id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0905.2004 | Yi-Dong Shen | Yi-Dong Shen, Danny De Schreye, Dean Voets | Termination Prediction for General Logic Programs | 28 pages, 12 figures. to appear in Theory and Practice of Logic
Programming (TPLP) | null | null | null | cs.PL cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a heuristic framework for attacking the undecidable termination
problem of logic programs, as an alternative to current
termination/non-termination proof approaches. We introduce an idea of
termination prediction, which predicts termination of a logic program in case
that neither a termination nor a non-termination proof is applicable. We
establish a necessary and sufficient characterization of infinite (generalized)
SLDNF-derivations with arbitrary (concrete or moded) queries, and develop an
algorithm that predicts termination of general logic programs with arbitrary
non-floundering queries. We have implemented a termination prediction tool and
obtained quite satisfactory experimental results. Except for five programs
which break the experiment time limit, our prediction is 100% correct for all
296 benchmark programs of the Termination Competition 2007, of which eighteen
programs cannot be proved by any of the existing state-of-the-art analyzers
like AProVE07, NTI, Polytool and TALP.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 02:47:06 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Shen",
"Yi-Dong",
""
],
[
"De Schreye",
"Danny",
""
],
[
"Voets",
"Dean",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.2028 | Weng-Long Chang | Weng-Long Chang, Ting-Ting Ren, Mang Feng, Jun Luo, Kawuu Weicheng
Lin, Minyi Guo, and Lai Chin Lu | Quantum Algorithms of Bio-molecular Solutions for the Clique Problem on
a Quantum Computer | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, it is demonstrated that the DNA-based algorithm [Ho et al.
2005] for solving an instance of the clique problem to any a graph G = (V, E)
with n vertices and p edges and its complementary graph G1 = (V, E1) with n
vertices and m = (((n*(n-1))/2)-p) edges can be implemented by Hadamard gates,
NOT gates, CNOT gates, CCNOT gates, Grover's operators, and quantum
measurements on a quantum computer. It is also demonstrated that if Grovers
algorithm is employed to accomplish the readout step in the DNA-based
algorithm, the quantum implementation of the DNA-based algorithm is equivalent
to the oracle work (in the language of Grover's algorithm), that is, the target
state labeling preceding Grover,s searching steps. It is shown that one oracle
work can be completed with O((2 * n) * (n + 1) * (n + 2) / 3) NOT gates, one
CNOT gate and O((4 * m) + (((2 * n) * (n + 1) * (n + 14)) / 6)) CCNOT gates.
This is to say that for the quantum implementation of the DNA-based algorithm
[Ho et al. 2005] a faster labeling of the target state is attained, which also
implies a speedy solution to an instance of the clique problem.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 07:38:48 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Chang",
"Weng-Long",
""
],
[
"Ren",
"Ting-Ting",
""
],
[
"Feng",
"Mang",
""
],
[
"Luo",
"Jun",
""
],
[
"Lin",
"Kawuu Weicheng",
""
],
[
"Guo",
"Minyi",
""
],
[
"Lu",
"Lai Chin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.2098 | Rahul Vaze | Rahul Vaze and Robert W. Heath Jr | End-to-End Joint Antenna Selection Strategy and Distributed Compress and
Forward Strategy for Relay Channels | Accepted for publication in the special issue on cooperative
communication in the Eurasip Journal on Wireless Communication and Networking | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-hop relay channels use multiple relay stages, each with multiple relay
nodes, to facilitate communication between a source and destination.
Previously, distributed space-time codes were proposed to maximize the
achievable diversity-multiplexing tradeoff, however, they fail to achieve all
the points of the optimal diversity-multiplexing tradeoff. In the presence of a
low-rate feedback link from the destination to each relay stage and the source,
this paper proposes an end-to-end antenna selection (EEAS) strategy as an
alternative to distributed space-time codes. The EEAS strategy uses a subset of
antennas of each relay stage for transmission of the source signal to the
destination with amplify and forwarding at each relay stage. The subsets are
chosen such that they maximize the end-to-end mutual information at the
destination. The EEAS strategy achieves the corner points of the optimal
diversity-multiplexing tradeoff (corresponding to maximum diversity gain and
maximum multiplexing gain) and achieves better diversity gain at intermediate
values of multiplexing gain, versus the best known distributed space-time
coding strategies. A distributed compress and forward (CF) strategy is also
proposed to achieve all points of the optimal diversity-multiplexing tradeoff
for a two-hop relay channel with multiple relay nodes.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 12:34:55 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Vaze",
"Rahul",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2125 | Jenia Jitsev | Jenia Jitsev, Christoph von der Malsburg | Experience-driven formation of parts-based representations in a model of
layered visual memory | 34 pages, 12 Figures, 1 Table, published in Frontiers in
Computational Neuroscience (Special Issue on Complex Systems Science and
Brain Dynamics),
http://www.frontiersin.org/neuroscience/computationalneuroscience/paper/10.3389/neuro.10/015.2009/ | Front. Comput. Neurosci. 3:15 (2009) | 10.3389/neuro.10.015.2009 | null | q-bio.NC cs.LG nlin.AO | http://creativecommons.org/licenses/by/3.0/ | Growing neuropsychological and neurophysiological evidence suggests that the
visual cortex uses parts-based representations to encode, store and retrieve
relevant objects. In such a scheme, objects are represented as a set of
spatially distributed local features, or parts, arranged in stereotypical
fashion. To encode the local appearance and to represent the relations between
the constituent parts, there has to be an appropriate memory structure formed
by previous experience with visual objects. Here, we propose a model how a
hierarchical memory structure supporting efficient storage and rapid recall of
parts-based representations can be established by an experience-driven process
of self-organization. The process is based on the collaboration of slow
bidirectional synaptic plasticity and homeostatic unit activity regulation,
both running at the top of fast activity dynamics with winner-take-all
character modulated by an oscillatory rhythm. These neural mechanisms lay down
the basis for cooperation and competition between the distributed units and
their synaptic connections. Choosing human face recognition as a test task, we
show that, under the condition of open-ended, unsupervised incremental
learning, the system is able to form memory traces for individual faces in a
parts-based fashion. On a lower memory layer the synaptic structure is
developed to represent local facial features and their interrelations, while
the identities of different persons are captured explicitly on a higher layer.
An additional property of the resulting representations is the sparseness of
both the activity during the recall and the synaptic patterns comprising the
memory traces.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 14:23:36 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jul 2009 12:58:02 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Mar 2010 15:38:57 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Jitsev",
"Jenia",
""
],
[
"von der Malsburg",
"Christoph",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
]
|
0905.2141 | Ilya Volnyansky | Ilya Volnyansky | Curse of Dimensionality in the Application of Pivot-based Indexes to the
Similarity Search Problem | 56 pages, 7 figures Master's Thesis in Mathematics, University of
Ottawa (Canada) Supervisor: Vladimir Pestov | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we study the validity of the so-called curse of dimensionality
for indexing of databases for similarity search. We perform an asymptotic
analysis, with a test model based on a sequence of metric spaces $(\Omega_d)$
from which we pick datasets $X_d$ in an i.i.d. fashion. We call the subscript
$d$ the dimension of the space $\Omega_d$ (e.g. for $\mathbb{R}^d$ the
dimension is just the usual one) and we allow the size of the dataset $n=n_d$
to be such that $d$ is superlogarithmic but subpolynomial in $n$.
We study the asymptotic performance of pivot-based indexing schemes where the
number of pivots is $o(n/d)$. We pick the relatively simple cost model of
similarity search where we count each distance calculation as a single
computation and disregard the rest.
We demonstrate that if the spaces $\Omega_d$ exhibit the (fairly common)
concentration of measure phenomenon the performance of similarity search using
such indexes is asymptotically linear in $n$. That is for large enough $d$ the
difference between using such an index and performing a search without an index
at all is negligeable. Thus we confirm the curse of dimensionality in this
setting.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 16:24:21 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Volnyansky",
"Ilya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.2158 | Emiliano De Cristofaro | Emiliano De Cristofaro and Xuhua Ding and Gene Tsudik | Privacy-Preserving Querying in Sensor Networks | Preliminary version of this paper appeared in the Proceedings of
ICCCN'09 under the same title | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless Sensor Networks (WSNs) provide sensing and monitoring services by
means of many tiny autonomous devices equipped with wireless radio
transceivers. As WSNs are deployed on a large-scale and/or on long-term basis,
not only traditional security but also privacy issues must be taken into
account. Furthermore, when network operators offer on-demand access to sensor
measurements to their clients, query mechanisms should ideally leak neither
client interests nor query patterns. In this paper, we present a
privacy-preserving WSN query mechanism that uses standard cryptographic
techniques. Besides preventing unauthorized entities from accessing sensor
readings, it minimizes leakage of (potentially sensitive) information about
users' query targets and patterns.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 18:02:51 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"De Cristofaro",
"Emiliano",
""
],
[
"Ding",
"Xuhua",
""
],
[
"Tsudik",
"Gene",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0905.2159 | Shweta Agrawal | Shweta Agrawal, Sriram Vishwanath | On the Secrecy Rate of Interference Networks using structured codes | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper shows that structured transmission schemes are a good choice for
secret communication over interference networks with an eavesdropper.
Structured transmission is shown to exploit channel asymmetries and thus
perform better than randomly generated codebooks for such channels. For a class
of interference channels, we show that an equivocation sumrate that is within
two bits of the maximum possible legitimate communication sum-rate is
achievable using lattice codes.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 18:06:09 GMT"
}
]
| 2009-05-14T00:00:00 | [
[
"Agrawal",
"Shweta",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2177 | Andreas Enge | Andreas Enge (INRIA Bordeaux - Sud-Ouest), Pierrick Gaudry (INRIA
Lorraine - LORIA), Emmanuel Thom\'e (INRIA Lorraine - LORIA) | An $L (1/3)$ Discrete Logarithm Algorithm for Low Degree Curves | null | null | null | null | cs.CR math.AG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithm for solving the discrete logarithm problem in
Jacobians of families of plane curves whose degrees in $X$ and $Y$ are low with
respect to their genera. The finite base fields $\FF_q$ are arbitrary, but
their sizes should not grow too fast compared to the genus. For such families,
the group structure and discrete logarithms can be computed in subexponential
time of $L_{q^g}(1/3, O(1))$. The runtime bounds rely on heuristics similar to
the ones used in the number field sieve or the function field sieve.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 19:43:15 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Dec 2009 17:24:45 GMT"
}
]
| 2009-12-20T00:00:00 | [
[
"Enge",
"Andreas",
"",
"INRIA Bordeaux - Sud-Ouest"
],
[
"Gaudry",
"Pierrick",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Thomé",
"Emmanuel",
"",
"INRIA Lorraine - LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
]
|
0905.2195 | Krishnendu Chatterjee | Krishnendu Chatterjee and Laurent Doyen and Thomas A. Henzinger | Expressiveness and Closure Properties for Quantitative Languages | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Weighted automata are nondeterministic automata with numerical weights on
transitions. They can define quantitative languages $L$ that assign to each
word $w$ a real number $L(w)$. In the case of infinite words, the value of a
run is naturally computed as the maximum, limsup, liminf, limit average, or
discounted sum of the transition weights. We study expressiveness and closure
questions about these quantitative languages.
We first show that the set of words with value greater than a threshold can
be non-$\omega$-regular for deterministic limit-average and discounted-sum
automata, while this set is always $\omega$-regular when the threshold is
isolated (i.e., some neighborhood around the threshold contains no word). In
the latter case, we prove that the $\omega$-regular language is robust against
small perturbations of the transition weights.
We next consider automata with transition weights 0 or 1 and show that they
are as expressive as general weighted automata in the limit-average case, but
not in the discounted-sum case.
Third, for quantitative languages $L_1$ and $L_2$, we consider the operations
$\max(L_1,L_2)$, $\min(L_1,L_2)$, and $1-L_1$, which generalize the boolean
operations on languages, as well as the sum $L_1 + L_2$. We establish the
closure properties of all classes of quantitative languages with respect to
these four operations.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 20:27:01 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Chatterjee",
"Krishnendu",
""
],
[
"Doyen",
"Laurent",
""
],
[
"Henzinger",
"Thomas A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.2200 | Debprakash Patnaik | Yong Cao, Debprakash Patnaik, Sean Ponce, Jeremy Archuleta, Patrick
Butler, Wu-chun Feng, and Naren Ramakrishnan | Towards Chip-on-Chip Neuroscience: Fast Mining of Frequent Episodes
Using Graphics Processors | null | null | null | null | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computational neuroscience is being revolutionized with the advent of
multi-electrode arrays that provide real-time, dynamic, perspectives into brain
function. Mining event streams from these chips is critical to understanding
the firing patterns of neurons and to gaining insight into the underlying
cellular activity. We present a GPGPU solution to mining spike trains. We focus
on mining frequent episodes which captures coordinated events across time even
in the presence of intervening background/"junk" events. Our algorithmic
contributions are two-fold: MapConcatenate, a new computation-to-core mapping
scheme, and a two-pass elimination approach to quickly find supported episodes
from a large number of candidates. Together, they help realize a real-time
"chip-on-chip" solution to neuroscience data mining, where one chip (the
multi-electrode array) supplies the spike train data and another (the GPGPU)
mines it at a scale unachievable previously. Evaluation on both synthetic and
real datasets demonstrate the potential of our approach.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 21:04:03 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Cao",
"Yong",
""
],
[
"Patnaik",
"Debprakash",
""
],
[
"Ponce",
"Sean",
""
],
[
"Archuleta",
"Jeremy",
""
],
[
"Butler",
"Patrick",
""
],
[
"Feng",
"Wu-chun",
""
],
[
"Ramakrishnan",
"Naren",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0905.2203 | Debprakash Patnaik | Debprakash Patnaik, Sean P. Ponce, Yong Cao, Naren Ramakrishnan | Accelerator-Oriented Algorithm Transformation for Temporal Data Mining | null | null | null | null | cs.DC cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Temporal data mining algorithms are becoming increasingly important in many
application domains including computational neuroscience, especially the
analysis of spike train data. While application scientists have been able to
readily gather multi-neuronal datasets, analysis capabilities have lagged
behind, due to both lack of powerful algorithms and inaccessibility to powerful
hardware platforms. The advent of GPU architectures such as Nvidia's GTX 280
offers a cost-effective option to bring these capabilities to the
neuroscientist's desktop. Rather than port existing algorithms onto this
architecture, we advocate the need for algorithm transformation, i.e.,
rethinking the design of the algorithm in a way that need not necessarily
mirror its serial implementation strictly. We present a novel implementation of
a frequent episode discovery algorithm by revisiting "in-the-large" issues such
as problem decomposition as well as "in-the-small" issues such as data layouts
and memory access patterns. This is non-trivial because frequent episode
discovery does not lend itself to GPU-friendly data-parallel mapping
strategies. Applications to many datasets and comparisons to CPU as well as
prior GPU implementations showcase the advantages of our approach.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 21:18:31 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Patnaik",
"Debprakash",
""
],
[
"Ponce",
"Sean P.",
""
],
[
"Cao",
"Yong",
""
],
[
"Ramakrishnan",
"Naren",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0905.2212 | Peter Scheiblechner | Peter Scheiblechner | Castelnuovo-Mumford Regularity and Computing the de Rham Cohomology of
Smooth Projective Varieties | 32 pages - filled a gap in Section 4.2, specific example added, minor
improvements | null | null | null | math.AG cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a parallel polynomial time algorithm for computing the
topological Betti numbers of a smooth complex projective variety $X$. It is the
first single exponential time algorithm for computing the Betti numbers of a
significant class of complex varieties of arbitrary dimension. Our main
theoretical result is that the Castelnuovo-Mumford regularity of the sheaf of
differential $p$-forms on $X$ is bounded by $p(em+1)D$, where $e$, $m$, and $D$
are the maximal codimension, dimension, and degree, respectively, of all
irreducible components of $X$. It follows that, for a union $V$ of generic
hyperplane sections in $X$, the algebraic de Rham cohomology of $X\setminus V$
is described by differential forms with poles along $V$ of single exponential
order. This yields a similar description of the de Rham cohomology of $X$,
which allows its efficient computation. Furthermore, we give a parallel
polynomial time algorithm for testing whether a projective variety is smooth.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 22:24:17 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Aug 2010 21:22:08 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Aug 2010 19:58:38 GMT"
},
{
"version": "v4",
"created": "Mon, 12 Dec 2011 09:20:39 GMT"
}
]
| 2011-12-13T00:00:00 | [
[
"Scheiblechner",
"Peter",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0905.2213 | Eduardo Hwang | Eduardo Hwang | Outlining an elegant solver for 3-SAT | This paper has been withdrawn by the author due to its inadequacy,
given more structured approaches to the subject | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of this article is to incite clever ways to attack problems. It
advocates in favor of more elegant algorithms, in place of brute force (albeit
its very well crafted) usages.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 22:23:07 GMT"
},
{
"version": "v2",
"created": "Fri, 15 May 2009 05:36:39 GMT"
},
{
"version": "v3",
"created": "Mon, 11 Apr 2011 00:53:48 GMT"
}
]
| 2011-04-12T00:00:00 | [
[
"Hwang",
"Eduardo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.2214 | Michael Goodrich | Michael T. Goodrich, Michael J. Nelson, Jonathan Z. Sun | The Rainbow Skip Graph: A Fault-Tolerant Constant-Degree P2P Relay
Structure | Expanded version of a paper appearing in ACM-SIAM Symp. on Discrete
Algorithms (SODA) | null | null | null | cs.DS cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a distributed data structure, which we call the rainbow skip
graph. To our knowledge, this is the first peer-to-peer data structure that
simultaneously achieves high fault tolerance, constant-sized nodes, and fast
update and query times for ordered data. It is a non-trivial adaptation of the
SkipNet/skip-graph structures of Harvey et al. and Aspnes and Shah, so as to
provide fault-tolerance as these structures do, but to do so using
constant-sized nodes, as in the family tree structure of Zatloukal and Harvey.
It supports successor queries on a set of n items using O(log n) messages with
high probability, an improvement over the expected O(log n) messages of the
family tree.
| [
{
"version": "v1",
"created": "Wed, 13 May 2009 22:40:52 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Goodrich",
"Michael T.",
""
],
[
"Nelson",
"Michael J.",
""
],
[
"Sun",
"Jonathan Z.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.2227 | Ke Xu | Jichang Zhao and Ke Xu | Enhancing the robustness of scale-free networks | 8 pages, 4 figures | J. Phys. A: Math. Theor. 42 (2009) 195003 | 10.1088/1751-8113/42/19/195003 | null | cs.NI cond-mat.stat-mech physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Error tolerance and attack vulnerability are two common and important
properties of complex networks, which are usually used to evaluate the
robustness of a network. Recently, much work has been devoted to determining
the network design with optimal robustness. However, little attention has been
paid to the problem of how to improve the robustness of existing networks. In
this paper, we present a new parameter alpha, called enforcing parameter, to
guide the process of enhancing the robustness of scale-free networks by
gradually adding new links. Intuitively, alpha < 0 means the nodes with lower
degrees are selected preferentially while the nodes with higher degrees will be
more probably selected when alpha > 0. It is shown both theoretically and
experimentally that when alpha < 0 the attack survivability of the network can
be enforced apparently. Then we propose new strategies to enhance the network
robustness. Through extensive experiments and comparisons, we conclude that
establishing new links between nodes with low degrees can drastically enforce
the attack survivability of scale-free networks while having little impact on
the error tolerance.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 00:50:49 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Zhao",
"Jichang",
""
],
[
"Xu",
"Ke",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0905.2234 | Ke Xu | Bo Xiao, Lian-dong Liu, Xiao-chen Guo, and Ke Xu | Modeling the IPv6 Internet AS-level Topology | 15 pages, 5 figures | Physica A 388(2009):529-540 | 10.1016/j.physa.2008.10.034 | null | cs.NI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To measure the IPv6 internet AS-level topology, a network topology discovery
system, called Dolphin, was developed. By comparing the measurement result of
Dolphin with that of CAIDA's Scamper, it was found that the IPv6 Internet at AS
level, similar to other complex networks, is also scale-free but the exponent
of its degree distribution is 1.2, which is much smaller than that of the IPv4
Internet and most other scale-free networks. In order to explain this feature
of IPv6 Internet we argue that the degree exponent is a measure of uniformity
of the degree distribution. Then, for the purpose on modeling the networks, we
propose a new model based on the two major factors affecting the exponent of
the EBA model. It breaks the lower bound of degree exponent which is 2 for most
models. To verify the validity of this model, both theoretical and experimental
analyses have been carried out. Finally, we demonstrate how this model can be
successfully used to reproduce the topology of the IPv6 Internet.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 01:59:48 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Xiao",
"Bo",
""
],
[
"Liu",
"Lian-dong",
""
],
[
"Guo",
"Xiao-chen",
""
],
[
"Xu",
"Ke",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0905.2248 | Shizheng Li | Shizheng Li and Aditya Ramamoorthy | Protection against link errors and failures using network coding | The first version of this paper was accepted by IEEE Intl' Symp. on
Info. Theo. 2009. The second version of this paper is submitted to IEEE
Transactions on Communications (under minor revision). The third version of
this paper has been accepted by IEEE Transactions on Communications | null | null | null | cs.IT cs.NI math.IT | http://creativecommons.org/licenses/by/3.0/ | We propose a network-coding based scheme to protect multiple bidirectional
unicast connections against adversarial errors and failures in a network. The
network consists of a set of bidirectional primary path connections that carry
the uncoded traffic. The end nodes of the bidirectional connections are
connected by a set of shared protection paths that provide the redundancy
required for protection. Such protection strategies are employed in the domain
of optical networks for recovery from failures. In this work we consider the
problem of simultaneous protection against adversarial errors and failures.
Suppose that n_e paths are corrupted by the omniscient adversary. Under our
proposed protocol, the errors can be corrected at all the end nodes with 4n_e
protection paths. More generally, if there are n_e adversarial errors and n_f
failures, 4n_e + 2n_f protection paths are sufficient. The number of protection
paths only depends on the number of errors and failures being protected against
and is independent of the number of unicast connections.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 04:45:05 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 20:59:13 GMT"
},
{
"version": "v3",
"created": "Tue, 31 Aug 2010 21:41:00 GMT"
}
]
| 2010-09-02T00:00:00 | [
[
"Li",
"Shizheng",
""
],
[
"Ramamoorthy",
"Aditya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2249 | Joseph O'Rourke | Joseph O'Rourke | Some Properties of Yao Y4 Subgraphs | 7 pages, 6 figures | null | null | Smith Technical Report 093 | cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Yao graph for k=4, Y4, is naturally partitioned into four subgraphs, one
per quadrant. We show that the subgraphs for one quadrant differ from the
subgraphs for two adjacent quadrants in three properties: planarity,
connectedness, and whether the directed graphs are spanners.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 04:49:00 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"O'Rourke",
"Joseph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.2257 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | A protocol for instruction stream processing | 15pages | null | null | PRG0905 | cs.PL cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The behaviour produced by an instruction sequence under execution is a
behaviour to be controlled by some execution environment: each step performed
actuates the processing of an instruction by the execution environment and a
reply returned at completion of the processing determines how the behaviour
proceeds. In this paper, we are concerned with the case where the processing
takes place remotely. We describe a protocol to deal with the case where the
behaviour produced by an instruction sequence under execution leads to the
generation of a stream of instructions to be processed and a remote execution
unit handles the processing of that stream of instructions.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 06:23:18 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0905.2287 | Lelia Blin | L\'elia Blin (IBISC), Maria Gradinariu Potop-Butucaru (INRIA
Rocquencourt), Stephane Rovedakis (IBISC), S\'ebastien Tixeuil (INRIA Futurs,
LIP6) | A New Self-Stabilizing Minimum Spanning Tree Construction with Loop-free
Property | null | null | null | null | cs.DS cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The minimum spanning tree (MST) construction is a classical problem in
Distributed Computing for creating a globally minimized structure
distributedly. Self-stabilization is versatile technique for forward recovery
that permits to handle any kind of transient faults in a unified manner. The
loop-free property provides interesting safety assurance in dynamic networks
where edge-cost changes during operation of the protocol. We present a new
self-stabilizing MST protocol that improves on previous known ap- proaches in
several ways. First, it makes fewer system hypotheses as the size of the
network (or an upper bound on the size) need not be known to the participants.
Second, it is loop-free in the sense that it guarantees that a spanning tree
structure is always preserved while edge costs change dynamically and the
protocol adjusts to a new MST. Finally, time complexity matches the best known
results, while space complexity results show that this protocol is the most
efficient to date.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 09:23:06 GMT"
}
]
| 2016-11-25T00:00:00 | [
[
"Blin",
"Lélia",
"",
"IBISC"
],
[
"Potop-Butucaru",
"Maria Gradinariu",
"",
"INRIA\n Rocquencourt"
],
[
"Rovedakis",
"Stephane",
"",
"IBISC"
],
[
"Tixeuil",
"Sébastien",
"",
"INRIA Futurs,\n LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.2288 | Michele Marchesi | Hongyu Zhang, Hee Beng Kuan Tan, Michele Marchesi | The Distribution of Program Sizes and Its Implications: An Eclipse Case
Study | 10 pages, 2 figures, 6 tables | null | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A large software system is often composed of many inter-related programs of
different sizes. Using the public Eclipse dataset, we replicate our previous
study on the distribution of program sizes. Our results confirm that the
program sizes follow the lognormal distribution. We also investigate the
implications of the program size distribution on size estimation and quality
predication. We find that the nature of size distribution can be used to
estimate the size of a large Java system. We also find that a small percentage
of largest programs account for a large percentage of defects, and the number
of defects across programs follows the Weibull distribution when the programs
are ranked by their sizes. Our results show that the distribution of program
sizes is an important property for understanding large and complex software
systems.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 09:24:51 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Zhang",
"Hongyu",
""
],
[
"Tan",
"Hee Beng Kuan",
""
],
[
"Marchesi",
"Michele",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0905.2297 | Rajesh Ramachandran | R Rajesh and Vinod Sharma | On Optimal Distributed Joint Source-Channel Coding for Correlated
Gaussian Sources over Gaussian Channels | 24 pages, 9 figures submitted to IEEE Trans Wireless commn | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of distributed joint source-channel coding of
correlated Gaussian sources over a Gaussian Multiple Access Channel (GMAC).
There may be side information at the decoder and/or at the encoders. First we
specialize a general result (for transmission of correlated sources over a MAC
with side information) to obtain sufficient conditions for reliable
transmission over a Gaussian MAC. This system does not satisfy the
source-channel separation. We study and compare three joint source-channel
coding schemes available in literature. We show that each of these schemes is
optimal under different scenarios. One of the schemes, Amplify and Forward (AF)
which simplifies the design of encoders and the decoder, is optimal at low SNR
but not at high SNR. Another scheme is asymptotically optimal at high SNR. The
third coding scheme is optimal for orthogonal Gaussian channels. We also show
that AF is close to the optimal scheme for orthogonal channels even at high
SNR.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 10:02:47 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Rajesh",
"R",
""
],
[
"Sharma",
"Vinod",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2311 | Couvreur Alain | A. Couvreur | Residus de 2-formes differentielles sur les surfaces algebriques et
applications aux codes correcteurs d'erreurs | 168 pages | PhD Thesis - Universit\'e de Toulouse - 2008 | null | null | math.AG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The theory of algebraic-geometric codes has been developed in the beginning
of the 80's after a paper of V.D. Goppa. Given a smooth projective algebraic
curve X over a finite field, there are two different constructions of
error-correcting codes. The first one, called "functional", uses some rational
functions on X and the second one, called "differential", involves some
rational 1-forms on this curve. Hundreds of papers are devoted to the study of
such codes.
In addition, a generalization of the functional construction for algebraic
varieties of arbitrary dimension is given by Y. Manin in an article of 1984. A
few papers about such codes has been published, but nothing has been done
concerning a generalization of the differential construction to the
higher-dimensional case.
In this thesis, we propose a differential construction of codes on algebraic
surfaces. Afterwards, we study the properties of these codes and particularly
their relations with functional codes. A pretty surprising fact is that a main
difference with the case of curves appears. Indeed, if in the case of curves, a
differential code is always the orthogonal of a functional one, this assertion
generally fails for surfaces. Last observation motivates the study of codes
which are the orthogonal of some functional code on a surface. Therefore, we
prove that, under some condition on the surface, these codes can be realized as
sums of differential codes. Moreover, we show that some answers to some open
problems "a la Bertini" could give very interesting informations on the
parameters of these codes.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 14:28:21 GMT"
}
]
| 2010-08-24T00:00:00 | [
[
"Couvreur",
"A.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2341 | Couvreur Alain | A. Couvreur | Differential approach for the study of duals of algebraic-geometric
codes on surfaces | 21 pages | Journal de Theorie des Nombres de Bordeaux, Volume 23(2), p95-120,
2011 | null | null | math.AG cs.IT math.IT math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The purpose of the present article is the study of duals of functional codes
on algebraic surfaces. We give a direct geometrical description of them, using
differentials. Even if this geometrical description is less trivial, it can be
regarded as a natural extension to surfaces of the result asserting that the
dual of a functional code on a curve is a differential code. We study the
parameters of such codes and state a lower bound for their minimum distance.
Using this bound, one can study some examples of codes on surfaces, and in
particular surfaces with Picard number 1 like elliptic quadrics or some
particular cubic surfaces. The parameters of some of the studied codes reach
those of the best known codes up to now.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 14:38:51 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Feb 2010 19:25:15 GMT"
},
{
"version": "v3",
"created": "Thu, 18 Nov 2010 14:29:31 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Dec 2010 12:50:41 GMT"
}
]
| 2011-09-14T00:00:00 | [
[
"Couvreur",
"A.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0905.2345 | Couvreur Alain | A. Couvreur | The dual minimum distance of arbitrary dimensional algebraic--geometric
codes | 24 pages | J. Algebra. 350(1), 84-107. 2012 | 10.1016/j.jalgebra.2011.09.030 | null | math.AG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, the minimum distance of the dual $C^{\bot}$ of a functional
code $C$ on an arbitrary dimensional variety $X$ over a finite field $\F_q$ is
studied. The approach consists in finding minimal configurations of points on
$X$ which are not in "general position". If $X$ is a curve, the result improves
in some situations the well-known Goppa designed distance.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 14:44:32 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Feb 2010 19:37:01 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Nov 2011 22:00:14 GMT"
}
]
| 2013-09-18T00:00:00 | [
[
"Couvreur",
"A.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2347 | Juan-Manuel Torres-Moreno | Juan-Manuel Torres-Moreno and Laurent Bougrain and Fr\'d\'eric
Alexandre | Combining Supervised and Unsupervised Learning for GIS Classification | 8 pages, 3 figures | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new hybrid learning algorithm for unsupervised
classification tasks. We combined Fuzzy c-means learning algorithm and a
supervised version of Minimerror to develop a hybrid incremental strategy
allowing unsupervised classifications. We applied this new approach to a
real-world database in order to know if the information contained in unlabeled
features of a Geographic Information System (GIS), allows to well classify it.
Finally, we compared our results to a classical supervised classification
obtained by a multilayer perceptron.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 14:59:15 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Torres-Moreno",
"Juan-Manuel",
""
],
[
"Bougrain",
"Laurent",
""
],
[
"Alexandre",
"Frdéric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0905.2355 | Zhe Chen | Zhe Chen, Gilles Motet | Modeling System Safety Requirements Using Input/Output Constraint
Meta-Automata | 6 pages. In Proceedings of the 4th International Conference on
Systems (ICONS 2009), Gosier, Guadeloupe, France, pp. 228-233. IEEE Computer
Society, 2009 | null | 10.1109/ICONS.2009.24 | null | cs.SE cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most recent software related accidents have been system accidents. To
validate the absence of system hazards concerning dysfunctional interactions,
industrials call for approaches of modeling system safety requirements and
interaction constraints among components and with environments (e.g., between
humans and machines). This paper proposes a framework based on input/output
constraint meta-automata, which restricts system behavior at the meta level.
This approach can formally model safe interactions between a system and its
environment or among its components. This framework differs from the framework
of the traditional model checking. It explicitly separates the tasks of product
engineers and safety engineers, and provides a top-down technique for modeling
a system with safety constraints, and for automatically composing a safe system
that conforms to safety requirements. The contributions of this work include
formalizing system safety requirements and a way of automatically ensuring
system safety.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 15:52:40 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Chen",
"Zhe",
""
],
[
"Motet",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.2364 | Zhe Chen | Zhe Chen, Gilles Motet | Formalizing Safety Requirements Using Controlling Automata | 6 pages. In Proceedings of the 2nd International Conference on
Dependability (DEPEND 2009), Athens, Greece. IEEE Computer Society, 2009 | null | 10.1109/DEPEND.2009.18 | null | cs.SE cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Safety is an important element of dependability. It is defined as the absence
of accidents. Most accidents involving software-intensive systems have been
system accidents, which are caused by unsafe inter-system or inter-component
interactions. To validate the absence of system hazards concerning
dysfunctional interactions, industrials call for approaches of modeling system
safety requirements and interaction constraints among components. This paper
proposes such a formalism, namely interface control systems (or shortly
C-Systems). An interface C-System is composed of an interface automaton and a
controlling automaton, which formalizes safe interactions and restricts system
behavior at the meta level. This framework differs from the framework of
traditional model checking. It explicitly separates the tasks of product
engineers and safety engineers, and provides a top-down technique for modeling
a system with safety constraints, and for automatically composing a safe system
that conforms to safety requirements. The contributions of this work include
formalizing safety requirements and a way of automatically ensuring system
safety.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 16:03:51 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Chen",
"Zhe",
""
],
[
"Motet",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.2367 | Zhe Chen | Zhe Chen, Gilles Motet | A Language-theoretic View on Guidelines and Consistency Rules of UML | 16 pages. In Proceedings of the 5th European Conference on Model
Driven Architecture - Foundations and Applications (ECMDA-FA 2009), Enschede,
The Netherlands, Lecture Notes in Computer Science 5562, pp. 66-81. Springer,
2009 | null | null | null | cs.SE cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Guidelines and consistency rules of UML are used to control the degrees of
freedom provided by the language to prevent faults. Guidelines are used in
specific domains (e.g., avionics) to recommend the proper use of technologies.
Consistency rules are used to deal with inconsistencies in models. However,
guidelines and consistency rules use informal restrictions on the uses of
languages, which makes checking difficult. In this paper, we consider these
problems from a language-theoretic view. We propose the formalism of C-Systems,
short for "formal language control systems". A C-System consists of a
controlled grammar and a controlling grammar. Guidelines and consistency rules
are formalized as controlling grammars that control the uses of UML, i.e. the
derivations using the grammar of UML. This approach can be implemented as a
parser, which can automatically verify the rules on a UML user model in XMI
format. A comparison to related work shows our contribution: a generic top-down
and syntax-based approach that checks language level constraints at
compile-time.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 16:13:48 GMT"
}
]
| 2009-05-15T00:00:00 | [
[
"Chen",
"Zhe",
""
],
[
"Motet",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.2381 | S. Charles Brubaker | S. Charles Brubaker and Santosh Vempala | Random Tensors and Planted Cliques | null | null | 10.1007/978-3-642-03685-9_31 | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The r-parity tensor of a graph is a generalization of the adjacency matrix,
where the tensor's entries denote the parity of the number of edges in
subgraphs induced by r distinct vertices. For r=2, it is the adjacency matrix
with 1's for edges and -1's for nonedges. It is well-known that the 2-norm of
the adjacency matrix of a random graph is O(\sqrt{n}). Here we show that the
2-norm of the r-parity tensor is at most f(r)\sqrt{n}\log^{O(r)}n, answering a
question of Frieze and Kannan who proved this for r=3. As a consequence, we get
a tight connection between the planted clique problem and the problem of
finding a vector that approximates the 2-norm of the r-parity tensor of a
random graph. Our proof method is based on an inductive application of
concentration of measure.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 17:27:30 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Brubaker",
"S. Charles",
""
],
[
"Vempala",
"Santosh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.2386 | Joel Ratsaby | Joel Ratsaby | Combinatorial information distance | null | null | null | null | cs.DM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $|A|$ denote the cardinality of a finite set $A$. For any real number $x$
define $t(x)=x$ if $x\geq1$ and 1 otherwise. For any finite sets $A,B$ let
$\delta(A,B)$ $=$ $\log_{2}(t(|B\cap\bar{A}||A|))$. We define {This appears as
Technical Report # arXiv:0905.2386v4. A shorter version appears in the {Proc.
of Mini-Conference on Applied Theoretical Computer Science (MATCOS-10)},
Slovenia, Oct. 13-14, 2010.} a new cobinatorial distance $d(A,B)$ $=$
$\max\{\delta(A,B),\delta(B,A)\} $ which may be applied to measure the distance
between binary strings of different lengths. The distance is based on a
classical combinatorial notion of information introduced by Kolmogorov.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 17:44:39 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Feb 2010 11:49:28 GMT"
},
{
"version": "v3",
"created": "Fri, 6 Aug 2010 09:36:12 GMT"
},
{
"version": "v4",
"created": "Thu, 9 Sep 2010 19:54:28 GMT"
},
{
"version": "v5",
"created": "Sun, 17 Oct 2010 18:12:08 GMT"
}
]
| 2010-10-19T00:00:00 | [
[
"Ratsaby",
"Joel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2392 | Vaneet Aggarwal | Achaleshwar Sahai and Vaneet Aggarwal and Melda Yuksel and Ashutosh
Sabharwal | On Channel Output Feedback in Deterministic Interference Channels | To appear in IEEE ITW, Oct. 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the effect of channel output feedback on the sum
capacity in a two-user symmetric deterministic interference channel. We find
that having a single feedback link from one of the receivers to its own
transmitter results in the same sum capacity as having a total of 4 feedback
links from both the receivers to both the transmitters. Hence, from the sum
capacity point of view, the three additional feedback links are not helpful. We
also consider a half-duplex feedback model where the forward and the feedback
resources are symmetric and timeshared. Surprisingly, we find that there is no
gain in sum-capacity with feedback in a half-duplex feedback model when
interference links have more capacity than direct links.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 18:33:19 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Aug 2009 19:37:36 GMT"
}
]
| 2009-08-31T00:00:00 | [
[
"Sahai",
"Achaleshwar",
""
],
[
"Aggarwal",
"Vaneet",
""
],
[
"Yuksel",
"Melda",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2413 | Meng Zeng | Meng Zeng, Rui Zhang, Shuguang Cui | Outage Capacity and Optimal Transmission for Dying Channels | 31 pages, 9 figures, submitted to IEEE Transactions on Information
Theory | null | 10.1109/TCOMM.2012.100812.110122 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In wireless networks, communication links may be subject to random fatal
impacts: for example, sensor networks under sudden power losses or cognitive
radio networks with unpredictable primary user spectrum occupancy. Under such
circumstances, it is critical to quantify how fast and reliably the information
can be collected over attacked links. For a single point-to-point channel
subject to a random attack, named as a \emph{dying channel}, we model it as a
block-fading (BF) channel with a finite and random delay constraint. First, we
define the outage capacity as the performance measure, followed by studying the
optimal coding length $K$ such that the outage probability is minimized when
uniform power allocation is assumed. For a given rate target and a coding
length $K$, we then minimize the outage probability over the power allocation
vector $\mv{P}_{K}$, and show that this optimization problem can be cast into a
convex optimization problem under some conditions. The optimal solutions for
several special cases are discussed.
Furthermore, we extend the single point-to-point dying channel result to the
parallel multi-channel case where each sub-channel is a dying channel, and
investigate the corresponding asymptotic behavior of the overall outage
probability with two different attack models: the independent-attack case and
the $m$-dependent-attack case. It can be shown that the overall outage
probability diminishes to zero for both cases as the number of sub-channels
increases if the \emph{rate per unit cost} is less than a certain threshold.
The outage exponents are also studied to reveal how fast the outage probability
improves over the number of sub-channels.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 20:03:25 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2009 16:21:20 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Zeng",
"Meng",
""
],
[
"Zhang",
"Rui",
""
],
[
"Cui",
"Shuguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2416 | Dimitrios Katsaros | Leonidas Akritidis, Dimitrios Katsaros, Panayiotis Bozanis | Identifying Influential Bloggers: Time Does Matter | null | null | null | null | cs.IR cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Blogs have recently become one of the most favored services on the Web. Many
users maintain a blog and write posts to express their opinion, experience and
knowledge about a product, an event and every subject of general or specific
interest. More users visit blogs to read these posts and comment them. This
"participatory journalism" of blogs has such an impact upon the masses that
Keller and Berry argued that through blogging "one American in tens tells the
other nine how to vote, where to eat and what to buy" \cite{keller1}.
Therefore, a significant issue is how to identify such influential bloggers.
This problem is very new and the relevant literature lacks sophisticated
solutions, but most importantly these solutions have not taken into account
temporal aspects for identifying influential bloggers, even though the time is
the most critical aspect of the Blogosphere. This article investigates the
issue of identifying influential bloggers by proposing two easily computed
blogger ranking methods, which incorporate temporal aspects of the blogging
activity. Each method is based on a specific metric to score the blogger's
posts. The first metric, termed MEIBI, takes into consideration the number of
the blog post's inlinks and its comments, along with the publication date of
the post. The second metric, MEIBIX, is used to score a blog post according to
the number and age of the blog post's inlinks and its comments. These methods
are evaluated against the state-of-the-art influential blogger identification
method utilizing data collected from a real-world community blog site. The
obtained results attest that the new methods are able to better identify
significant temporal patterns in the blogging behaviour.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 20:05:41 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Akritidis",
"Leonidas",
""
],
[
"Katsaros",
"Dimitrios",
""
],
[
"Bozanis",
"Panayiotis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0905.2419 | Daniel Gottesman | Daniel Gottesman, Sandy Irani | The Quantum and Classical Complexity of Translationally Invariant Tiling
and Hamiltonian Problems | 67 pages, approximately 6 gazillion figures. v2 has new results
proving hardness for reflection-invariant quantum and classical systems and a
discussion of the infinite quantum chain | null | null | null | quant-ph cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the complexity of a class of problems involving satisfying
constraints which remain the same under translations in one or more spatial
directions. In this paper, we show hardness of a classical tiling problem on an
N x N 2-dimensional grid and a quantum problem involving finding the ground
state energy of a 1-dimensional quantum system of N particles. In both cases,
the only input is N, provided in binary. We show that the classical problem is
NEXP-complete and the quantum problem is QMA_EXP-complete. Thus, an algorithm
for these problems which runs in time polynomial in N (exponential in the input
size) would imply that EXP = NEXP or BQEXP = QMA_EXP, respectively. Although
tiling in general is already known to be NEXP-complete, to our knowledge, all
previous reductions require that either the set of tiles and their constraints
or some varying boundary conditions be given as part of the input. In the
problem considered here, these are fixed, constant-sized parameters of the
problem. Instead, the problem instance is encoded solely in the size of the
system.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 20:28:03 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Aug 2010 22:57:44 GMT"
}
]
| 2010-08-25T00:00:00 | [
[
"Gottesman",
"Daniel",
""
],
[
"Irani",
"Sandy",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.2422 | Vahid Pourahmadi Mr. | Vahid Pourahmadi, Alireza Bayesteh, and Amir K. Khandani | Multilevel Coding over Two-Hop Single-User Networks | 21 pages, 7 figures, Submitted to IEEE Transactions on Information
Theory on April 6, 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a two-hop network in which information is transmitted from a
source via a relay to a destination is considered. It is assumed that the
channels are static fading with additive white Gaussian noise. All nodes are
equipped with a single antenna and the Channel State Information (CSI) of each
hop is not available at the corresponding transmitter. The relay is assumed to
be simple, i.e., not capable of data buffering over multiple coding blocks,
water-filling over time, or rescheduling. A commonly used design criterion in
such configurations is the maximization of the average received rate at the
destination. We show that using a continuum of multilevel codes at both the
source and the relay, in conjunction with decode and forward strategy at the
relay, performs optimum in this setup. In addition, we present a scheme to
optimally allocate the available source and relay powers to different levels of
their corresponding codes. The performance of this scheme is evaluated assuming
Rayleigh fading and compared with the previously known strategies.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 20:39:52 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Pourahmadi",
"Vahid",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2423 | Alexander Barg | Alexander Barg, Oleg R. Musin | Bounds on sets with few distances | 11 pages | Journal of Combinatorial Theory Ser. A, 118 , no. 4, 2011, pp.
1465-1474, | 10.1016/j.jcta.2011.01.002 | null | math.CO cs.IT math.IT math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We derive a new estimate of the size of finite sets of points in metric
spaces with few distances. The following applications are considered:
(1) we improve the Ray-Chaudhuri--Wilson bound of the size of uniform
intersecting families of subsets;
(2) we refine the bound of Delsarte-Goethals-Seidel on the maximum size of
spherical sets with few distances;
(3) we prove a new bound on codes with few distances in the Hamming space,
improving an earlier result of Delsarte.
We also find the size of maximal binary codes and maximal constant-weight
codes of small length with 2 and 3 distances.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 21:12:19 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Sep 2010 17:30:24 GMT"
}
]
| 2011-04-29T00:00:00 | [
[
"Barg",
"Alexander",
""
],
[
"Musin",
"Oleg R.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
]
|
0905.2429 | Kfir Gedalyahu | Kfir Gedalyahu and Yonina C. Eldar | Time Delay Estimation from Low Rate Samples: A Union of Subspaces
Approach | null | null | 10.1109/TSP.2010.2044253 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Time delay estimation arises in many applications in which a multipath medium
has to be identified from pulses transmitted through the channel. Various
approaches have been proposed in the literature to identify time delays
introduced by multipath environments. However, these methods either operate on
the analog received signal, or require high sampling rates in order to achieve
reasonable time resolution. In this paper, our goal is to develop a unified
approach to time delay estimation from low rate samples of the output of a
multipath channel. Our methods result in perfect recovery of the multipath
delays from samples of the channel output at the lowest possible rate, even in
the presence of overlapping transmitted pulses. This rate depends only on the
number of multipath components and the transmission rate, but not on the
bandwidth of the probing signal. In addition, our development allows for a
variety of different sampling methods. By properly manipulating the low-rate
samples, we show that the time delays can be recovered using the well-known
ESPRIT algorithm. Combining results from sampling theory with those obtained in
the context of direction of arrival estimation methods, we develop necessary
and sufficient conditions on the transmitted pulse and the sampling functions
in order to ensure perfect recovery of the channel parameters at the minimal
possible rate. Our results can be viewed in a broader context, as a sampling
theorem for analog signals defined over an infinite union of subspaces.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 21:15:49 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 08:36:37 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Nov 2009 10:07:29 GMT"
}
]
| 2011-01-05T00:00:00 | [
[
"Gedalyahu",
"Kfir",
""
],
[
"Eldar",
"Yonina C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2435 | Christoph Benzmueller | Christoph Benzmueller, Lawrence C. Paulson | Quantified Multimodal Logics in Simple Type Theory | ii + 22 pages | null | null | SEKI Report SR-2009-02 | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a straightforward embedding of quantified multimodal logic in
simple type theory and prove its soundness and completeness. Modal operators
are replaced by quantification over a type of possible worlds. We present
simple experiments, using existing higher-order theorem provers, to demonstrate
that the embedding allows automated proofs of statements in these logics, as
well as meta properties of them.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 22:25:24 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Benzmueller",
"Christoph",
""
],
[
"Paulson",
"Lawrence C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.2447 | Aydin Sezgin | Aydin Sezgin, Syed Ali Jafar, and Hamid Jafarkhani | The Diversity Multiplexing Tradeoff for Interference Networks | 5 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The diversity-multiplexing tradeoff (DMT) for interference networks, such as
the interference channel, the X channel, the Z interference channel and the Z
channel, is analyzed. In particular, we investigate the impact of
rate-splitting and channel knowledge at the transmitters. We also use the DMT
of the Z channel and the Z interference channel to distill insights into the
"loud neighbor" problem for femto-cell networks.
| [
{
"version": "v1",
"created": "Thu, 14 May 2009 23:53:13 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Sezgin",
"Aydin",
""
],
[
"Jafar",
"Syed Ali",
""
],
[
"Jafarkhani",
"Hamid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2449 | Serguei Mokhov | Serguei A. Mokhov | The Role of Self-Forensics in Vehicle Crash Investigations and Event
Reconstruction | 10 pages; preliminary version for CMRSC | null | null | null | cs.CY cs.AI cs.CR cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper further introduces and formalizes a novel concept of
self-forensics for automotive vehicles, specified in the Forensic Lucid
language. We argue that self-forensics, with the forensics taken out of the
cybercrime domain, is applicable to "self-dissection" of intelligent vehicles
and hardware systems for automated incident and anomaly analysis and event
reconstruction by the software with or without the aid of the engineering teams
in a variety of forensic scenarios. We propose a formal design, requirements,
and specification of the self-forensic enabled units (similar to blackboxes) in
vehicles that will help investigation of incidents and also automated reasoning
and verification of theories along with the events reconstruction in a formal
model. We argue such an analysis is beneficial to improve the safety of the
passengers and their vehicles, like the airline industry does for planes.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 00:08:02 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.2459 | Serguei Mokhov | Serguei A. Mokhov | On Design and Implementation of the Distributed Modular Audio
Recognition Framework: Requirements and Specification Design Document | 53 pages, 8 figures, 2 tables. A 2006 report on software design and
implementation of Distributed MARF, which is a distributed extension of
classical MARF documented at arXiv:0905.1235 . Parts are to appear at the
CISSE'08 conference (Springer). The content of the document and code are
open-source and released at http://marf.sf.net ; v2 adds missing .ind file | null | 10.1007/978-90-481-3662-9_72 | null | cs.CV cs.DC cs.MM cs.NE cs.SD | http://creativecommons.org/licenses/by/3.0/ | We present the requirements and design specification of the open-source
Distributed Modular Audio Recognition Framework (DMARF), a distributed
extension of MARF. The distributed version aggregates a number of distributed
technologies (e.g. Java RMI, CORBA, Web Services) in a pluggable and modular
model along with the provision of advanced distributed systems algorithms. We
outline the associated challenges incurred during the design and implementation
as well as overall specification of the project and its advantages and
limitations.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 02:52:28 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Jul 2009 23:16:29 GMT"
}
]
| 2010-01-31T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
]
|
0905.2463 | Chunhua Shen | Chunhua Shen, Junae Kim, Hanzi Wang | Generalized Kernel-based Visual Tracking | 12 pages | IEEE Transactions on Circuits and Systems for Video Technology,
2010 | null | null | cs.CV cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we generalize the plain MS trackers and attempt to overcome
standard mean shift trackers' two limitations.
It is well known that modeling and maintaining a representation of a target
object is an important component of a successful visual tracker.
However, little work has been done on building a robust template model for
kernel-based MS tracking. In contrast to building a template from a single
frame, we train a robust object representation model from a large amount of
data. Tracking is viewed as a binary classification problem, and a
discriminative classification rule is learned to distinguish between the object
and background. We adopt a support vector machine (SVM) for training. The
tracker is then implemented by maximizing the classification score. An
iterative optimization scheme very similar to MS is derived for this purpose.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 03:26:52 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Jun 2009 04:35:37 GMT"
}
]
| 2009-06-07T00:00:00 | [
[
"Shen",
"Chunhua",
""
],
[
"Kim",
"Junae",
""
],
[
"Wang",
"Hanzi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0905.2473 | Keki Burjorjee | Keki M. Burjorjee | On the Workings of Genetic Algorithms: The Genoclique Fixing Hypothesis | 25 pages, 7 figures | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We recently reported that the simple genetic algorithm (SGA) is capable of
performing a remarkable form of sublinear computation which has a
straightforward connection with the general problem of interacting attributes
in data-mining. In this paper we explain how the SGA can leverage this
computational proficiency to perform efficient adaptation on a broad class of
fitness functions. Based on the relative ease with which a practical fitness
function might belong to this broad class, we submit a new hypothesis about the
workings of genetic algorithms. We explain why our hypothesis is superior to
the building block hypothesis, and, by way of empirical validation, we present
the results of an experiment in which the use of a simple mechanism called
clamping dramatically improved the performance of an SGA with uniform crossover
on large, randomly generated instances of the MAX 3-SAT problem.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 07:17:31 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Burjorjee",
"Keki M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.2479 | Guangyue Han | Guangyue Han, Brian Marcus, Yuval Peres | A note on a complex Hilbert metric with application to domain of
analyticity for entropy rate of hidden Markov processes | 15 pages, 1 figure | null | null | null | math.DS cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note, we show that small complex perturbations of positive matrices
are contractions, with respect to a complex version of the Hilbert metric, on
the standard complex simplex. We show that this metric can be used to obtain
estimates of the domain of analyticity of entropy rate for a hidden Markov
process when the underlying Markov chain has strictly positive transition
probabilities.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 06:43:02 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Han",
"Guangyue",
""
],
[
"Marcus",
"Brian",
""
],
[
"Peres",
"Yuval",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2485 | Oded Schwartz | Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz | Minimizing Communication in Linear Algebra | 27 pages, 2 tables | SIAM. J. Matrix Anal. & Appl. 32 (2011), no. 3, 866-901 | 10.1137/090769156 | null | cs.CC cs.DS cs.NA math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 1981 Hong and Kung proved a lower bound on the amount of communication
needed to perform dense, matrix-multiplication using the conventional $O(n^3)$
algorithm, where the input matrices were too large to fit in the small, fast
memory. In 2004 Irony, Toledo and Tiskin gave a new proof of this result and
extended it to the parallel case. In both cases the lower bound may be
expressed as $\Omega$(#arithmetic operations / $\sqrt{M}$), where M is the size
of the fast memory (or local memory in the parallel case). Here we generalize
these results to a much wider variety of algorithms, including LU
factorization, Cholesky factorization, $LDL^T$ factorization, QR factorization,
algorithms for eigenvalues and singular values, i.e., essentially all direct
methods of linear algebra. The proof works for dense or sparse matrices, and
for sequential or parallel algorithms. In addition to lower bounds on the
amount of data moved (bandwidth) we get lower bounds on the number of messages
required to move it (latency). We illustrate how to extend our lower bound
technique to compositions of linear algebra operations (like computing powers
of a matrix), to decide whether it is enough to call a sequence of simpler
optimal algorithms (like matrix multiplication) to minimize communication, or
if we can do better. We give examples of both. We also show how to extend our
lower bounds to certain graph theoretic problems.
We point out recently designed algorithms for dense LU, Cholesky, QR,
eigenvalue and the SVD problems that attain these lower bounds; implementations
of LU and QR show large speedups over conventional linear algebra algorithms in
standard libraries like LAPACK and ScaLAPACK. Many open problems remain.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 07:26:56 GMT"
}
]
| 2011-09-20T00:00:00 | [
[
"Ballard",
"Grey",
""
],
[
"Demmel",
"James",
""
],
[
"Holtz",
"Olga",
""
],
[
"Schwartz",
"Oded",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
]
|
0905.2501 | Rom\`an R. Zapatrin | Daniel Sonntag, Rom\`an R. Zapatrin | Macrodynamics of users' behavior in Information Retrieval | null | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a method to geometrize massive data sets from search engines query
logs. For this purpose, a macrodynamic-like quantitative model of the
Information Retrieval (IR) process is developed, whose paradigm is inspired by
basic constructions of Einstein's general relativity theory in which all IR
objects are uniformly placed in a common Room. The Room has a structure similar
to Einsteinian spacetime, namely that of a smooth manifold. Documents and
queries are treated as matter objects and sources of material fields.
Relevance, the central notion of IR, becomes a dynamical issue controlled by
both gravitation (or, more precisely, as the motion in a curved spacetime) and
forces originating from the interactions of matter fields. The spatio-temporal
description ascribes dynamics to any document or query, thus providing a
uniform description for documents of both initially static and dynamical
nature. Within the IR context, the techniques presented are based on two ideas.
The first is the placement of all objects participating in IR into a common
continuous space. The second idea is the `objectivization' of the IR process;
instead of expressing users' wishes, we consider the overall IR as an objective
physical process, representing the IR process in terms of motion in a given
external-fields configuration. Various semantic environments are treated as
various IR universes.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 09:57:56 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Sonntag",
"Daniel",
""
],
[
"Zapatrin",
"Romàn R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0905.2509 | Stefano Zacchiroli | Angelo Di Iorio, Fabio Vitali, Davide Rossi, Stefano Zacchiroli (PPS) | Where are your Manners? Sharing Best Community Practices in the Web 2.0 | ACM symposium on Applied Computing, Honolulu : \'Etats-Unis
d'Am\'erique (2009) | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Web 2.0 fosters the creation of communities by offering users a wide
array of social software tools. While the success of these tools is based on
their ability to support different interaction patterns among users by imposing
as few limitations as possible, the communities they support are not free of
rules (just think about the posting rules in a community forum or the editing
rules in a thematic wiki). In this paper we propose a framework for the sharing
of best community practices in the form of a (potentially rule-based)
annotation layer that can be integrated with existing Web 2.0 community tools
(with specific focus on wikis). This solution is characterized by minimal
intrusiveness and plays nicely within the open spirit of the Web 2.0 by
providing users with behavioral hints rather than by enforcing the strict
adherence to a set of rules.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 10:04:29 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Di Iorio",
"Angelo",
"",
"PPS"
],
[
"Vitali",
"Fabio",
"",
"PPS"
],
[
"Rossi",
"Davide",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0905.2539 | Delia Kesner | Delia Kesner | A Theory of Explicit Substitutions with Safe and Full Composition | 29 pages Special Issue: Selected Papers of the Conference
"International Colloquium on Automata, Languages and Programming 2008" edited
by Giuseppe Castagna and Igor Walukiewicz | Logical Methods in Computer Science, Volume 5, Issue 3 (July 15,
2009) lmcs:816 | 10.2168/LMCS-5(3:1)2009 | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many different systems with explicit substitutions have been proposed to
implement a large class of higher-order languages. Motivations and challenges
that guided the development of such calculi in functional frameworks are
surveyed in the first part of this paper. Then, very simple technology in named
variable-style notation is used to establish a theory of explicit substitutions
for the lambda-calculus which enjoys a whole set of useful properties such as
full composition, simulation of one-step beta-reduction, preservation of
beta-strong normalisation, strong normalisation of typed terms and confluence
on metaterms. Normalisation of related calculi is also discussed.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 13:35:58 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jul 2009 12:33:03 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Jul 2009 21:06:30 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Kesner",
"Delia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.2540 | Swan Dubois | Alain Cournier (MIS), Swan Dubois (LIP6, INRIA Rocquencourt), Vincent
Villain (MIS) | Two snap-stabilizing point-to-point communication protocols in
message-switched networks | null | null | null | null | cs.DS cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A snap-stabilizing protocol, starting from any configuration, always behaves
according to its specification. In this paper, we present a snap-stabilizing
protocol to solve the message forwarding problem in a message-switched network.
In this problem, we must manage resources of the system to deliver messages to
any processor of the network. In this purpose, we use information given by a
routing algorithm. By the context of stabilization (in particular, the system
starts in an arbitrary configuration), this information can be corrupted. So,
the existence of a snap-stabilizing protocol for the message forwarding problem
implies that we can ask the system to begin forwarding messages even if routing
information are initially corrupted. In this paper, we propose two
snap-stabilizing algorithms (in the state model) for the following
specification of the problem: - Any message can be generated in a finite time.
- Any emitted message is delivered to its destination once and only once in a
finite time. This implies that our protocol can deliver any emitted message
regardless of the state of routing tables in the initial configuration. These
two algorithms are based on the previous work of [MS78]. Each algorithm needs a
particular method to be transform into a snap-stabilizing one but both of them
do not introduce a significant overcost in memory or in time with respect to
algorithms of [MS78].
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 12:41:01 GMT"
}
]
| 2009-05-18T00:00:00 | [
[
"Cournier",
"Alain",
"",
"MIS"
],
[
"Dubois",
"Swan",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Villain",
"Vincent",
"",
"MIS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0905.2545 | Rene David | Ren\'e David (LAMA) | A direct proof of the confluence of combinatory strong reduction | To appear in TCS | null | null | null | math.LO cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I give a proof of the confluence of combinatory strong reduction that does
not use the one of lambda-calculus. I also give simple and direct proofs of a
standardization theorem for this reduction and the strong normalization of
simply typed terms.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 13:42:46 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"David",
"René",
"",
"LAMA"
]
]
| [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.2605 | Dengpan Zhou | Jie Gao, Dengpan Zhou | The Emergence of Sparse Spanners and Greedy Well-Separated Pair
Decomposition | null | null | 10.1007/978-3-642-13731-0_6 | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A spanner graph on a set of points in $R^d$ contains a shortest path between
any pair of points with length at most a constant factor of their Euclidean
distance. In this paper we investigate new models and aim to interpret why good
spanners 'emerge' in reality, when they are clearly built in pieces by agents
with their own interests and the construction is not coordinated. Our main
result is to show that if edges are built in an arbitrary order but an edge is
built if and only if its endpoints are not 'close' to the endpoints of an
existing edge, the graph is a $(1 + \eps)$-spanner with a linear number of
edges, constant average degree, and the total edge length as a small
logarithmic factor of the cost of the minimum spanning tree. As a side product,
we show a simple greedy algorithm for constructing optimal size well-separated
pair decompositions that may be of interest on its own.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 19:47:36 GMT"
},
{
"version": "v2",
"created": "Fri, 15 May 2009 20:11:22 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Gao",
"Jie",
""
],
[
"Zhou",
"Dengpan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.2635 | Andriy Myronenko | Andriy Myronenko, Xubo Song | Point-Set Registration: Coherent Point Drift | null | IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 32,
issue 12, pp. 2262-2275 | 10.1109/TPAMI.2010.46 | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Point set registration is a key component in many computer vision tasks. The
goal of point set registration is to assign correspondences between two sets of
points and to recover the transformation that maps one point set to the other.
Multiple factors, including an unknown non-rigid spatial transformation, large
dimensionality of point set, noise and outliers, make the point set
registration a challenging problem. We introduce a probabilistic method, called
the Coherent Point Drift (CPD) algorithm, for both rigid and non-rigid point
set registration. We consider the alignment of two point sets as a probability
density estimation problem. We fit the GMM centroids (representing the first
point set) to the data (the second point set) by maximizing the likelihood. We
force the GMM centroids to move coherently as a group to preserve the
topological structure of the point sets. In the rigid case, we impose the
coherence constraint by re-parametrization of GMM centroid locations with rigid
parameters and derive a closed form solution of the maximization step of the EM
algorithm in arbitrary dimensions. In the non-rigid case, we impose the
coherence constraint by regularizing the displacement field and using the
variational calculus to derive the optimal transformation. We also introduce a
fast algorithm that reduces the method computation complexity to linear. We
test the CPD algorithm for both rigid and non-rigid transformations in the
presence of noise, outliers and missing points, where CPD shows accurate
results and outperforms current state-of-the-art methods.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 22:28:00 GMT"
}
]
| 2010-11-09T00:00:00 | [
[
"Myronenko",
"Andriy",
""
],
[
"Song",
"Xubo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0905.2636 | Lada A. Adamic | Xiaolin Shi, Belle Tseng, Lada A. Adamic | Information Diffusion in Computer Science Citation Networks | long version of poster published at ICWSM 2009 | null | null | null | cs.DL cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper citation network is a traditional social medium for the exchange of
ideas and knowledge. In this paper we view citation networks from the
perspective of information diffusion. We study the structural features of the
information paths through the citation networks of publications in computer
science, and analyze the impact of various citation choices on the subsequent
impact of the article. We find that citing recent papers and papers within the
same scholarly community garners a slightly larger number of citations on
average. However, this correlation is weaker among well-cited papers implying
that for high impact work citing within one's field is of lesser importance. We
also study differences in information flow for specific subsets of citation
networks: books versus conference and journal articles, different areas of
computer science, and different time periods.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 22:41:39 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"Shi",
"Xiaolin",
""
],
[
"Tseng",
"Belle",
""
],
[
"Adamic",
"Lada A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0905.2637 | Felipe Cruz | Felipe A. Cruz, Matthew G. Knepley, L. A. Barba | PetFMM--A dynamically load-balancing parallel fast multipole library | 28 pages, 9 figures | Int. J. Num. Meth. Eng., 85(4): 403-428 (Jan. 2011) | 10.1002/nme.2972 | null | cs.DC cs.DS | http://creativecommons.org/licenses/by/3.0/ | Fast algorithms for the computation of $N$-body problems can be broadly
classified into mesh-based interpolation methods, and hierarchical or
multiresolution methods. To this last class belongs the well-known fast
multipole method (FMM), which offers O(N) complexity. This paper presents an
extensible parallel library for $N$-body interactions utilizing the FMM
algorithm, built on the framework of PETSc. A prominent feature of this library
is that it is designed to be extensible, with a view to unifying efforts
involving many algorithms based on the same principles as the FMM and enabling
easy development of scientific application codes. The paper also details an
exhaustive model for the computation of tree-based $N$-body algorithms in
parallel, including both work estimates and communications estimates. With this
model, we are able to implement a method to provide automatic, a priori load
balancing of the parallel execution, achieving optimal distribution of the
computational work among processors and minimal inter-processor communications.
Using a client application that performs the calculation of velocity induced by
$N$ vortex particles, ample verification and testing of the library was
performed. Strong scaling results are presented with close to a million
particles in up to 64 processors, including both speedup and parallel
efficiency. The library is currently able to achieve over 85% parallel
efficiency for 64 processors. The software library is open source under the
PETSc license; this guarantees the maximum impact to the scientific community
and encourages peer-based collaboration for the extensions and applications.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 23:46:14 GMT"
}
]
| 2011-09-21T00:00:00 | [
[
"Cruz",
"Felipe A.",
""
],
[
"Knepley",
"Matthew G.",
""
],
[
"Barba",
"L. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.2638 | Aylin Yener | Xiang He, Aylin Yener | Secure Degrees of Freedom for Gaussian Channels with Interference:
Structured Codes Outperform Gaussian Signaling | 6 pages, Submitted to IEEE Globecom, March 2009 | null | 10.1109/GLOCOM.2009.5425429 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we prove that a positive secure degree of freedom is achievable
for a large class of Gaussian channels as long as the channel is not degraded
and the channel is fully connected. This class includes the MAC wire-tap
channel, the 2-user interference channel with confidential messages, the 2-user
interference channel with an external eavesdropper. Best known achievable
schemes to date for these channels use Gaussian signaling. In this work, we
show that structured codes outperform Gaussian random codes at high SNR when
channel gains are real numbers.
| [
{
"version": "v1",
"created": "Fri, 15 May 2009 23:59:44 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2639 | Narayana Santhanam | Narayana Santhanam and Martin J. Wainwright | Information-theoretic limits of selecting binary graphical models in
high dimensions | 27 pages | null | null | null | cs.IT cs.LG math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of graphical model selection is to correctly estimate the graph
structure of a Markov random field given samples from the underlying
distribution. We analyze the information-theoretic limitations of the problem
of graph selection for binary Markov random fields under high-dimensional
scaling, in which the graph size $p$ and the number of edges $k$, and/or the
maximal node degree $d$ are allowed to increase to infinity as a function of
the sample size $n$. For pairwise binary Markov random fields, we derive both
necessary and sufficient conditions for correct graph selection over the class
$\mathcal{G}_{p,k}$ of graphs on $p$ vertices with at most $k$ edges, and over
the class $\mathcal{G}_{p,d}$ of graphs on $p$ vertices with maximum degree at
most $d$. For the class $\mathcal{G}_{p, k}$, we establish the existence of
constants $c$ and $c'$ such that if $\numobs < c k \log p$, any method has
error probability at least 1/2 uniformly over the family, and we demonstrate a
graph decoder that succeeds with high probability uniformly over the family for
sample sizes $\numobs > c' k^2 \log p$. Similarly, for the class
$\mathcal{G}_{p,d}$, we exhibit constants $c$ and $c'$ such that for $n < c d^2
\log p$, any method fails with probability at least 1/2, and we demonstrate a
graph decoder that succeeds with high probability for $n > c' d^3 \log p$.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 00:41:30 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"Santhanam",
"Narayana",
""
],
[
"Wainwright",
"Martin J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0905.2640 | Aylin Yener | Xiang He, Aylin Yener | The Gaussian Many-to-One Interference Channel with Confidential Messages | 5 pages, To appear at IEEE ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the $K$-user many-to-one interference channel with
confidential messages in which the $K$th user experiences interference from all
other $K-1$ users, and is at the same time treated as an eavesdropper to all
the messages of these users. We derive achievable rates and an upper bound on
the sum rate for this channel and show that the gap between the achievable sum
rate and its upper bound is $\log_2(K-1)$ bits per channel use under very
strong interference, when the interfering users have equal power constraints
and interfering link channel gains. The main contributions of this work are:
(i) nested lattice codes are shown to provide secrecy when interference is
present, (ii) a secrecy sum rate upper bound is found for strong interference
regime and (iii) it is proved that under very strong interference and a
symmetric setting, the gap between the achievable sum rate and the upper bound
is constant with respect to transmission powers.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 00:46:51 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2643 | Aylin Yener | Xiang He, Aylin Yener | K-user Interference Channels: Achievable Secrecy Rate and Degrees of
Freedom | 5 pages. To appear at IEEE ITW 2009, Volos, June 2009 | null | 10.1109/ITWNIT.2009.5158598 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, we consider achievable secrecy rates for symmetric $K$-user ($K
\ge 3$) interference channels with confidential messages. We find that nested
lattice codes and layered coding are useful in providing secrecy for these
channels. Achievable secrecy rates are derived for very strong interference. In
addition, we derive the secure degrees of freedom for a range of channel
parameters. As a by-product of our approach, we also demonstrate that nested
lattice codes are useful for K-user symmetric interference channels without
secrecy constraints in that they yield higher degrees of freedom than previous
results.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 01:04:27 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2645 | Aylin Yener | Xiang He, Aylin Yener | Providing Secrecy with Lattice Codes | This paper appeared in the Proceedings of the 2008 Allerton
Conference on Communication, Control, and Computing, September 2008. Theorems
1 and 2 in this paper derived the Equivocation when using Nested Lattice
Codes, leading to the "one-bit" result for the secrecy rate | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent results have shown that lattice codes can be used to construct good
channel codes, source codes and physical layer network codes for Gaussian
channels. On the other hand, for Gaussian channels with secrecy constraints,
efforts to date rely on random codes. In this work, we provide a tool to bridge
these two areas so that the secrecy rate can be computed when lattice codes are
used. In particular, we address the problem of bounding equivocation rates
under nonlinear modulus operation that is present in lattice encoders/decoders.
The technique is then demonstrated in two Gaussian channel examples: (1) a
Gaussian wiretap channel with a cooperative jammer, and (2) a multi-hop line
network from a source to a destination with untrusted intermediate relay nodes
from whom the information needs to be kept secret. In both cases, lattice codes
are used to facilitate cooperative jamming. In the second case, interestingly,
we demonstrate that a non-vanishing positive secrecy rate is achievable
regardless of the number of hops.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 01:25:43 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2649 | Soumya Banerjee | Soumya Banerjee | An Immune System Inspired Approach to Automated Program Verification | null | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An immune system inspired Artificial Immune System (AIS) algorithm is
presented, and is used for the purposes of automated program verification.
Relevant immunological concepts are discussed and the field of AIS is briefly
reviewed. It is proposed to use this AIS algorithm for a specific automated
program verification task: that of predicting shape of program invariants. It
is shown that the algorithm correctly predicts program invariant shape for a
variety of benchmarked programs.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 02:34:32 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"Banerjee",
"Soumya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0905.2657 | Daniel Lemire | Kamel Aouiche, Daniel Lemire, Robert Godin | Web 2.0 OLAP: From Data Cubes to Tag Clouds | Software at https://github.com/lemire/OLAPTagCloud. arXiv admin note:
substantial text overlap with arXiv:0710.2156 | Lecture Notes in Business Information Processing Vol. 18, pages
51-64, 2009 | 10.1007/978-3-642-01344-7_5 | null | cs.DB | http://creativecommons.org/licenses/by-nc-sa/4.0/ | Increasingly, business projects are ephemeral. New Business Intelligence
tools must support ad-lib data sources and quick perusal. Meanwhile, tag clouds
are a popular community-driven visualization technique. Hence, we investigate
tag-cloud views with support for OLAP operations such as roll-ups, slices,
dices, clustering, and drill-downs. As a case study, we implemented an
application where users can upload data and immediately navigate through its ad
hoc dimensions. To support social networking, views can be easily shared and
embedded in other Web sites. Algorithmically, our tag-cloud views are
approximate range top-k queries over spontaneous data cubes. We present
experimental evidence that iceberg cuboids provide adequate online
approximations. We benchmark several browser-oblivious tag-cloud layout
optimizations.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 05:57:06 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Mar 2016 21:52:24 GMT"
}
]
| 2016-03-17T00:00:00 | [
[
"Aouiche",
"Kamel",
""
],
[
"Lemire",
"Daniel",
""
],
[
"Godin",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0905.2659 | Walid Saad | Walid Saad, Zhu Han, Merouane Debbah, Are Hj{\o}rungnes, and Tamer
Ba\c{s}ar | Coalitional Games for Distributed Collaborative Spectrum Sensing in
Cognitive Radio Networks | in proceedings of IEEE INFOCOM 2009 | IEEE INFOCOM 2009 | 10.1109/INFCOM.2009.5062135 | null | cs.GT cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaborative spectrum sensing among secondary users (SUs) in cognitive
networks is shown to yield a significant performance improvement. However,
there exists an inherent trade off between the gains in terms of probability of
detection of the primary user (PU) and the costs in terms of false alarm
probability. In this paper, we study the impact of this trade off on the
topology and the dynamics of a network of SUs seeking to reduce the
interference on the PU through collaborative sensing. Moreover, while existing
literature mainly focused on centralized solutions for collaborative sensing,
we propose distributed collaboration strategies through game theory. We model
the problem as a non-transferable coalitional game, and propose a distributed
algorithm for coalition formation through simple merge and split rules. Through
the proposed algorithm, SUs can autonomously collaborate and self-organize into
disjoint independent coalitions, while maximizing their detection probability
taking into account the cooperation costs (in terms of false alarm). We study
the stability of the resulting network structure, and show that a maximum
number of SUs per formed coalition exists for the proposed utility model.
Simulation results show that the proposed algorithm allows a reduction of up to
86.6% of the average missing probability per SU (probability of missing the
detection of the PU) relative to the non-cooperative case, while maintaining a
certain false alarm level. In addition, through simulations, we compare the
performance of the proposed distributed solution with respect to an optimal
centralized solution that minimizes the average missing probability per SU.
Finally, the results also show how the proposed algorithm autonomously adapts
the network topology to environmental changes such as mobility.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 07:12:14 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Saad",
"Walid",
""
],
[
"Han",
"Zhu",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Hjørungnes",
"Are",
""
],
[
"Başar",
"Tamer",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2676 | Samir Medina Perlaza | Samir M. Perlaza, Merouane Debbah, Samson Lasaulce, Hanna Bogucka | On the Benefits of Bandwidth Limiting in Decentralized Vector Multiple
Access Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the network spectral efficiency of decentralized vector multiple
access channels (MACs) when the number of accessible dimensions per transmitter
is strategically limited. Considering each dimension as a frequency band, we
call this limiting process bandwidth limiting (BL). Assuming that each
transmitter maximizes its own data rate by water-filling over the available
frequency bands, we consider two scenarios. In the first scenario, transmitters
use non-intersecting sets of bands (spectral resource partition), and in the
second one, they freely exploit all the available frequency bands (spectral
resource sharing). In the latter case, successive interference cancelation
(SIC) is used. We show the existence of an optimal number of dimensions that a
transmitter must use in order to maximize the network performance measured in
terms of spectral efficiency. We provide a closed form expression for the
optimal number of accessible bands in the first scenario. Such an optimum
point, depends on the number of active transmitters, the number of available
frequency bands and the different signal-to-noise ratios. In the second
scenario, we show that BL does not bring a significant improvement on the
network spectral efficiency, when all transmitters use the same BL policy. For
both scenarios, we provide simulation results to validate our conclusions.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 11:30:38 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"Perlaza",
"Samir M.",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Lasaulce",
"Samson",
""
],
[
"Bogucka",
"Hanna",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2705 | Alexander Reshetnyak | A. Kuleshov, A.A. Reshetnyak | Programming Realization of Symbolic Computations for Non-linear
Commutator Superalgebras over the Heisenberg--Weyl Superalgebra: Data
Structures and Processing Methods | 35 pages, 2 figures in eps-format, corrected typos, added references | null | null | null | hep-th cs.SC math.QA math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We suggest a programming realization of an algorithm for verifying a given
set of algebraic relations in the form of a supercommutator multiplication
table for the Verma module, which is constructed according to a generalized
Cartan procedure for a quadratic superalgebra and whose elements are realized
as a formal power series with respect to non-commuting elements. To this end,
we propose an algebraic procedure of Verma module construction and its
realization in terms of non-commuting creation and annihilation operators of a
given Heisenberg--Weyl superalgebra. In doing so, we set up a problem which
naturally arises within a Lagrangian description of higher-spin fields in
anti-de-Sitter (AdS) spaces: to verify the fact that the resulting Verma module
elements obey the given commutator multiplication for the original non-linear
superalgebra. The problem setting is based on a restricted principle of
mathematical induction, in powers of inverse squared radius of the AdS-space.
For a construction of an algorithm resolving this problem, we use a two-level
data model within the object-oriented approach, which is realized on a basis of
the programming language C#. The program allows one to consider objects (of a
less general nature than non-linear commutator superalgebras) that fall under
the class of so-called $GR$-algebras, for whose treatment one widely uses the
module \emph{Plural} of the system \emph{Singular} of symbolic computations for
polynomials.
| [
{
"version": "v1",
"created": "Sat, 16 May 2009 21:29:03 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Aug 2009 11:32:37 GMT"
}
]
| 2009-08-26T00:00:00 | [
[
"Kuleshov",
"A.",
""
],
[
"Reshetnyak",
"A. A.",
""
]
]
| [
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
0905.2718 | Joerg Kliewer | Tao Cui, Tracey Ho, Joerg Kliewer | Achievable Rate and Optimal Physical Layer Rate Allocation in
Interference-Free Wireless Networks | 5 pages, to appear in Proc. IEEE ISIT, July 2009 | null | 10.1109/ISIT.2009.5205903 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the achievable rate in interference-free wireless networks with
physical layer fading channels and orthogonal multiple access. As a starting
point, the point-to-point channel is considered. We find the optimal physical
and network layer rate trade-off which maximizes the achievable overall rate
for both a fixed rate transmission scheme and an improved scheme based on
multiple virtual users and superposition coding. These initial results are
extended to the network setting, where, based on a cut-set formulation, the
achievable rate at each node and its upper bound are derived. We propose a
distributed optimization algorithm which allows to jointly determine the
maximum achievable rate, the optimal physical layer rates on each network link,
and an opportunistic back-pressure-type routing strategy on the network layer.
This inherently justifies the layered architecture in existing wireless
networks. Finally, we show that the proposed layered optimization approach can
achieve almost all of the ergodic network capacity in high SNR.
| [
{
"version": "v1",
"created": "Sun, 17 May 2009 06:02:11 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Cui",
"Tao",
""
],
[
"Ho",
"Tracey",
""
],
[
"Kliewer",
"Joerg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2796 | Danilo Silva | Danilo Silva, Weifei Zeng, Frank R. Kschischang | Sparse Network Coding with Overlapping Classes | 15 pages, 5 figures, to be published at NetCod 2009 | null | 10.1109/NETCOD.2009.5191397 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel approach to network coding for distribution of
large files. Instead of the usual approach of splitting packets into disjoint
classes (also known as generations) we propose the use of overlapping classes.
The overlapping allows the decoder to alternate between Gaussian elimination
and back substitution, simultaneously boosting the performance and reducing the
decoding complexity. Our approach can be seen as a combination of fountain
coding and network coding. Simulation results are presented that demonstrate
the promise of our approach.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 03:37:41 GMT"
}
]
| 2019-05-07T00:00:00 | [
[
"Silva",
"Danilo",
""
],
[
"Zeng",
"Weifei",
""
],
[
"Kschischang",
"Frank R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2817 | Haiping Huang | Haiping Huang and Haijun Zhou | Cavity approach to the Sourlas code system | 12 pages, 6 figures | Phys. Rev. E 80, 056113 (2009) | 10.1103/PhysRevE.80.056113 | null | cond-mat.dis-nn cond-mat.stat-mech cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The statistical physics properties of regular and irregular Sourlas codes are
investigated in this paper by the cavity method. At finite temperatures, the
free energy density of these coding systems is derived and compared with the
result obtained by the replica method. In the zero temperature limit, the
Shannon's bound is recovered in the case of infinite-body interactions while
the code rate is still finite. However, the decoding performance as obtained by
the replica theory has not considered the zero-temperature entropic effect. The
cavity approach is able to consider the ground-state entropy. It leads to a set
of evanescent cavity fields propagation equations which further improve the
decoding performance, as confirmed by our numerical simulations on single
instances. For the irregular Sourlas code, we find that it takes the trade-off
between good dynamical property and high performance of decoding. In agreement
with the results found from the algorithmic point of view, the decoding
exhibits a first order phase transition as occurs in the regular code system
with three-body interactions. The cavity approach for the Sourlas code system
can be extended to consider first-step replica-symmetry-breaking.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 14:17:13 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Aug 2009 02:42:08 GMT"
}
]
| 2013-05-29T00:00:00 | [
[
"Huang",
"Haiping",
""
],
[
"Zhou",
"Haijun",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2825 | Petter Holme | Beom Jun Kim, Petter Holme, Viktoria Fodor | Heterogeneous attachment strategies optimize the topology of dynamic
wireless networks | null | Eur. Phys. J. B 73, 597--604 (2010) | 10.1140/epjb/e2010-00049-x | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In optimizing the topology of wireless networks built of a dynamic set of
spatially embedded agents, there are many trade-offs to be dealt with. The
network should preferably be as small (in the sense that the average, or
maximal, pathlength is short) as possible, it should be robust to failures, not
consume too much power, and so on. In this paper, we investigate simple models
of how agents can choose their neighbors in such an environment. In our model
of attachment, we can tune from one situation where agents prefer to attach to
others in closest proximity, to a situation where distance is ignored (and thus
attachments can be made to agents further away). We evaluate this scenario with
several performance measures and find that the optimal topologies, for most of
the quantities, is obtained for strategies resulting in a mix of most local and
a few random connections.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 08:35:02 GMT"
}
]
| 2010-03-13T00:00:00 | [
[
"Kim",
"Beom Jun",
""
],
[
"Holme",
"Petter",
""
],
[
"Fodor",
"Viktoria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.2880 | Rene David | Ren\'e David (LAMA), Marek Zaionc | Counting proofs in propositional logic | null | Archive for Mathematical Logic 48 (2009) P 185-199 | 10.1007/s00153-009-0119-5 | null | math.LO cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a procedure for counting the number of different proofs of a formula
in various sorts of propositional logic. This number is either an integer (that
may be 0 if the formula is not provable) or infinite.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 13:14:01 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"David",
"René",
"",
"LAMA"
],
[
"Zaionc",
"Marek",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.2882 | Maroun Bercachi | Maroun Bercachi (I3S), Philippe Collard (I3S), Manuel Clergue (I3S),
Sebastien Verel (I3S) | Do not Choose Representation just Change: An Experimental Study in
States based EA | null | Genetic and Evolutionary Computation Conference 2009, Montr\'eal :
Canada (2009) | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our aim in this paper is to analyse the phenotypic effects (evolvability) of
diverse coding conversion operators in an instance of the states based
evolutionary algorithm (SEA). Since the representation of solutions or the
selection of the best encoding during the optimization process has been proved
to be very important for the efficiency of evolutionary algorithms (EAs), we
will discuss a strategy of coupling more than one representation and different
procedures of conversion from one coding to another during the search.
Elsewhere, some EAs try to use multiple representations (SM-GA, SEA, etc.) in
intention to benefit from the characteristics of each of them. In spite of
those results, this paper shows that the change of the representation is also a
crucial approach to take into consideration while attempting to increase the
performances of such EAs. As a demonstrative example, we use a two states SEA
(2-SEA) which has two identical search spaces but different coding conversion
operators. The results show that the way of changing from one coding to another
and not only the choice of the best representation nor the representation
itself is very advantageous and must be taken into account in order to
well-desing and improve EAs execution.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 13:35:14 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"Bercachi",
"Maroun",
"",
"I3S"
],
[
"Collard",
"Philippe",
"",
"I3S"
],
[
"Clergue",
"Manuel",
"",
"I3S"
],
[
"Verel",
"Sebastien",
"",
"I3S"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.2892 | Rene David | Ren\'e David (LAMA), Karim Nour (LAMA) | Strong normalization results by translation | Submitted to APAL | null | null | null | math.LO cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove the strong normalization of full classical natural deduction (i.e.
with conjunction, disjunction and permutative conversions) by using a
translation into the simply typed lambda-mu-calculus. We also extend Mendler's
result on recursive equations to this system.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 14:13:58 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"David",
"René",
"",
"LAMA"
],
[
"Nour",
"Karim",
"",
"LAMA"
]
]
| [
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.2918 | Karoline Wiesner | Karoline Wiesner, Mile Gu, Elisabeth Rieper, and Vlatko Vedral | Information erasure lurking behind measures of complexity | Withdrawn: The main results, a corrected version of Theorem 1, and
further results are contained in the new paper "Information-theoretic bound
on the energy cost of stochastic simulation", http://arxiv.org/abs/1110.4217 | null | null | null | physics.data-an cond-mat.stat-mech cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Complex systems are found in most branches of science. It is still argued how
to best quantify their complexity and to what end. One prominent measure of
complexity (the statistical complexity) has an operational meaning in terms of
the amount of resources needed to forecasting a system's behaviour. Another one
(the effective measure complexity, aka excess entropy) is a measure of mutual
information stored in the system proper. We show that for any given system the
two measures differ by the amount of information erased during forecasting. We
interpret the difference as inefficiency of a given model. We find a bound to
the ratio of the two measures defined as information-processing efficiency, in
analogy to the second law of thermodynamics. This new link between two
prominent measures of complexity provides a quantitative criterion for good
models of complex systems, namely those with little information erasure.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 15:54:50 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Oct 2011 09:24:52 GMT"
}
]
| 2011-10-24T00:00:00 | [
[
"Wiesner",
"Karoline",
""
],
[
"Gu",
"Mile",
""
],
[
"Rieper",
"Elisabeth",
""
],
[
"Vedral",
"Vlatko",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.2919 | Elena Grigorescu | Elena Grigorescu and Tali Kaufman and Madhu Sudan | Succinct Representation of Codes with Applications to Testing | null | null | 10.1007/978-3-642-03685-9_40 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by questions in property testing, we search for linear
error-correcting codes that have the "single local orbit" property: i.e., they
are specified by a single local constraint and its translations under the
symmetry group of the code. We show that the dual of every "sparse" binary code
whose coordinates are indexed by elements of F_{2^n} for prime n, and whose
symmetry group includes the group of non-singular affine transformations of
F_{2^n} has the single local orbit property. (A code is said to be "sparse" if
it contains polynomially many codewords in its block length.) In particular
this class includes the dual-BCH codes for whose duals (i.e., for BCH codes)
simple bases were not known. Our result gives the first short (O(n)-bit, as
opposed to the natural exp(n)-bit) description of a low-weight basis for BCH
codes. The interest in the "single local orbit" property comes from the recent
result of Kaufman and Sudan (STOC 2008) that shows that the duals of codes that
have the single local orbit property under the affine symmetry group are
locally testable. When combined with our main result, this shows that all
sparse affine-invariant codes over the coordinates F_{2^n} for prime n are
locally testable. If, in addition to n being prime, if 2^n-1 is also prime
(i.e., 2^n-1 is a Mersenne prime), then we get that every sparse cyclic code
also has the single local orbit. In particular this implies that BCH codes of
Mersenne prime length are generated by a single low-weight codeword and its
cyclic shifts.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 15:55:38 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Grigorescu",
"Elena",
""
],
[
"Kaufman",
"Tali",
""
],
[
"Sudan",
"Madhu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.2924 | Nassir Mohammad | Nassir Mohammad, Alexander Balinsky | Colorization of Natural Images via L1 Optimization | 5 pages, 3 figures | null | null | 0905.2921 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Natural images in the colour space YUV have been observed to have a
non-Gaussian, heavy tailed distribution (called 'sparse') when the filter
G(U)(r) = U(r) - sum_{s \in N(r)} w{(Y)_{rs}} U(s), is applied to the
chromacity channel U (and equivalently to V), where w is a weighting function
constructed from the intensity component Y [1]. In this paper we develop
Bayesian analysis of the colorization problem using the filter response as a
regularization term to arrive at a non-convex optimization problem. This
problem is convexified using L1 optimization which often gives the same results
for sparse signals [2]. It is observed that L1 optimization, in many cases,
over-performs the famous colorization algorithm by Levin et al [3].
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 16:07:52 GMT"
}
]
| 2009-05-19T00:00:00 | [
[
"Mohammad",
"Nassir",
""
],
[
"Balinsky",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0905.2958 | Jacob Oaknin H. | J.H. Oaknin | A statistical learning approach to color demosaicing | 24 pages, 4 figures, 1 table. Rewritten manuscript. New abstract | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A statistical learning/inference framework for color demosaicing is
presented. We start with simplistic assumptions about color constancy, and
recast color demosaicing as a blind linear inverse problem: color parameterizes
the unknown kernel, while brightness takes on the role of a latent variable. An
expectation-maximization algorithm naturally suggests itself for the estimation
of them both. Then, as we gradually broaden the family of hypothesis where
color is learned, we let our demosaicing behave adaptively, in a manner that
reflects our prior knowledge about the statistics of color images. We show that
we can incorporate realistic, learned priors without essentially changing the
complexity of the simple expectation-maximization algorithm we started with.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 19:44:58 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 22:30:02 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Feb 2010 21:25:49 GMT"
}
]
| 2010-02-12T00:00:00 | [
[
"Oaknin",
"J. H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0905.2977 | Subhash Kak | Subhash Kak | Cryptography for Multi-Located Parties | 7 pages; 6 figures | null | null | null | cs.CR quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This note describes some cryptographic issues related to multi-located
parties. In general, multi-located parties make it difficult for the
eavesdropper to mount the man-in-the-middle attack. Conversely, they make it
easier to address problems such as joint encryption and error correction
coding. It is easier to implement the three-stage quantum cryptography
protocol.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 20:29:22 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Kak",
"Subhash",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0905.2990 | Juan-Manuel Torres-Moreno | Juan-Manuel Torres-Moreno and Pier-Luc St-Onge and Michel Gagnon and
Marc El-B\`eze and Patrice Bellot | Automatic Summarization System coupled with a Question-Answering System
(QAAS) | 28 pages, 11 figures | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To select the most relevant sentences of a document, it uses an optimal
decision algorithm that combines several metrics. The metrics processes,
weighting and extract pertinence sentences by statistical and informational
algorithms. This technique might improve a Question-Answering system, whose
function is to provide an exact answer to a question in natural language. In
this paper, we present the results obtained by coupling the Cortex summarizer
with a Question-Answering system (QAAS). Two configurations have been
evaluated. In the first one, a low compression level is selected and the
summarization system is only used as a noise filter. In the second
configuration, the system actually functions as a summarizer, with a very high
level of compression. Our results on French corpus demonstrate that the
coupling of Automatic Summarization system with a Question-Answering system is
promising. Then the system has been adapted to generate a customized summary
depending on the specific question. Tests on a french multi-document corpus
have been realized, and the personalized QAAS system obtains the best
performances.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 21:35:52 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Torres-Moreno",
"Juan-Manuel",
""
],
[
"St-Onge",
"Pier-Luc",
""
],
[
"Gagnon",
"Michel",
""
],
[
"El-Bèze",
"Marc",
""
],
[
"Bellot",
"Patrice",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0905.2997 | Andrew Guillory | Andrew Guillory, Jeff Bilmes | Average-Case Active Learning with Costs | 14 pages, 2 figures | null | null | UWEETR-2009-0005 | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the expected cost of a greedy active learning algorithm. Our
analysis extends previous work to a more general setting in which different
queries have different costs. Moreover, queries may have more than two possible
responses and the distribution over hypotheses may be non uniform. Specific
applications include active learning with label costs, active learning for
multiclass and partial label queries, and batch mode active learning. We also
discuss an approximate version of interest when there are very many queries.
| [
{
"version": "v1",
"created": "Mon, 18 May 2009 23:21:35 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Guillory",
"Andrew",
""
],
[
"Bilmes",
"Jeff",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0905.3012 | Ye Du | Ye Du | On the Complexity of Deciding Degeneracy in Games | null | null | null | null | cs.GT cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that it is NP-Complete to decide whether a bimatrix game is
degenerate and it is Co-NP-Complete to decide whether a bimatrix game is
nondegenerate.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 01:40:55 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Du",
"Ye",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.3023 | Fainan Hanif | Muhammad Fainan Hanif, Mansoor Shafi, Peter J. Smith and Pawel A.
Dmochowski | Interference and Deployment Issues for Cognitive Radio Systems in
Shadowing Environments | to be presented at IEEE ICC 2009. This posting is the same as the
original one. Only author's list is updated that was unfortunately not
correctly mentioned in first version | null | 10.1109/ICC.2009.5199089 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe a model for calculating the aggregate interference
encountered by primary receivers in the presence of randomly placed cognitive
radios (CRs). We show that incorporating the impact of distance attenuation and
lognormal fading on each constituent interferer in the aggregate, leads to a
composite interference that cannot be satisfactorily modeled by a lognormal.
Using the interference statistics we determine a number of key parameters
needed for the deployment of CRs. Examples of these are the exclusion zone
radius, needed to protect the primary receiver under different types of fading
environments and acceptable interference levels, and the numbers of CRs that
can be deployed. We further show that if the CRs have apriori knowledge of the
radio environment map (REM), then a much larger number of CRs can be deployed
especially in a high density environment. Given REM information, we also look
at the CR numbers achieved by two different types of techniques to process the
scheduling information.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 05:55:44 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2009 07:34:25 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Hanif",
"Muhammad Fainan",
""
],
[
"Shafi",
"Mansoor",
""
],
[
"Smith",
"Peter J.",
""
],
[
"Dmochowski",
"Pawel A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3030 | Fainan Hanif | Muhammad Fainan Hanif, Peter J. Smith and Mansoor Shafi | Performance of Cognitive Radio Systems with Imperfect Radio Environment
Map Information | presented at IEEE AusCTW 2009. Journal versions are under
preparation. This posting is the same as the original one. Only author's list
is updated that was unfortunately not correctly mentioned in the first
version | null | 10.1109/AUSCTW.2009.4805601 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we describe the effect of imperfections in the radio
environment map (REM) information on the performance of cognitive radio (CR)
systems. Via simulations we explore the relationship between the required
precision of the REM and various channel/system properties. For example, the
degree of spatial correlation in the shadow fading is a key factor as is the
interference constraint employed by the primary user. Based on the CR
interferers obtained from the simulations, we characterize the temporal
behavior of such systems by computing the level crossing rates (LCRs) of the
cumulative interference represented by these CRs. This evaluates the effect of
short term fluctuations above acceptable interference levels due to the fast
fading. We derive analytical formulae for the LCRs in Rayleigh and Rician fast
fading conditions. The analytical results are verified by Monte Carlo
simulations.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 06:26:28 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2009 07:28:10 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Hanif",
"Muhammad Fainan",
""
],
[
"Smith",
"Peter J.",
""
],
[
"Shafi",
"Mansoor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3049 | Arnaud Legout | Anwar Al Hamra, Nikitas Liogkas (UCLA-CS), Arnaud Legout (INRIA Sophia
Antipolis / INRIA Rh\^one-Alpes), Chadi Barakat (INRIA Sophia Antipolis /
INRIA Rh\^one-Alpes) | Swarming Overlay Construction Strategies | null | ICCCN 2009 (2009) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Swarming peer-to-peer systems play an increasingly instrumental role in
Internet content distribution. It is therefore important to better understand
how these systems behave in practice. Recent research efforts have looked at
various protocol parameters and have measured how they affect system
performance and robustness. However, the importance of the strategy based on
which peers establish connections has been largely overlooked. This work
utilizes extensive simulations to examine the default overlay construction
strategy in BitTorrent systems. Based on the results, we identify a critical
parameter, the maximum allowable number of outgoing connections at each peer,
and evaluate its impact on the robustness of the generated overlay. We find
that there is no single optimal value for this parameter using the default
strategy. We then propose an alternative strategy that allows certain new peer
connection requests to replace existing connections. Further experiments with
the new strategy demonstrate that it outperforms the default one for all
considered metrics by creating an overlay more robust to churn. Additionally,
our proposed strategy exhibits optimal behavior for a well-defined value of the
maximum number of outgoing connections, thereby removing the need to set this
parameter in an ad-hoc manner.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 09:33:42 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Hamra",
"Anwar Al",
"",
"UCLA-CS"
],
[
"Liogkas",
"Nikitas",
"",
"UCLA-CS"
],
[
"Legout",
"Arnaud",
"",
"INRIA Sophia\n Antipolis / INRIA Rhône-Alpes"
],
[
"Barakat",
"Chadi",
"",
"INRIA Sophia Antipolis /\n INRIA Rhône-Alpes"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.3070 | Katarina Borg Gyllenback Ms | Katarina Borg Gyllenback | Narrative Bridging - a specification of a modelling method for game
design | null | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Very little has been explored about the narrative as a process when
constructing entertainment for interactive media. Simultaneously, the interest
in narrative vehicles increases while certain occupations, seeing the narrative
as a structure, obscure the examination of the process of selecting, arranging
and rendering story material. To correct this deficiency, a method for a
narrative bridging that encourages research and design while exploring
narration as a process, is proposed with the aim to not diminish the properties
of the interactive media. This method focuses on the initial phase where
establishing and handling the information takes place and creates a foundation
that precedes its systematization and computation. The aim is to give designers
a comfortable design tool that firmly aids the design without interfering with
creativity, and at the same time aids the construction of interplay between
narration, spatiality and interactivity. The method aided the practise of a
discipline that was established through a qualitative study conducted as part
of a university course in rapid prototyping. The results demonstrated that the
method aided time-constrained design processes, simultaneously detecting
inconsistencies that would prevent the team from making improvements. The
method gave the team a shared vocabulary and outlook, allowing them to progress
without interfering with the creative flow. This enabled the team to reason
about the process and easily advice design stakeholders. The study also
provides directions for future developments within research of narrative
processes in game design.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 11:46:13 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Gyllenback",
"Katarina Borg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0905.3076 | Enrico Paolini | E. Paolini, M.F. Flanagan, M. Chiani, M.P.C. Fossorier | On a Class of Doubly-Generalized LDPC Codes with Single Parity-Check
Variable Nodes | 2009 IEEE Int. Symp. on Information Theory. 5 pages, 3 figures | null | 10.1109/ISIT.2009.5205731 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A class of doubly-generalized low-density parity-check (D-GLDPC) codes, where
single parity-check (SPC) codes are used as variable nodes (VNs), is
investigated. An expression for the growth rate of the weight distribution of
any D-GLDPC ensemble with a uniform check node (CN) set is presented at first,
together with an analytical technique for its efficient evaluation. These tools
are then used for detailed analysis of a case study, namely, a rate-1/2 D-GLDPC
ensemble where all the CNs are (7,4) Hamming codes and all the VNs are length-7
SPC codes. It is illustrated how the VN representations can heavily affect the
code properties and how different VN representations can be combined within the
same graph to enhance some of the code parameters. The analysis is conducted
over the binary erasure channel. Interesting features of the new codes include
the capability of achieving a good compromise between waterfall and error floor
performance while preserving graphical regularity, and values of threshold
outperforming LDPC counterparts.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 12:07:50 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Paolini",
"E.",
""
],
[
"Flanagan",
"M. F.",
""
],
[
"Chiani",
"M.",
""
],
[
"Fossorier",
"M. P. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3086 | Sae-Young Chung | Sung Hoon Lim, Young-Han Kim, Sae-Young Chung | Deterministic Relay Networks with State Information | 5 pages, to appear in proc. IEEE ISIT, June 2009 | null | 10.1109/ISIT.2009.5205735 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by fading channels and erasure channels, the problem of reliable
communication over deterministic relay networks is studied, in which relay
nodes receive a function of the incoming signals and a random network state. An
achievable rate is characterized for the case in which destination nodes have
full knowledge of the state information. If the relay nodes receive a linear
function of the incoming signals and the state in a finite field, then the
achievable rate is shown to be optimal, meeting the cut-set upper bound on the
capacity. This result generalizes on a unified framework the work of
Avestimehr, Diggavi, and Tse on the deterministic networks with state
dependency, the work of Dana, Gowaikar, Palanki, Hassibi, and Effros on linear
erasure networks with interference, and the work of Smith and Vishwanath on
linear erasure networks with broadcast.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 12:41:16 GMT"
},
{
"version": "v2",
"created": "Wed, 20 May 2009 06:57:53 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Lim",
"Sung Hoon",
""
],
[
"Kim",
"Young-Han",
""
],
[
"Chung",
"Sae-Young",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3107 | Travis Gagie | Travis Gagie, Gonzalo Navarro, Yakov Nekrich | Fast and Compact Prefix Codes | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well-known that, given a probability distribution over $n$ characters,
in the worst case it takes (\Theta (n \log n)) bits to store a prefix code with
minimum expected codeword length. However, in this paper we first show that,
for any $0<\epsilon<1/2$ with (1 / \epsilon = \Oh{\polylog{n}}), it takes
$\Oh{n \log \log (1 / \epsilon)}$ bits to store a prefix code with expected
codeword length within $\epsilon$ of the minimum. We then show that, for any
constant (c > 1), it takes $\Oh{n^{1 / c} \log n}$ bits to store a prefix code
with expected codeword length at most $c$ times the minimum. In both cases, our
data structures allow us to encode and decode any character in $\Oh{1}$ time.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 14:19:08 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Gagie",
"Travis",
""
],
[
"Navarro",
"Gonzalo",
""
],
[
"Nekrich",
"Yakov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.3108 | Ian Pratt-Hartmann | Yevgeny Kazakov and Ian Pratt-Hartmann | A Note on the Complexity of the Satisfiability Problem for Graded Modal
Logics | Full proofs for paper presented at the IEEE Conference on Logic in
Computer Science, 2009 | null | null | null | cs.LO cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graded modal logic is the formal language obtained from ordinary
(propositional) modal logic by endowing its modal operators with cardinality
constraints. Under the familiar possible-worlds semantics, these augmented
modal operators receive interpretations such as "It is true at no fewer than 15
accessible worlds that...", or "It is true at no more than 2 accessible worlds
that...". We investigate the complexity of satisfiability for this language
over some familiar classes of frames. This problem is more challenging than its
ordinary modal logic counterpart--especially in the case of transitive frames,
where graded modal logic lacks the tree-model property. We obtain tight
complexity bounds for the problem of determining the satisfiability of a given
graded modal logic formula over the classes of frames characterized by any
combination of reflexivity, seriality, symmetry, transitivity and the Euclidean
property.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 15:27:04 GMT"
}
]
| 2009-05-20T00:00:00 | [
[
"Kazakov",
"Yevgeny",
""
],
[
"Pratt-Hartmann",
"Ian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.3109 | Vinod Prabhakaran | Vinod M. Prabhakaran and Pramod Viswanath | Interference Channels with Source Cooperation | revised based on reviewers' comments | IEEE Trans. Inform. Theory 57 (2011) 156-186 | 10.1109/TIT.2010.2090231 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The role of cooperation in managing interference - a fundamental feature of
the wireless channel - is investigated by studying the two-user Gaussian
interference channel where the source nodes can both transmit and receive in
full-duplex. The sum-capacity of this channel is obtained within a gap of a
constant number of bits. The coding scheme used builds up on the superposition
scheme of Han and Kobayashi (1981) for the two-user interference channel
without cooperation. New upperbounds on the sum-capacity are also derived. The
same coding scheme is shown to obtain the sum-capacity of the symmetric
two-user Gaussian interference channel with noiseless feedback within a
constant gap.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 14:01:00 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Nov 2010 05:49:30 GMT"
}
]
| 2011-01-28T00:00:00 | [
[
"Prabhakaran",
"Vinod M.",
""
],
[
"Viswanath",
"Pramod",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3135 | Ayan Mahalanobis | Ayan Mahalanobis | The discrete logarithm problem in the group of non-singular circulant
matrices | null | null | null | null | cs.CR cs.DM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The discrete logarithm problem is one of the backbones in public key
cryptography. In this paper we study the discrete logarithm problem in the
group of circulant matrices over a finite field. This gives rise to secure and
fast public key cryptosystems.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 15:31:31 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Sep 2009 12:46:07 GMT"
}
]
| 2009-09-21T00:00:00 | [
[
"Mahalanobis",
"Ayan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3158 | Hoang-Thach Nguyen | Jean Mairesse (LIAFA), Hoang-Thach Nguyen (LIAFA) | Deficiency Zero Petri Nets and Product Form | This is a long and improved version of the conference paper: J.
Mairesse and H.-T. Nguyen. Deficiency zero Petri nets and product form. In G.
Franceschinis and K. Wolf, editors, Petri Nets 2009, volume 5606 of LNCS,
pages 103-122. Springer-Verlag, 2009 | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a Markovian Petri net with race policy. The marking process has a
"product form" stationary distribution if the probability of viewing a given
marking can be decomposed as the product over places of terms depending only on
the local marking. First we observe that the Deficiency Zero Theorem of
Feinberg, developped for chemical reaction networks, provides a structural and
simple sufficient condition for the existence of a product form. In view of
this, we study the classical subclass of free-choice nets. Roughly, we show
that the only such Petri nets having a product form are the state machines
which can alternatively be viewed as Jackson networks.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 18:29:04 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Aug 2009 13:51:17 GMT"
},
{
"version": "v3",
"created": "Mon, 31 May 2010 08:51:15 GMT"
}
]
| 2010-06-01T00:00:00 | [
[
"Mairesse",
"Jean",
"",
"LIAFA"
],
[
"Nguyen",
"Hoang-Thach",
"",
"LIAFA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.3178 | Italo Dejter Prof | Italo J. Dejter | SQS-graphs of Solov'eva-Phelps codes | 14 pages, 15 tables | null | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A binary extended 1-perfect code $\mathcal C$ folds over its kernel via the
Steiner quadruple systems associated with its codewords. The resulting folding,
proposed as a graph invariant for $\mathcal C$, distinguishes among the 361
nonlinear codes $\mathcal C$ of kernel dimension $\kappa$ obtained via
Solov'eva-Phelps doubling construction, where $9\geq\kappa\geq 5$. Each of the
361 resulting graphs has most of its nonloop edges expressible in terms of
lexicographically ordered quarters of products of classes from extended
1-perfect partitions of length 8 (as classified by Phelps) and loops mostly
expressible in terms of the lines of the Fano plane.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 20:13:16 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Dejter",
"Italo J.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3191 | Tanmoy Chakraborty | Tanmoy Chakraborty, Zhiyi Huang, Sanjeev Khanna | Dynamic and Non-Uniform Pricing Strategies for Revenue Maximization | 23 pages, 0 figure | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the Item Pricing problem for revenue maximization in the limited
supply setting, where a single seller with $n$ items caters to $m$ buyers with
unknown subadditive valuation functions who arrive in a sequence. The seller
sets the prices on individual items. Each buyer buys a subset of yet unsold
items that maximizes her utility. Our goal is to design pricing strategies that
guarantee an expected revenue that is within a small factor $\alpha$ of the
maximum possible social welfare -- an upper bound on the maximum revenue that
can be generated. Most earlier work has focused on the unlimited supply
setting, where selling items to some buyer does not affect their availability
to the future buyers. Balcan et. al. (EC 2008) studied the limited supply
setting, giving a randomized strategy that assigns a single price to all items
(uniform strategy), and never changes it (static strategy), that gives an
$2^{O(\sqrt{\log n \log \log n})}$-approximation, and moreover, no static
uniform pricing strategy can give better than $2^{\Omega(\log^{1/4} n)}$-
approximation. We improve this lower bound to $2^{\Omega(sqrt{\log n})}$.
We consider dynamic uniform strategies, which can change the price upon the
arrival of each buyer but the price on all unsold items is the same at all
times, and static non-uniform strategies, which can assign different prices to
different items but can never change it after setting it initially. We design
such pricing strategies that give a poly-logarithmic approximation to maximum
revenue. Thus in the limited supply setting, our results highlight a strong
separation between the power of dynamic and non-uniform pricing versus static
uniform pricing. To our knowledge, this is the first non-trivial analysis of
dynamic and non-uniform pricing schemes for revenue maximization.
| [
{
"version": "v1",
"created": "Tue, 19 May 2009 22:15:12 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Chakraborty",
"Tanmoy",
""
],
[
"Huang",
"Zhiyi",
""
],
[
"Khanna",
"Sanjeev",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0905.3201 | Fainan Hanif | Muhammad Fainan Hanif, Peter J. Smith and Mansoor Shafi | On the Statistics of Cognitive Radio Capacity in Shadowing and Fast
Fading Environments | to appear in IEEE CrownCom 2009 Proc | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the capacity of the cognitive radio channel in a
fading environment under a "low interference regime". This capacity depends
critically on a power loss parameter, $\alpha$, which governs how much transmit
power the cognitive radio dedicates to relaying the primary message. We derive
a simple, accurate approximation to $\alpha$ which gives considerable insight
into system capacity. We also investigate the effects of system parameters and
propagation environment on $\alpha$ and the cognitive radio capacity. In all
cases, the use of the approximation is shown to be extremely accurate. Finally,
we derive the probability that the "low interference regime" holds and
demonstrate that this is the dominant case, especially in practical cognitive
radio deployment scenarios.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 07:05:54 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Hanif",
"Muhammad Fainan",
""
],
[
"Smith",
"Peter J.",
""
],
[
"Shafi",
"Mansoor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3245 | Lianlin Li Dr | Lianlin Li, Fang Li | Novel Algorithm for Sparse Solutions to Linear Inverse Problems with
Multiple Measurements | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this report, a novel efficient algorithm for recovery of jointly sparse
signals (sparse matrix) from multiple incomplete measurements has been
presented, in particular, the NESTA-based MMV optimization method. In a
nutshell, the jointly sparse recovery is obviously superior to applying
standard sparse reconstruction methods to each channel individually. Moreover
several efforts have been made to improve the NESTA-based MMV algorithm, in
particular, (1) the NESTA-based MMV algorithm for partially known support to
greatly improve the convergence rate, (2) the detection of partial (or all)
locations of unknown jointly sparse signals by using so-called MUSIC algorithm;
(3) the iterative NESTA-based algorithm by combing hard thresholding technique
to decrease the numbers of measurements. It has been shown that by using
proposed approach one can recover the unknown sparse matrix X with () Spark A
-sparsity from () Spark A measurements, predicted in Ref. [1], where the
measurement matrix denoted by A satisfies the so-called restricted isometry
property (RIP). Under a very mild condition on the sparsity of X and
characteristics of the A, the iterative hard threshold (IHT)-based MMV method
has been shown to be also a very good candidate.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 08:36:46 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Li",
"Lianlin",
""
],
[
"Li",
"Fang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3267 | Asim Ghosh | Asim Ghosh, Anindya Sundar Chakrabarti, Bikas K. Chakrabarti | Kolkata Paise Restaurant Problem in Some Uniform Learning Strategy
Limits | to be published in "Econophysics & Economics of Games, Social Choices
& Quantitative Techniques", Proc. Econophys-Kolkata IV, Springer, Milan
(2009) | null | null | null | cs.GT physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the dynamics of some uniform learning strategy limits or a
probabilistic version of the "Kolkata Paise Restaurant" problem, where N agents
choose among N equally priced but differently ranked restaurants every evening
such that each agent can get dinner in the best possible ranked restaurant
(each serving only one customer and the rest arriving there going without
dinner that evening). We consider the learning to be uniform among the agents
and assume that each follow the same probabilistic strategy dependent on the
information of the past successes in the game. The numerical results for
utilization of the restaurants in some limiting cases are analytically
examined.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 11:40:31 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Ghosh",
"Asim",
""
],
[
"Chakrabarti",
"Anindya Sundar",
""
],
[
"Chakrabarti",
"Bikas K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0905.3287 | Roberto Tonelli | Alessandro Murgia, Giulio Concas, Sandro Pinna, Roberto Tonelli, Ivana
Turnu | Empirical study of software quality evolution in open source projects
using agile practices | 12 pages, 6 figures 2 tables | null | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyse the time evolution of two open source Java projects: Eclipse and
Netbeans, both developed following agile practices, though to a different
extent. Our study is centered on quality analysis of the systems, measured as
defects absence, and its relation with software metrics evolution. The two
projects are described through a software graph in which nodes are represented
by Java files and edges describe the existing relation between nodes. We
propose a metrics suite for Java files based on Chidamber and Kemerer suite,
and use it to study software evolution and its relationship with bug count.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 13:29:25 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Murgia",
"Alessandro",
""
],
[
"Concas",
"Giulio",
""
],
[
"Pinna",
"Sandro",
""
],
[
"Tonelli",
"Roberto",
""
],
[
"Turnu",
"Ivana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0905.3296 | Roberto Tonelli | Alessandro Murgia, Giulio Concas, Michele Marchesi, Roberto Tonelli
and Ivana Turnu | An Analysis of Bug Distribution in Object Oriented Systems | 17 pages, 8 figures, 10 tables | null | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduced a new approach to describe Java software as graph, where nodes
represent a Java file - called compilation unit (CU) - and an edges represent a
relations between them. The software system is characterized by the degree
distribution of the graph properties, like in-or-out links, as well as by the
distribution of Chidamber and Kemerer metrics computed on its CUs. Every CU can
be related to one or more bugs during its life. We find a relationship among
the software system and the bugs hitting its nodes. We found that the
distribution of some metrics, and the number of bugs per CU, exhibit a
power-law behavior in their tails, as well as the number of CUs influenced by a
specific bug. We examine the evolution of software metrics across different
releases to understand how relationships among CUs metrics and CUs faultness
change with time.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 12:41:25 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Murgia",
"Alessandro",
""
],
[
"Concas",
"Giulio",
""
],
[
"Marchesi",
"Michele",
""
],
[
"Tonelli",
"Roberto",
""
],
[
"Turnu",
"Ivana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0905.3318 | Maarten Hijzelendoorn | Maarten Hijzelendoorn and Crit Cremers | An Object-Oriented and Fast Lexicon for Semantic Generation | Paper presented at the 18th Computational Linguistics In the
Netherlands Meeting (CLIN), Nijmegen, 10 December 2007, 15pp | null | null | null | cs.CL cs.DB cs.DS cs.IR cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is about the technical design of a large computational lexicon,
its storage, and its access from a Prolog environment. Traditionally, efficient
access and storage of data structures is implemented by a relational database
management system. In Delilah, a lexicon-based NLP system, efficient access to
the lexicon by the semantic generator is vital. We show that our highly
detailed HPSG-style lexical specifications do not fit well in the Relational
Model, and that they cannot be efficiently retrieved. We argue that they fit
more naturally in the Object-Oriented Model. Although storage of objects is
redundant, we claim that efficient access is still possible by applying
indexing, and compression techniques from the Relational Model to the
Object-Oriented Model. We demonstrate that it is possible to implement
object-oriented storage and fast access in ISO Prolog.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 14:12:42 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Hijzelendoorn",
"Maarten",
""
],
[
"Cremers",
"Crit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0905.3330 | Semen Kutateladze S | S.S. Kutateladze | The Game of Cipher Beads | The last data are inserted | J.Appl. Indust. Math., 2009, V.3, No.3, 364-366 | null | null | cs.DL math.HO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Comparison between the various impact factors of a few Russian journals
demonstrates the deficiencies of the popular citation indices.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 15:04:01 GMT"
},
{
"version": "v2",
"created": "Thu, 21 May 2009 09:47:37 GMT"
},
{
"version": "v3",
"created": "Wed, 29 Jul 2009 09:50:05 GMT"
}
]
| 2011-05-31T00:00:00 | [
[
"Kutateladze",
"S. S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.