id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0905.2004
Yi-Dong Shen
Yi-Dong Shen, Danny De Schreye, Dean Voets
Termination Prediction for General Logic Programs
28 pages, 12 figures. to appear in Theory and Practice of Logic Programming (TPLP)
null
null
null
cs.PL cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a heuristic framework for attacking the undecidable termination problem of logic programs, as an alternative to current termination/non-termination proof approaches. We introduce an idea of termination prediction, which predicts termination of a logic program in case that neither a termination nor a non-termination proof is applicable. We establish a necessary and sufficient characterization of infinite (generalized) SLDNF-derivations with arbitrary (concrete or moded) queries, and develop an algorithm that predicts termination of general logic programs with arbitrary non-floundering queries. We have implemented a termination prediction tool and obtained quite satisfactory experimental results. Except for five programs which break the experiment time limit, our prediction is 100% correct for all 296 benchmark programs of the Termination Competition 2007, of which eighteen programs cannot be proved by any of the existing state-of-the-art analyzers like AProVE07, NTI, Polytool and TALP.
[ { "version": "v1", "created": "Wed, 13 May 2009 02:47:06 GMT" } ]
2009-05-14T00:00:00
[ [ "Shen", "Yi-Dong", "" ], [ "De Schreye", "Danny", "" ], [ "Voets", "Dean", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.2028
Weng-Long Chang
Weng-Long Chang, Ting-Ting Ren, Mang Feng, Jun Luo, Kawuu Weicheng Lin, Minyi Guo, and Lai Chin Lu
Quantum Algorithms of Bio-molecular Solutions for the Clique Problem on a Quantum Computer
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, it is demonstrated that the DNA-based algorithm [Ho et al. 2005] for solving an instance of the clique problem to any a graph G = (V, E) with n vertices and p edges and its complementary graph G1 = (V, E1) with n vertices and m = (((n*(n-1))/2)-p) edges can be implemented by Hadamard gates, NOT gates, CNOT gates, CCNOT gates, Grover's operators, and quantum measurements on a quantum computer. It is also demonstrated that if Grovers algorithm is employed to accomplish the readout step in the DNA-based algorithm, the quantum implementation of the DNA-based algorithm is equivalent to the oracle work (in the language of Grover's algorithm), that is, the target state labeling preceding Grover,s searching steps. It is shown that one oracle work can be completed with O((2 * n) * (n + 1) * (n + 2) / 3) NOT gates, one CNOT gate and O((4 * m) + (((2 * n) * (n + 1) * (n + 14)) / 6)) CCNOT gates. This is to say that for the quantum implementation of the DNA-based algorithm [Ho et al. 2005] a faster labeling of the target state is attained, which also implies a speedy solution to an instance of the clique problem.
[ { "version": "v1", "created": "Wed, 13 May 2009 07:38:48 GMT" } ]
2009-05-14T00:00:00
[ [ "Chang", "Weng-Long", "" ], [ "Ren", "Ting-Ting", "" ], [ "Feng", "Mang", "" ], [ "Luo", "Jun", "" ], [ "Lin", "Kawuu Weicheng", "" ], [ "Guo", "Minyi", "" ], [ "Lu", "Lai Chin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.2098
Rahul Vaze
Rahul Vaze and Robert W. Heath Jr
End-to-End Joint Antenna Selection Strategy and Distributed Compress and Forward Strategy for Relay Channels
Accepted for publication in the special issue on cooperative communication in the Eurasip Journal on Wireless Communication and Networking
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-hop relay channels use multiple relay stages, each with multiple relay nodes, to facilitate communication between a source and destination. Previously, distributed space-time codes were proposed to maximize the achievable diversity-multiplexing tradeoff, however, they fail to achieve all the points of the optimal diversity-multiplexing tradeoff. In the presence of a low-rate feedback link from the destination to each relay stage and the source, this paper proposes an end-to-end antenna selection (EEAS) strategy as an alternative to distributed space-time codes. The EEAS strategy uses a subset of antennas of each relay stage for transmission of the source signal to the destination with amplify and forwarding at each relay stage. The subsets are chosen such that they maximize the end-to-end mutual information at the destination. The EEAS strategy achieves the corner points of the optimal diversity-multiplexing tradeoff (corresponding to maximum diversity gain and maximum multiplexing gain) and achieves better diversity gain at intermediate values of multiplexing gain, versus the best known distributed space-time coding strategies. A distributed compress and forward (CF) strategy is also proposed to achieve all points of the optimal diversity-multiplexing tradeoff for a two-hop relay channel with multiple relay nodes.
[ { "version": "v1", "created": "Wed, 13 May 2009 12:34:55 GMT" } ]
2009-05-14T00:00:00
[ [ "Vaze", "Rahul", "" ], [ "Heath", "Robert W.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2125
Jenia Jitsev
Jenia Jitsev, Christoph von der Malsburg
Experience-driven formation of parts-based representations in a model of layered visual memory
34 pages, 12 Figures, 1 Table, published in Frontiers in Computational Neuroscience (Special Issue on Complex Systems Science and Brain Dynamics), http://www.frontiersin.org/neuroscience/computationalneuroscience/paper/10.3389/neuro.10/015.2009/
Front. Comput. Neurosci. 3:15 (2009)
10.3389/neuro.10.015.2009
null
q-bio.NC cs.LG nlin.AO
http://creativecommons.org/licenses/by/3.0/
Growing neuropsychological and neurophysiological evidence suggests that the visual cortex uses parts-based representations to encode, store and retrieve relevant objects. In such a scheme, objects are represented as a set of spatially distributed local features, or parts, arranged in stereotypical fashion. To encode the local appearance and to represent the relations between the constituent parts, there has to be an appropriate memory structure formed by previous experience with visual objects. Here, we propose a model how a hierarchical memory structure supporting efficient storage and rapid recall of parts-based representations can be established by an experience-driven process of self-organization. The process is based on the collaboration of slow bidirectional synaptic plasticity and homeostatic unit activity regulation, both running at the top of fast activity dynamics with winner-take-all character modulated by an oscillatory rhythm. These neural mechanisms lay down the basis for cooperation and competition between the distributed units and their synaptic connections. Choosing human face recognition as a test task, we show that, under the condition of open-ended, unsupervised incremental learning, the system is able to form memory traces for individual faces in a parts-based fashion. On a lower memory layer the synaptic structure is developed to represent local facial features and their interrelations, while the identities of different persons are captured explicitly on a higher layer. An additional property of the resulting representations is the sparseness of both the activity during the recall and the synaptic patterns comprising the memory traces.
[ { "version": "v1", "created": "Wed, 13 May 2009 14:23:36 GMT" }, { "version": "v2", "created": "Thu, 16 Jul 2009 12:58:02 GMT" }, { "version": "v3", "created": "Mon, 22 Mar 2010 15:38:57 GMT" } ]
2015-03-13T00:00:00
[ [ "Jitsev", "Jenia", "" ], [ "von der Malsburg", "Christoph", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0905.2141
Ilya Volnyansky
Ilya Volnyansky
Curse of Dimensionality in the Application of Pivot-based Indexes to the Similarity Search Problem
56 pages, 7 figures Master's Thesis in Mathematics, University of Ottawa (Canada) Supervisor: Vladimir Pestov
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we study the validity of the so-called curse of dimensionality for indexing of databases for similarity search. We perform an asymptotic analysis, with a test model based on a sequence of metric spaces $(\Omega_d)$ from which we pick datasets $X_d$ in an i.i.d. fashion. We call the subscript $d$ the dimension of the space $\Omega_d$ (e.g. for $\mathbb{R}^d$ the dimension is just the usual one) and we allow the size of the dataset $n=n_d$ to be such that $d$ is superlogarithmic but subpolynomial in $n$. We study the asymptotic performance of pivot-based indexing schemes where the number of pivots is $o(n/d)$. We pick the relatively simple cost model of similarity search where we count each distance calculation as a single computation and disregard the rest. We demonstrate that if the spaces $\Omega_d$ exhibit the (fairly common) concentration of measure phenomenon the performance of similarity search using such indexes is asymptotically linear in $n$. That is for large enough $d$ the difference between using such an index and performing a search without an index at all is negligeable. Thus we confirm the curse of dimensionality in this setting.
[ { "version": "v1", "created": "Wed, 13 May 2009 16:24:21 GMT" } ]
2009-05-14T00:00:00
[ [ "Volnyansky", "Ilya", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.2158
Emiliano De Cristofaro
Emiliano De Cristofaro and Xuhua Ding and Gene Tsudik
Privacy-Preserving Querying in Sensor Networks
Preliminary version of this paper appeared in the Proceedings of ICCCN'09 under the same title
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor Networks (WSNs) provide sensing and monitoring services by means of many tiny autonomous devices equipped with wireless radio transceivers. As WSNs are deployed on a large-scale and/or on long-term basis, not only traditional security but also privacy issues must be taken into account. Furthermore, when network operators offer on-demand access to sensor measurements to their clients, query mechanisms should ideally leak neither client interests nor query patterns. In this paper, we present a privacy-preserving WSN query mechanism that uses standard cryptographic techniques. Besides preventing unauthorized entities from accessing sensor readings, it minimizes leakage of (potentially sensitive) information about users' query targets and patterns.
[ { "version": "v1", "created": "Wed, 13 May 2009 18:02:51 GMT" } ]
2009-05-14T00:00:00
[ [ "De Cristofaro", "Emiliano", "" ], [ "Ding", "Xuhua", "" ], [ "Tsudik", "Gene", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0905.2159
Shweta Agrawal
Shweta Agrawal, Sriram Vishwanath
On the Secrecy Rate of Interference Networks using structured codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper shows that structured transmission schemes are a good choice for secret communication over interference networks with an eavesdropper. Structured transmission is shown to exploit channel asymmetries and thus perform better than randomly generated codebooks for such channels. For a class of interference channels, we show that an equivocation sumrate that is within two bits of the maximum possible legitimate communication sum-rate is achievable using lattice codes.
[ { "version": "v1", "created": "Wed, 13 May 2009 18:06:09 GMT" } ]
2009-05-14T00:00:00
[ [ "Agrawal", "Shweta", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2177
Andreas Enge
Andreas Enge (INRIA Bordeaux - Sud-Ouest), Pierrick Gaudry (INRIA Lorraine - LORIA), Emmanuel Thom\'e (INRIA Lorraine - LORIA)
An $L (1/3)$ Discrete Logarithm Algorithm for Low Degree Curves
null
null
null
null
cs.CR math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm for solving the discrete logarithm problem in Jacobians of families of plane curves whose degrees in $X$ and $Y$ are low with respect to their genera. The finite base fields $\FF_q$ are arbitrary, but their sizes should not grow too fast compared to the genus. For such families, the group structure and discrete logarithms can be computed in subexponential time of $L_{q^g}(1/3, O(1))$. The runtime bounds rely on heuristics similar to the ones used in the number field sieve or the function field sieve.
[ { "version": "v1", "created": "Wed, 13 May 2009 19:43:15 GMT" }, { "version": "v2", "created": "Sun, 20 Dec 2009 17:24:45 GMT" } ]
2009-12-20T00:00:00
[ [ "Enge", "Andreas", "", "INRIA Bordeaux - Sud-Ouest" ], [ "Gaudry", "Pierrick", "", "INRIA\n Lorraine - LORIA" ], [ "Thomé", "Emmanuel", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0905.2195
Krishnendu Chatterjee
Krishnendu Chatterjee and Laurent Doyen and Thomas A. Henzinger
Expressiveness and Closure Properties for Quantitative Languages
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Weighted automata are nondeterministic automata with numerical weights on transitions. They can define quantitative languages $L$ that assign to each word $w$ a real number $L(w)$. In the case of infinite words, the value of a run is naturally computed as the maximum, limsup, liminf, limit average, or discounted sum of the transition weights. We study expressiveness and closure questions about these quantitative languages. We first show that the set of words with value greater than a threshold can be non-$\omega$-regular for deterministic limit-average and discounted-sum automata, while this set is always $\omega$-regular when the threshold is isolated (i.e., some neighborhood around the threshold contains no word). In the latter case, we prove that the $\omega$-regular language is robust against small perturbations of the transition weights. We next consider automata with transition weights 0 or 1 and show that they are as expressive as general weighted automata in the limit-average case, but not in the discounted-sum case. Third, for quantitative languages $L_1$ and $L_2$, we consider the operations $\max(L_1,L_2)$, $\min(L_1,L_2)$, and $1-L_1$, which generalize the boolean operations on languages, as well as the sum $L_1 + L_2$. We establish the closure properties of all classes of quantitative languages with respect to these four operations.
[ { "version": "v1", "created": "Wed, 13 May 2009 20:27:01 GMT" } ]
2009-05-15T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Doyen", "Laurent", "" ], [ "Henzinger", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.2200
Debprakash Patnaik
Yong Cao, Debprakash Patnaik, Sean Ponce, Jeremy Archuleta, Patrick Butler, Wu-chun Feng, and Naren Ramakrishnan
Towards Chip-on-Chip Neuroscience: Fast Mining of Frequent Episodes Using Graphics Processors
null
null
null
null
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computational neuroscience is being revolutionized with the advent of multi-electrode arrays that provide real-time, dynamic, perspectives into brain function. Mining event streams from these chips is critical to understanding the firing patterns of neurons and to gaining insight into the underlying cellular activity. We present a GPGPU solution to mining spike trains. We focus on mining frequent episodes which captures coordinated events across time even in the presence of intervening background/"junk" events. Our algorithmic contributions are two-fold: MapConcatenate, a new computation-to-core mapping scheme, and a two-pass elimination approach to quickly find supported episodes from a large number of candidates. Together, they help realize a real-time "chip-on-chip" solution to neuroscience data mining, where one chip (the multi-electrode array) supplies the spike train data and another (the GPGPU) mines it at a scale unachievable previously. Evaluation on both synthetic and real datasets demonstrate the potential of our approach.
[ { "version": "v1", "created": "Wed, 13 May 2009 21:04:03 GMT" } ]
2009-05-15T00:00:00
[ [ "Cao", "Yong", "" ], [ "Patnaik", "Debprakash", "" ], [ "Ponce", "Sean", "" ], [ "Archuleta", "Jeremy", "" ], [ "Butler", "Patrick", "" ], [ "Feng", "Wu-chun", "" ], [ "Ramakrishnan", "Naren", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0905.2203
Debprakash Patnaik
Debprakash Patnaik, Sean P. Ponce, Yong Cao, Naren Ramakrishnan
Accelerator-Oriented Algorithm Transformation for Temporal Data Mining
null
null
null
null
cs.DC cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Temporal data mining algorithms are becoming increasingly important in many application domains including computational neuroscience, especially the analysis of spike train data. While application scientists have been able to readily gather multi-neuronal datasets, analysis capabilities have lagged behind, due to both lack of powerful algorithms and inaccessibility to powerful hardware platforms. The advent of GPU architectures such as Nvidia's GTX 280 offers a cost-effective option to bring these capabilities to the neuroscientist's desktop. Rather than port existing algorithms onto this architecture, we advocate the need for algorithm transformation, i.e., rethinking the design of the algorithm in a way that need not necessarily mirror its serial implementation strictly. We present a novel implementation of a frequent episode discovery algorithm by revisiting "in-the-large" issues such as problem decomposition as well as "in-the-small" issues such as data layouts and memory access patterns. This is non-trivial because frequent episode discovery does not lend itself to GPU-friendly data-parallel mapping strategies. Applications to many datasets and comparisons to CPU as well as prior GPU implementations showcase the advantages of our approach.
[ { "version": "v1", "created": "Wed, 13 May 2009 21:18:31 GMT" } ]
2009-05-15T00:00:00
[ [ "Patnaik", "Debprakash", "" ], [ "Ponce", "Sean P.", "" ], [ "Cao", "Yong", "" ], [ "Ramakrishnan", "Naren", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0905.2212
Peter Scheiblechner
Peter Scheiblechner
Castelnuovo-Mumford Regularity and Computing the de Rham Cohomology of Smooth Projective Varieties
32 pages - filled a gap in Section 4.2, specific example added, minor improvements
null
null
null
math.AG cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a parallel polynomial time algorithm for computing the topological Betti numbers of a smooth complex projective variety $X$. It is the first single exponential time algorithm for computing the Betti numbers of a significant class of complex varieties of arbitrary dimension. Our main theoretical result is that the Castelnuovo-Mumford regularity of the sheaf of differential $p$-forms on $X$ is bounded by $p(em+1)D$, where $e$, $m$, and $D$ are the maximal codimension, dimension, and degree, respectively, of all irreducible components of $X$. It follows that, for a union $V$ of generic hyperplane sections in $X$, the algebraic de Rham cohomology of $X\setminus V$ is described by differential forms with poles along $V$ of single exponential order. This yields a similar description of the de Rham cohomology of $X$, which allows its efficient computation. Furthermore, we give a parallel polynomial time algorithm for testing whether a projective variety is smooth.
[ { "version": "v1", "created": "Wed, 13 May 2009 22:24:17 GMT" }, { "version": "v2", "created": "Fri, 13 Aug 2010 21:22:08 GMT" }, { "version": "v3", "created": "Tue, 17 Aug 2010 19:58:38 GMT" }, { "version": "v4", "created": "Mon, 12 Dec 2011 09:20:39 GMT" } ]
2011-12-13T00:00:00
[ [ "Scheiblechner", "Peter", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0905.2213
Eduardo Hwang
Eduardo Hwang
Outlining an elegant solver for 3-SAT
This paper has been withdrawn by the author due to its inadequacy, given more structured approaches to the subject
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of this article is to incite clever ways to attack problems. It advocates in favor of more elegant algorithms, in place of brute force (albeit its very well crafted) usages.
[ { "version": "v1", "created": "Wed, 13 May 2009 22:23:07 GMT" }, { "version": "v2", "created": "Fri, 15 May 2009 05:36:39 GMT" }, { "version": "v3", "created": "Mon, 11 Apr 2011 00:53:48 GMT" } ]
2011-04-12T00:00:00
[ [ "Hwang", "Eduardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.2214
Michael Goodrich
Michael T. Goodrich, Michael J. Nelson, Jonathan Z. Sun
The Rainbow Skip Graph: A Fault-Tolerant Constant-Degree P2P Relay Structure
Expanded version of a paper appearing in ACM-SIAM Symp. on Discrete Algorithms (SODA)
null
null
null
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a distributed data structure, which we call the rainbow skip graph. To our knowledge, this is the first peer-to-peer data structure that simultaneously achieves high fault tolerance, constant-sized nodes, and fast update and query times for ordered data. It is a non-trivial adaptation of the SkipNet/skip-graph structures of Harvey et al. and Aspnes and Shah, so as to provide fault-tolerance as these structures do, but to do so using constant-sized nodes, as in the family tree structure of Zatloukal and Harvey. It supports successor queries on a set of n items using O(log n) messages with high probability, an improvement over the expected O(log n) messages of the family tree.
[ { "version": "v1", "created": "Wed, 13 May 2009 22:40:52 GMT" } ]
2009-05-15T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Nelson", "Michael J.", "" ], [ "Sun", "Jonathan Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.2227
Ke Xu
Jichang Zhao and Ke Xu
Enhancing the robustness of scale-free networks
8 pages, 4 figures
J. Phys. A: Math. Theor. 42 (2009) 195003
10.1088/1751-8113/42/19/195003
null
cs.NI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Error tolerance and attack vulnerability are two common and important properties of complex networks, which are usually used to evaluate the robustness of a network. Recently, much work has been devoted to determining the network design with optimal robustness. However, little attention has been paid to the problem of how to improve the robustness of existing networks. In this paper, we present a new parameter alpha, called enforcing parameter, to guide the process of enhancing the robustness of scale-free networks by gradually adding new links. Intuitively, alpha < 0 means the nodes with lower degrees are selected preferentially while the nodes with higher degrees will be more probably selected when alpha > 0. It is shown both theoretically and experimentally that when alpha < 0 the attack survivability of the network can be enforced apparently. Then we propose new strategies to enhance the network robustness. Through extensive experiments and comparisons, we conclude that establishing new links between nodes with low degrees can drastically enforce the attack survivability of scale-free networks while having little impact on the error tolerance.
[ { "version": "v1", "created": "Thu, 14 May 2009 00:50:49 GMT" } ]
2015-05-13T00:00:00
[ [ "Zhao", "Jichang", "" ], [ "Xu", "Ke", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0905.2234
Ke Xu
Bo Xiao, Lian-dong Liu, Xiao-chen Guo, and Ke Xu
Modeling the IPv6 Internet AS-level Topology
15 pages, 5 figures
Physica A 388(2009):529-540
10.1016/j.physa.2008.10.034
null
cs.NI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To measure the IPv6 internet AS-level topology, a network topology discovery system, called Dolphin, was developed. By comparing the measurement result of Dolphin with that of CAIDA's Scamper, it was found that the IPv6 Internet at AS level, similar to other complex networks, is also scale-free but the exponent of its degree distribution is 1.2, which is much smaller than that of the IPv4 Internet and most other scale-free networks. In order to explain this feature of IPv6 Internet we argue that the degree exponent is a measure of uniformity of the degree distribution. Then, for the purpose on modeling the networks, we propose a new model based on the two major factors affecting the exponent of the EBA model. It breaks the lower bound of degree exponent which is 2 for most models. To verify the validity of this model, both theoretical and experimental analyses have been carried out. Finally, we demonstrate how this model can be successfully used to reproduce the topology of the IPv6 Internet.
[ { "version": "v1", "created": "Thu, 14 May 2009 01:59:48 GMT" } ]
2015-05-13T00:00:00
[ [ "Xiao", "Bo", "" ], [ "Liu", "Lian-dong", "" ], [ "Guo", "Xiao-chen", "" ], [ "Xu", "Ke", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0905.2248
Shizheng Li
Shizheng Li and Aditya Ramamoorthy
Protection against link errors and failures using network coding
The first version of this paper was accepted by IEEE Intl' Symp. on Info. Theo. 2009. The second version of this paper is submitted to IEEE Transactions on Communications (under minor revision). The third version of this paper has been accepted by IEEE Transactions on Communications
null
null
null
cs.IT cs.NI math.IT
http://creativecommons.org/licenses/by/3.0/
We propose a network-coding based scheme to protect multiple bidirectional unicast connections against adversarial errors and failures in a network. The network consists of a set of bidirectional primary path connections that carry the uncoded traffic. The end nodes of the bidirectional connections are connected by a set of shared protection paths that provide the redundancy required for protection. Such protection strategies are employed in the domain of optical networks for recovery from failures. In this work we consider the problem of simultaneous protection against adversarial errors and failures. Suppose that n_e paths are corrupted by the omniscient adversary. Under our proposed protocol, the errors can be corrected at all the end nodes with 4n_e protection paths. More generally, if there are n_e adversarial errors and n_f failures, 4n_e + 2n_f protection paths are sufficient. The number of protection paths only depends on the number of errors and failures being protected against and is independent of the number of unicast connections.
[ { "version": "v1", "created": "Thu, 14 May 2009 04:45:05 GMT" }, { "version": "v2", "created": "Fri, 26 Feb 2010 20:59:13 GMT" }, { "version": "v3", "created": "Tue, 31 Aug 2010 21:41:00 GMT" } ]
2010-09-02T00:00:00
[ [ "Li", "Shizheng", "" ], [ "Ramamoorthy", "Aditya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2249
Joseph O'Rourke
Joseph O'Rourke
Some Properties of Yao Y4 Subgraphs
7 pages, 6 figures
null
null
Smith Technical Report 093
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Yao graph for k=4, Y4, is naturally partitioned into four subgraphs, one per quadrant. We show that the subgraphs for one quadrant differ from the subgraphs for two adjacent quadrants in three properties: planarity, connectedness, and whether the directed graphs are spanners.
[ { "version": "v1", "created": "Thu, 14 May 2009 04:49:00 GMT" } ]
2009-05-15T00:00:00
[ [ "O'Rourke", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.2257
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
A protocol for instruction stream processing
15pages
null
null
PRG0905
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. In this paper, we are concerned with the case where the processing takes place remotely. We describe a protocol to deal with the case where the behaviour produced by an instruction sequence under execution leads to the generation of a stream of instructions to be processed and a remote execution unit handles the processing of that stream of instructions.
[ { "version": "v1", "created": "Thu, 14 May 2009 06:23:18 GMT" } ]
2009-05-15T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0905.2287
Lelia Blin
L\'elia Blin (IBISC), Maria Gradinariu Potop-Butucaru (INRIA Rocquencourt), Stephane Rovedakis (IBISC), S\'ebastien Tixeuil (INRIA Futurs, LIP6)
A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-free Property
null
null
null
null
cs.DS cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimum spanning tree (MST) construction is a classical problem in Distributed Computing for creating a globally minimized structure distributedly. Self-stabilization is versatile technique for forward recovery that permits to handle any kind of transient faults in a unified manner. The loop-free property provides interesting safety assurance in dynamic networks where edge-cost changes during operation of the protocol. We present a new self-stabilizing MST protocol that improves on previous known ap- proaches in several ways. First, it makes fewer system hypotheses as the size of the network (or an upper bound on the size) need not be known to the participants. Second, it is loop-free in the sense that it guarantees that a spanning tree structure is always preserved while edge costs change dynamically and the protocol adjusts to a new MST. Finally, time complexity matches the best known results, while space complexity results show that this protocol is the most efficient to date.
[ { "version": "v1", "created": "Thu, 14 May 2009 09:23:06 GMT" } ]
2016-11-25T00:00:00
[ [ "Blin", "Lélia", "", "IBISC" ], [ "Potop-Butucaru", "Maria Gradinariu", "", "INRIA\n Rocquencourt" ], [ "Rovedakis", "Stephane", "", "IBISC" ], [ "Tixeuil", "Sébastien", "", "INRIA Futurs,\n LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.2288
Michele Marchesi
Hongyu Zhang, Hee Beng Kuan Tan, Michele Marchesi
The Distribution of Program Sizes and Its Implications: An Eclipse Case Study
10 pages, 2 figures, 6 tables
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large software system is often composed of many inter-related programs of different sizes. Using the public Eclipse dataset, we replicate our previous study on the distribution of program sizes. Our results confirm that the program sizes follow the lognormal distribution. We also investigate the implications of the program size distribution on size estimation and quality predication. We find that the nature of size distribution can be used to estimate the size of a large Java system. We also find that a small percentage of largest programs account for a large percentage of defects, and the number of defects across programs follows the Weibull distribution when the programs are ranked by their sizes. Our results show that the distribution of program sizes is an important property for understanding large and complex software systems.
[ { "version": "v1", "created": "Thu, 14 May 2009 09:24:51 GMT" } ]
2009-05-15T00:00:00
[ [ "Zhang", "Hongyu", "" ], [ "Tan", "Hee Beng Kuan", "" ], [ "Marchesi", "Michele", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0905.2297
Rajesh Ramachandran
R Rajesh and Vinod Sharma
On Optimal Distributed Joint Source-Channel Coding for Correlated Gaussian Sources over Gaussian Channels
24 pages, 9 figures submitted to IEEE Trans Wireless commn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of distributed joint source-channel coding of correlated Gaussian sources over a Gaussian Multiple Access Channel (GMAC). There may be side information at the decoder and/or at the encoders. First we specialize a general result (for transmission of correlated sources over a MAC with side information) to obtain sufficient conditions for reliable transmission over a Gaussian MAC. This system does not satisfy the source-channel separation. We study and compare three joint source-channel coding schemes available in literature. We show that each of these schemes is optimal under different scenarios. One of the schemes, Amplify and Forward (AF) which simplifies the design of encoders and the decoder, is optimal at low SNR but not at high SNR. Another scheme is asymptotically optimal at high SNR. The third coding scheme is optimal for orthogonal Gaussian channels. We also show that AF is close to the optimal scheme for orthogonal channels even at high SNR.
[ { "version": "v1", "created": "Thu, 14 May 2009 10:02:47 GMT" } ]
2009-05-15T00:00:00
[ [ "Rajesh", "R", "" ], [ "Sharma", "Vinod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2311
Couvreur Alain
A. Couvreur
Residus de 2-formes differentielles sur les surfaces algebriques et applications aux codes correcteurs d'erreurs
168 pages
PhD Thesis - Universit\'e de Toulouse - 2008
null
null
math.AG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of algebraic-geometric codes has been developed in the beginning of the 80's after a paper of V.D. Goppa. Given a smooth projective algebraic curve X over a finite field, there are two different constructions of error-correcting codes. The first one, called "functional", uses some rational functions on X and the second one, called "differential", involves some rational 1-forms on this curve. Hundreds of papers are devoted to the study of such codes. In addition, a generalization of the functional construction for algebraic varieties of arbitrary dimension is given by Y. Manin in an article of 1984. A few papers about such codes has been published, but nothing has been done concerning a generalization of the differential construction to the higher-dimensional case. In this thesis, we propose a differential construction of codes on algebraic surfaces. Afterwards, we study the properties of these codes and particularly their relations with functional codes. A pretty surprising fact is that a main difference with the case of curves appears. Indeed, if in the case of curves, a differential code is always the orthogonal of a functional one, this assertion generally fails for surfaces. Last observation motivates the study of codes which are the orthogonal of some functional code on a surface. Therefore, we prove that, under some condition on the surface, these codes can be realized as sums of differential codes. Moreover, we show that some answers to some open problems "a la Bertini" could give very interesting informations on the parameters of these codes.
[ { "version": "v1", "created": "Thu, 14 May 2009 14:28:21 GMT" } ]
2010-08-24T00:00:00
[ [ "Couvreur", "A.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2341
Couvreur Alain
A. Couvreur
Differential approach for the study of duals of algebraic-geometric codes on surfaces
21 pages
Journal de Theorie des Nombres de Bordeaux, Volume 23(2), p95-120, 2011
null
null
math.AG cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The purpose of the present article is the study of duals of functional codes on algebraic surfaces. We give a direct geometrical description of them, using differentials. Even if this geometrical description is less trivial, it can be regarded as a natural extension to surfaces of the result asserting that the dual of a functional code on a curve is a differential code. We study the parameters of such codes and state a lower bound for their minimum distance. Using this bound, one can study some examples of codes on surfaces, and in particular surfaces with Picard number 1 like elliptic quadrics or some particular cubic surfaces. The parameters of some of the studied codes reach those of the best known codes up to now.
[ { "version": "v1", "created": "Thu, 14 May 2009 14:38:51 GMT" }, { "version": "v2", "created": "Wed, 3 Feb 2010 19:25:15 GMT" }, { "version": "v3", "created": "Thu, 18 Nov 2010 14:29:31 GMT" }, { "version": "v4", "created": "Wed, 1 Dec 2010 12:50:41 GMT" } ]
2011-09-14T00:00:00
[ [ "Couvreur", "A.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0905.2345
Couvreur Alain
A. Couvreur
The dual minimum distance of arbitrary dimensional algebraic--geometric codes
24 pages
J. Algebra. 350(1), 84-107. 2012
10.1016/j.jalgebra.2011.09.030
null
math.AG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, the minimum distance of the dual $C^{\bot}$ of a functional code $C$ on an arbitrary dimensional variety $X$ over a finite field $\F_q$ is studied. The approach consists in finding minimal configurations of points on $X$ which are not in "general position". If $X$ is a curve, the result improves in some situations the well-known Goppa designed distance.
[ { "version": "v1", "created": "Thu, 14 May 2009 14:44:32 GMT" }, { "version": "v2", "created": "Wed, 3 Feb 2010 19:37:01 GMT" }, { "version": "v3", "created": "Thu, 10 Nov 2011 22:00:14 GMT" } ]
2013-09-18T00:00:00
[ [ "Couvreur", "A.", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2347
Juan-Manuel Torres-Moreno
Juan-Manuel Torres-Moreno and Laurent Bougrain and Fr\'d\'eric Alexandre
Combining Supervised and Unsupervised Learning for GIS Classification
8 pages, 3 figures
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new hybrid learning algorithm for unsupervised classification tasks. We combined Fuzzy c-means learning algorithm and a supervised version of Minimerror to develop a hybrid incremental strategy allowing unsupervised classifications. We applied this new approach to a real-world database in order to know if the information contained in unlabeled features of a Geographic Information System (GIS), allows to well classify it. Finally, we compared our results to a classical supervised classification obtained by a multilayer perceptron.
[ { "version": "v1", "created": "Thu, 14 May 2009 14:59:15 GMT" } ]
2009-05-15T00:00:00
[ [ "Torres-Moreno", "Juan-Manuel", "" ], [ "Bougrain", "Laurent", "" ], [ "Alexandre", "Frdéric", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0905.2355
Zhe Chen
Zhe Chen, Gilles Motet
Modeling System Safety Requirements Using Input/Output Constraint Meta-Automata
6 pages. In Proceedings of the 4th International Conference on Systems (ICONS 2009), Gosier, Guadeloupe, France, pp. 228-233. IEEE Computer Society, 2009
null
10.1109/ICONS.2009.24
null
cs.SE cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most recent software related accidents have been system accidents. To validate the absence of system hazards concerning dysfunctional interactions, industrials call for approaches of modeling system safety requirements and interaction constraints among components and with environments (e.g., between humans and machines). This paper proposes a framework based on input/output constraint meta-automata, which restricts system behavior at the meta level. This approach can formally model safe interactions between a system and its environment or among its components. This framework differs from the framework of the traditional model checking. It explicitly separates the tasks of product engineers and safety engineers, and provides a top-down technique for modeling a system with safety constraints, and for automatically composing a safe system that conforms to safety requirements. The contributions of this work include formalizing system safety requirements and a way of automatically ensuring system safety.
[ { "version": "v1", "created": "Thu, 14 May 2009 15:52:40 GMT" } ]
2016-11-17T00:00:00
[ [ "Chen", "Zhe", "" ], [ "Motet", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0905.2364
Zhe Chen
Zhe Chen, Gilles Motet
Formalizing Safety Requirements Using Controlling Automata
6 pages. In Proceedings of the 2nd International Conference on Dependability (DEPEND 2009), Athens, Greece. IEEE Computer Society, 2009
null
10.1109/DEPEND.2009.18
null
cs.SE cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Safety is an important element of dependability. It is defined as the absence of accidents. Most accidents involving software-intensive systems have been system accidents, which are caused by unsafe inter-system or inter-component interactions. To validate the absence of system hazards concerning dysfunctional interactions, industrials call for approaches of modeling system safety requirements and interaction constraints among components. This paper proposes such a formalism, namely interface control systems (or shortly C-Systems). An interface C-System is composed of an interface automaton and a controlling automaton, which formalizes safe interactions and restricts system behavior at the meta level. This framework differs from the framework of traditional model checking. It explicitly separates the tasks of product engineers and safety engineers, and provides a top-down technique for modeling a system with safety constraints, and for automatically composing a safe system that conforms to safety requirements. The contributions of this work include formalizing safety requirements and a way of automatically ensuring system safety.
[ { "version": "v1", "created": "Thu, 14 May 2009 16:03:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Chen", "Zhe", "" ], [ "Motet", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0905.2367
Zhe Chen
Zhe Chen, Gilles Motet
A Language-theoretic View on Guidelines and Consistency Rules of UML
16 pages. In Proceedings of the 5th European Conference on Model Driven Architecture - Foundations and Applications (ECMDA-FA 2009), Enschede, The Netherlands, Lecture Notes in Computer Science 5562, pp. 66-81. Springer, 2009
null
null
null
cs.SE cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Guidelines and consistency rules of UML are used to control the degrees of freedom provided by the language to prevent faults. Guidelines are used in specific domains (e.g., avionics) to recommend the proper use of technologies. Consistency rules are used to deal with inconsistencies in models. However, guidelines and consistency rules use informal restrictions on the uses of languages, which makes checking difficult. In this paper, we consider these problems from a language-theoretic view. We propose the formalism of C-Systems, short for "formal language control systems". A C-System consists of a controlled grammar and a controlling grammar. Guidelines and consistency rules are formalized as controlling grammars that control the uses of UML, i.e. the derivations using the grammar of UML. This approach can be implemented as a parser, which can automatically verify the rules on a UML user model in XMI format. A comparison to related work shows our contribution: a generic top-down and syntax-based approach that checks language level constraints at compile-time.
[ { "version": "v1", "created": "Thu, 14 May 2009 16:13:48 GMT" } ]
2009-05-15T00:00:00
[ [ "Chen", "Zhe", "" ], [ "Motet", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0905.2381
S. Charles Brubaker
S. Charles Brubaker and Santosh Vempala
Random Tensors and Planted Cliques
null
null
10.1007/978-3-642-03685-9_31
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The r-parity tensor of a graph is a generalization of the adjacency matrix, where the tensor's entries denote the parity of the number of edges in subgraphs induced by r distinct vertices. For r=2, it is the adjacency matrix with 1's for edges and -1's for nonedges. It is well-known that the 2-norm of the adjacency matrix of a random graph is O(\sqrt{n}). Here we show that the 2-norm of the r-parity tensor is at most f(r)\sqrt{n}\log^{O(r)}n, answering a question of Frieze and Kannan who proved this for r=3. As a consequence, we get a tight connection between the planted clique problem and the problem of finding a vector that approximates the 2-norm of the r-parity tensor of a random graph. Our proof method is based on an inductive application of concentration of measure.
[ { "version": "v1", "created": "Thu, 14 May 2009 17:27:30 GMT" } ]
2015-05-13T00:00:00
[ [ "Brubaker", "S. Charles", "" ], [ "Vempala", "Santosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0905.2386
Joel Ratsaby
Joel Ratsaby
Combinatorial information distance
null
null
null
null
cs.DM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $|A|$ denote the cardinality of a finite set $A$. For any real number $x$ define $t(x)=x$ if $x\geq1$ and 1 otherwise. For any finite sets $A,B$ let $\delta(A,B)$ $=$ $\log_{2}(t(|B\cap\bar{A}||A|))$. We define {This appears as Technical Report # arXiv:0905.2386v4. A shorter version appears in the {Proc. of Mini-Conference on Applied Theoretical Computer Science (MATCOS-10)}, Slovenia, Oct. 13-14, 2010.} a new cobinatorial distance $d(A,B)$ $=$ $\max\{\delta(A,B),\delta(B,A)\} $ which may be applied to measure the distance between binary strings of different lengths. The distance is based on a classical combinatorial notion of information introduced by Kolmogorov.
[ { "version": "v1", "created": "Thu, 14 May 2009 17:44:39 GMT" }, { "version": "v2", "created": "Wed, 24 Feb 2010 11:49:28 GMT" }, { "version": "v3", "created": "Fri, 6 Aug 2010 09:36:12 GMT" }, { "version": "v4", "created": "Thu, 9 Sep 2010 19:54:28 GMT" }, { "version": "v5", "created": "Sun, 17 Oct 2010 18:12:08 GMT" } ]
2010-10-19T00:00:00
[ [ "Ratsaby", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2392
Vaneet Aggarwal
Achaleshwar Sahai and Vaneet Aggarwal and Melda Yuksel and Ashutosh Sabharwal
On Channel Output Feedback in Deterministic Interference Channels
To appear in IEEE ITW, Oct. 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the effect of channel output feedback on the sum capacity in a two-user symmetric deterministic interference channel. We find that having a single feedback link from one of the receivers to its own transmitter results in the same sum capacity as having a total of 4 feedback links from both the receivers to both the transmitters. Hence, from the sum capacity point of view, the three additional feedback links are not helpful. We also consider a half-duplex feedback model where the forward and the feedback resources are symmetric and timeshared. Surprisingly, we find that there is no gain in sum-capacity with feedback in a half-duplex feedback model when interference links have more capacity than direct links.
[ { "version": "v1", "created": "Thu, 14 May 2009 18:33:19 GMT" }, { "version": "v2", "created": "Mon, 31 Aug 2009 19:37:36 GMT" } ]
2009-08-31T00:00:00
[ [ "Sahai", "Achaleshwar", "" ], [ "Aggarwal", "Vaneet", "" ], [ "Yuksel", "Melda", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2413
Meng Zeng
Meng Zeng, Rui Zhang, Shuguang Cui
Outage Capacity and Optimal Transmission for Dying Channels
31 pages, 9 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TCOMM.2012.100812.110122
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In wireless networks, communication links may be subject to random fatal impacts: for example, sensor networks under sudden power losses or cognitive radio networks with unpredictable primary user spectrum occupancy. Under such circumstances, it is critical to quantify how fast and reliably the information can be collected over attacked links. For a single point-to-point channel subject to a random attack, named as a \emph{dying channel}, we model it as a block-fading (BF) channel with a finite and random delay constraint. First, we define the outage capacity as the performance measure, followed by studying the optimal coding length $K$ such that the outage probability is minimized when uniform power allocation is assumed. For a given rate target and a coding length $K$, we then minimize the outage probability over the power allocation vector $\mv{P}_{K}$, and show that this optimization problem can be cast into a convex optimization problem under some conditions. The optimal solutions for several special cases are discussed. Furthermore, we extend the single point-to-point dying channel result to the parallel multi-channel case where each sub-channel is a dying channel, and investigate the corresponding asymptotic behavior of the overall outage probability with two different attack models: the independent-attack case and the $m$-dependent-attack case. It can be shown that the overall outage probability diminishes to zero for both cases as the number of sub-channels increases if the \emph{rate per unit cost} is less than a certain threshold. The outage exponents are also studied to reveal how fast the outage probability improves over the number of sub-channels.
[ { "version": "v1", "created": "Thu, 14 May 2009 20:03:25 GMT" }, { "version": "v2", "created": "Thu, 4 Jun 2009 16:21:20 GMT" } ]
2016-11-15T00:00:00
[ [ "Zeng", "Meng", "" ], [ "Zhang", "Rui", "" ], [ "Cui", "Shuguang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2416
Dimitrios Katsaros
Leonidas Akritidis, Dimitrios Katsaros, Panayiotis Bozanis
Identifying Influential Bloggers: Time Does Matter
null
null
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blogs have recently become one of the most favored services on the Web. Many users maintain a blog and write posts to express their opinion, experience and knowledge about a product, an event and every subject of general or specific interest. More users visit blogs to read these posts and comment them. This "participatory journalism" of blogs has such an impact upon the masses that Keller and Berry argued that through blogging "one American in tens tells the other nine how to vote, where to eat and what to buy" \cite{keller1}. Therefore, a significant issue is how to identify such influential bloggers. This problem is very new and the relevant literature lacks sophisticated solutions, but most importantly these solutions have not taken into account temporal aspects for identifying influential bloggers, even though the time is the most critical aspect of the Blogosphere. This article investigates the issue of identifying influential bloggers by proposing two easily computed blogger ranking methods, which incorporate temporal aspects of the blogging activity. Each method is based on a specific metric to score the blogger's posts. The first metric, termed MEIBI, takes into consideration the number of the blog post's inlinks and its comments, along with the publication date of the post. The second metric, MEIBIX, is used to score a blog post according to the number and age of the blog post's inlinks and its comments. These methods are evaluated against the state-of-the-art influential blogger identification method utilizing data collected from a real-world community blog site. The obtained results attest that the new methods are able to better identify significant temporal patterns in the blogging behaviour.
[ { "version": "v1", "created": "Thu, 14 May 2009 20:05:41 GMT" } ]
2009-05-18T00:00:00
[ [ "Akritidis", "Leonidas", "" ], [ "Katsaros", "Dimitrios", "" ], [ "Bozanis", "Panayiotis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0905.2419
Daniel Gottesman
Daniel Gottesman, Sandy Irani
The Quantum and Classical Complexity of Translationally Invariant Tiling and Hamiltonian Problems
67 pages, approximately 6 gazillion figures. v2 has new results proving hardness for reflection-invariant quantum and classical systems and a discussion of the infinite quantum chain
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the complexity of a class of problems involving satisfying constraints which remain the same under translations in one or more spatial directions. In this paper, we show hardness of a classical tiling problem on an N x N 2-dimensional grid and a quantum problem involving finding the ground state energy of a 1-dimensional quantum system of N particles. In both cases, the only input is N, provided in binary. We show that the classical problem is NEXP-complete and the quantum problem is QMA_EXP-complete. Thus, an algorithm for these problems which runs in time polynomial in N (exponential in the input size) would imply that EXP = NEXP or BQEXP = QMA_EXP, respectively. Although tiling in general is already known to be NEXP-complete, to our knowledge, all previous reductions require that either the set of tiles and their constraints or some varying boundary conditions be given as part of the input. In the problem considered here, these are fixed, constant-sized parameters of the problem. Instead, the problem instance is encoded solely in the size of the system.
[ { "version": "v1", "created": "Thu, 14 May 2009 20:28:03 GMT" }, { "version": "v2", "created": "Mon, 23 Aug 2010 22:57:44 GMT" } ]
2010-08-25T00:00:00
[ [ "Gottesman", "Daniel", "" ], [ "Irani", "Sandy", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0905.2422
Vahid Pourahmadi Mr.
Vahid Pourahmadi, Alireza Bayesteh, and Amir K. Khandani
Multilevel Coding over Two-Hop Single-User Networks
21 pages, 7 figures, Submitted to IEEE Transactions on Information Theory on April 6, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a two-hop network in which information is transmitted from a source via a relay to a destination is considered. It is assumed that the channels are static fading with additive white Gaussian noise. All nodes are equipped with a single antenna and the Channel State Information (CSI) of each hop is not available at the corresponding transmitter. The relay is assumed to be simple, i.e., not capable of data buffering over multiple coding blocks, water-filling over time, or rescheduling. A commonly used design criterion in such configurations is the maximization of the average received rate at the destination. We show that using a continuum of multilevel codes at both the source and the relay, in conjunction with decode and forward strategy at the relay, performs optimum in this setup. In addition, we present a scheme to optimally allocate the available source and relay powers to different levels of their corresponding codes. The performance of this scheme is evaluated assuming Rayleigh fading and compared with the previously known strategies.
[ { "version": "v1", "created": "Thu, 14 May 2009 20:39:52 GMT" } ]
2009-05-18T00:00:00
[ [ "Pourahmadi", "Vahid", "" ], [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2423
Alexander Barg
Alexander Barg, Oleg R. Musin
Bounds on sets with few distances
11 pages
Journal of Combinatorial Theory Ser. A, 118 , no. 4, 2011, pp. 1465-1474,
10.1016/j.jcta.2011.01.002
null
math.CO cs.IT math.IT math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We derive a new estimate of the size of finite sets of points in metric spaces with few distances. The following applications are considered: (1) we improve the Ray-Chaudhuri--Wilson bound of the size of uniform intersecting families of subsets; (2) we refine the bound of Delsarte-Goethals-Seidel on the maximum size of spherical sets with few distances; (3) we prove a new bound on codes with few distances in the Hamming space, improving an earlier result of Delsarte. We also find the size of maximal binary codes and maximal constant-weight codes of small length with 2 and 3 distances.
[ { "version": "v1", "created": "Thu, 14 May 2009 21:12:19 GMT" }, { "version": "v2", "created": "Wed, 8 Sep 2010 17:30:24 GMT" } ]
2011-04-29T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Musin", "Oleg R.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0905.2429
Kfir Gedalyahu
Kfir Gedalyahu and Yonina C. Eldar
Time Delay Estimation from Low Rate Samples: A Union of Subspaces Approach
null
null
10.1109/TSP.2010.2044253
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time delay estimation arises in many applications in which a multipath medium has to be identified from pulses transmitted through the channel. Various approaches have been proposed in the literature to identify time delays introduced by multipath environments. However, these methods either operate on the analog received signal, or require high sampling rates in order to achieve reasonable time resolution. In this paper, our goal is to develop a unified approach to time delay estimation from low rate samples of the output of a multipath channel. Our methods result in perfect recovery of the multipath delays from samples of the channel output at the lowest possible rate, even in the presence of overlapping transmitted pulses. This rate depends only on the number of multipath components and the transmission rate, but not on the bandwidth of the probing signal. In addition, our development allows for a variety of different sampling methods. By properly manipulating the low-rate samples, we show that the time delays can be recovered using the well-known ESPRIT algorithm. Combining results from sampling theory with those obtained in the context of direction of arrival estimation methods, we develop necessary and sufficient conditions on the transmitted pulse and the sampling functions in order to ensure perfect recovery of the channel parameters at the minimal possible rate. Our results can be viewed in a broader context, as a sampling theorem for analog signals defined over an infinite union of subspaces.
[ { "version": "v1", "created": "Thu, 14 May 2009 21:15:49 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2009 08:36:37 GMT" }, { "version": "v3", "created": "Fri, 20 Nov 2009 10:07:29 GMT" } ]
2011-01-05T00:00:00
[ [ "Gedalyahu", "Kfir", "" ], [ "Eldar", "Yonina C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2435
Christoph Benzmueller
Christoph Benzmueller, Lawrence C. Paulson
Quantified Multimodal Logics in Simple Type Theory
ii + 22 pages
null
null
SEKI Report SR-2009-02
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a straightforward embedding of quantified multimodal logic in simple type theory and prove its soundness and completeness. Modal operators are replaced by quantification over a type of possible worlds. We present simple experiments, using existing higher-order theorem provers, to demonstrate that the embedding allows automated proofs of statements in these logics, as well as meta properties of them.
[ { "version": "v1", "created": "Thu, 14 May 2009 22:25:24 GMT" } ]
2009-05-18T00:00:00
[ [ "Benzmueller", "Christoph", "" ], [ "Paulson", "Lawrence C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.2447
Aydin Sezgin
Aydin Sezgin, Syed Ali Jafar, and Hamid Jafarkhani
The Diversity Multiplexing Tradeoff for Interference Networks
5 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The diversity-multiplexing tradeoff (DMT) for interference networks, such as the interference channel, the X channel, the Z interference channel and the Z channel, is analyzed. In particular, we investigate the impact of rate-splitting and channel knowledge at the transmitters. We also use the DMT of the Z channel and the Z interference channel to distill insights into the "loud neighbor" problem for femto-cell networks.
[ { "version": "v1", "created": "Thu, 14 May 2009 23:53:13 GMT" } ]
2009-05-18T00:00:00
[ [ "Sezgin", "Aydin", "" ], [ "Jafar", "Syed Ali", "" ], [ "Jafarkhani", "Hamid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2449
Serguei Mokhov
Serguei A. Mokhov
The Role of Self-Forensics in Vehicle Crash Investigations and Event Reconstruction
10 pages; preliminary version for CMRSC
null
null
null
cs.CY cs.AI cs.CR cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper further introduces and formalizes a novel concept of self-forensics for automotive vehicles, specified in the Forensic Lucid language. We argue that self-forensics, with the forensics taken out of the cybercrime domain, is applicable to "self-dissection" of intelligent vehicles and hardware systems for automated incident and anomaly analysis and event reconstruction by the software with or without the aid of the engineering teams in a variety of forensic scenarios. We propose a formal design, requirements, and specification of the self-forensic enabled units (similar to blackboxes) in vehicles that will help investigation of incidents and also automated reasoning and verification of theories along with the events reconstruction in a formal model. We argue such an analysis is beneficial to improve the safety of the passengers and their vehicles, like the airline industry does for planes.
[ { "version": "v1", "created": "Fri, 15 May 2009 00:08:02 GMT" } ]
2009-05-18T00:00:00
[ [ "Mokhov", "Serguei A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0905.2459
Serguei Mokhov
Serguei A. Mokhov
On Design and Implementation of the Distributed Modular Audio Recognition Framework: Requirements and Specification Design Document
53 pages, 8 figures, 2 tables. A 2006 report on software design and implementation of Distributed MARF, which is a distributed extension of classical MARF documented at arXiv:0905.1235 . Parts are to appear at the CISSE'08 conference (Springer). The content of the document and code are open-source and released at http://marf.sf.net ; v2 adds missing .ind file
null
10.1007/978-90-481-3662-9_72
null
cs.CV cs.DC cs.MM cs.NE cs.SD
http://creativecommons.org/licenses/by/3.0/
We present the requirements and design specification of the open-source Distributed Modular Audio Recognition Framework (DMARF), a distributed extension of MARF. The distributed version aggregates a number of distributed technologies (e.g. Java RMI, CORBA, Web Services) in a pluggable and modular model along with the provision of advanced distributed systems algorithms. We outline the associated challenges incurred during the design and implementation as well as overall specification of the project and its advantages and limitations.
[ { "version": "v1", "created": "Fri, 15 May 2009 02:52:28 GMT" }, { "version": "v2", "created": "Sun, 26 Jul 2009 23:16:29 GMT" } ]
2010-01-31T00:00:00
[ [ "Mokhov", "Serguei A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0905.2463
Chunhua Shen
Chunhua Shen, Junae Kim, Hanzi Wang
Generalized Kernel-based Visual Tracking
12 pages
IEEE Transactions on Circuits and Systems for Video Technology, 2010
null
null
cs.CV cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we generalize the plain MS trackers and attempt to overcome standard mean shift trackers' two limitations. It is well known that modeling and maintaining a representation of a target object is an important component of a successful visual tracker. However, little work has been done on building a robust template model for kernel-based MS tracking. In contrast to building a template from a single frame, we train a robust object representation model from a large amount of data. Tracking is viewed as a binary classification problem, and a discriminative classification rule is learned to distinguish between the object and background. We adopt a support vector machine (SVM) for training. The tracker is then implemented by maximizing the classification score. An iterative optimization scheme very similar to MS is derived for this purpose.
[ { "version": "v1", "created": "Fri, 15 May 2009 03:26:52 GMT" }, { "version": "v2", "created": "Sun, 7 Jun 2009 04:35:37 GMT" } ]
2009-06-07T00:00:00
[ [ "Shen", "Chunhua", "" ], [ "Kim", "Junae", "" ], [ "Wang", "Hanzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0905.2473
Keki Burjorjee
Keki M. Burjorjee
On the Workings of Genetic Algorithms: The Genoclique Fixing Hypothesis
25 pages, 7 figures
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We recently reported that the simple genetic algorithm (SGA) is capable of performing a remarkable form of sublinear computation which has a straightforward connection with the general problem of interacting attributes in data-mining. In this paper we explain how the SGA can leverage this computational proficiency to perform efficient adaptation on a broad class of fitness functions. Based on the relative ease with which a practical fitness function might belong to this broad class, we submit a new hypothesis about the workings of genetic algorithms. We explain why our hypothesis is superior to the building block hypothesis, and, by way of empirical validation, we present the results of an experiment in which the use of a simple mechanism called clamping dramatically improved the performance of an SGA with uniform crossover on large, randomly generated instances of the MAX 3-SAT problem.
[ { "version": "v1", "created": "Fri, 15 May 2009 07:17:31 GMT" } ]
2009-05-18T00:00:00
[ [ "Burjorjee", "Keki M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.2479
Guangyue Han
Guangyue Han, Brian Marcus, Yuval Peres
A note on a complex Hilbert metric with application to domain of analyticity for entropy rate of hidden Markov processes
15 pages, 1 figure
null
null
null
math.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we show that small complex perturbations of positive matrices are contractions, with respect to a complex version of the Hilbert metric, on the standard complex simplex. We show that this metric can be used to obtain estimates of the domain of analyticity of entropy rate for a hidden Markov process when the underlying Markov chain has strictly positive transition probabilities.
[ { "version": "v1", "created": "Fri, 15 May 2009 06:43:02 GMT" } ]
2009-05-18T00:00:00
[ [ "Han", "Guangyue", "" ], [ "Marcus", "Brian", "" ], [ "Peres", "Yuval", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2485
Oded Schwartz
Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz
Minimizing Communication in Linear Algebra
27 pages, 2 tables
SIAM. J. Matrix Anal. & Appl. 32 (2011), no. 3, 866-901
10.1137/090769156
null
cs.CC cs.DS cs.NA math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 1981 Hong and Kung proved a lower bound on the amount of communication needed to perform dense, matrix-multiplication using the conventional $O(n^3)$ algorithm, where the input matrices were too large to fit in the small, fast memory. In 2004 Irony, Toledo and Tiskin gave a new proof of this result and extended it to the parallel case. In both cases the lower bound may be expressed as $\Omega$(#arithmetic operations / $\sqrt{M}$), where M is the size of the fast memory (or local memory in the parallel case). Here we generalize these results to a much wider variety of algorithms, including LU factorization, Cholesky factorization, $LDL^T$ factorization, QR factorization, algorithms for eigenvalues and singular values, i.e., essentially all direct methods of linear algebra. The proof works for dense or sparse matrices, and for sequential or parallel algorithms. In addition to lower bounds on the amount of data moved (bandwidth) we get lower bounds on the number of messages required to move it (latency). We illustrate how to extend our lower bound technique to compositions of linear algebra operations (like computing powers of a matrix), to decide whether it is enough to call a sequence of simpler optimal algorithms (like matrix multiplication) to minimize communication, or if we can do better. We give examples of both. We also show how to extend our lower bounds to certain graph theoretic problems. We point out recently designed algorithms for dense LU, Cholesky, QR, eigenvalue and the SVD problems that attain these lower bounds; implementations of LU and QR show large speedups over conventional linear algebra algorithms in standard libraries like LAPACK and ScaLAPACK. Many open problems remain.
[ { "version": "v1", "created": "Fri, 15 May 2009 07:26:56 GMT" } ]
2011-09-20T00:00:00
[ [ "Ballard", "Grey", "" ], [ "Demmel", "James", "" ], [ "Holtz", "Olga", "" ], [ "Schwartz", "Oded", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0905.2501
Rom\`an R. Zapatrin
Daniel Sonntag, Rom\`an R. Zapatrin
Macrodynamics of users' behavior in Information Retrieval
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method to geometrize massive data sets from search engines query logs. For this purpose, a macrodynamic-like quantitative model of the Information Retrieval (IR) process is developed, whose paradigm is inspired by basic constructions of Einstein's general relativity theory in which all IR objects are uniformly placed in a common Room. The Room has a structure similar to Einsteinian spacetime, namely that of a smooth manifold. Documents and queries are treated as matter objects and sources of material fields. Relevance, the central notion of IR, becomes a dynamical issue controlled by both gravitation (or, more precisely, as the motion in a curved spacetime) and forces originating from the interactions of matter fields. The spatio-temporal description ascribes dynamics to any document or query, thus providing a uniform description for documents of both initially static and dynamical nature. Within the IR context, the techniques presented are based on two ideas. The first is the placement of all objects participating in IR into a common continuous space. The second idea is the `objectivization' of the IR process; instead of expressing users' wishes, we consider the overall IR as an objective physical process, representing the IR process in terms of motion in a given external-fields configuration. Various semantic environments are treated as various IR universes.
[ { "version": "v1", "created": "Fri, 15 May 2009 09:57:56 GMT" } ]
2009-05-18T00:00:00
[ [ "Sonntag", "Daniel", "" ], [ "Zapatrin", "Romàn R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0905.2509
Stefano Zacchiroli
Angelo Di Iorio, Fabio Vitali, Davide Rossi, Stefano Zacchiroli (PPS)
Where are your Manners? Sharing Best Community Practices in the Web 2.0
ACM symposium on Applied Computing, Honolulu : \'Etats-Unis d'Am\'erique (2009)
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Web 2.0 fosters the creation of communities by offering users a wide array of social software tools. While the success of these tools is based on their ability to support different interaction patterns among users by imposing as few limitations as possible, the communities they support are not free of rules (just think about the posting rules in a community forum or the editing rules in a thematic wiki). In this paper we propose a framework for the sharing of best community practices in the form of a (potentially rule-based) annotation layer that can be integrated with existing Web 2.0 community tools (with specific focus on wikis). This solution is characterized by minimal intrusiveness and plays nicely within the open spirit of the Web 2.0 by providing users with behavioral hints rather than by enforcing the strict adherence to a set of rules.
[ { "version": "v1", "created": "Fri, 15 May 2009 10:04:29 GMT" } ]
2009-05-18T00:00:00
[ [ "Di Iorio", "Angelo", "", "PPS" ], [ "Vitali", "Fabio", "", "PPS" ], [ "Rossi", "Davide", "", "PPS" ], [ "Zacchiroli", "Stefano", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0905.2539
Delia Kesner
Delia Kesner
A Theory of Explicit Substitutions with Safe and Full Composition
29 pages Special Issue: Selected Papers of the Conference "International Colloquium on Automata, Languages and Programming 2008" edited by Giuseppe Castagna and Igor Walukiewicz
Logical Methods in Computer Science, Volume 5, Issue 3 (July 15, 2009) lmcs:816
10.2168/LMCS-5(3:1)2009
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many different systems with explicit substitutions have been proposed to implement a large class of higher-order languages. Motivations and challenges that guided the development of such calculi in functional frameworks are surveyed in the first part of this paper. Then, very simple technology in named variable-style notation is used to establish a theory of explicit substitutions for the lambda-calculus which enjoys a whole set of useful properties such as full composition, simulation of one-step beta-reduction, preservation of beta-strong normalisation, strong normalisation of typed terms and confluence on metaterms. Normalisation of related calculi is also discussed.
[ { "version": "v1", "created": "Fri, 15 May 2009 13:35:58 GMT" }, { "version": "v2", "created": "Wed, 15 Jul 2009 12:33:03 GMT" }, { "version": "v3", "created": "Wed, 15 Jul 2009 21:06:30 GMT" } ]
2015-07-01T00:00:00
[ [ "Kesner", "Delia", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.2540
Swan Dubois
Alain Cournier (MIS), Swan Dubois (LIP6, INRIA Rocquencourt), Vincent Villain (MIS)
Two snap-stabilizing point-to-point communication protocols in message-switched networks
null
null
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A snap-stabilizing protocol, starting from any configuration, always behaves according to its specification. In this paper, we present a snap-stabilizing protocol to solve the message forwarding problem in a message-switched network. In this problem, we must manage resources of the system to deliver messages to any processor of the network. In this purpose, we use information given by a routing algorithm. By the context of stabilization (in particular, the system starts in an arbitrary configuration), this information can be corrupted. So, the existence of a snap-stabilizing protocol for the message forwarding problem implies that we can ask the system to begin forwarding messages even if routing information are initially corrupted. In this paper, we propose two snap-stabilizing algorithms (in the state model) for the following specification of the problem: - Any message can be generated in a finite time. - Any emitted message is delivered to its destination once and only once in a finite time. This implies that our protocol can deliver any emitted message regardless of the state of routing tables in the initial configuration. These two algorithms are based on the previous work of [MS78]. Each algorithm needs a particular method to be transform into a snap-stabilizing one but both of them do not introduce a significant overcost in memory or in time with respect to algorithms of [MS78].
[ { "version": "v1", "created": "Fri, 15 May 2009 12:41:01 GMT" } ]
2009-05-18T00:00:00
[ [ "Cournier", "Alain", "", "MIS" ], [ "Dubois", "Swan", "", "LIP6, INRIA Rocquencourt" ], [ "Villain", "Vincent", "", "MIS" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0905.2545
Rene David
Ren\'e David (LAMA)
A direct proof of the confluence of combinatory strong reduction
To appear in TCS
null
null
null
math.LO cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I give a proof of the confluence of combinatory strong reduction that does not use the one of lambda-calculus. I also give simple and direct proofs of a standardization theorem for this reduction and the strong normalization of simply typed terms.
[ { "version": "v1", "created": "Fri, 15 May 2009 13:42:46 GMT" } ]
2009-05-19T00:00:00
[ [ "David", "René", "", "LAMA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.2605
Dengpan Zhou
Jie Gao, Dengpan Zhou
The Emergence of Sparse Spanners and Greedy Well-Separated Pair Decomposition
null
null
10.1007/978-3-642-13731-0_6
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A spanner graph on a set of points in $R^d$ contains a shortest path between any pair of points with length at most a constant factor of their Euclidean distance. In this paper we investigate new models and aim to interpret why good spanners 'emerge' in reality, when they are clearly built in pieces by agents with their own interests and the construction is not coordinated. Our main result is to show that if edges are built in an arbitrary order but an edge is built if and only if its endpoints are not 'close' to the endpoints of an existing edge, the graph is a $(1 + \eps)$-spanner with a linear number of edges, constant average degree, and the total edge length as a small logarithmic factor of the cost of the minimum spanning tree. As a side product, we show a simple greedy algorithm for constructing optimal size well-separated pair decompositions that may be of interest on its own.
[ { "version": "v1", "created": "Fri, 15 May 2009 19:47:36 GMT" }, { "version": "v2", "created": "Fri, 15 May 2009 20:11:22 GMT" } ]
2015-05-13T00:00:00
[ [ "Gao", "Jie", "" ], [ "Zhou", "Dengpan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.2635
Andriy Myronenko
Andriy Myronenko, Xubo Song
Point-Set Registration: Coherent Point Drift
null
IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 32, issue 12, pp. 2262-2275
10.1109/TPAMI.2010.46
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Point set registration is a key component in many computer vision tasks. The goal of point set registration is to assign correspondences between two sets of points and to recover the transformation that maps one point set to the other. Multiple factors, including an unknown non-rigid spatial transformation, large dimensionality of point set, noise and outliers, make the point set registration a challenging problem. We introduce a probabilistic method, called the Coherent Point Drift (CPD) algorithm, for both rigid and non-rigid point set registration. We consider the alignment of two point sets as a probability density estimation problem. We fit the GMM centroids (representing the first point set) to the data (the second point set) by maximizing the likelihood. We force the GMM centroids to move coherently as a group to preserve the topological structure of the point sets. In the rigid case, we impose the coherence constraint by re-parametrization of GMM centroid locations with rigid parameters and derive a closed form solution of the maximization step of the EM algorithm in arbitrary dimensions. In the non-rigid case, we impose the coherence constraint by regularizing the displacement field and using the variational calculus to derive the optimal transformation. We also introduce a fast algorithm that reduces the method computation complexity to linear. We test the CPD algorithm for both rigid and non-rigid transformations in the presence of noise, outliers and missing points, where CPD shows accurate results and outperforms current state-of-the-art methods.
[ { "version": "v1", "created": "Fri, 15 May 2009 22:28:00 GMT" } ]
2010-11-09T00:00:00
[ [ "Myronenko", "Andriy", "" ], [ "Song", "Xubo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0905.2636
Lada A. Adamic
Xiaolin Shi, Belle Tseng, Lada A. Adamic
Information Diffusion in Computer Science Citation Networks
long version of poster published at ICWSM 2009
null
null
null
cs.DL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper citation network is a traditional social medium for the exchange of ideas and knowledge. In this paper we view citation networks from the perspective of information diffusion. We study the structural features of the information paths through the citation networks of publications in computer science, and analyze the impact of various citation choices on the subsequent impact of the article. We find that citing recent papers and papers within the same scholarly community garners a slightly larger number of citations on average. However, this correlation is weaker among well-cited papers implying that for high impact work citing within one's field is of lesser importance. We also study differences in information flow for specific subsets of citation networks: books versus conference and journal articles, different areas of computer science, and different time periods.
[ { "version": "v1", "created": "Fri, 15 May 2009 22:41:39 GMT" } ]
2009-05-19T00:00:00
[ [ "Shi", "Xiaolin", "" ], [ "Tseng", "Belle", "" ], [ "Adamic", "Lada A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0905.2637
Felipe Cruz
Felipe A. Cruz, Matthew G. Knepley, L. A. Barba
PetFMM--A dynamically load-balancing parallel fast multipole library
28 pages, 9 figures
Int. J. Num. Meth. Eng., 85(4): 403-428 (Jan. 2011)
10.1002/nme.2972
null
cs.DC cs.DS
http://creativecommons.org/licenses/by/3.0/
Fast algorithms for the computation of $N$-body problems can be broadly classified into mesh-based interpolation methods, and hierarchical or multiresolution methods. To this last class belongs the well-known fast multipole method (FMM), which offers O(N) complexity. This paper presents an extensible parallel library for $N$-body interactions utilizing the FMM algorithm, built on the framework of PETSc. A prominent feature of this library is that it is designed to be extensible, with a view to unifying efforts involving many algorithms based on the same principles as the FMM and enabling easy development of scientific application codes. The paper also details an exhaustive model for the computation of tree-based $N$-body algorithms in parallel, including both work estimates and communications estimates. With this model, we are able to implement a method to provide automatic, a priori load balancing of the parallel execution, achieving optimal distribution of the computational work among processors and minimal inter-processor communications. Using a client application that performs the calculation of velocity induced by $N$ vortex particles, ample verification and testing of the library was performed. Strong scaling results are presented with close to a million particles in up to 64 processors, including both speedup and parallel efficiency. The library is currently able to achieve over 85% parallel efficiency for 64 processors. The software library is open source under the PETSc license; this guarantees the maximum impact to the scientific community and encourages peer-based collaboration for the extensions and applications.
[ { "version": "v1", "created": "Fri, 15 May 2009 23:46:14 GMT" } ]
2011-09-21T00:00:00
[ [ "Cruz", "Felipe A.", "" ], [ "Knepley", "Matthew G.", "" ], [ "Barba", "L. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.2638
Aylin Yener
Xiang He, Aylin Yener
Secure Degrees of Freedom for Gaussian Channels with Interference: Structured Codes Outperform Gaussian Signaling
6 pages, Submitted to IEEE Globecom, March 2009
null
10.1109/GLOCOM.2009.5425429
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we prove that a positive secure degree of freedom is achievable for a large class of Gaussian channels as long as the channel is not degraded and the channel is fully connected. This class includes the MAC wire-tap channel, the 2-user interference channel with confidential messages, the 2-user interference channel with an external eavesdropper. Best known achievable schemes to date for these channels use Gaussian signaling. In this work, we show that structured codes outperform Gaussian random codes at high SNR when channel gains are real numbers.
[ { "version": "v1", "created": "Fri, 15 May 2009 23:59:44 GMT" } ]
2016-11-17T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2639
Narayana Santhanam
Narayana Santhanam and Martin J. Wainwright
Information-theoretic limits of selecting binary graphical models in high dimensions
27 pages
null
null
null
cs.IT cs.LG math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of graphical model selection is to correctly estimate the graph structure of a Markov random field given samples from the underlying distribution. We analyze the information-theoretic limitations of the problem of graph selection for binary Markov random fields under high-dimensional scaling, in which the graph size $p$ and the number of edges $k$, and/or the maximal node degree $d$ are allowed to increase to infinity as a function of the sample size $n$. For pairwise binary Markov random fields, we derive both necessary and sufficient conditions for correct graph selection over the class $\mathcal{G}_{p,k}$ of graphs on $p$ vertices with at most $k$ edges, and over the class $\mathcal{G}_{p,d}$ of graphs on $p$ vertices with maximum degree at most $d$. For the class $\mathcal{G}_{p, k}$, we establish the existence of constants $c$ and $c'$ such that if $\numobs < c k \log p$, any method has error probability at least 1/2 uniformly over the family, and we demonstrate a graph decoder that succeeds with high probability uniformly over the family for sample sizes $\numobs > c' k^2 \log p$. Similarly, for the class $\mathcal{G}_{p,d}$, we exhibit constants $c$ and $c'$ such that for $n < c d^2 \log p$, any method fails with probability at least 1/2, and we demonstrate a graph decoder that succeeds with high probability for $n > c' d^3 \log p$.
[ { "version": "v1", "created": "Sat, 16 May 2009 00:41:30 GMT" } ]
2009-05-19T00:00:00
[ [ "Santhanam", "Narayana", "" ], [ "Wainwright", "Martin J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0905.2640
Aylin Yener
Xiang He, Aylin Yener
The Gaussian Many-to-One Interference Channel with Confidential Messages
5 pages, To appear at IEEE ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the $K$-user many-to-one interference channel with confidential messages in which the $K$th user experiences interference from all other $K-1$ users, and is at the same time treated as an eavesdropper to all the messages of these users. We derive achievable rates and an upper bound on the sum rate for this channel and show that the gap between the achievable sum rate and its upper bound is $\log_2(K-1)$ bits per channel use under very strong interference, when the interfering users have equal power constraints and interfering link channel gains. The main contributions of this work are: (i) nested lattice codes are shown to provide secrecy when interference is present, (ii) a secrecy sum rate upper bound is found for strong interference regime and (iii) it is proved that under very strong interference and a symmetric setting, the gap between the achievable sum rate and the upper bound is constant with respect to transmission powers.
[ { "version": "v1", "created": "Sat, 16 May 2009 00:46:51 GMT" } ]
2009-05-19T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2643
Aylin Yener
Xiang He, Aylin Yener
K-user Interference Channels: Achievable Secrecy Rate and Degrees of Freedom
5 pages. To appear at IEEE ITW 2009, Volos, June 2009
null
10.1109/ITWNIT.2009.5158598
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we consider achievable secrecy rates for symmetric $K$-user ($K \ge 3$) interference channels with confidential messages. We find that nested lattice codes and layered coding are useful in providing secrecy for these channels. Achievable secrecy rates are derived for very strong interference. In addition, we derive the secure degrees of freedom for a range of channel parameters. As a by-product of our approach, we also demonstrate that nested lattice codes are useful for K-user symmetric interference channels without secrecy constraints in that they yield higher degrees of freedom than previous results.
[ { "version": "v1", "created": "Sat, 16 May 2009 01:04:27 GMT" } ]
2016-11-17T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2645
Aylin Yener
Xiang He, Aylin Yener
Providing Secrecy with Lattice Codes
This paper appeared in the Proceedings of the 2008 Allerton Conference on Communication, Control, and Computing, September 2008. Theorems 1 and 2 in this paper derived the Equivocation when using Nested Lattice Codes, leading to the "one-bit" result for the secrecy rate
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent results have shown that lattice codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. On the other hand, for Gaussian channels with secrecy constraints, efforts to date rely on random codes. In this work, we provide a tool to bridge these two areas so that the secrecy rate can be computed when lattice codes are used. In particular, we address the problem of bounding equivocation rates under nonlinear modulus operation that is present in lattice encoders/decoders. The technique is then demonstrated in two Gaussian channel examples: (1) a Gaussian wiretap channel with a cooperative jammer, and (2) a multi-hop line network from a source to a destination with untrusted intermediate relay nodes from whom the information needs to be kept secret. In both cases, lattice codes are used to facilitate cooperative jamming. In the second case, interestingly, we demonstrate that a non-vanishing positive secrecy rate is achievable regardless of the number of hops.
[ { "version": "v1", "created": "Sat, 16 May 2009 01:25:43 GMT" } ]
2009-05-19T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2649
Soumya Banerjee
Soumya Banerjee
An Immune System Inspired Approach to Automated Program Verification
null
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An immune system inspired Artificial Immune System (AIS) algorithm is presented, and is used for the purposes of automated program verification. Relevant immunological concepts are discussed and the field of AIS is briefly reviewed. It is proposed to use this AIS algorithm for a specific automated program verification task: that of predicting shape of program invariants. It is shown that the algorithm correctly predicts program invariant shape for a variety of benchmarked programs.
[ { "version": "v1", "created": "Sat, 16 May 2009 02:34:32 GMT" } ]
2009-05-19T00:00:00
[ [ "Banerjee", "Soumya", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0905.2657
Daniel Lemire
Kamel Aouiche, Daniel Lemire, Robert Godin
Web 2.0 OLAP: From Data Cubes to Tag Clouds
Software at https://github.com/lemire/OLAPTagCloud. arXiv admin note: substantial text overlap with arXiv:0710.2156
Lecture Notes in Business Information Processing Vol. 18, pages 51-64, 2009
10.1007/978-3-642-01344-7_5
null
cs.DB
http://creativecommons.org/licenses/by-nc-sa/4.0/
Increasingly, business projects are ephemeral. New Business Intelligence tools must support ad-lib data sources and quick perusal. Meanwhile, tag clouds are a popular community-driven visualization technique. Hence, we investigate tag-cloud views with support for OLAP operations such as roll-ups, slices, dices, clustering, and drill-downs. As a case study, we implemented an application where users can upload data and immediately navigate through its ad hoc dimensions. To support social networking, views can be easily shared and embedded in other Web sites. Algorithmically, our tag-cloud views are approximate range top-k queries over spontaneous data cubes. We present experimental evidence that iceberg cuboids provide adequate online approximations. We benchmark several browser-oblivious tag-cloud layout optimizations.
[ { "version": "v1", "created": "Sat, 16 May 2009 05:57:06 GMT" }, { "version": "v2", "created": "Tue, 15 Mar 2016 21:52:24 GMT" } ]
2016-03-17T00:00:00
[ [ "Aouiche", "Kamel", "" ], [ "Lemire", "Daniel", "" ], [ "Godin", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0905.2659
Walid Saad
Walid Saad, Zhu Han, Merouane Debbah, Are Hj{\o}rungnes, and Tamer Ba\c{s}ar
Coalitional Games for Distributed Collaborative Spectrum Sensing in Cognitive Radio Networks
in proceedings of IEEE INFOCOM 2009
IEEE INFOCOM 2009
10.1109/INFCOM.2009.5062135
null
cs.GT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative spectrum sensing among secondary users (SUs) in cognitive networks is shown to yield a significant performance improvement. However, there exists an inherent trade off between the gains in terms of probability of detection of the primary user (PU) and the costs in terms of false alarm probability. In this paper, we study the impact of this trade off on the topology and the dynamics of a network of SUs seeking to reduce the interference on the PU through collaborative sensing. Moreover, while existing literature mainly focused on centralized solutions for collaborative sensing, we propose distributed collaboration strategies through game theory. We model the problem as a non-transferable coalitional game, and propose a distributed algorithm for coalition formation through simple merge and split rules. Through the proposed algorithm, SUs can autonomously collaborate and self-organize into disjoint independent coalitions, while maximizing their detection probability taking into account the cooperation costs (in terms of false alarm). We study the stability of the resulting network structure, and show that a maximum number of SUs per formed coalition exists for the proposed utility model. Simulation results show that the proposed algorithm allows a reduction of up to 86.6% of the average missing probability per SU (probability of missing the detection of the PU) relative to the non-cooperative case, while maintaining a certain false alarm level. In addition, through simulations, we compare the performance of the proposed distributed solution with respect to an optimal centralized solution that minimizes the average missing probability per SU. Finally, the results also show how the proposed algorithm autonomously adapts the network topology to environmental changes such as mobility.
[ { "version": "v1", "created": "Sat, 16 May 2009 07:12:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Saad", "Walid", "" ], [ "Han", "Zhu", "" ], [ "Debbah", "Merouane", "" ], [ "Hjørungnes", "Are", "" ], [ "Başar", "Tamer", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2676
Samir Medina Perlaza
Samir M. Perlaza, Merouane Debbah, Samson Lasaulce, Hanna Bogucka
On the Benefits of Bandwidth Limiting in Decentralized Vector Multiple Access Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the network spectral efficiency of decentralized vector multiple access channels (MACs) when the number of accessible dimensions per transmitter is strategically limited. Considering each dimension as a frequency band, we call this limiting process bandwidth limiting (BL). Assuming that each transmitter maximizes its own data rate by water-filling over the available frequency bands, we consider two scenarios. In the first scenario, transmitters use non-intersecting sets of bands (spectral resource partition), and in the second one, they freely exploit all the available frequency bands (spectral resource sharing). In the latter case, successive interference cancelation (SIC) is used. We show the existence of an optimal number of dimensions that a transmitter must use in order to maximize the network performance measured in terms of spectral efficiency. We provide a closed form expression for the optimal number of accessible bands in the first scenario. Such an optimum point, depends on the number of active transmitters, the number of available frequency bands and the different signal-to-noise ratios. In the second scenario, we show that BL does not bring a significant improvement on the network spectral efficiency, when all transmitters use the same BL policy. For both scenarios, we provide simulation results to validate our conclusions.
[ { "version": "v1", "created": "Sat, 16 May 2009 11:30:38 GMT" } ]
2009-05-19T00:00:00
[ [ "Perlaza", "Samir M.", "" ], [ "Debbah", "Merouane", "" ], [ "Lasaulce", "Samson", "" ], [ "Bogucka", "Hanna", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2705
Alexander Reshetnyak
A. Kuleshov, A.A. Reshetnyak
Programming Realization of Symbolic Computations for Non-linear Commutator Superalgebras over the Heisenberg--Weyl Superalgebra: Data Structures and Processing Methods
35 pages, 2 figures in eps-format, corrected typos, added references
null
null
null
hep-th cs.SC math.QA math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We suggest a programming realization of an algorithm for verifying a given set of algebraic relations in the form of a supercommutator multiplication table for the Verma module, which is constructed according to a generalized Cartan procedure for a quadratic superalgebra and whose elements are realized as a formal power series with respect to non-commuting elements. To this end, we propose an algebraic procedure of Verma module construction and its realization in terms of non-commuting creation and annihilation operators of a given Heisenberg--Weyl superalgebra. In doing so, we set up a problem which naturally arises within a Lagrangian description of higher-spin fields in anti-de-Sitter (AdS) spaces: to verify the fact that the resulting Verma module elements obey the given commutator multiplication for the original non-linear superalgebra. The problem setting is based on a restricted principle of mathematical induction, in powers of inverse squared radius of the AdS-space. For a construction of an algorithm resolving this problem, we use a two-level data model within the object-oriented approach, which is realized on a basis of the programming language C#. The program allows one to consider objects (of a less general nature than non-linear commutator superalgebras) that fall under the class of so-called $GR$-algebras, for whose treatment one widely uses the module \emph{Plural} of the system \emph{Singular} of symbolic computations for polynomials.
[ { "version": "v1", "created": "Sat, 16 May 2009 21:29:03 GMT" }, { "version": "v2", "created": "Wed, 19 Aug 2009 11:32:37 GMT" } ]
2009-08-26T00:00:00
[ [ "Kuleshov", "A.", "" ], [ "Reshetnyak", "A. A.", "" ] ]
[ { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]
0905.2718
Joerg Kliewer
Tao Cui, Tracey Ho, Joerg Kliewer
Achievable Rate and Optimal Physical Layer Rate Allocation in Interference-Free Wireless Networks
5 pages, to appear in Proc. IEEE ISIT, July 2009
null
10.1109/ISIT.2009.5205903
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the achievable rate in interference-free wireless networks with physical layer fading channels and orthogonal multiple access. As a starting point, the point-to-point channel is considered. We find the optimal physical and network layer rate trade-off which maximizes the achievable overall rate for both a fixed rate transmission scheme and an improved scheme based on multiple virtual users and superposition coding. These initial results are extended to the network setting, where, based on a cut-set formulation, the achievable rate at each node and its upper bound are derived. We propose a distributed optimization algorithm which allows to jointly determine the maximum achievable rate, the optimal physical layer rates on each network link, and an opportunistic back-pressure-type routing strategy on the network layer. This inherently justifies the layered architecture in existing wireless networks. Finally, we show that the proposed layered optimization approach can achieve almost all of the ergodic network capacity in high SNR.
[ { "version": "v1", "created": "Sun, 17 May 2009 06:02:11 GMT" } ]
2016-11-18T00:00:00
[ [ "Cui", "Tao", "" ], [ "Ho", "Tracey", "" ], [ "Kliewer", "Joerg", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2796
Danilo Silva
Danilo Silva, Weifei Zeng, Frank R. Kschischang
Sparse Network Coding with Overlapping Classes
15 pages, 5 figures, to be published at NetCod 2009
null
10.1109/NETCOD.2009.5191397
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel approach to network coding for distribution of large files. Instead of the usual approach of splitting packets into disjoint classes (also known as generations) we propose the use of overlapping classes. The overlapping allows the decoder to alternate between Gaussian elimination and back substitution, simultaneously boosting the performance and reducing the decoding complexity. Our approach can be seen as a combination of fountain coding and network coding. Simulation results are presented that demonstrate the promise of our approach.
[ { "version": "v1", "created": "Mon, 18 May 2009 03:37:41 GMT" } ]
2019-05-07T00:00:00
[ [ "Silva", "Danilo", "" ], [ "Zeng", "Weifei", "" ], [ "Kschischang", "Frank R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2817
Haiping Huang
Haiping Huang and Haijun Zhou
Cavity approach to the Sourlas code system
12 pages, 6 figures
Phys. Rev. E 80, 056113 (2009)
10.1103/PhysRevE.80.056113
null
cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The statistical physics properties of regular and irregular Sourlas codes are investigated in this paper by the cavity method. At finite temperatures, the free energy density of these coding systems is derived and compared with the result obtained by the replica method. In the zero temperature limit, the Shannon's bound is recovered in the case of infinite-body interactions while the code rate is still finite. However, the decoding performance as obtained by the replica theory has not considered the zero-temperature entropic effect. The cavity approach is able to consider the ground-state entropy. It leads to a set of evanescent cavity fields propagation equations which further improve the decoding performance, as confirmed by our numerical simulations on single instances. For the irregular Sourlas code, we find that it takes the trade-off between good dynamical property and high performance of decoding. In agreement with the results found from the algorithmic point of view, the decoding exhibits a first order phase transition as occurs in the regular code system with three-body interactions. The cavity approach for the Sourlas code system can be extended to consider first-step replica-symmetry-breaking.
[ { "version": "v1", "created": "Mon, 18 May 2009 14:17:13 GMT" }, { "version": "v2", "created": "Thu, 13 Aug 2009 02:42:08 GMT" } ]
2013-05-29T00:00:00
[ [ "Huang", "Haiping", "" ], [ "Zhou", "Haijun", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2825
Petter Holme
Beom Jun Kim, Petter Holme, Viktoria Fodor
Heterogeneous attachment strategies optimize the topology of dynamic wireless networks
null
Eur. Phys. J. B 73, 597--604 (2010)
10.1140/epjb/e2010-00049-x
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In optimizing the topology of wireless networks built of a dynamic set of spatially embedded agents, there are many trade-offs to be dealt with. The network should preferably be as small (in the sense that the average, or maximal, pathlength is short) as possible, it should be robust to failures, not consume too much power, and so on. In this paper, we investigate simple models of how agents can choose their neighbors in such an environment. In our model of attachment, we can tune from one situation where agents prefer to attach to others in closest proximity, to a situation where distance is ignored (and thus attachments can be made to agents further away). We evaluate this scenario with several performance measures and find that the optimal topologies, for most of the quantities, is obtained for strategies resulting in a mix of most local and a few random connections.
[ { "version": "v1", "created": "Mon, 18 May 2009 08:35:02 GMT" } ]
2010-03-13T00:00:00
[ [ "Kim", "Beom Jun", "" ], [ "Holme", "Petter", "" ], [ "Fodor", "Viktoria", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.2880
Rene David
Ren\'e David (LAMA), Marek Zaionc
Counting proofs in propositional logic
null
Archive for Mathematical Logic 48 (2009) P 185-199
10.1007/s00153-009-0119-5
null
math.LO cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a procedure for counting the number of different proofs of a formula in various sorts of propositional logic. This number is either an integer (that may be 0 if the formula is not provable) or infinite.
[ { "version": "v1", "created": "Mon, 18 May 2009 13:14:01 GMT" } ]
2009-05-19T00:00:00
[ [ "David", "René", "", "LAMA" ], [ "Zaionc", "Marek", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.2882
Maroun Bercachi
Maroun Bercachi (I3S), Philippe Collard (I3S), Manuel Clergue (I3S), Sebastien Verel (I3S)
Do not Choose Representation just Change: An Experimental Study in States based EA
null
Genetic and Evolutionary Computation Conference 2009, Montr\'eal : Canada (2009)
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our aim in this paper is to analyse the phenotypic effects (evolvability) of diverse coding conversion operators in an instance of the states based evolutionary algorithm (SEA). Since the representation of solutions or the selection of the best encoding during the optimization process has been proved to be very important for the efficiency of evolutionary algorithms (EAs), we will discuss a strategy of coupling more than one representation and different procedures of conversion from one coding to another during the search. Elsewhere, some EAs try to use multiple representations (SM-GA, SEA, etc.) in intention to benefit from the characteristics of each of them. In spite of those results, this paper shows that the change of the representation is also a crucial approach to take into consideration while attempting to increase the performances of such EAs. As a demonstrative example, we use a two states SEA (2-SEA) which has two identical search spaces but different coding conversion operators. The results show that the way of changing from one coding to another and not only the choice of the best representation nor the representation itself is very advantageous and must be taken into account in order to well-desing and improve EAs execution.
[ { "version": "v1", "created": "Mon, 18 May 2009 13:35:14 GMT" } ]
2009-05-19T00:00:00
[ [ "Bercachi", "Maroun", "", "I3S" ], [ "Collard", "Philippe", "", "I3S" ], [ "Clergue", "Manuel", "", "I3S" ], [ "Verel", "Sebastien", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.2892
Rene David
Ren\'e David (LAMA), Karim Nour (LAMA)
Strong normalization results by translation
Submitted to APAL
null
null
null
math.LO cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove the strong normalization of full classical natural deduction (i.e. with conjunction, disjunction and permutative conversions) by using a translation into the simply typed lambda-mu-calculus. We also extend Mendler's result on recursive equations to this system.
[ { "version": "v1", "created": "Mon, 18 May 2009 14:13:58 GMT" } ]
2009-05-19T00:00:00
[ [ "David", "René", "", "LAMA" ], [ "Nour", "Karim", "", "LAMA" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.2918
Karoline Wiesner
Karoline Wiesner, Mile Gu, Elisabeth Rieper, and Vlatko Vedral
Information erasure lurking behind measures of complexity
Withdrawn: The main results, a corrected version of Theorem 1, and further results are contained in the new paper "Information-theoretic bound on the energy cost of stochastic simulation", http://arxiv.org/abs/1110.4217
null
null
null
physics.data-an cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex systems are found in most branches of science. It is still argued how to best quantify their complexity and to what end. One prominent measure of complexity (the statistical complexity) has an operational meaning in terms of the amount of resources needed to forecasting a system's behaviour. Another one (the effective measure complexity, aka excess entropy) is a measure of mutual information stored in the system proper. We show that for any given system the two measures differ by the amount of information erased during forecasting. We interpret the difference as inefficiency of a given model. We find a bound to the ratio of the two measures defined as information-processing efficiency, in analogy to the second law of thermodynamics. This new link between two prominent measures of complexity provides a quantitative criterion for good models of complex systems, namely those with little information erasure.
[ { "version": "v1", "created": "Mon, 18 May 2009 15:54:50 GMT" }, { "version": "v2", "created": "Fri, 21 Oct 2011 09:24:52 GMT" } ]
2011-10-24T00:00:00
[ [ "Wiesner", "Karoline", "" ], [ "Gu", "Mile", "" ], [ "Rieper", "Elisabeth", "" ], [ "Vedral", "Vlatko", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0905.2919
Elena Grigorescu
Elena Grigorescu and Tali Kaufman and Madhu Sudan
Succinct Representation of Codes with Applications to Testing
null
null
10.1007/978-3-642-03685-9_40
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by questions in property testing, we search for linear error-correcting codes that have the "single local orbit" property: i.e., they are specified by a single local constraint and its translations under the symmetry group of the code. We show that the dual of every "sparse" binary code whose coordinates are indexed by elements of F_{2^n} for prime n, and whose symmetry group includes the group of non-singular affine transformations of F_{2^n} has the single local orbit property. (A code is said to be "sparse" if it contains polynomially many codewords in its block length.) In particular this class includes the dual-BCH codes for whose duals (i.e., for BCH codes) simple bases were not known. Our result gives the first short (O(n)-bit, as opposed to the natural exp(n)-bit) description of a low-weight basis for BCH codes. The interest in the "single local orbit" property comes from the recent result of Kaufman and Sudan (STOC 2008) that shows that the duals of codes that have the single local orbit property under the affine symmetry group are locally testable. When combined with our main result, this shows that all sparse affine-invariant codes over the coordinates F_{2^n} for prime n are locally testable. If, in addition to n being prime, if 2^n-1 is also prime (i.e., 2^n-1 is a Mersenne prime), then we get that every sparse cyclic code also has the single local orbit. In particular this implies that BCH codes of Mersenne prime length are generated by a single low-weight codeword and its cyclic shifts.
[ { "version": "v1", "created": "Mon, 18 May 2009 15:55:38 GMT" } ]
2015-05-13T00:00:00
[ [ "Grigorescu", "Elena", "" ], [ "Kaufman", "Tali", "" ], [ "Sudan", "Madhu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.2924
Nassir Mohammad
Nassir Mohammad, Alexander Balinsky
Colorization of Natural Images via L1 Optimization
5 pages, 3 figures
null
null
0905.2921
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Natural images in the colour space YUV have been observed to have a non-Gaussian, heavy tailed distribution (called 'sparse') when the filter G(U)(r) = U(r) - sum_{s \in N(r)} w{(Y)_{rs}} U(s), is applied to the chromacity channel U (and equivalently to V), where w is a weighting function constructed from the intensity component Y [1]. In this paper we develop Bayesian analysis of the colorization problem using the filter response as a regularization term to arrive at a non-convex optimization problem. This problem is convexified using L1 optimization which often gives the same results for sparse signals [2]. It is observed that L1 optimization, in many cases, over-performs the famous colorization algorithm by Levin et al [3].
[ { "version": "v1", "created": "Mon, 18 May 2009 16:07:52 GMT" } ]
2009-05-19T00:00:00
[ [ "Mohammad", "Nassir", "" ], [ "Balinsky", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0905.2958
Jacob Oaknin H.
J.H. Oaknin
A statistical learning approach to color demosaicing
24 pages, 4 figures, 1 table. Rewritten manuscript. New abstract
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A statistical learning/inference framework for color demosaicing is presented. We start with simplistic assumptions about color constancy, and recast color demosaicing as a blind linear inverse problem: color parameterizes the unknown kernel, while brightness takes on the role of a latent variable. An expectation-maximization algorithm naturally suggests itself for the estimation of them both. Then, as we gradually broaden the family of hypothesis where color is learned, we let our demosaicing behave adaptively, in a manner that reflects our prior knowledge about the statistics of color images. We show that we can incorporate realistic, learned priors without essentially changing the complexity of the simple expectation-maximization algorithm we started with.
[ { "version": "v1", "created": "Mon, 18 May 2009 19:44:58 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2009 22:30:02 GMT" }, { "version": "v3", "created": "Fri, 12 Feb 2010 21:25:49 GMT" } ]
2010-02-12T00:00:00
[ [ "Oaknin", "J. H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0905.2977
Subhash Kak
Subhash Kak
Cryptography for Multi-Located Parties
7 pages; 6 figures
null
null
null
cs.CR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This note describes some cryptographic issues related to multi-located parties. In general, multi-located parties make it difficult for the eavesdropper to mount the man-in-the-middle attack. Conversely, they make it easier to address problems such as joint encryption and error correction coding. It is easier to implement the three-stage quantum cryptography protocol.
[ { "version": "v1", "created": "Mon, 18 May 2009 20:29:22 GMT" } ]
2009-05-20T00:00:00
[ [ "Kak", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0905.2990
Juan-Manuel Torres-Moreno
Juan-Manuel Torres-Moreno and Pier-Luc St-Onge and Michel Gagnon and Marc El-B\`eze and Patrice Bellot
Automatic Summarization System coupled with a Question-Answering System (QAAS)
28 pages, 11 figures
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To select the most relevant sentences of a document, it uses an optimal decision algorithm that combines several metrics. The metrics processes, weighting and extract pertinence sentences by statistical and informational algorithms. This technique might improve a Question-Answering system, whose function is to provide an exact answer to a question in natural language. In this paper, we present the results obtained by coupling the Cortex summarizer with a Question-Answering system (QAAS). Two configurations have been evaluated. In the first one, a low compression level is selected and the summarization system is only used as a noise filter. In the second configuration, the system actually functions as a summarizer, with a very high level of compression. Our results on French corpus demonstrate that the coupling of Automatic Summarization system with a Question-Answering system is promising. Then the system has been adapted to generate a customized summary depending on the specific question. Tests on a french multi-document corpus have been realized, and the personalized QAAS system obtains the best performances.
[ { "version": "v1", "created": "Mon, 18 May 2009 21:35:52 GMT" } ]
2009-05-20T00:00:00
[ [ "Torres-Moreno", "Juan-Manuel", "" ], [ "St-Onge", "Pier-Luc", "" ], [ "Gagnon", "Michel", "" ], [ "El-Bèze", "Marc", "" ], [ "Bellot", "Patrice", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0905.2997
Andrew Guillory
Andrew Guillory, Jeff Bilmes
Average-Case Active Learning with Costs
14 pages, 2 figures
null
null
UWEETR-2009-0005
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the expected cost of a greedy active learning algorithm. Our analysis extends previous work to a more general setting in which different queries have different costs. Moreover, queries may have more than two possible responses and the distribution over hypotheses may be non uniform. Specific applications include active learning with label costs, active learning for multiclass and partial label queries, and batch mode active learning. We also discuss an approximate version of interest when there are very many queries.
[ { "version": "v1", "created": "Mon, 18 May 2009 23:21:35 GMT" } ]
2009-05-20T00:00:00
[ [ "Guillory", "Andrew", "" ], [ "Bilmes", "Jeff", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0905.3012
Ye Du
Ye Du
On the Complexity of Deciding Degeneracy in Games
null
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that it is NP-Complete to decide whether a bimatrix game is degenerate and it is Co-NP-Complete to decide whether a bimatrix game is nondegenerate.
[ { "version": "v1", "created": "Tue, 19 May 2009 01:40:55 GMT" } ]
2009-05-20T00:00:00
[ [ "Du", "Ye", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0905.3023
Fainan Hanif
Muhammad Fainan Hanif, Mansoor Shafi, Peter J. Smith and Pawel A. Dmochowski
Interference and Deployment Issues for Cognitive Radio Systems in Shadowing Environments
to be presented at IEEE ICC 2009. This posting is the same as the original one. Only author's list is updated that was unfortunately not correctly mentioned in first version
null
10.1109/ICC.2009.5199089
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe a model for calculating the aggregate interference encountered by primary receivers in the presence of randomly placed cognitive radios (CRs). We show that incorporating the impact of distance attenuation and lognormal fading on each constituent interferer in the aggregate, leads to a composite interference that cannot be satisfactorily modeled by a lognormal. Using the interference statistics we determine a number of key parameters needed for the deployment of CRs. Examples of these are the exclusion zone radius, needed to protect the primary receiver under different types of fading environments and acceptable interference levels, and the numbers of CRs that can be deployed. We further show that if the CRs have apriori knowledge of the radio environment map (REM), then a much larger number of CRs can be deployed especially in a high density environment. Given REM information, we also look at the CR numbers achieved by two different types of techniques to process the scheduling information.
[ { "version": "v1", "created": "Tue, 19 May 2009 05:55:44 GMT" }, { "version": "v2", "created": "Wed, 20 May 2009 07:34:25 GMT" } ]
2016-11-17T00:00:00
[ [ "Hanif", "Muhammad Fainan", "" ], [ "Shafi", "Mansoor", "" ], [ "Smith", "Peter J.", "" ], [ "Dmochowski", "Pawel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3030
Fainan Hanif
Muhammad Fainan Hanif, Peter J. Smith and Mansoor Shafi
Performance of Cognitive Radio Systems with Imperfect Radio Environment Map Information
presented at IEEE AusCTW 2009. Journal versions are under preparation. This posting is the same as the original one. Only author's list is updated that was unfortunately not correctly mentioned in the first version
null
10.1109/AUSCTW.2009.4805601
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe the effect of imperfections in the radio environment map (REM) information on the performance of cognitive radio (CR) systems. Via simulations we explore the relationship between the required precision of the REM and various channel/system properties. For example, the degree of spatial correlation in the shadow fading is a key factor as is the interference constraint employed by the primary user. Based on the CR interferers obtained from the simulations, we characterize the temporal behavior of such systems by computing the level crossing rates (LCRs) of the cumulative interference represented by these CRs. This evaluates the effect of short term fluctuations above acceptable interference levels due to the fast fading. We derive analytical formulae for the LCRs in Rayleigh and Rician fast fading conditions. The analytical results are verified by Monte Carlo simulations.
[ { "version": "v1", "created": "Tue, 19 May 2009 06:26:28 GMT" }, { "version": "v2", "created": "Wed, 20 May 2009 07:28:10 GMT" } ]
2016-11-17T00:00:00
[ [ "Hanif", "Muhammad Fainan", "" ], [ "Smith", "Peter J.", "" ], [ "Shafi", "Mansoor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3049
Arnaud Legout
Anwar Al Hamra, Nikitas Liogkas (UCLA-CS), Arnaud Legout (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes), Chadi Barakat (INRIA Sophia Antipolis / INRIA Rh\^one-Alpes)
Swarming Overlay Construction Strategies
null
ICCCN 2009 (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Swarming peer-to-peer systems play an increasingly instrumental role in Internet content distribution. It is therefore important to better understand how these systems behave in practice. Recent research efforts have looked at various protocol parameters and have measured how they affect system performance and robustness. However, the importance of the strategy based on which peers establish connections has been largely overlooked. This work utilizes extensive simulations to examine the default overlay construction strategy in BitTorrent systems. Based on the results, we identify a critical parameter, the maximum allowable number of outgoing connections at each peer, and evaluate its impact on the robustness of the generated overlay. We find that there is no single optimal value for this parameter using the default strategy. We then propose an alternative strategy that allows certain new peer connection requests to replace existing connections. Further experiments with the new strategy demonstrate that it outperforms the default one for all considered metrics by creating an overlay more robust to churn. Additionally, our proposed strategy exhibits optimal behavior for a well-defined value of the maximum number of outgoing connections, thereby removing the need to set this parameter in an ad-hoc manner.
[ { "version": "v1", "created": "Tue, 19 May 2009 09:33:42 GMT" } ]
2009-05-20T00:00:00
[ [ "Hamra", "Anwar Al", "", "UCLA-CS" ], [ "Liogkas", "Nikitas", "", "UCLA-CS" ], [ "Legout", "Arnaud", "", "INRIA Sophia\n Antipolis / INRIA Rhône-Alpes" ], [ "Barakat", "Chadi", "", "INRIA Sophia Antipolis /\n INRIA Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0905.3070
Katarina Borg Gyllenback Ms
Katarina Borg Gyllenback
Narrative Bridging - a specification of a modelling method for game design
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Very little has been explored about the narrative as a process when constructing entertainment for interactive media. Simultaneously, the interest in narrative vehicles increases while certain occupations, seeing the narrative as a structure, obscure the examination of the process of selecting, arranging and rendering story material. To correct this deficiency, a method for a narrative bridging that encourages research and design while exploring narration as a process, is proposed with the aim to not diminish the properties of the interactive media. This method focuses on the initial phase where establishing and handling the information takes place and creates a foundation that precedes its systematization and computation. The aim is to give designers a comfortable design tool that firmly aids the design without interfering with creativity, and at the same time aids the construction of interplay between narration, spatiality and interactivity. The method aided the practise of a discipline that was established through a qualitative study conducted as part of a university course in rapid prototyping. The results demonstrated that the method aided time-constrained design processes, simultaneously detecting inconsistencies that would prevent the team from making improvements. The method gave the team a shared vocabulary and outlook, allowing them to progress without interfering with the creative flow. This enabled the team to reason about the process and easily advice design stakeholders. The study also provides directions for future developments within research of narrative processes in game design.
[ { "version": "v1", "created": "Tue, 19 May 2009 11:46:13 GMT" } ]
2009-05-20T00:00:00
[ [ "Gyllenback", "Katarina Borg", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0905.3076
Enrico Paolini
E. Paolini, M.F. Flanagan, M. Chiani, M.P.C. Fossorier
On a Class of Doubly-Generalized LDPC Codes with Single Parity-Check Variable Nodes
2009 IEEE Int. Symp. on Information Theory. 5 pages, 3 figures
null
10.1109/ISIT.2009.5205731
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A class of doubly-generalized low-density parity-check (D-GLDPC) codes, where single parity-check (SPC) codes are used as variable nodes (VNs), is investigated. An expression for the growth rate of the weight distribution of any D-GLDPC ensemble with a uniform check node (CN) set is presented at first, together with an analytical technique for its efficient evaluation. These tools are then used for detailed analysis of a case study, namely, a rate-1/2 D-GLDPC ensemble where all the CNs are (7,4) Hamming codes and all the VNs are length-7 SPC codes. It is illustrated how the VN representations can heavily affect the code properties and how different VN representations can be combined within the same graph to enhance some of the code parameters. The analysis is conducted over the binary erasure channel. Interesting features of the new codes include the capability of achieving a good compromise between waterfall and error floor performance while preserving graphical regularity, and values of threshold outperforming LDPC counterparts.
[ { "version": "v1", "created": "Tue, 19 May 2009 12:07:50 GMT" } ]
2016-11-17T00:00:00
[ [ "Paolini", "E.", "" ], [ "Flanagan", "M. F.", "" ], [ "Chiani", "M.", "" ], [ "Fossorier", "M. P. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3086
Sae-Young Chung
Sung Hoon Lim, Young-Han Kim, Sae-Young Chung
Deterministic Relay Networks with State Information
5 pages, to appear in proc. IEEE ISIT, June 2009
null
10.1109/ISIT.2009.5205735
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by fading channels and erasure channels, the problem of reliable communication over deterministic relay networks is studied, in which relay nodes receive a function of the incoming signals and a random network state. An achievable rate is characterized for the case in which destination nodes have full knowledge of the state information. If the relay nodes receive a linear function of the incoming signals and the state in a finite field, then the achievable rate is shown to be optimal, meeting the cut-set upper bound on the capacity. This result generalizes on a unified framework the work of Avestimehr, Diggavi, and Tse on the deterministic networks with state dependency, the work of Dana, Gowaikar, Palanki, Hassibi, and Effros on linear erasure networks with interference, and the work of Smith and Vishwanath on linear erasure networks with broadcast.
[ { "version": "v1", "created": "Tue, 19 May 2009 12:41:16 GMT" }, { "version": "v2", "created": "Wed, 20 May 2009 06:57:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Lim", "Sung Hoon", "" ], [ "Kim", "Young-Han", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3107
Travis Gagie
Travis Gagie, Gonzalo Navarro, Yakov Nekrich
Fast and Compact Prefix Codes
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well-known that, given a probability distribution over $n$ characters, in the worst case it takes (\Theta (n \log n)) bits to store a prefix code with minimum expected codeword length. However, in this paper we first show that, for any $0<\epsilon<1/2$ with (1 / \epsilon = \Oh{\polylog{n}}), it takes $\Oh{n \log \log (1 / \epsilon)}$ bits to store a prefix code with expected codeword length within $\epsilon$ of the minimum. We then show that, for any constant (c > 1), it takes $\Oh{n^{1 / c} \log n}$ bits to store a prefix code with expected codeword length at most $c$ times the minimum. In both cases, our data structures allow us to encode and decode any character in $\Oh{1}$ time.
[ { "version": "v1", "created": "Tue, 19 May 2009 14:19:08 GMT" } ]
2009-05-20T00:00:00
[ [ "Gagie", "Travis", "" ], [ "Navarro", "Gonzalo", "" ], [ "Nekrich", "Yakov", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.3108
Ian Pratt-Hartmann
Yevgeny Kazakov and Ian Pratt-Hartmann
A Note on the Complexity of the Satisfiability Problem for Graded Modal Logics
Full proofs for paper presented at the IEEE Conference on Logic in Computer Science, 2009
null
null
null
cs.LO cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graded modal logic is the formal language obtained from ordinary (propositional) modal logic by endowing its modal operators with cardinality constraints. Under the familiar possible-worlds semantics, these augmented modal operators receive interpretations such as "It is true at no fewer than 15 accessible worlds that...", or "It is true at no more than 2 accessible worlds that...". We investigate the complexity of satisfiability for this language over some familiar classes of frames. This problem is more challenging than its ordinary modal logic counterpart--especially in the case of transitive frames, where graded modal logic lacks the tree-model property. We obtain tight complexity bounds for the problem of determining the satisfiability of a given graded modal logic formula over the classes of frames characterized by any combination of reflexivity, seriality, symmetry, transitivity and the Euclidean property.
[ { "version": "v1", "created": "Tue, 19 May 2009 15:27:04 GMT" } ]
2009-05-20T00:00:00
[ [ "Kazakov", "Yevgeny", "" ], [ "Pratt-Hartmann", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0905.3109
Vinod Prabhakaran
Vinod M. Prabhakaran and Pramod Viswanath
Interference Channels with Source Cooperation
revised based on reviewers' comments
IEEE Trans. Inform. Theory 57 (2011) 156-186
10.1109/TIT.2010.2090231
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The role of cooperation in managing interference - a fundamental feature of the wireless channel - is investigated by studying the two-user Gaussian interference channel where the source nodes can both transmit and receive in full-duplex. The sum-capacity of this channel is obtained within a gap of a constant number of bits. The coding scheme used builds up on the superposition scheme of Han and Kobayashi (1981) for the two-user interference channel without cooperation. New upperbounds on the sum-capacity are also derived. The same coding scheme is shown to obtain the sum-capacity of the symmetric two-user Gaussian interference channel with noiseless feedback within a constant gap.
[ { "version": "v1", "created": "Tue, 19 May 2009 14:01:00 GMT" }, { "version": "v2", "created": "Sat, 6 Nov 2010 05:49:30 GMT" } ]
2011-01-28T00:00:00
[ [ "Prabhakaran", "Vinod M.", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3135
Ayan Mahalanobis
Ayan Mahalanobis
The discrete logarithm problem in the group of non-singular circulant matrices
null
null
null
null
cs.CR cs.DM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The discrete logarithm problem is one of the backbones in public key cryptography. In this paper we study the discrete logarithm problem in the group of circulant matrices over a finite field. This gives rise to secure and fast public key cryptosystems.
[ { "version": "v1", "created": "Tue, 19 May 2009 15:31:31 GMT" }, { "version": "v2", "created": "Mon, 21 Sep 2009 12:46:07 GMT" } ]
2009-09-21T00:00:00
[ [ "Mahalanobis", "Ayan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3158
Hoang-Thach Nguyen
Jean Mairesse (LIAFA), Hoang-Thach Nguyen (LIAFA)
Deficiency Zero Petri Nets and Product Form
This is a long and improved version of the conference paper: J. Mairesse and H.-T. Nguyen. Deficiency zero Petri nets and product form. In G. Franceschinis and K. Wolf, editors, Petri Nets 2009, volume 5606 of LNCS, pages 103-122. Springer-Verlag, 2009
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a Markovian Petri net with race policy. The marking process has a "product form" stationary distribution if the probability of viewing a given marking can be decomposed as the product over places of terms depending only on the local marking. First we observe that the Deficiency Zero Theorem of Feinberg, developped for chemical reaction networks, provides a structural and simple sufficient condition for the existence of a product form. In view of this, we study the classical subclass of free-choice nets. Roughly, we show that the only such Petri nets having a product form are the state machines which can alternatively be viewed as Jackson networks.
[ { "version": "v1", "created": "Tue, 19 May 2009 18:29:04 GMT" }, { "version": "v2", "created": "Mon, 24 Aug 2009 13:51:17 GMT" }, { "version": "v3", "created": "Mon, 31 May 2010 08:51:15 GMT" } ]
2010-06-01T00:00:00
[ [ "Mairesse", "Jean", "", "LIAFA" ], [ "Nguyen", "Hoang-Thach", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.3178
Italo Dejter Prof
Italo J. Dejter
SQS-graphs of Solov'eva-Phelps codes
14 pages, 15 tables
null
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A binary extended 1-perfect code $\mathcal C$ folds over its kernel via the Steiner quadruple systems associated with its codewords. The resulting folding, proposed as a graph invariant for $\mathcal C$, distinguishes among the 361 nonlinear codes $\mathcal C$ of kernel dimension $\kappa$ obtained via Solov'eva-Phelps doubling construction, where $9\geq\kappa\geq 5$. Each of the 361 resulting graphs has most of its nonloop edges expressible in terms of lexicographically ordered quarters of products of classes from extended 1-perfect partitions of length 8 (as classified by Phelps) and loops mostly expressible in terms of the lines of the Fano plane.
[ { "version": "v1", "created": "Tue, 19 May 2009 20:13:16 GMT" } ]
2009-05-21T00:00:00
[ [ "Dejter", "Italo J.", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3191
Tanmoy Chakraborty
Tanmoy Chakraborty, Zhiyi Huang, Sanjeev Khanna
Dynamic and Non-Uniform Pricing Strategies for Revenue Maximization
23 pages, 0 figure
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the Item Pricing problem for revenue maximization in the limited supply setting, where a single seller with $n$ items caters to $m$ buyers with unknown subadditive valuation functions who arrive in a sequence. The seller sets the prices on individual items. Each buyer buys a subset of yet unsold items that maximizes her utility. Our goal is to design pricing strategies that guarantee an expected revenue that is within a small factor $\alpha$ of the maximum possible social welfare -- an upper bound on the maximum revenue that can be generated. Most earlier work has focused on the unlimited supply setting, where selling items to some buyer does not affect their availability to the future buyers. Balcan et. al. (EC 2008) studied the limited supply setting, giving a randomized strategy that assigns a single price to all items (uniform strategy), and never changes it (static strategy), that gives an $2^{O(\sqrt{\log n \log \log n})}$-approximation, and moreover, no static uniform pricing strategy can give better than $2^{\Omega(\log^{1/4} n)}$- approximation. We improve this lower bound to $2^{\Omega(sqrt{\log n})}$. We consider dynamic uniform strategies, which can change the price upon the arrival of each buyer but the price on all unsold items is the same at all times, and static non-uniform strategies, which can assign different prices to different items but can never change it after setting it initially. We design such pricing strategies that give a poly-logarithmic approximation to maximum revenue. Thus in the limited supply setting, our results highlight a strong separation between the power of dynamic and non-uniform pricing versus static uniform pricing. To our knowledge, this is the first non-trivial analysis of dynamic and non-uniform pricing schemes for revenue maximization.
[ { "version": "v1", "created": "Tue, 19 May 2009 22:15:12 GMT" } ]
2009-05-21T00:00:00
[ [ "Chakraborty", "Tanmoy", "" ], [ "Huang", "Zhiyi", "" ], [ "Khanna", "Sanjeev", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0905.3201
Fainan Hanif
Muhammad Fainan Hanif, Peter J. Smith and Mansoor Shafi
On the Statistics of Cognitive Radio Capacity in Shadowing and Fast Fading Environments
to appear in IEEE CrownCom 2009 Proc
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the capacity of the cognitive radio channel in a fading environment under a "low interference regime". This capacity depends critically on a power loss parameter, $\alpha$, which governs how much transmit power the cognitive radio dedicates to relaying the primary message. We derive a simple, accurate approximation to $\alpha$ which gives considerable insight into system capacity. We also investigate the effects of system parameters and propagation environment on $\alpha$ and the cognitive radio capacity. In all cases, the use of the approximation is shown to be extremely accurate. Finally, we derive the probability that the "low interference regime" holds and demonstrate that this is the dominant case, especially in practical cognitive radio deployment scenarios.
[ { "version": "v1", "created": "Wed, 20 May 2009 07:05:54 GMT" } ]
2009-05-21T00:00:00
[ [ "Hanif", "Muhammad Fainan", "" ], [ "Smith", "Peter J.", "" ], [ "Shafi", "Mansoor", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3245
Lianlin Li Dr
Lianlin Li, Fang Li
Novel Algorithm for Sparse Solutions to Linear Inverse Problems with Multiple Measurements
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this report, a novel efficient algorithm for recovery of jointly sparse signals (sparse matrix) from multiple incomplete measurements has been presented, in particular, the NESTA-based MMV optimization method. In a nutshell, the jointly sparse recovery is obviously superior to applying standard sparse reconstruction methods to each channel individually. Moreover several efforts have been made to improve the NESTA-based MMV algorithm, in particular, (1) the NESTA-based MMV algorithm for partially known support to greatly improve the convergence rate, (2) the detection of partial (or all) locations of unknown jointly sparse signals by using so-called MUSIC algorithm; (3) the iterative NESTA-based algorithm by combing hard thresholding technique to decrease the numbers of measurements. It has been shown that by using proposed approach one can recover the unknown sparse matrix X with () Spark A -sparsity from () Spark A measurements, predicted in Ref. [1], where the measurement matrix denoted by A satisfies the so-called restricted isometry property (RIP). Under a very mild condition on the sparsity of X and characteristics of the A, the iterative hard threshold (IHT)-based MMV method has been shown to be also a very good candidate.
[ { "version": "v1", "created": "Wed, 20 May 2009 08:36:46 GMT" } ]
2009-05-21T00:00:00
[ [ "Li", "Lianlin", "" ], [ "Li", "Fang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.3267
Asim Ghosh
Asim Ghosh, Anindya Sundar Chakrabarti, Bikas K. Chakrabarti
Kolkata Paise Restaurant Problem in Some Uniform Learning Strategy Limits
to be published in "Econophysics & Economics of Games, Social Choices & Quantitative Techniques", Proc. Econophys-Kolkata IV, Springer, Milan (2009)
null
null
null
cs.GT physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the dynamics of some uniform learning strategy limits or a probabilistic version of the "Kolkata Paise Restaurant" problem, where N agents choose among N equally priced but differently ranked restaurants every evening such that each agent can get dinner in the best possible ranked restaurant (each serving only one customer and the rest arriving there going without dinner that evening). We consider the learning to be uniform among the agents and assume that each follow the same probabilistic strategy dependent on the information of the past successes in the game. The numerical results for utilization of the restaurants in some limiting cases are analytically examined.
[ { "version": "v1", "created": "Wed, 20 May 2009 11:40:31 GMT" } ]
2009-05-21T00:00:00
[ [ "Ghosh", "Asim", "" ], [ "Chakrabarti", "Anindya Sundar", "" ], [ "Chakrabarti", "Bikas K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0905.3287
Roberto Tonelli
Alessandro Murgia, Giulio Concas, Sandro Pinna, Roberto Tonelli, Ivana Turnu
Empirical study of software quality evolution in open source projects using agile practices
12 pages, 6 figures 2 tables
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyse the time evolution of two open source Java projects: Eclipse and Netbeans, both developed following agile practices, though to a different extent. Our study is centered on quality analysis of the systems, measured as defects absence, and its relation with software metrics evolution. The two projects are described through a software graph in which nodes are represented by Java files and edges describe the existing relation between nodes. We propose a metrics suite for Java files based on Chidamber and Kemerer suite, and use it to study software evolution and its relationship with bug count.
[ { "version": "v1", "created": "Wed, 20 May 2009 13:29:25 GMT" } ]
2009-05-21T00:00:00
[ [ "Murgia", "Alessandro", "" ], [ "Concas", "Giulio", "" ], [ "Pinna", "Sandro", "" ], [ "Tonelli", "Roberto", "" ], [ "Turnu", "Ivana", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0905.3296
Roberto Tonelli
Alessandro Murgia, Giulio Concas, Michele Marchesi, Roberto Tonelli and Ivana Turnu
An Analysis of Bug Distribution in Object Oriented Systems
17 pages, 8 figures, 10 tables
null
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduced a new approach to describe Java software as graph, where nodes represent a Java file - called compilation unit (CU) - and an edges represent a relations between them. The software system is characterized by the degree distribution of the graph properties, like in-or-out links, as well as by the distribution of Chidamber and Kemerer metrics computed on its CUs. Every CU can be related to one or more bugs during its life. We find a relationship among the software system and the bugs hitting its nodes. We found that the distribution of some metrics, and the number of bugs per CU, exhibit a power-law behavior in their tails, as well as the number of CUs influenced by a specific bug. We examine the evolution of software metrics across different releases to understand how relationships among CUs metrics and CUs faultness change with time.
[ { "version": "v1", "created": "Wed, 20 May 2009 12:41:25 GMT" } ]
2009-05-21T00:00:00
[ [ "Murgia", "Alessandro", "" ], [ "Concas", "Giulio", "" ], [ "Marchesi", "Michele", "" ], [ "Tonelli", "Roberto", "" ], [ "Turnu", "Ivana", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0905.3318
Maarten Hijzelendoorn
Maarten Hijzelendoorn and Crit Cremers
An Object-Oriented and Fast Lexicon for Semantic Generation
Paper presented at the 18th Computational Linguistics In the Netherlands Meeting (CLIN), Nijmegen, 10 December 2007, 15pp
null
null
null
cs.CL cs.DB cs.DS cs.IR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is about the technical design of a large computational lexicon, its storage, and its access from a Prolog environment. Traditionally, efficient access and storage of data structures is implemented by a relational database management system. In Delilah, a lexicon-based NLP system, efficient access to the lexicon by the semantic generator is vital. We show that our highly detailed HPSG-style lexical specifications do not fit well in the Relational Model, and that they cannot be efficiently retrieved. We argue that they fit more naturally in the Object-Oriented Model. Although storage of objects is redundant, we claim that efficient access is still possible by applying indexing, and compression techniques from the Relational Model to the Object-Oriented Model. We demonstrate that it is possible to implement object-oriented storage and fast access in ISO Prolog.
[ { "version": "v1", "created": "Wed, 20 May 2009 14:12:42 GMT" } ]
2009-05-21T00:00:00
[ [ "Hijzelendoorn", "Maarten", "" ], [ "Cremers", "Crit", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0905.3330
Semen Kutateladze S
S.S. Kutateladze
The Game of Cipher Beads
The last data are inserted
J.Appl. Indust. Math., 2009, V.3, No.3, 364-366
null
null
cs.DL math.HO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Comparison between the various impact factors of a few Russian journals demonstrates the deficiencies of the popular citation indices.
[ { "version": "v1", "created": "Wed, 20 May 2009 15:04:01 GMT" }, { "version": "v2", "created": "Thu, 21 May 2009 09:47:37 GMT" }, { "version": "v3", "created": "Wed, 29 Jul 2009 09:50:05 GMT" } ]
2011-05-31T00:00:00
[ [ "Kutateladze", "S. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" } ]