", "created": "Wed, 6 May 2009 10:05:40 GMT" }, { "version": "v2", "created": "Thu, 6 Aug 2009 07:07:12 GMT" }, { "version": "v3", "created": "Sun, 25 Oct 2009 02:41:04 GMT" }, { "version": "v4", "created": "Tue, 27 Oct 2009 03:25:41 GMT" }, { "version": "v5", "created": "Wed, 4 Nov 2009 08:31:13 GMT" } ]
2009-11-18T00:00:00
[ [ "Zhang", "WeiGuo", "" ], [ "Xiao", "GuoZhen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0838
Nihar Jindal
Nihar Jindal, Angel Lozano, Thomas L. Marzetta
What is the Value of Joint Processing of Pilots and Data in Block-Fading Channels?
To appear at IEEE Int. Symposium on Information Theory; 5 pages
null
10.1109/ISIT.2009.5205818
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The spectral efficiency achievable with joint processing of pilot and data symbol observations is compared with that achievable through the conventional (separate) approach of first estimating the channel on the basis of the pilot symbols alone, and subsequently detecting the data symbols. Studied on the basis of a mutual information lower bound, joint processing is found to provide a non-negligible advantage relative to separate processing, particularly for fast fading. It is shown that, regardless of the fading rate, only a very small number of pilot symbols (at most one per transmit antenna and per channel coherence interval) should be transmitted if joint processing is allowed.
[ { "version": "v1", "created": "Wed, 6 May 2009 14:19:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Jindal", "Nihar", "" ], [ "Lozano", "Angel", "" ], [ "Marzetta", "Thomas L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0848
Sylvain Boussier
Sylvain Boussier (LIA), Michel Vasquez (LGI2P, EMA), Yannick Vimont (LGI2P), Said Hanafi (LAMIH), Philippe Michelon (LIA)
Solving the 0-1 Multidimensional Knapsack Problem with Resolution Search
null
VI ALIO/EURO Workshop on Applied Combinatorial Optimization, Buenos Aires : Argentine (2008)
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an exact method which combines the resolution search and branch & bound algorithms for solving the 0?1 Multidimensional Knapsack Problem. This algorithm is able to prove large?scale strong correlated instances. The optimal values of the 10 constraint, 500 variable instances of the OR-Library are exposed. These values were previously unknown.
[ { "version": "v1", "created": "Wed, 6 May 2009 14:58:02 GMT" } ]
2009-05-07T00:00:00
[ [ "Boussier", "Sylvain", "", "LIA" ], [ "Vasquez", "Michel", "", "LGI2P, EMA" ], [ "Vimont", "Yannick", "", "LGI2P" ], [ "Hanafi", "Said", "", "LAMIH" ], [ "Michelon", "Philippe", "", "LIA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.0869
Carlos P. Roca
Carlos P. Roca, Jos\'e A. Cuesta and Angel S\'anchez
Imperfect Imitation Can Enhance Cooperation
4 pages, 4 figures
Europhysics Letters 87, 48005 (2009)
10.1209/0295-5075/87/48005
null
q-bio.PE cs.GT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The promotion of cooperation on spatial lattices is an important issue in evolutionary game theory. This effect clearly depends on the update rule: it diminishes with stochastic imitative rules whereas it increases with unconditional imitation. To study the transition between both regimes, we propose a new evolutionary rule, which stochastically combines unconditional imitation with another imitative rule. We find that, surprinsingly, in many social dilemmas this rule yields higher cooperative levels than any of the two original ones. This nontrivial effect occurs because the basic rules induce a separation of timescales in the microscopic processes at cluster interfaces. The result is robust in the space of 2x2 symmetric games, on regular lattices and on scale-free networks.
[ { "version": "v1", "created": "Wed, 6 May 2009 16:35:54 GMT" } ]
2009-11-07T00:00:00
[ [ "Roca", "Carlos P.", "" ], [ "Cuesta", "José A.", "" ], [ "Sánchez", "Angel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0905.0940
Vincent Tan
Vincent Y. F. Tan, Animashree Anandkumar, Lang Tong and Alan S. Willsky
A Large-Deviation Analysis of the Maximum-Likelihood Learning of Markov Tree Structures
Accepted to the IEEE Transactions on Information Theory on Nov 18, 2010
null
10.1109/TIT.2011.2104513
null
stat.ML cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of maximum-likelihood (ML) estimation of discrete tree-structured distributions is considered. Chow and Liu established that ML-estimation reduces to the construction of a maximum-weight spanning tree using the empirical mutual information quantities as the edge weights. Using the theory of large-deviations, we analyze the exponent associated with the error probability of the event that the ML-estimate of the Markov tree structure differs from the true tree structure, given a set of independently drawn samples. By exploiting the fact that the output of ML-estimation is a tree, we establish that the error exponent is equal to the exponential rate of decay of a single dominant crossover event. We prove that in this dominant crossover event, a non-neighbor node pair replaces a true edge of the distribution that is along the path of edges in the true tree graph connecting the nodes in the non-neighbor pair. Using ideas from Euclidean information theory, we then analyze the scenario of ML-estimation in the very noisy learning regime and show that the error exponent can be approximated as a ratio, which is interpreted as the signal-to-noise ratio (SNR) for learning tree distributions. We show via numerical experiments that in this regime, our SNR approximation is accurate.
[ { "version": "v1", "created": "Thu, 7 May 2009 01:40:10 GMT" }, { "version": "v2", "created": "Tue, 19 Oct 2010 03:40:08 GMT" }, { "version": "v3", "created": "Sun, 21 Nov 2010 16:27:58 GMT" } ]
2016-11-15T00:00:00
[ [ "Tan", "Vincent Y. F.", "" ], [ "Anandkumar", "Animashree", "" ], [ "Tong", "Lang", "" ], [ "Willsky", "Alan S.", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.0976
Vinko Zlati\'c
Vinko Zlati\'c, Gourab Ghoshal, Guido Caldarelli
Hypergraph topological quantities for tagged social networks
8 pages, 9 figures, revtex
Phys. Rev. E 80, 036118 (2009)
10.1103/PhysRevE.80.036118
null
physics.soc-ph cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent years have witnessed the emergence of a new class of social networks, that require us to move beyond previously employed representations of complex graph structures. A notable example is that of the folksonomy, an online process where users collaboratively employ tags to resources to impart structure to an otherwise undifferentiated database. In a recent paper[1] we proposed a mathematical model that represents these structures as tripartite hypergraphs and defined basic topological quantities of interest. In this paper we extend our model by defining additional quantities such as edge distributions, vertex similarity and correlations as well as clustering. We then empirically measure these quantities on two real life folksonomies, the popular online photo sharing site Flickr and the bookmarking site CiteULike. We find that these systems share similar qualitative features with the majority of complex networks that have been previously studied. We propose that the quantities and methodology described here can be used as a standard tool in measuring the structure of tagged networks.
[ { "version": "v1", "created": "Thu, 7 May 2009 09:52:31 GMT" } ]
2011-05-23T00:00:00
[ [ "Zlatić", "Vinko", "" ], [ "Ghoshal", "Gourab", "" ], [ "Caldarelli", "Guido", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0905.1024
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
Greedoids on Vertex Sets of Unicycle Graphs
9 pages; 4 figures
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A maximum stable set in a graph G is a stable set of maximum cardinality. S is a local maximum stable set of G, if S is a maximum stable set of the subgraph induced by its closed neighborhood. It is known that the family of all local maximum stable sets of a forest forms a greedoid on its vertex set. Bipartite, triangle-free, and well-covered graphs whose families of local maximum stable sets form greedoids have been analyzed as well. A unicycle graph owns only one cycle. In this paper we characterize the unicycle graphs whose families of local maximum stable sets form greedoids.
[ { "version": "v1", "created": "Thu, 7 May 2009 13:10:20 GMT" } ]
2011-01-25T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.1039
Zurab Silagadze
Z.K. Silagadze
Citation entropy and research impact estimation
9 pages, 3 figures, significantly changed, version to by published in Acta Phys. Polon. B
Acta Phys. Polon. B41 (2010), 2325-2333
null
null
physics.soc-ph cond-mat.stat-mech cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new indicator, a real valued $s$-index, is suggested to characterize a quality and impact of the scientific research output. It is expected to be at least as useful as the notorious $h$-index, at the same time avoiding some its obvious drawbacks. However, surprisingly, the $h$-index is found to be quite a good indicator for majority of real-life citation data with their alleged Zipfian behaviour for which these drawbacks do not show up. The style of the paper was chosen deliberately somewhat frivolous to indicate that any attempt to characterize the scientific output of a researcher by just one number always has an element of a grotesque game in it and should not be taken too seriously. I hope this frivolous style will be perceived as a funny decoration only.
[ { "version": "v1", "created": "Thu, 7 May 2009 15:01:38 GMT" }, { "version": "v2", "created": "Sat, 18 Sep 2010 13:27:00 GMT" } ]
2010-11-01T00:00:00
[ [ "Silagadze", "Z. K.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0905.1045
Giovanni Pighizzini
Andreas Malcher and Giovanni Pighizzini
Descriptional complexity of bounded context-free languages
31 pages, 1 figure. A preliminary version was presented at DLT 2007. The full version is submitted to a journal
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finite-turn pushdown automata (PDA) are investigated concerning their descriptional complexity. It is known that they accept exactly the class of ultralinear context-free languages. Furthermore, the increase in size when converting arbitrary PDAs accepting ultralinear languages to finite-turn PDAs cannot be bounded by any recursive function. The latter phenomenon is known as non-recursive trade-off. In this paper, finite-turn PDAs accepting bounded languages are considered. First, letter-bounded languages are studied. We prove that in this case the non-recursive trade-off is reduced to a recursive trade-off, more precisely, to an exponential trade-off. A conversion algorithm is presented and the optimality of the construction is shown by proving tight lower bounds. Furthermore, the question of reducing the number of turns of a given finite-turn PDA is studied. Again, a conversion algorithm is provided which shows that in this case the trade-off is at most polynomial. Finally, the more general case of word-bounded languages is investigated. We show how the results obtained for letter-bounded languages can be extended to word-bounded languages.
[ { "version": "v1", "created": "Thu, 7 May 2009 15:18:10 GMT" }, { "version": "v2", "created": "Fri, 8 May 2009 14:20:09 GMT" } ]
2009-05-08T00:00:00
[ [ "Malcher", "Andreas", "" ], [ "Pighizzini", "Giovanni", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0905.1056
Ivan Soprunov
Ivan Soprunov, Evgenia Soprunova
Bringing Toric Codes to the next dimension
11 pages, 1 figure; Major changes in the section on parameters, new examples.
SIAM J. Discrete Math. Volume 24, no. 2, pp. 655-665 (2010)
10.1137/090762592
null
math.AG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is concerned with the minimum distance computation for higher dimensional toric codes defined by lattice polytopes. We show that the minimum distance is multiplicative with respect to taking the product of polytopes, and behaves in a simple way when one builds a k-dilate of a pyramid over a polytope. This allows us to construct a large class of examples of higher dimensional toric codes where we can compute the minimum distance explicitly.
[ { "version": "v1", "created": "Thu, 7 May 2009 15:51:16 GMT" }, { "version": "v2", "created": "Mon, 12 Apr 2010 21:30:41 GMT" } ]
2015-06-26T00:00:00
[ [ "Soprunov", "Ivan", "" ], [ "Soprunova", "Evgenia", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1093
Matt Gibson
Matt Gibson and Kasturi Varadarajan
Decomposing Coverings and the Planar Sensor Cover Problem
18 pages, 13 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that a $k$-fold covering using translates of an arbitrary convex polygon can be decomposed into $\Omega(k)$ covers (using an efficient algorithm). We generalize this result to obtain a constant factor approximation to the sensor cover problem where the ranges of the sensors are translates of a given convex polygon. The crucial ingredient in this generalization is a constant factor approximation algorithm for a one-dimensional version of the sensor cover problem, called the Restricted Strip Cover (RSC) problem, where sensors are intervals of possibly different lengths. Our algorithm for RSC improves on the previous $O(\log \log \log n)$ approximation.
[ { "version": "v1", "created": "Thu, 7 May 2009 19:03:57 GMT" } ]
2009-05-08T00:00:00
[ [ "Gibson", "Matt", "" ], [ "Varadarajan", "Kasturi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0905.1108
Aram Galstyan
Aram Galstyan, Vahe Musoyan, and Paul Cohen
Maximizing Influence Propagation in Networks with Community Structure
7 pages, 8 figures
Phys. Rev. E 79, 056102 (2009)
10.1103/PhysRevE.79.056102
null
physics.soc-ph cond-mat.stat-mech cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the algorithmic problem of selecting a set of target nodes that cause the biggest activation cascade in a network. In case when the activation process obeys the diminishing returns property, a simple hill-climbing selection mechanism has been shown to achieve a provably good performance. Here we study models of influence propagation that exhibit critical behavior, and where the property of diminishing returns does not hold. We demonstrate that in such systems, the structural properties of networks can play a significant role. We focus on networks with two loosely coupled communities, and show that the double-critical behavior of activation spreading in such systems has significant implications for the targeting strategies. In particular, we show that simple strategies that work well for homogeneous networks can be overly sub-optimal, and suggest simple modification for improving the performance, by taking into account the community structure.
[ { "version": "v1", "created": "Thu, 7 May 2009 19:29:48 GMT" } ]
2009-05-08T00:00:00
[ [ "Galstyan", "Aram", "" ], [ "Musoyan", "Vahe", "" ], [ "Cohen", "Paul", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0905.1113
Bogdan Nicolae
Bogdan Nicolae (INRIA - IRISA), Gabriel Antoniu (INRIA - IRISA, INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme), Luc Boug\'e (INRIA - IRISA, INRIA Rh\^one-Alpes / LIP Laboratoire de l'Informatique du Parall\'elisme)
BlobSeer: How to Enable Efficient Versioning for Large Object Storage under Heavy Access Concurrency
null
DAMAP 2009 (2009)
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To accommodate the needs of large-scale distributed P2P systems, scalable data management strategies are required, allowing applications to efficiently cope with continuously growing, highly dis tributed data. This paper addresses the problem of efficiently stor ing and accessing very large binary data objects (blobs). It proposesan efficient versioning scheme allowing a large number of clients to concurrently read, write and append data to huge blobs that are fragmented and distributed at a very large scale. Scalability under heavy concurrency is achieved thanks to an original metadata scheme, based on a distributed segment tree built on top of a Distributed Hash Table (DHT). Our approach has been implemented and experimented within our BlobSeer prototype on the Grid'5000 testbed, using up to 175 nodes.
[ { "version": "v1", "created": "Thu, 7 May 2009 19:37:48 GMT" } ]
2009-09-30T00:00:00
[ [ "Nicolae", "Bogdan", "", "INRIA - IRISA" ], [ "Antoniu", "Gabriel", "", "INRIA - IRISA, INRIA\n Rhône-Alpes / LIP Laboratoire de l'Informatique du Parallélisme" ], [ "Bougé", "Luc", "", "INRIA - IRISA, INRIA Rhône-Alpes / LIP Laboratoire de\n l'Informatique du Parallélisme" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0905.1129
Narad Rampersad
James Currie and Narad Rampersad
A proof of Dejean's conjecture
proof details added
null
null
null
math.CO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove Dejean's conjecture. Specifically, we show that Dejean's conjecture holds for the last remaining open values of n, namely 15 <= n <= 26.
[ { "version": "v1", "created": "Thu, 7 May 2009 20:19:04 GMT" }, { "version": "v2", "created": "Mon, 11 May 2009 14:49:23 GMT" }, { "version": "v3", "created": "Fri, 22 May 2009 16:50:26 GMT" } ]
2009-05-22T00:00:00
[ [ "Currie", "James", "" ], [ "Rampersad", "Narad", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0905.1130
Juan-Manuel Torres-Moreno
Florian Boudin, Patricia Velazquez-Morales and Juan-Manuel Torres-Moreno
Statistical Automatic Summarization in Organic Chemistry
10 pages, 3 figures
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an oriented numerical summarizer algorithm, applied to producing automatic summaries of scientific documents in Organic Chemistry. We present its implementation named Yachs (Yet Another Chemistry Summarizer) that combines a specific document pre-processing with a sentence scoring method relying on the statistical properties of documents. We show that Yachs achieves the best results among several other summarizers on a corpus of Organic Chemistry articles.
[ { "version": "v1", "created": "Thu, 7 May 2009 20:21:45 GMT" } ]
2009-05-11T00:00:00
[ [ "Boudin", "Florian", "" ], [ "Velazquez-Morales", "Patricia", "" ], [ "Torres-Moreno", "Juan-Manuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0905.1187
Markus Haltmeier
Markus Grasmair, Markus Haltmeier, and Otmar Scherzer
The Residual Method for Regularizing Ill-Posed Problems
29 pages, one figure
Appl. Math. Comput. 218(6): pp. 2693-2710 (2011)
10.1016/j.amc.2011.08.009
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although the \emph{residual method}, or \emph{constrained regularization}, is frequently used in applications, a detailed study of its properties is still missing. This sharply contrasts the progress of the theory of Tikhonov regularization, where a series of new results for regularization in Banach spaces has been published in the recent years. The present paper intends to bridge the gap between the existing theories as far as possible. We develop a stability and convergence theory for the residual method in general topological spaces. In addition, we prove convergence rates in terms of (generalized) Bregman distances, which can also be applied to non-convex regularization functionals. We provide three examples that show the applicability of our theory. The first example is the regularized solution of linear operator equations on $L^p$-spaces, where we show that the results of Tikhonov regularization generalize unchanged to the residual method. As a second example, we consider the problem of density estimation from a finite number of sampling points, using the Wasserstein distance as a fidelity term and an entropy measure as regularization term. It is shown that the densities obtained in this way depend continuously on the location of the sampled points and that the underlying density can be recovered as the number of sampling points tends to infinity. Finally, we apply our theory to compressed sensing. Here, we show the well-posedness of the method and derive convergence rates both for convex and non-convex regularization under rather weak conditions.
[ { "version": "v1", "created": "Fri, 8 May 2009 13:38:17 GMT" }, { "version": "v2", "created": "Tue, 7 Dec 2010 17:13:23 GMT" }, { "version": "v3", "created": "Thu, 21 Jul 2011 14:06:36 GMT" } ]
2012-12-06T00:00:00
[ [ "Grasmair", "Markus", "" ], [ "Haltmeier", "Markus", "" ], [ "Scherzer", "Otmar", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0905.1200
Jan Foniok
Jan Foniok, Jaroslav Nesetril, Claude Tardif
Interleaved adjoints on directed graphs
null
European J. Combin., 32(7), pp. 1018--1024, 2011
10.1016/j.ejc.2011.03.013
null
math.CO cs.DM math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For an integer k >= 1, the k-th interlacing adjoint of a digraph G is the digraph i_k(G) with vertex-set V(G)^k, and arcs ((u_1, ..., u_k), (v_1, ..., v_k)) such that (u_i,v_i) \in A(G) for i = 1, ..., k and (v_i, u_{i+1}) \in A(G) for i = 1, ..., k-1. For every k we derive upper and lower bounds for the chromatic number of i_k(G) in terms of that of G. In particular, we find tight bounds on the chromatic number of interlacing adjoints of transitive tournaments. We use this result in conjunction with categorial properties of adjoint functors to derive the following consequence. For every integer ell, there exists a directed path Q_{\ell} of algebraic length ell which admits homomorphisms into every directed graph of chromatic number at least 4. We discuss a possible impact of this approach on the multifactor version of the weak Hedetniemi conjecture.
[ { "version": "v1", "created": "Fri, 8 May 2009 08:33:13 GMT" }, { "version": "v2", "created": "Fri, 23 Jul 2010 14:40:51 GMT" } ]
2012-08-09T00:00:00
[ [ "Foniok", "Jan", "" ], [ "Nesetril", "Jaroslav", "" ], [ "Tardif", "Claude", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0905.1202
Pedro Pablo P\'erez Velasco
Pedro Pablo Perez Velasco
Matrix Graph Grammars as a Model of Computation
33 pages, 19 figures. English improved. One new section introducing an algebra of matrices
null
null
null
cs.DM cs.CC cs.FL
http://creativecommons.org/licenses/by-nc-sa/3.0/
Matrix Graph Grammars (MGG) is a novel approach to the study of graph dynamics ([15]). In the present contribution we look at MGG as a formal grammar and as a model of computation, which is a necessary step in the more ambitious program of tackling complexity theory through MGG. We also study its relation with other well-known models such as Turing machines (TM) and Boolean circuits (BC) as well as non-determinism. As a side effect, all techniques available for MGG can be applied to TMs and BCs.
[ { "version": "v1", "created": "Fri, 8 May 2009 08:35:23 GMT" }, { "version": "v2", "created": "Tue, 12 May 2009 06:40:21 GMT" }, { "version": "v3", "created": "Mon, 16 Nov 2009 07:00:16 GMT" } ]
2009-11-16T00:00:00
[ [ "Velasco", "Pedro Pablo Perez", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0905.1215
Dominik Seethaler
Dominik Seethaler, Joakim Jald\'en, Christoph Studer, and Helmut B\"olcskei
Tail Behavior of Sphere-Decoding Complexity in Random Lattices
To be presented at IEEE ISIT 2009, Seoul, Korea
null
10.1109/ISIT.2009.5205679
null
cs.IT cs.CC math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the (computational) complexity distribution of sphere-decoding (SD) for random infinite lattices. In particular, we show that under fairly general assumptions on the statistics of the lattice basis matrix, the tail behavior of the SD complexity distribution is solely determined by the inverse volume of a fundamental region of the underlying lattice. Particularizing this result to NxM, N>=M, i.i.d. Gaussian lattice basis matrices, we find that the corresponding complexity distribution is of Pareto-type with tail exponent given by N-M+1. We furthermore show that this tail exponent is not improved by lattice-reduction, which includes layer-sorting as a special case.
[ { "version": "v1", "created": "Fri, 8 May 2009 09:41:58 GMT" } ]
2016-11-15T00:00:00
[ [ "Seethaler", "Dominik", "" ], [ "Jaldén", "Joakim", "" ], [ "Studer", "Christoph", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0905.1235
Serguei Mokhov
Serguei A. Mokhov, Stephen Sinclair, Ian Cl\'ement, Dimitrios Nicolacopoulos (for the MARF R&D Group)
The Modular Audio Recognition Framework (MARF) and its Applications: Scientific and Software Engineering Notes
v2: add missing .ind file for index; 224 pages, 40 figures, 19 tables; index. A comprehensive description of AI and PR algorithms and data structures, software engineering design and implementation, and experiments. Source revision is maintained in the CVS at http://marf.sf.net
null
10.1007/978-1-4020-8741-7_84 10.1007/978-3-540-68825-9_21 10.1145/1370256.1370262
null
cs.SD cs.CL cs.CV cs.MM cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
MARF is an open-source research platform and a collection of voice/sound/speech/text and natural language processing (NLP) algorithms written in Java and arranged into a modular and extensible framework facilitating addition of new algorithms. MARF can run distributively over the network and may act as a library in applications or be used as a source for learning and extension. A few example applications are provided to show how to use the framework. There is an API reference in the Javadoc format as well as this set of accompanying notes with the detailed description of the architectural design, algorithms, and applications. MARF and its applications are released under a BSD-style license and is hosted at SourceForge.net. This document provides the details and the insight on the internals of MARF and some of the mentioned applications.
[ { "version": "v1", "created": "Fri, 8 May 2009 14:42:03 GMT" }, { "version": "v2", "created": "Sat, 25 Jul 2009 04:13:29 GMT" } ]
2019-08-14T00:00:00
[ [ "Mokhov", "Serguei A.", "", "for the MARF R&D Group" ], [ "Sinclair", "Stephen", "", "for the MARF R&D Group" ], [ "Clément", "Ian", "", "for the MARF R&D Group" ], [ "Nicolacopoulos", "Dimitrios", "", "for the MARF R&D Group" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0905.1248
Giovanni Pighizzini
Giovanni Pighizzini
Deterministic pushdown automata and unary languages
17 pages. Preprint of an article submitted for consideration in the International Journal of Foundations of Computer Science (World Scientific Publishing Company). A preliminary version was presented at the conference CIAA 2008
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The simulation of deterministic pushdown automata defined over a one-letter alphabet by finite state automata is investigated from a descriptional complexity point of view. We show that each unary deterministic pushdown automaton of size s can be simulated by a deterministic finite automaton with a number of states that is exponential in s. We prove that this simulation is tight. Furthermore, its cost cannot be reduced even if it is performed by a two-way nondeterministic automaton. We also prove that there are unary languages for which deterministic pushdown automata cannot be exponentially more succinct than finite automata. In order to state this result, we investigate the conversion of deterministic pushdown automata into context-free grammars. We prove that in the unary case the number of variables in the resulting grammar is strictly smaller than the number of variables needed in the case of nonunary alphabets.
[ { "version": "v1", "created": "Fri, 8 May 2009 14:24:08 GMT" } ]
2009-05-11T00:00:00
[ [ "Pighizzini", "Giovanni", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0905.1271
Giovanni Pighizzini
Giovanni Pighizzini
Nondeterministic one-tape off-line Turing machines and their time complexity
18 pages. The paper will appear on the Journal of Automata, Languages and Combinatorics
null
null
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the time and the crossing sequence complexities of one-tape off-line Turing machines. We show that the running time of each nondeterministic machine accepting a nonregular language must grow at least as n\log n, in the case all accepting computations are considered (accept measure). We also prove that the maximal length of the crossing sequences used in accepting computations must grow at least as \log n. On the other hand, it is known that if the time is measured considering, for each accepted string, only the faster accepting computation (weak measure), then there exist nonregular languages accepted in linear time. We prove that under this measure, each accepting computation should exhibit a crossing sequence of length at least \log\log n. We also present efficient implementations of algorithms accepting some unary nonregular languages.
[ { "version": "v1", "created": "Fri, 8 May 2009 14:34:37 GMT" } ]
2009-05-11T00:00:00
[ [ "Pighizzini", "Giovanni", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0905.1300
John Watrous
Rahul Jain, Sarvagya Upadhyay, and John Watrous
Two-message quantum interactive proofs are in PSPACE
24 pages
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that QIP(2), the class of problems having two-message quantum interactive proof systems, is a subset of PSPACE. This relationship is obtained by means of an efficient parallel algorithm, based on the multiplicative weights update method, for approximately solving a certain class of semidefinite programs.
[ { "version": "v1", "created": "Fri, 8 May 2009 17:22:04 GMT" } ]
2009-05-11T00:00:00
[ [ "Jain", "Rahul", "" ], [ "Upadhyay", "Sarvagya", "" ], [ "Watrous", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0905.1305
Nestor Chatzidiamantis
Nestor D. Chatzidiamantis and George K. Karagiannidis
On the Distribution of the Sum of Gamma-Gamma Variates and Applications in RF and Optical Wireless Communications
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Gamma-Gamma (GG) distribution has recently attracted the interest within the research community due to its involvement in various communication systems. In the context of RF wireless communications, GG distribution accurately models the power statistics in composite shadowing/fading channels as well as in cascade multipath fading channels, while in optical wireless (OW) systems, it describes the fluctuations of the irradiance of optical signals distorted by atmospheric turbulence. Although GG channel model offers analytical tractability in the analysis of single input single output (SISO) wireless systems, difficulties arise when studying multiple input multiple output (MIMO) systems, where the distribution of the sum of independent GG variates is required. In this paper, we present a novel simple closed-form approximation for the distribution of the sum of independent, but not necessarily identically distributed GG variates. It is shown that the probability density function (PDF) of the GG sum can be efficiently approximated either by the PDF of a single GG distribution, or by a finite weighted sum of PDFs of GG distributions. To reveal the importance of the proposed approximation, the performance of RF wireless systems in the presence of composite fading, as well as MIMO OW systems impaired by atmospheric turbulence, are investigated. Numerical results and simulations illustrate the accuracy of the proposed approach.
[ { "version": "v1", "created": "Fri, 8 May 2009 17:35:15 GMT" } ]
2009-05-11T00:00:00
[ [ "Chatzidiamantis", "Nestor D.", "" ], [ "Karagiannidis", "George K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1307
Michael Goodrich
Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic
An Efficient Dynamic and Distributed RSA Accumulator
Expanded version of a paper appearing in the 5th International Information Security Conference (ISC)
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how to use the RSA one-way accumulator to realize an efficient and dynamic authenticated dictionary, where untrusted directories provide cryptographically verifiable answers to membership queries on a set maintained by a trusted source. Our accumulator-based scheme for authenticated dictionaries supports efficient incremental updates of the underlying set by insertions and deletions of elements. Also, the user can optimally verify in constant time the authenticity of the answer provided by a directory with a simple and practical algorithm. We have also implemented this scheme and we give empirical results that can be used to determine the best strategy for systems implementation with respect to resources that are available. This work has applications to certificate revocation in public key infrastructure and end-to-end integrity of data collections published by third parties on the Internet.
[ { "version": "v1", "created": "Fri, 8 May 2009 17:49:57 GMT" } ]
2009-05-11T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Tamassia", "Roberto", "" ], [ "Hasic", "Jasminka", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0905.1362
Joaquin Garcia-Alfaro
Stere Preda, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro, and Laurent Toutain
Reliable Process for Security Policy Deployment
12 pages
Proc. 2007 International Conference on Security and Cryptography (Secrypt 2007), Barcelona, Spain, July 2007
null
null
cs.CR cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.
[ { "version": "v1", "created": "Sat, 9 May 2009 01:37:47 GMT" } ]
2009-05-12T00:00:00
[ [ "Preda", "Stere", "" ], [ "Cuppens-Boulahia", "Nora", "" ], [ "Cuppens", "Frederic", "" ], [ "Garcia-Alfaro", "Joaquin", "" ], [ "Toutain", "Laurent", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0905.1375
Yen-Wei Huang
Yen-Wei Huang, Pierre Moulin
Saddle-point Solution of the Fingerprinting Capacity Game Under the Marking Assumption
5 pages, to appear in 2009 IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June 2009
null
10.1109/ISIT.2009.5205882
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a fingerprinting game in which the collusion channel is unknown. The encoder embeds fingerprints into a host sequence and provides the decoder with the capability to trace back pirated copies to the colluders. Fingerprinting capacity has recently been derived as the limit value of a sequence of maxmin games with mutual information as the payoff function. However, these games generally do not admit saddle-point solutions and are very hard to solve numerically. Here under the so-called Boneh-Shaw marking assumption, we reformulate the capacity as the value of a single two-person zero-sum game, and show that it is achieved by a saddle-point solution. If the maximal coalition size is $k$ and the fingerprint alphabet is binary, we derive equations that can numerically solve the capacity game for arbitrary $k$. We also provide tight upper and lower bounds on the capacity. Finally, we discuss the asymptotic behavior of the fingerprinting game for large $k$ and practical implementation issues.
[ { "version": "v1", "created": "Sat, 9 May 2009 04:43:44 GMT" } ]
2010-11-05T00:00:00
[ [ "Huang", "Yen-Wei", "" ], [ "Moulin", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1385
Vit Niennattrakul
Vit Niennattrakul, Chotirat Ann Ratanamahatana
Making Hand Geometry Verification System More Accurate Using Time Series Representation with R-K Band Learning
In Proceedings of 11th National Computer Science and Engineering Conference (NCSEC 2007), Bangkok, Thailand, 19/11/2007. 8 pages, 10 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At present, applications of biometrics are rapidly increasing due to inconveniences in using traditional passwords and physical keys. Hand geometry, one of the most well-known biometrics, is implemented in many verification systems with various feature extraction methods. In recent work, a hand geometry verification system using time series conversion techniques and Dynamic Time Warping (DTW) distance measure with Sakoe-Chiba band has been proposed. This system demonstrates many advantages, especially ease of implementation and small storage space requirement using time series representation. In this paper, we propose a novel hand geometry verification system that exploits DTW distance measure and R-K band learning to further improve the system performance. Finally, our evaluation reveals that our proposed system outperforms the current system by a wide margin, in terms of False Acceptance Rate (FAR), False Rejection Rate (FRR), and Total Success Rate (TSR) at Equal Error Rate (EER).
[ { "version": "v1", "created": "Sat, 9 May 2009 17:31:37 GMT" } ]
2009-05-12T00:00:00
[ [ "Niennattrakul", "Vit", "" ], [ "Ratanamahatana", "Chotirat Ann", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0905.1386
Pedro Coronel
Pedro Coronel, Markus G\"artner, and Helmut B\"olcskei
Selective-Fading Multiple-Access MIMO Channels: Diversity-Multiplexing Tradeoff and Dominant Outage Event Regions
Corrections in Section V
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish the optimal diversity-multiplexing (DM) tradeoff for coherent selective-fading multiple-access MIMO channels and provide corresponding code design criteria. As a byproduct, on the conceptual level, we find an interesting relation between the DM tradeoff framework and the notion of dominant error event regions, first introduced in the AWGN case by Gallager, IEEE Trans. IT, 1985. This relation allows us to accurately characterize the error mechanisms in MIMO fading multiple-access channels. In particular, we find that, for a given rate tuple, the maximum achievable diversity order is determined by a single outage event that dominates the total error probability exponentially in SNR. Finally, we examine the distributed space-time code construction proposed by Badr and Belfiore, Int. Zurich Seminar on Commun., 2008, using the code design criteria derived in this paper.
[ { "version": "v1", "created": "Sat, 9 May 2009 08:01:15 GMT" }, { "version": "v2", "created": "Fri, 26 Jun 2009 09:45:45 GMT" } ]
2009-06-26T00:00:00
[ [ "Coronel", "Pedro", "" ], [ "Gärtner", "Markus", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1424
Dmitry Ignatov
Sergei O. Kuznetsov, Dmitry I. Ignatov
Concept Stability for Constructing Taxonomies of Web-site Users
Sergei O. Kuznetsov, D.I. Ignatov, Concept Stability for Constructing Taxonomies of Web-site users, in Proc. Social Network Analysis and Conceptual Structures: Exploring Opportunities, S. Obiedkov, C. Roth (Eds.), Clermont-Ferrand (France), February 16, 2007
null
null
null
cs.CY cs.AI cs.SI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Owners of a web-site are often interested in analysis of groups of users of their site. Information on these groups can help optimizing the structure and contents of the site. In this paper we use an approach based on formal concepts for constructing taxonomies of user groups. For decreasing the huge amount of concepts that arise in applications, we employ stability index of a concept, which describes how a group given by a concept extent differs from other such groups. We analyze resulting taxonomies of user groups for three target websites.
[ { "version": "v1", "created": "Sat, 9 May 2009 18:35:50 GMT" }, { "version": "v2", "created": "Thu, 24 Nov 2016 19:25:12 GMT" } ]
2016-11-28T00:00:00
[ [ "Kuznetsov", "Sergei O.", "" ], [ "Ignatov", "Dmitry I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0905.1460
Feifei Gao
Feifei Gao, Rui Zhang, Ying-Chang Liang, and Xiaodong Wang
Design of Learning Based MIMO Cognitive Radio Systems
30 pages, 10 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the design issues of the multi-antenna-based cognitive radio (CR) system that is able to operate concurrently with the licensed primary radio (PR) system. We propose a practical CR transmission strategy consisting of three major stages: environment learning, channel training, and data transmission. In the environment learning stage, the CR transceivers both listen to the PR transmission and apply blind algorithms to estimate the spaces that are orthogonal to the channels from the PR. Assuming time-division duplex (TDD) based transmission for the PR, cognitive beamforming is then designed and applied at CR transceivers to restrict the interference to/from the PR during the subsequent channel training and data transmission stages. In the channel training stage, the CR transmitter sends training signals to the CR receiver, which applies the linear-minimum-mean-square-error (LMMSE) based estimator to estimate the effective channel. Considering imperfect estimations in both learning and training stages, we derive a lower bound on the ergodic capacity achievable for the CR in the data transmission stage. From this capacity lower bound, we observe a general learning/training/throughput tradeoff associated with the proposed scheme, pertinent to transmit power allocation between training and transmission stages, as well as time allocation among learning, training, and transmission stages. We characterize the aforementioned tradeoff by optimizing the associated power and time allocation to maximize the CR ergodic capacity.
[ { "version": "v1", "created": "Sun, 10 May 2009 09:17:10 GMT" } ]
2009-05-12T00:00:00
[ [ "Gao", "Feifei", "" ], [ "Zhang", "Rui", "" ], [ "Liang", "Ying-Chang", "" ], [ "Wang", "Xiaodong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1512
Eitan Yaakobi
Hessam Mahdavifar, Paul H. Siegel, Alexander Vardy, Jack K. Wolf, and Eitan Yaakobi
A Nearly Optimal Construction of Flash Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Flash memory is a non-volatile computer memory comprised of blocks of cells, wherein each cell can take on q different values or levels. While increasing the cell level is easy, reducing the level of a cell can be accomplished only by erasing an entire block. Since block erasures are highly undesirable, coding schemes - known as floating codes or flash codes - have been designed in order to maximize the number of times that information stored in a flash memory can be written (and re-written) prior to incurring a block erasure. An (n,k,t)_q flash code C is a coding scheme for storing k information bits in n cells in such a way that any sequence of up to t writes (where a write is a transition 0 -> 1 or 1 -> 0 in any one of the k bits) can be accommodated without a block erasure. The total number of available level transitions in n cells is n(q-1), and the write deficiency of C, defined as \delta(C) = n(q-1) - t, is a measure of how close the code comes to perfectly utilizing all these transitions. For k > 6 and large n, the best previously known construction of flash codes achieves a write deficiency of O(qk^2). On the other hand, the best known lower bound on write deficiency is \Omega(qk). In this paper, we present a new construction of flash codes that approaches this lower bound to within a factor logarithmic in k. To this end, we first improve upon the so-called "indexed" flash codes, due to Jiang and Bruck, by eliminating the need for index cells in the Jiang-Bruck construction. Next, we further increase the number of writes by introducing a new multi-stage (recursive) indexing scheme. We then show that the write deficiency of the resulting flash codes is O(qk\log k) if q \geq \log_2k, and at most O(k\log^2 k) otherwise.
[ { "version": "v1", "created": "Sun, 10 May 2009 22:36:59 GMT" } ]
2009-05-12T00:00:00
[ [ "Mahdavifar", "Hessam", "" ], [ "Siegel", "Paul H.", "" ], [ "Vardy", "Alexander", "" ], [ "Wolf", "Jack K.", "" ], [ "Yaakobi", "Eitan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1537
Sang Won Choi
Sang Won Choi and Sae-Young Chung
On the Separability of Parallel Gaussian Interference Channels
5 pages, 1 figure, to appear in proc. IEEE ISIT, June 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The separability in parallel Gaussian interference channels (PGICs) is studied in this paper. We generalize the separability results in one-sided PGICs (OPGICs) by Sung \emph{et al.} to two-sided PGICs (TPGICs). Specifically, for strong and mixed TPGICs, we show necessary and sufficient conditions for the separability. For this, we show diagonal covariance matrices are sum-rate optimal for strong and mixed TPGICs.
[ { "version": "v1", "created": "Mon, 11 May 2009 04:24:26 GMT" } ]
2009-05-12T00:00:00
[ [ "Choi", "Sang Won", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1543
Sang-Woon Jeon
Sang-Woon Jeon and Sae-Young Chung
Sum capacity of multi-source linear finite-field relay networks with fading
5 pages, 2 figures, to appear in proc. IEEE ISIT, June 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a fading linear finite-field relay network having multiple source-destination pairs. Because of the interference created by different unicast sessions, the problem of finding its capacity region is in general difficult. We observe that, since channels are time-varying, relays can deliver their received signals by waiting for appropriate channel realizations such that the destinations can decode their messages without interference. We propose a block Markov encoding and relaying scheme that exploits such channel variations. By deriving a general cut-set upper bound and an achievable rate region, we characterize the sum capacity for some classes of channel distributions and network topologies. For example, when the channels are uniformly distributed, the sum capacity is given by the minimum average rank of the channel matrices constructed by all cuts that separate the entire sources and destinations. We also describe other cases where the capacity is characterized.
[ { "version": "v1", "created": "Mon, 11 May 2009 05:17:49 GMT" } ]
2009-05-12T00:00:00
[ [ "Jeon", "Sang-Woon", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1546
Anthony Man-Cho So
Zhisu Zhu, Anthony Man-Cho So, Yinyu Ye
Fast and Near-Optimal Matrix Completion via Randomized Basis Pursuit
23 pages. New section (Section 3.3) added
null
null
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the philosophy and phenomenal success of compressed sensing, the problem of reconstructing a matrix from a sampling of its entries has attracted much attention recently. Such a problem can be viewed as an information-theoretic variant of the well-studied matrix completion problem, and the main objective is to design an efficient algorithm that can reconstruct a matrix by inspecting only a small number of its entries. Although this is an impossible task in general, Cand\`es and co-authors have recently shown that under a so-called incoherence assumption, a rank $r$ $n\times n$ matrix can be reconstructed using semidefinite programming (SDP) after one inspects $O(nr\log^6n)$ of its entries. In this paper we propose an alternative approach that is much more efficient and can reconstruct a larger class of matrices by inspecting a significantly smaller number of the entries. Specifically, we first introduce a class of so-called stable matrices and show that it includes all those that satisfy the incoherence assumption. Then, we propose a randomized basis pursuit (RBP) algorithm and show that it can reconstruct a stable rank $r$ $n\times n$ matrix after inspecting $O(nr\log n)$ of its entries. Our sampling bound is only a logarithmic factor away from the information-theoretic limit and is essentially optimal. Moreover, the runtime of the RBP algorithm is bounded by $O(nr^2\log n+n^2r)$, which compares very favorably with the $\Omega(n^4r^2\log^{12}n)$ runtime of the SDP-based algorithm. Perhaps more importantly, our algorithm will provide an exact reconstruction of the input matrix in polynomial time. By contrast, the SDP-based algorithm can only provide an approximate one in polynomial time.
[ { "version": "v1", "created": "Mon, 11 May 2009 06:13:49 GMT" }, { "version": "v2", "created": "Fri, 15 May 2009 03:38:47 GMT" } ]
2009-05-15T00:00:00
[ [ "Zhu", "Zhisu", "" ], [ "So", "Anthony Man-Cho", "" ], [ "Ye", "Yinyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1583
Haim Kaplan
Gy\"orgy Elekes and Haim Kaplan and Micha Sharir
On Lines, Joints, and Incidences in Three Dimensions
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend (and somewhat simplify) the algebraic proof technique of Guth and Katz \cite{GK}, to obtain several sharp bounds on the number of incidences between lines and points in three dimensions. Specifically, we show: (i) The maximum possible number of incidences between $n$ lines in $\reals^3$ and $m$ of their joints (points incident to at least three non-coplanar lines) is $\Theta(m^{1/3}n)$ for $m\ge n$, and $\Theta(m^{2/3}n^{2/3}+m+n)$ for $m\le n$. (ii) In particular, the number of such incidences cannot exceed $O(n^{3/2})$. (iii) The bound in (i) also holds for incidences between $n$ lines and $m$ arbitrary points (not necessarily joints), provided that no plane contains more than O(n) points and each point is incident to at least three lines. As a preliminary step, we give a simpler proof of (an extension of) the bound $O(n^{3/2})$, established by Guth and Katz, on the number of joints in a set of $n$ lines in $\reals^3$. We also present some further extensions of these bounds, and give a proof of Bourgain's conjecture on incidences between points and lines in 3-space, which constitutes a simpler alternative to the proof of \cite{GK}.
[ { "version": "v1", "created": "Mon, 11 May 2009 16:39:03 GMT" } ]
2009-05-12T00:00:00
[ [ "Elekes", "György", "" ], [ "Kaplan", "Haim", "" ], [ "Sharir", "Micha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0905.1587
Dominik Scheder
Dominik Scheder
Unsatisfiable Linear CNF Formulas Are Large and Complex
12 pages plus a two-page appendix; corrected an inconsistency between title of the paper and title of the arxiv submission
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We call a CNF formula linear if any two clauses have at most one variable in common. We show that there exist unsatisfiable linear k-CNF formulas with at most 4k^2 4^k clauses, and on the other hand, any linear k-CNF formula with at most 4^k/(8e^2k^2) clauses is satisfiable. The upper bound uses probabilistic means, and we have no explicit construction coming even close to it. One reason for this is that unsatisfiable linear formulas exhibit a more complex structure than general (non-linear) formulas: First, any treelike resolution refutation of any unsatisfiable linear k-CNF formula has size at least 2^(2^(k/2-1))$. This implies that small unsatisfiable linear k-CNF formulas are hard instances for Davis-Putnam style splitting algorithms. Second, if we require that the formula F have a strict resolution tree, i.e. every clause of F is used only once in the resolution tree, then we need at least a^a^...^a clauses, where a is approximately 2 and the height of this tower is roughly k.
[ { "version": "v1", "created": "Mon, 11 May 2009 09:55:07 GMT" }, { "version": "v2", "created": "Tue, 15 Dec 2009 15:12:19 GMT" }, { "version": "v3", "created": "Fri, 18 Dec 2009 15:37:15 GMT" }, { "version": "v4", "created": "Wed, 3 Feb 2010 13:55:40 GMT" }, { "version": "v5", "created": "Thu, 28 Oct 2010 08:32:45 GMT" } ]
2010-10-29T00:00:00
[ [ "Scheder", "Dominik", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.1594
Marko A. Rodriguez
Marko A. Rodriguez and David W. Allen and Joshua Shinavier and Gary Ebersole
A Recommender System to Support the Scholarly Communication Process
null
null
null
KRS-2009-02
cs.DL cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The number of researchers, articles, journals, conferences, funding opportunities, and other such scholarly resources continues to grow every year and at an increasing rate. Many services have emerged to support scholars in navigating particular aspects of this resource-rich environment. Some commercial publishers provide recommender and alert services for the articles and journals in their digital libraries. Similarly, numerous noncommercial social bookmarking services have emerged for citation sharing. While these services do provide some support, they lack an understanding of the various problem-solving scenarios that researchers face daily. Example scenarios, to name a few, include when a scholar is in search of an article related to another article of interest, when a scholar is in search of a potential collaborator for a funding opportunity, when a scholar is in search of an optimal venue to which to submit their article, and when a scholar, in the role of an editor, is in search of referees to review an article. All of these example scenarios can be represented as a problem in information filtering by means of context-sensitive recommendation. This article presents an overview of a context-sensitive recommender system to support the scholarly communication process that is based on the standards and technology set forth by the Semantic Web initiative.
[ { "version": "v1", "created": "Mon, 11 May 2009 18:58:16 GMT" } ]
2009-05-12T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Allen", "David W.", "" ], [ "Shinavier", "Joshua", "" ], [ "Ebersole", "Gary", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0905.1608
Jean B. Lasserre
Jean Lasserre (LAAS), S. Zeron
Certificates and relaxations for integer programming and the semi-group membership problem
21 pages
null
null
null
math.OC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider integer programming and the semi-group membership problem. We provide the following theorem of the alternative: the system Ax=b has no nonnegative integral solution x if and only if p(b) <0 for some given polynomial p whose vector of coefficients lies in a convex cone that we characterize. We also provide a hierarchy of linear programming relaxations, where the continuous case Ax=b with x real and nonnegative, describes the first relaxation in the hierarchy.
[ { "version": "v1", "created": "Mon, 11 May 2009 12:16:33 GMT" } ]
2009-05-12T00:00:00
[ [ "Lasserre", "Jean", "", "LAAS" ], [ "Zeron", "S.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.1609
Nabil Hathout
Nabil Hathout (CLLE)
Acquisition of morphological families and derivational series from a machine readable dictionary
proceedings of the 6th D\'ecembrettes
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a linguistic and computational model aiming at making the morphological structure of the lexicon emerge from the formal and semantic regularities of the words it contains. The model is word-based. The proposed morphological structure consists of (1) binary relations that connect each headword with words that are morphologically related, and especially with the members of its morphological family and its derivational series, and of (2) the analogies that hold between the words. The model has been tested on the lexicon of French using the TLFi machine readable dictionary.
[ { "version": "v1", "created": "Mon, 11 May 2009 12:17:36 GMT" } ]
2009-05-12T00:00:00
[ [ "Hathout", "Nabil", "", "CLLE" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0905.1643
Shiqian Ma
Shiqian Ma, Donald Goldfarb and Lifeng Chen
Fixed Point and Bregman Iterative Methods for Matrix Rank Minimization
null
null
null
null
math.OC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The linearly constrained matrix rank minimization problem is widely applicable in many fields such as control, signal processing and system identification. The tightest convex relaxation of this problem is the linearly constrained nuclear norm minimization. Although the latter can be cast as a semidefinite programming problem, such an approach is computationally expensive to solve when the matrices are large. In this paper, we propose fixed point and Bregman iterative algorithms for solving the nuclear norm minimization problem and prove convergence of the first of these algorithms. By using a homotopy approach together with an approximate singular value decomposition procedure, we get a very fast, robust and powerful algorithm, which we call FPCA (Fixed Point Continuation with Approximate SVD), that can solve very large matrix rank minimization problems. Our numerical results on randomly generated and real matrix completion problems demonstrate that this algorithm is much faster and provides much better recoverability than semidefinite programming solvers such as SDPT3. For example, our algorithm can recover 1000 x 1000 matrices of rank 50 with a relative error of 1e-5 in about 3 minutes by sampling only 20 percent of the elements. We know of no other method that achieves as good recoverability. Numerical experiments on online recommendation, DNA microarray data set and image inpainting problems demonstrate the effectiveness of our algorithms.
[ { "version": "v1", "created": "Mon, 11 May 2009 15:45:03 GMT" }, { "version": "v2", "created": "Tue, 12 May 2009 01:52:03 GMT" } ]
2009-05-12T00:00:00
[ [ "Ma", "Shiqian", "" ], [ "Goldfarb", "Donald", "" ], [ "Chen", "Lifeng", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1737
Russell Martin
J. Czyzowicz, S. Dobrev, L. Gasieniec, D. Ilcinkas, J. Jansson, R. Klasing, I. Lignos, R. Martin, K. Sadakane, and W.-K. Sung
More efficient periodic traversal in anonymous undirected graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of periodic graph exploration in which a mobile entity with constant memory, an agent, has to visit all n nodes of an arbitrary undirected graph G in a periodic manner. Graphs are supposed to be anonymous, that is, nodes are unlabeled. However, while visiting a node, the robot has to distinguish between edges incident to it. For each node v the endpoints of the edges incident to v are uniquely identified by different integer labels called port numbers. We are interested in minimisation of the length of the exploration period. This problem is unsolvable if the local port numbers are set arbitrarily. However, surprisingly small periods can be achieved when assigning carefully the local port numbers. Dobrev et al. described an algorithm for assigning port numbers, and an oblivious agent (i.e. agent with no memory) using it, such that the agent explores all graphs of size n within period 10n. Providing the agent with a constant number of memory bits, the optimal length of the period was previously proved to be no more than 3.75n (using a different assignment of the port numbers). In this paper, we improve both these bounds. More precisely, we show a period of length at most 4 1/3 n for oblivious agents, and a period of length at most 3.5n for agents with constant memory. Moreover, we give the first non-trivial lower bound, 2.8n, on the period length for the oblivious case.
[ { "version": "v1", "created": "Mon, 11 May 2009 23:51:02 GMT" } ]
2009-05-13T00:00:00
[ [ "Czyzowicz", "J.", "" ], [ "Dobrev", "S.", "" ], [ "Gasieniec", "L.", "" ], [ "Ilcinkas", "D.", "" ], [ "Jansson", "J.", "" ], [ "Klasing", "R.", "" ], [ "Lignos", "I.", "" ], [ "Martin", "R.", "" ], [ "Sadakane", "K.", "" ], [ "Sung", "W. -K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.1738
Predrag Jelenkovic
Predrag R. Jelenkovic and Mariana Olvera-Cravioto
Information Ranking and Power Laws on Trees
null
null
null
null
math.PR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the situations when the solution to a weighted stochastic recursion has a power law tail. To this end, we develop two complementary approaches, the first one extends Goldie's (1991) implicit renewal theorem to cover recursions on trees; and the second one is based on a direct sample path large deviations analysis of weighted recursive random sums. We believe that these methods may be of independent interest in the analysis of more general weighted branching processes as well as in the analysis of algorithms.
[ { "version": "v1", "created": "Mon, 11 May 2009 23:57:58 GMT" }, { "version": "v2", "created": "Tue, 27 Oct 2009 17:39:41 GMT" }, { "version": "v3", "created": "Wed, 28 Jul 2010 22:28:53 GMT" } ]
2010-07-30T00:00:00
[ [ "Jelenkovic", "Predrag R.", "" ], [ "Olvera-Cravioto", "Mariana", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0905.1740
Bernardo Huberman
Fang Wu, Dennis M. Wilkinson and Bernardo A. Huberman
Feedback loops of attention in peer production
null
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A significant percentage of online content is now published and consumed via the mechanism of crowdsourcing. While any user can contribute to these forums, a disproportionately large percentage of the content is submitted by very active and devoted users, whose continuing participation is key to the sites' success. As we show, people's propensity to keep participating increases the more they contribute, suggesting motivating factors which increase over time. This paper demonstrates that submitters who stop receiving attention tend to stop contributing, while prolific contributors attract an ever increasing number of followers and their attention in a feedback loop. We demonstrate that this mechanism leads to the observed power law in the number of contributions per user and support our assertions by an analysis of hundreds of millions of contributions to top content sharing websites Digg.com and Youtube.com.
[ { "version": "v1", "created": "Tue, 12 May 2009 00:00:04 GMT" } ]
2009-05-15T00:00:00
[ [ "Wu", "Fang", "" ], [ "Wilkinson", "Dennis M.", "" ], [ "Huberman", "Bernardo A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0905.1744
Fahad Saeed
Fahad Saeed and Ashfaq Khokhar
A Domain Decomposition Strategy for Alignment of Multiple Biological Sequences on Multiprocessor Platforms
36 pages, 17 figures, Accepted manuscript in Journal of Parallel and Distributed Computing(JPDC)
as: F. Saeed, A. Khokhar, A domain decomposition strategy for alignment of multiple biological sequences on multiprocessor platforms, J. Parallel Distrib. Comput. (2009)
10.1016/j.jpdc.2009.03.006
null
cs.DC q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple Sequences Alignment (MSA) of biological sequences is a fundamental problem in computational biology due to its critical significance in wide ranging applications including haplotype reconstruction, sequence homology, phylogenetic analysis, and prediction of evolutionary origins. The MSA problem is considered NP-hard and known heuristics for the problem do not scale well with increasing number of sequences. On the other hand, with the advent of new breed of fast sequencing techniques it is now possible to generate thousands of sequences very quickly. For rapid sequence analysis, it is therefore desirable to develop fast MSA algorithms that scale well with the increase in the dataset size. In this paper, we present a novel domain decomposition based technique to solve the MSA problem on multiprocessing platforms. The domain decomposition based technique, in addition to yielding better quality, gives enormous advantage in terms of execution time and memory requirements. The proposed strategy allows to decrease the time complexity of any known heuristic of O(N)^x complexity by a factor of O(1/p)^x, where N is the number of sequences, x depends on the underlying heuristic approach, and p is the number of processing nodes. In particular, we propose a highly scalable algorithm, Sample-Align-D, for aligning biological sequences using Muscle system as the underlying heuristic. The proposed algorithm has been implemented on a cluster of workstations using MPI library. Experimental results for different problem sizes are analyzed in terms of quality of alignment, execution time and speed-up.
[ { "version": "v1", "created": "Tue, 12 May 2009 01:04:40 GMT" } ]
2009-05-13T00:00:00
[ [ "Saeed", "Fahad", "" ], [ "Khokhar", "Ashfaq", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0905.1745
Tiangao Gou
Tiangao Gou, Syed A. Jafar
Capacity of a Class of Symmetric SIMO Gaussian Interference Channels within O(1)
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The N+1 user, 1 x N single input multiple output (SIMO) Gaussian interference channel where each transmitter has a single antenna and each receiver has N antennas is studied. The symmetric capacity within O(1) is characterized for the symmetric case where all direct links have the same signal-to-noise ratio (SNR) and all undesired links have the same interference-to-noise ratio (INR). The gap to the exact capacity is a constant which is independent of SNR and INR. To get this result, we first generalize the deterministic interference channel introduced by El Gamal and Costa to model interference channels with multiple antennas. We derive the capacity region of this deterministic interference channel. Based on the insights provided by the deterministic channel, we characterize the generalized degrees of freedom (GDOF) of Gaussian case, which directly leads to the O(1) capacity approximation. On the achievability side, an interesting conclusion is that the generalized degrees of freedom (GDOF) regime where treating interference as noise is found to be optimal in the 2 user interference channel, does not appear in the N+1 user, 1 x N SIMO case. On the converse side, new multi-user outer bounds emerge out of this work that do not follow directly from the 2 user case. In addition to the GDOF region, the outer bounds identify a strong interference regime where the capacity region is established.
[ { "version": "v1", "created": "Tue, 12 May 2009 06:14:03 GMT" } ]
2009-05-13T00:00:00
[ [ "Gou", "Tiangao", "" ], [ "Jafar", "Syed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1751
Chao-Yang Pang
Chao-Yang Pang, Chong-Bao Wang and Ben-Qiong Hu
Experiment Study of Entropy Convergence of Ant Colony Optimization
21 papges, 8 figures
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ant colony optimization (ACO) has been applied to the field of combinatorial optimization widely. But the study of convergence theory of ACO is rare under general condition. In this paper, the authors try to find the evidence to prove that entropy is related to the convergence of ACO, especially to the estimation of the minimum iteration number of convergence. Entropy is a new view point possibly to studying the ACO convergence under general condition. Key Words: Ant Colony Optimization, Convergence of ACO, Entropy
[ { "version": "v1", "created": "Tue, 12 May 2009 12:38:57 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2009 14:50:03 GMT" }, { "version": "v3", "created": "Fri, 24 Jul 2009 08:11:20 GMT" }, { "version": "v4", "created": "Sun, 25 Oct 2009 03:08:14 GMT" } ]
2009-10-25T00:00:00
[ [ "Pang", "Chao-Yang", "" ], [ "Wang", "Chong-Bao", "" ], [ "Hu", "Ben-Qiong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.1755
Raymond Chi-Wing Wong
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu
Can the Utility of Anonymized Data be used for Privacy Breaches?
11 pages
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Group based anonymization is the most widely studied approach for privacy preserving data publishing. This includes k-anonymity, l-diversity, and t-closeness, to name a few. The goal of this paper is to raise a fundamental issue on the privacy exposure of the current group based approach. This has been overlooked in the past. The group based anonymization approach basically hides each individual record behind a group to preserve data privacy. If not properly anonymized, patterns can actually be derived from the published data and be used by the adversary to breach individual privacy. For example, from the medical records released, if patterns such as people from certain countries rarely suffer from some disease can be derived, then the information can be used to imply linkage of other people in an anonymized group with this disease with higher likelihood. We call the derived patterns from the published data the foreground knowledge. This is in contrast to the background knowledge that the adversary may obtain from other channels as studied in some previous work. Finally, we show by experiments that the attack is realistic in the privacy benchmark dataset under the traditional group based anonymization approach.
[ { "version": "v1", "created": "Tue, 12 May 2009 03:36:26 GMT" } ]
2009-05-13T00:00:00
[ [ "Wong", "Raymond Chi-Wing", "" ], [ "Fu", "Ada Wai-Chee", "" ], [ "Wang", "Ke", "" ], [ "Xu", "Yabo", "" ], [ "Yu", "Philip S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0905.1769
Sk Sarif Hassan s
Pabitra Pal Choudhury, Sudhakar Sahoo, Sk Sarif Hasssan, Satrajit Basu, Dibyendu Ghosh, Debarun Kar, Abhishek Ghosh, Avijit Ghosh, Amal K. Ghosh
Classification of Cellular Automata Rules Based on Their Properties
Releted to Cellular Automata!
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a classification of Cellular Automata rules based on its properties at the nth iteration. Elaborate computer program has been designed to get the nth iteration for arbitrary 1-D or 2-D CA rules. Studies indicate that the figures at some particular iteration might be helpful for some specific application. The hardware circuit implementation can be done using opto-electronic components [1-7].
[ { "version": "v1", "created": "Tue, 12 May 2009 06:53:23 GMT" } ]
2009-05-13T00:00:00
[ [ "Choudhury", "Pabitra Pal", "" ], [ "Sahoo", "Sudhakar", "" ], [ "Hasssan", "Sk Sarif", "" ], [ "Basu", "Satrajit", "" ], [ "Ghosh", "Dibyendu", "" ], [ "Kar", "Debarun", "" ], [ "Ghosh", "Abhishek", "" ], [ "Ghosh", "Avijit", "" ], [ "Ghosh", "Amal K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.1778
Salah A. Aly
Salah A. Aly, Ahmed E. Kamal
Encoding of Network Protection Codes Against Link and Node Failures Over Finite Fields
null
null
null
null
cs.IT cs.CR cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Link and node failures are common two fundamental problems that affect operational networks. Hence, protection of communication networks is essential to increase their reliability, performance, and operations. Much research work has been done to protect against link and node failures, and to provide reliable solutions based on pre-defined provision or dynamic restoration of the domain. In this paper we develop network protection strategies against multiple link failures using network coding and joint capacities. In these strategies, the source nodes apply network coding for their transmitted data to provide backup copies for recovery at the receivers' nodes. Such techniques can be applied to optical, IP, and mesh networks. The encoding operations of protection codes are defined over finite fields. Furthermore, the normalized capacity of the communication network is given by $(n-t)/n$ in case of $t$ link failures. In addition, a bound on the minimum required field size is derived.
[ { "version": "v1", "created": "Tue, 12 May 2009 07:44:45 GMT" } ]
2009-06-30T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Kamal", "Ahmed E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1780
Tiziana Calamoneri
Tiziana Calamoneri
The L(2, 1)-Labeling Problem on Oriented Regular Grids
The content of this paper has been presented to ICTCS 2009, 28-30 September, Cremona, Italy. This updated version is a longer and more complete version of the first submission (from 10 to 13 pages, from 5 to 7 figures) and a wrong figure has been corrected
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The L(2, 1)-labeling of a digraph G is a function f from the node set of $G$ to the set of all nonnegative integers such that $|f(x)-f(y)| \geq 2$ if $x$ and $y$ are at distance 1, and $f(x)=f(y)$ if $x$ and $y$ are at distance 2, where the distance from vertex $x$ to vertex $y$ is the length of a shortest dipath from $x$ to $y$. The minimum of the maximum used label over all $L(2, 1)$-labelings of $G$ is called $\lambda(G)$. In this paper we study the L(2, 1)-labeling problem on squared, triangular and hexagonal grids and for them we compute the exact values of $\lambda$.
[ { "version": "v1", "created": "Tue, 12 May 2009 07:48:14 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2009 12:32:01 GMT" } ]
2009-10-01T00:00:00
[ [ "Calamoneri", "Tiziana", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.1786
Swan Dubois
Alain Cournier (MIS), Swan Dubois (LIP6, INRIA Rocquencourt), Vincent Villain (MIS)
Une CNS pour l'acheminement de messages instantan\'ement stabilisant
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A snap-stabilizing algorithm ensures that it always behaves according to its specifications whenever it starts from an arbitrary configuration. In this paper, we interest in the message forwarding problem in a message-switched network. We must manage network ressources in order to deliver messages to any processor of the network. In this goal, we need information given by a routing algorithm. But, due to the context of stabilization, this information can be initially corrupted. It is why the existence of snap-stabilizing algorithms for this task (proved in [CDV09]) implies that we can ask the system to begin forwarding messages even if routing tables are initially corrupted. In this paper, we generalize the previous result given a necessary and sufficient condition to solve the forwarding problem in a snap-stabilizing way.
[ { "version": "v1", "created": "Tue, 12 May 2009 08:28:47 GMT" } ]
2009-05-13T00:00:00
[ [ "Cournier", "Alain", "", "MIS" ], [ "Dubois", "Swan", "", "LIP6, INRIA Rocquencourt" ], [ "Villain", "Vincent", "", "MIS" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0905.1820
Nicole Berline
Velleda Baldoni, Nicole Berline (CMLS-EcolePolytechnique), Mich\`ele Vergne (CMLS-EcolePolytechnique, IMJ)
Summing a polynomial function over integral points of a polygon. User's guide
null
null
null
null
cs.CG math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This document is a companion for the Maple program \textbf{Summing a polynomial function over integral points of a polygon}. It contains two parts. First, we see what this programs does. In the second part, we briefly recall the mathematical background.
[ { "version": "v1", "created": "Tue, 12 May 2009 12:00:08 GMT" } ]
2009-05-13T00:00:00
[ [ "Baldoni", "Velleda", "", "CMLS-EcolePolytechnique" ], [ "Berline", "Nicole", "", "CMLS-EcolePolytechnique" ], [ "Vergne", "Michèle", "", "CMLS-EcolePolytechnique, IMJ" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0905.1883
Paul Cuff
Paul Cuff (Stanford University), Han-I Su (Stanford University), Abbas El Gamal (Stanford University)
Cascade multiterminal source coding
ISIT 2009, 5 pages, 1 eps figure, uses IEEEtran.cls
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate distributed source coding of two correlated sources X and Y where messages are passed to a decoder in a cascade fashion. The encoder of X sends a message at rate R_1 to the encoder of Y. The encoder of Y then sends a message to the decoder at rate R_2 based both on Y and on the message it received about X. The decoder's task is to estimate a function of X and Y. For example, we consider the minimum mean squared-error distortion when encoding the sum of jointly Gaussian random variables under these constraints. We also characterize the rates needed to reconstruct a function of X and Y losslessly. Our general contribution toward understanding the limits of the cascade multiterminal source coding network is in the form of inner and outer bounds on the achievable rate region for satisfying a distortion constraint for an arbitrary distortion function d(x,y,z). The inner bound makes use of a balance between two encoding tactics--relaying the information about X and recompressing the information about X jointly with Y. In the Gaussian case, a threshold is discovered for identifying which of the two extreme strategies optimizes the inner bound. Relaying outperforms recompressing the sum at the relay for some rate pairs if the variance of X is greater than the variance of Y.
[ { "version": "v1", "created": "Tue, 12 May 2009 16:13:58 GMT" } ]
2009-05-13T00:00:00
[ [ "Cuff", "Paul", "", "Stanford University" ], [ "Su", "Han-I", "", "Stanford University" ], [ "Gamal", "Abbas El", "", "Stanford University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1893
Serena Bradde
S. Bradde, A. Braunstein, H. Mahmoudi, F. Tria, M. Weigt and R. Zecchina
Aligning graphs and finding substructures by a cavity approach
5 pages, 4 figures
2010 Europhys. Lett. 89 37009
10.1209/0295-5075/89/37009
null
q-bio.QM cond-mat.stat-mech cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new distributed algorithm for aligning graphs or finding substructures within a given graph. It is based on the cavity method and is used to study the maximum-clique and the graph-alignment problems in random graphs. The algorithm allows to analyze large graphs and may find applications in fields such as computational biology. As a proof of concept we use our algorithm to align the similarity graphs of two interacting protein families involved in bacterial signal transduction, and to predict actually interacting protein partners between these families.
[ { "version": "v1", "created": "Tue, 12 May 2009 16:09:47 GMT" }, { "version": "v2", "created": "Thu, 1 Apr 2010 13:40:11 GMT" } ]
2010-04-02T00:00:00
[ [ "Bradde", "S.", "" ], [ "Braunstein", "A.", "" ], [ "Mahmoudi", "H.", "" ], [ "Tria", "F.", "" ], [ "Weigt", "M.", "" ], [ "Zecchina", "R.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.1906
Michael Goodrich
Michael T. Goodrich, Daniel S. Hirschberg
Improved Adaptive Group Testing Algorithms with Applications to Multiple Access Channels and Dead Sensor Diagnosis
Expanded version of a paper appearing in ACM Symposium on Parallelism in Algorithms and Architectures (SPAA), and preliminary version of paper appearing in Journal of Combinatorial Optimization
Journal of Combinatorial Optimization, Volume 15, Number 1, January, 2008
10.1007/s10878-007-9087-z
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study group-testing algorithms for resolving broadcast conflicts on a multiple access channel (MAC) and for identifying the dead sensors in a mobile ad hoc wireless network. In group-testing algorithms, we are asked to identify all the defective items in a set of items when we can test arbitrary subsets of items. In the standard group-testing problem, the result of a test is binary--the tested subset either contains defective items or not. In the more generalized versions we study in this paper, the result of each test is non-binary. For example, it may indicate whether the number of defective items contained in the tested subset is zero, one, or at least two. We give adaptive algorithms that are provably more efficient than previous group testing algorithms. We also show how our algorithms can be applied to solve conflict resolution on a MAC and dead sensor diagnosis. Dead sensor diagnosis poses an interesting challenge compared to MAC resolution, because dead sensors are not locally detectable, nor are they themselves active participants.
[ { "version": "v1", "created": "Tue, 12 May 2009 16:45:01 GMT" } ]
2009-05-13T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Hirschberg", "Daniel S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1964
Rony El Haddad
Rony EL Haddad, Brian Smith, Sriram Vishwanath
On Models of Multi-user Gaussian Channels with Fading
6 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An analytically tractable model for Gaussian multiuser channels with fading is studied, and the capacity region of this model is found to be a good approximation of the capacity region of the original Gaussian network. This work extends the existing body of work on deterministic models for Gaussian multiuser channels to include the physical phenomenon of fading. In particular, it generalizes these results to a unicast, multiple node network setting with fading.
[ { "version": "v1", "created": "Tue, 12 May 2009 20:31:16 GMT" }, { "version": "v2", "created": "Sat, 16 May 2009 00:17:34 GMT" } ]
2009-05-16T00:00:00
[ [ "Haddad", "Rony EL", "" ], [ "Smith", "Brian", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1990
Halyun Jeong
Halyun Jeong, Young-Han Kim
Sparse Linear Representation
5 pages, to appear in proc. IEEE ISIT, June 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the question of how well a signal can be reprsented by a sparse linear combination of reference signals from an overcomplete dictionary. When the dictionary size is exponential in the dimension of signal, then the exact characterization of the optimal distortion is given as a function of the dictionary size exponent and the number of reference signals for the linear representation. Roughly speaking, every signal is sparse if the dictionary size is exponentially large, no matter how small the exponent is. Furthermore, an iterative method similar to matching pursuit that successively finds the best reference signal at each stage gives asymptotically optimal representations. This method is essentially equivalent to successive refinement for multiple descriptions and provides a simple alternative proof of the successive refinability of white Gaussian sources.
[ { "version": "v1", "created": "Wed, 13 May 2009 00:18:58 GMT" }, { "version": "v2", "created": "Thu, 14 May 2009 01:30:27 GMT" } ]
2009-05-14T00:00:00
[ [ "Jeong", "Halyun", "" ], [ "Kim", "Young-Han", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.1993
Bruno Escoffier
Nicolas Bourgeois, Bruno Escoffier, Vangelis Th. Paschos
Fast algorithms for min independent dominating set
null
null
10.1007/978-3-642-13284-1_20
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We first devise a branching algorithm that computes a minimum independent dominating set on any graph with running time O*(2^0.424n) and polynomial space. This improves the O*(2^0.441n) result by (S. Gaspers and M. Liedloff, A branch-and-reduce algorithm for finding a minimum independent dominating set in graphs, Proc. WG'06). We then show that, for every r>3, it is possible to compute an r-((r-1)/r)log_2(r)-approximate solution for min independent dominating set within time O*(2^(nlog_2(r)/r)).
[ { "version": "v1", "created": "Wed, 13 May 2009 12:50:52 GMT" } ]
2015-05-13T00:00:00
[ [ "Bourgeois", "Nicolas", "" ], [ "Escoffier", "Bruno", "" ], [ "Paschos", "Vangelis Th.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.1995
Michael Schapira
Elchanan Mossel, Christos Papadimitriou, Michael Schapira and Yaron Singer
VC v. VCG: Inapproximability of Combinatorial Auctions via Generalizations of the VC Dimension
null
null
null
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The existence of incentive-compatible computationally-efficient protocols for combinatorial auctions with decent approximation ratios is the paradigmatic problem in computational mechanism design. It is believed that in many cases good approximations for combinatorial auctions may be unattainable due to an inherent clash between truthfulness and computational efficiency. However, to date, researchers lack the machinery to prove such results. In this paper, we present a new approach that we believe holds great promise for making progress on this important problem. We take the first steps towards the development of new technologies for lower bounding the VC dimension of k-tuples of disjoint sets. We apply this machinery to prove the first computational-complexity inapproximability results for incentive-compatible mechanisms for combinatorial auctions. These results hold for the important class of VCG-based mechanisms, and are based on the complexity assumption that NP has no polynomial-size circuits.
[ { "version": "v1", "created": "Wed, 13 May 2009 01:50:21 GMT" } ]
2009-05-14T00:00:00
[ [ "Mossel", "Elchanan", "" ], [ "Papadimitriou", "Christos", "" ], [ "Schapira", "Michael", "" ], [ "Singer", "Yaron", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]