id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0905.3347 | Paul Vitanyi | Paul M.B. Vitanyi | Information Distance in Multiples | LateX 14 pages, Submitted to a technical journal | null | null | null | cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information distance is a parameter-free similarity measure based on
compression, used in pattern recognition, data mining, phylogeny, clustering,
and classification. The notion of information distance is extended from pairs
to multiples (finite lists). We study maximal overlap, metricity, universality,
minimal overlap, additivity, and normalized information distance in multiples.
We use the theoretical notion of Kolmogorov complexity which for practical
purposes is approximated by the length of the compressed version of the file
involved, using a real-world compression program.
{\em Index Terms}-- Information distance, multiples, pattern recognition,
data mining, similarity, Kolmogorov complexity
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 16:37:16 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0905.3348 | Haris Aziz | Haris Aziz and Mike Paterson | False name manipulations in weighted voting games: splitting, merging
and annexation | Preprint of AAMAS 2009 (Eighth International Conference on Autonomous
Agents and Multiagent Systems) paper | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important aspect of mechanism design in social choice protocols and
multiagent systems is to discourage insincere and manipulative behaviour. We
examine the computational complexity of false-name manipulation in weighted
voting games which are an important class of coalitional voting games. Weighted
voting games have received increased interest in the multiagent community due
to their compact representation and ability to model coalitional formation
scenarios. Bachrach and Elkind in their AAMAS 2008 paper examined divide and
conquer false-name manipulation in weighted voting games from the point of view
of Shapley-Shubik index. We analyse the corresponding case of the Banzhaf index
and check how much the Banzhaf index of a player increases or decreases if it
splits up into sub-players. A pseudo-polynomial algorithm to find the optimal
split is also provided. Bachrach and Elkind also mentioned manipulation via
merging as an open problem. In the paper, we examine the cases where a player
annexes other players or merges with them to increase their Banzhaf index or
Shapley-Shubik index payoff. We characterize the computational complexity of
such manipulations and provide limits to the manipulation. The annexation
non-monotonicity paradox is also discovered in the case of the Banzhaf index.
The results give insight into coalition formation and manipulation.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 16:28:58 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Aziz",
"Haris",
""
],
[
"Paterson",
"Mike",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0905.3356 | Rom\`an R. Zapatrin | George Parfionov, Rom\`an Zapatrin | Memento Ludi: Information Retrieval from a Game-Theoretic Perspective | null | null | null | null | cs.IR cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a macro-model of information retrieval process using Game Theory
as a mathematical theory of conflicts. We represent the participants of the
Information Retrieval process as a game of two abstract players. The first
player is the `intellectual crowd' of users of search engines, the second is a
community of information retrieval systems. In order to apply Game Theory, we
treat search log data as Nash equilibrium strategies and solve the inverse
problem of finding appropriate payoff functions. For that, we suggest a
particular model, which we call Alpha model. Within this model, we suggest a
method, called shifting, which makes it possible to partially control the
behavior of massive users.
This Note is addressed to researchers in both game theory (providing a new
class of real life problems) and information retrieval, for whom we present new
techniques to control the IR environment.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 17:04:07 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Parfionov",
"George",
""
],
[
"Zapatrin",
"Romàn",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0905.3359 | Geoff Hollinger | Ath. Kehagias, G. Hollinger and A. Gelastopoulos | Searching the Nodes of a Graph: Theory and Algorithms | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One or more searchers must capture an invisible evader hiding in the nodes of
a graph. We study this graph search problem; we emphasize that we study the
capture of a node-located evader, which has received less attention than edge
search. We show that in general graphs the problem of node search is easier
than that of edge search (however node search is NP-complete, just like edge
search). We concentrate on the internal monotone connected (IMC) node search of
trees and show that it is essentially equivalent to IMC edge search. For IMC
node search on general graphs we present a new algorithm: GSST (Guaranteed
Search by Spanning Tree) which clears the graph G by performing all its
clearing moves along a spanning tree T of G. We prove the existence of
probabilistically complete variants of GSST. Our experiments also indicate that
GSST can efficiently node-clear large graphs given only a small running time.
An implementation of GSST is also provided and made publicly available.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 17:15:54 GMT"
}
]
| 2009-05-21T00:00:00 | [
[
"Kehagias",
"Ath.",
""
],
[
"Hollinger",
"G.",
""
],
[
"Gelastopoulos",
"A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.3360 | Ricardo Lopez-Ruiz | R. Lopez-Ruiz, A. Nagy, E. Romera and J. Sanudo | A Generalized Statistical Complexity Measure: Applications to Quantum
Systems | 15 pages, 3 figures | null | 10.1063/1.3274387 | null | quant-ph cs.IT math.IT nlin.AO physics.atom-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A two-parameter family of complexity measures $\tilde{C}^{(\alpha,\beta)}$
based on the R\'enyi entropies is introduced and characterized by a detailed
study of its mathematical properties. This family is the generalization of a
continuous version of the LMC complexity, which is recovered for $\alpha=1$ and
$\beta=2$. These complexity measures are obtained by multiplying two quantities
bringing global information on the probability distribution defining the
system. When one of the parameters, $\alpha$ or $\beta$, goes to infinity, one
of the global factors becomes a local factor. For this special case, the
complexity is calculated on different quantum systems: H-atom, harmonic
oscillator and square well.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 17:39:45 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Lopez-Ruiz",
"R.",
""
],
[
"Nagy",
"A.",
""
],
[
"Romera",
"E.",
""
],
[
"Sanudo",
"J.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "physics.atom-ph",
"description": "Atomic and molecular structure, spectra, collisions, and data. Atoms and molecules in external fields. Molecular dynamics and coherent and optical control. Cold atoms and molecules. Cold collisions. Optical lattices.",
"span": "(Atomic Physics)"
}
]
|
0905.3369 | John Langford | John Langford, Ruslan Salakhutdinov, and Tong Zhang | Learning Nonlinear Dynamic Models | null | null | null | null | cs.AI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a novel approach for learning nonlinear dynamic models, which
leads to a new set of tools capable of solving problems that are otherwise
difficult. We provide theory showing this new approach is consistent for models
with long range structure, and apply the approach to motion capture and
high-dimensional video data, yielding results superior to standard
alternatives.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 18:08:18 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 20:29:16 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Langford",
"John",
""
],
[
"Salakhutdinov",
"Ruslan",
""
],
[
"Zhang",
"Tong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0905.3378 | Marko A. Rodriguez | Marko A. Rodriguez | Interpretations of the Web of Data | null | Data Management in the Semantic Web, eds. H. Jin and Z. Lv,
series: Distributed, Cluster and Grid Computing, pp. 1-37, Nova Publishing,
ISBN:978-1-61324-760-0, 2011 | null | LA-UR-09-03344 | cs.AI cs.DL | http://creativecommons.org/licenses/publicdomain/ | The emerging Web of Data utilizes the web infrastructure to represent and
interrelate data. The foundational standards of the Web of Data include the
Uniform Resource Identifier (URI) and the Resource Description Framework (RDF).
URIs are used to identify resources and RDF is used to relate resources. While
RDF has been posited as a logic language designed specifically for knowledge
representation and reasoning, it is more generally useful if it can
conveniently support other models of computing. In order to realize the Web of
Data as a general-purpose medium for storing and processing the world's data,
it is necessary to separate RDF from its logic language legacy and frame it
simply as a data model. Moreover, there is significant advantage in seeing the
Semantic Web as a particular interpretation of the Web of Data that is focused
specifically on knowledge representation and reasoning. By doing so, other
interpretations of the Web of Data are exposed that realize RDF in different
capacities and in support of different computing models.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 19:48:10 GMT"
},
{
"version": "v2",
"created": "Thu, 21 May 2009 03:38:16 GMT"
}
]
| 2011-08-05T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0905.3407 | Long Gao | Long Gao, Rui Zhang, Changchuan Yin, and Shuguang Cui | Throughput and Delay Scaling in Supportive Two-Tier Networks | 13 pages, double-column, 6 figures, accepted for publication in JSAC
2011 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a wireless network that has two tiers with different priorities: a
primary tier vs. a secondary tier, which is an emerging network scenario with
the advancement of cognitive radio technologies. The primary tier consists of
randomly distributed legacy nodes of density $n$, which have an absolute
priority to access the spectrum. The secondary tier consists of randomly
distributed cognitive nodes of density $m=n^\beta$ with $\beta\geq 2$, which
can only access the spectrum opportunistically to limit the interference to the
primary tier. Based on the assumption that the secondary tier is allowed to
route the packets for the primary tier, we investigate the throughput and delay
scaling laws of the two tiers in the following two scenarios: i) the primary
and secondary nodes are all static; ii) the primary nodes are static while the
secondary nodes are mobile. With the proposed protocols for the two tiers, we
show that the primary tier can achieve a per-node throughput scaling of
$\lambda_p(n)=\Theta(1/\log n)$ in the above two scenarios. In the associated
delay analysis for the first scenario, we show that the primary tier can
achieve a delay scaling of $D_p(n)=\Theta(\sqrt{n^\beta\log n}\lambda_p(n))$
with $\lambda_p(n)=O(1/\log n)$. In the second scenario, with two mobility
models considered for the secondary nodes: an i.i.d. mobility model and a
random walk model, we show that the primary tier can achieve delay scaling laws
of $\Theta(1)$ and $\Theta(1/S)$, respectively, where $S$ is the random walk
step size. The throughput and delay scaling laws for the secondary tier are
also established, which are the same as those for a stand-alone network.
| [
{
"version": "v1",
"created": "Wed, 20 May 2009 22:01:29 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jun 2009 21:21:22 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Feb 2011 07:38:30 GMT"
},
{
"version": "v4",
"created": "Tue, 18 Oct 2011 22:08:02 GMT"
}
]
| 2011-10-20T00:00:00 | [
[
"Gao",
"Long",
""
],
[
"Zhang",
"Rui",
""
],
[
"Yin",
"Changchuan",
""
],
[
"Cui",
"Shuguang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3428 | Umaa Rebbapragada | Umaa Rebbapragada, Pavlos Protopapas, Carla E. Brodley, Charles Alcock | Finding Anomalous Periodic Time Series: An Application to Catalogs of
Periodic Variable Stars | null | Machine Learning 74:281,2009 | 10.1007/s10994-008-5093-3 | null | cs.LG astro-ph.IM physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Catalogs of periodic variable stars contain large numbers of periodic
light-curves (photometric time series data from the astrophysics domain).
Separating anomalous objects from well-known classes is an important step
towards the discovery of new classes of astronomical objects. Most anomaly
detection methods for time series data assume either a single continuous time
series or a set of time series whose periods are aligned. Light-curve data
precludes the use of these methods as the periods of any given pair of
light-curves may be out of sync. One may use an existing anomaly detection
method if, prior to similarity calculation, one performs the costly act of
aligning two light-curves, an operation that scales poorly to massive data
sets. This paper presents PCAD, an unsupervised anomaly detection method for
large sets of unsynchronized periodic time-series data, that outputs a ranked
list of both global and local anomalies. It calculates its anomaly score for
each light-curve in relation to a set of centroids produced by a modified
k-means clustering algorithm. Our method is able to scale to large data sets
through the use of sampling. We validate our method on both light-curve data
and other time series data sets. We demonstrate its effectiveness at finding
known anomalies, and discuss the effect of sample size and number of centroids
on our results. We compare our method to naive solutions and existing time
series anomaly detection methods for unphased data, and show that PCAD's
reported anomalies are comparable to or better than all other methods. Finally,
astrophysicists on our team have verified that PCAD finds true anomalies that
might be indicative of novel astrophysical phenomena.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 03:05:38 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Rebbapragada",
"Umaa",
""
],
[
"Protopapas",
"Pavlos",
""
],
[
"Brodley",
"Carla E.",
""
],
[
"Alcock",
"Charles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0905.3429 | Aaron Roth | Moshe Babaioff, Liad Blumrosen, Aaron L. Roth | Auctions with Online Supply | null | null | null | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of selling identical goods to n unit-demand bidders in a
setting in which the total supply of goods is unknown to the mechanism. Items
arrive dynamically, and the seller must make the allocation and payment
decisions online with the goal of maximizing social welfare. We consider two
models of unknown supply: the adversarial supply model, in which the mechanism
must produce a welfare guarantee for any arbitrary supply, and the stochastic
supply model, in which supply is drawn from a distribution known to the
mechanism, and the mechanism need only provide a welfare guarantee in
expectation.
Our main result is a separation between these two models. We show that all
truthful mechanisms, even randomized, achieve a diminishing fraction of the
optimal social welfare (namely, no better than a Omega(loglog n) approximation)
in the adversarial setting. In sharp contrast, in the stochastic model, under a
standard monotone hazard-rate condition, we present a truthful mechanism that
achieves a constant approximation. We show that the monotone hazard rate
condition is necessary, and also characterize a natural subclass of truthful
mechanisms in our setting, the set of online-envy-free mechanisms. All of the
mechanisms we present fall into this class, and we prove almost optimal lower
bounds for such mechanisms. Since auctions with unknown supply are regularly
run in many online-advertising settings, our main results emphasize the
importance of considering distributional information in the design of auctions
in such environments.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 03:12:19 GMT"
}
]
| 2009-05-22T00:00:00 | [
[
"Babaioff",
"Moshe",
""
],
[
"Blumrosen",
"Liad",
""
],
[
"Roth",
"Aaron L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.3432 | Francisco Carvalho-Junior Dr | Francisco Heron de Carvalho-Junior, Rafael Dueire Lins | A Type System for Parallel Components | Submitted to SBLP 2009 (Brazilian Symposium on Programming Languages) | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The # component model was proposed to improve the practice of parallel
programming. This paper introduces a type system for # programming systems,
aiming to lift the abstraction and safety of programming for parallel computing
architectures by introducing a notion of abstract component based on universal
and existential bounded quantification. Issues about the implementation of such
type system in HPE, a # programming system, are also discussed.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 03:35:52 GMT"
}
]
| 2009-05-22T00:00:00 | [
[
"de Carvalho-Junior",
"Francisco Heron",
""
],
[
"Lins",
"Rafael Dueire",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0905.3434 | Rui Zhang | Rui Zhang, John M. Cioffi | Exploiting Opportunistic Multiuser Detection in Decentralized Multiuser
MIMO Systems | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the design of a decentralized multiuser multi-antenna
(MIMO) system for spectrum sharing over a fixed narrow band, where the
coexisting users independently update their transmit covariance matrices for
individual transmit-rate maximization via an iterative manner. This design
problem was usually investigated in the literature by assuming that each user
treats the co-channel interference from all the other users as additional
(colored) noise at the receiver, i.e., the conventional single-user decoder
(SUD) is applied. This paper proposes a new decoding method for the
decentralized multiuser MIMO system, whereby each user opportunistically
cancels the co-channel interference from some or all of the other users via
applying multiuser detection techniques, thus termed opportunistic multiuser
detection (OMD). This paper studies the optimal transmit covariance design for
users' iterative maximization of individual transmit rates with the proposed
OMD, and demonstrates the resulting capacity gains in decentralized multiuser
MIMO systems against the conventional SUD.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 04:11:31 GMT"
}
]
| 2009-05-22T00:00:00 | [
[
"Zhang",
"Rui",
""
],
[
"Cioffi",
"John M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3436 | Rui Zhang | Rui Zhang | On Active Learning and Supervised Transmission of Spectrum Sharing Based
Cognitive Radios by Exploiting Hidden Primary Radio Feedback | accepted in IEEE Transactions on Communications, June 2010 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the wireless spectrum sharing between a pair of
distributed primary radio (PR) and cognitive radio (CR) links. Assuming that
the PR link adapts its transmit power and/or rate upon receiving an
interference signal from the CR and such transmit adaptations are observable by
the CR, this results in a new form of feedback from the PR to CR, refereed to
as hidden PR feedback, whereby the CR learns the PR's strategy for transmit
adaptations without the need of a dedicated feedback channel from the PR. In
this paper, we exploit the hidden PR feedback to design new learning and
transmission schemes for spectrum sharing based CRs, namely active learning and
supervised transmission. For active learning, the CR initiatively sends a
probing signal to interfere with the PR, and from the observed PR transmit
adaptations the CR estimates the channel gain from its transmitter to the PR
receiver, which is essential for the CR to control its interference to the PR
during the subsequent data transmission. This paper proposes a new transmission
protocol for the CR to implement the active learning and the solutions to deal
with various practical issues for implementation, such as time synchronization,
rate estimation granularity, power measurement noise, and channel variation.
Furthermore, with the acquired knowledge from active learning, the CR designs a
supervised data transmission by effectively controlling the interference powers
both to and from the PR, so as to achieve the optimum performance tradeoffs for
the PR and CR links. Numerical results are provided to evaluate the
effectiveness of the proposed schemes for CRs under different system setups.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 04:18:42 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Jun 2010 09:21:38 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Zhang",
"Rui",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3454 | Fabian Kuhn | Fabian Kuhn and Rotem Oshman | Gradient Clock Synchronization using Reference Broadcasts | 21 page, 2 figures | null | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we suggest a method by which reference broadcast
synchronization (RBS), and other methods of estimating clock values, can be
incorporated in standard clock synchronization algorithms to improve
synchronization quality. We advocate a logical separation of the task of
estimating the clock values of other nodes in the network from the task of
using these estimates to output a logical clock value.
The separation is achieved by means of a virtual estimate graph, overlaid on
top of the real network graph, which represents the information various nodes
can obtain about each other. RBS estimates are represented in the estimate
graph as edges between nodes at distance 2 from each other in the original
network graph. A clock synchronization algorithm then operates on the estimate
graph as though it were the original network.
To illustrate the merits of this approach, we modify a recent optimal
gradient clock synchronization algorithm to work in this setting. The modified
algorithm transparently takes advantage of RBS estimates and any other means by
which nodes can estimate each others' clock values.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 19:52:01 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Kuhn",
"Fabian",
""
],
[
"Oshman",
"Rotem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.3487 | Vadim E. Levit | Vadim E. Levit and Eugen Mandrescu | A Simple Proof of an Inequality Connecting the Alternating Number of
Independent Sets and the Decycling Number | 4 pages | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If alpha=alpha(G) is the maximum size of an independent set and s_{k} equals
the number of stable sets of cardinality k in graph G, then
I(G;x)=s_{0}+s_{1}x+...+s_{alpha}x^{alpha} is the independence polynomial of G.
In this paper we provide an elementary proof of the inequality claiming that
the absolute value of I(G;-1) is not greater than 2^phi(G), for every graph G,
where phi(G) is its decycling number.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 13:15:37 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.3527 | Shu Tanaka | Kenichi Kurihara, Shu Tanaka, and Seiji Miyashita | Quantum Annealing for Clustering | 8 pages, 6 figures, Proceedings of the 25th Conference on Uncertainty
in Artificial Intelligence (UAI 2009) accepted | null | null | null | cond-mat.dis-nn cond-mat.stat-mech cs.LG quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies quantum annealing (QA) for clustering, which can be seen
as an extension of simulated annealing (SA). We derive a QA algorithm for
clustering and propose an annealing schedule, which is crucial in practice.
Experiments show the proposed QA algorithm finds better clustering assignments
than SA. Furthermore, QA is as easy as SA to implement.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 17:01:12 GMT"
},
{
"version": "v2",
"created": "Thu, 28 May 2009 15:36:23 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Kurihara",
"Kenichi",
""
],
[
"Tanaka",
"Shu",
""
],
[
"Miyashita",
"Seiji",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0905.3528 | Shu Tanaka | Issei Sato, Kenichi Kurihara, Shu Tanaka, Hiroshi Nakagawa, and Seiji
Miyashita | Quantum Annealing for Variational Bayes Inference | 9 pages, 4 figures, Proceedings of the 25th Conference on Uncertainty
in Artificial Intelligence (UAI 2009) accepted | null | null | null | cond-mat.dis-nn cond-mat.stat-mech cs.LG quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents studies on a deterministic annealing algorithm based on
quantum annealing for variational Bayes (QAVB) inference, which can be seen as
an extension of the simulated annealing for variational Bayes (SAVB) inference.
QAVB is as easy as SAVB to implement. Experiments revealed QAVB finds a better
local optimum than SAVB in terms of the variational free energy in latent
Dirichlet allocation (LDA).
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 17:01:28 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2009 17:45:45 GMT"
},
{
"version": "v3",
"created": "Thu, 28 May 2009 15:44:30 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Sato",
"Issei",
""
],
[
"Kurihara",
"Kenichi",
""
],
[
"Tanaka",
"Shu",
""
],
[
"Nakagawa",
"Hiroshi",
""
],
[
"Miyashita",
"Seiji",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0905.3548 | Dusko Pavlovic | Dusko Pavlovic | A semantical approach to equilibria and rationality | 18 pages; Proceedings of CALCO 2009 | null | 10.1007/978-3-642-03741-2_22 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Game theoretic equilibria are mathematical expressions of rationality.
Rational agents are used to model not only humans and their software
representatives, but also organisms, populations, species and genes,
interacting with each other and with the environment. Rational behaviors are
achieved not only through conscious reasoning, but also through spontaneous
stabilization at equilibrium points.
Formal theories of rationality are usually guided by informal intuitions,
which are acquired by observing some concrete economic, biological, or network
processes. Treating such processes as instances of computation, we reconstruct
and refine some basic notions of equilibrium and rationality from the some
basic structures of computation.
It is, of course, well known that equilibria arise as fixed points; the point
is that semantics of computation of fixed points seems to be providing novel
methods, algebraic and coalgebraic, for reasoning about them.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 19:36:11 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Pavlovic",
"Dusko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0905.3564 | Cristian Constantin Lalescu | Cristian Constantin Lalescu | Two hierarchies of spline interpolations. Practical algorithms for
multivariate higher order splines | null | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A systematic construction of higher order splines using two hierarchies of
polynomials is presented. Explicit instructions on how to implement one of
these hierarchies are given. The results are limited to interpolations on
regular, rectangular grids, but an approach to other types of grids is also
discussed.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 20:58:46 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Lalescu",
"Cristian Constantin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0905.3569 | Christophe Paoli | Cyril Voyant, Marc Muselli, Christophe Paoli, Marie Laure Nivet and
Philippe Poggi | Predictability of PV power grid performance on insular sites without
weather stations: use of artificial neural networks | 4 pages, 3 figures, 24th European Photovoltaic Solar Energy
Conference | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The official meteorological network is poor on the island of Corsica: only
three sites being about 50 km apart are equipped with pyranometers which enable
measurements by hourly and daily step. These sites are Ajaccio (seaside),
Bastia (seaside) and Corte (average altitude of 486 meters). This lack of
weather station makes difficult the predictability of PV power grid
performance. This work intends to study a methodology which can predict global
solar irradiation using data available from another location for daily and
hourly horizon. In order to achieve this prediction, we have used Artificial
Neural Network which is a popular artificial intelligence technique in the
forecasting domain. A simulator has been obtained using data available for the
station of Ajaccio that is the only station for which we have a lot of data: 16
years from 1972 to 1987. Then we have tested the efficiency of this simulator
in two places with different geographical features: Corte, a mountainous region
and Bastia, a coastal region. On daily horizon, the relocation has implied
fewer errors than a naive prediction method based on the persistence (RMSE=1468
Vs 1383Wh/m2 to Bastia and 1325 Vs 1213Wh/m2 to Corte). On hourly case, the
results were still satisfactory, and widely better than persistence (RMSE=138.8
Vs 109.3 Wh/m2 to Bastia and 135.1 Vs 114.7 Wh/m2 to Corte). The last
experiment was to evaluate the accuracy of our simulator on a PV power grid
localized at 10 km from the station of Ajaccio. We got errors very suitable
(nRMSE=27.9%, RMSE=99.0 W.h) compared to those obtained with the persistence
(nRMSE=42.2%, RMSE=149.7 W.h).
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 21:34:41 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Voyant",
"Cyril",
""
],
[
"Muselli",
"Marc",
""
],
[
"Paoli",
"Christophe",
""
],
[
"Nivet",
"Marie Laure",
""
],
[
"Poggi",
"Philippe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.3582 | Yoshiharu Maeno | Yoshiharu Maeno | Profiling of a network behind an infectious disease outbreak | null | Physica A vol.389, pp.4755-4768 (2010) | 10.1016/j.physa.2010.07.014 | null | cs.AI q-bio.PE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Stochasticity and spatial heterogeneity are of great interest recently in
studying the spread of an infectious disease. The presented method solves an
inverse problem to discover the effectively decisive topology of a
heterogeneous network and reveal the transmission parameters which govern the
stochastic spreads over the network from a dataset on an infectious disease
outbreak in the early growth phase. Populations in a combination of
epidemiological compartment models and a meta-population network model are
described by stochastic differential equations. Probability density functions
are derived from the equations and used for the maximal likelihood estimation
of the topology and parameters. The method is tested with computationally
synthesized datasets and the WHO dataset on SARS outbreak.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 23:19:41 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2009 10:35:14 GMT"
},
{
"version": "v3",
"created": "Fri, 29 Jan 2010 08:52:00 GMT"
},
{
"version": "v4",
"created": "Wed, 31 Mar 2010 03:17:35 GMT"
},
{
"version": "v5",
"created": "Mon, 14 Jun 2010 14:06:11 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Maeno",
"Yoshiharu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
]
|
0905.3584 | Pat Morin | Luc Devroye, Joachim Gudmundsson, Pat Morin | On the Expected Maximum Degree of Gabriel and Yao Graphs | 20 pages, 10 figures | null | null | null | cs.CG cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Motivated by applications of Gabriel graphs and Yao graphs in wireless ad-hoc
networks, we show that the maximal degree of a random Gabriel graph or Yao
graph defined on $n$ points drawn uniformly at random from a unit square grows
as $\Theta (\log n / \log \log n)$ in probability.
| [
{
"version": "v1",
"created": "Thu, 21 May 2009 23:56:40 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Devroye",
"Luc",
""
],
[
"Gudmundsson",
"Joachim",
""
],
[
"Morin",
"Pat",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0905.3587 | James P. Crutchfield | Christopher J. Ellison, John R. Mahoney, James P. Crutchfield | Prediction, Retrodiction, and The Amount of Information Stored in the
Present | 17 pages, 7 figures, 1 table;
http://users.cse.ucdavis.edu/~cmg/compmech/pubs/pratisp.htm | null | 10.1007/s10955-009-9808-z | null | cond-mat.stat-mech cond-mat.dis-nn cs.IT math.IT physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an ambidextrous view of stochastic dynamical systems, comparing
their forward-time and reverse-time representations and then integrating them
into a single time-symmetric representation. The perspective is useful
theoretically, computationally, and conceptually. Mathematically, we prove that
the excess entropy--a familiar measure of organization in complex systems--is
the mutual information not only between the past and future, but also between
the predictive and retrodictive causal states. Practically, we exploit the
connection between prediction and retrodiction to directly calculate the excess
entropy. Conceptually, these lead one to discover new system invariants for
stochastic dynamical systems: crypticity (information accessibility) and causal
irreversibility. Ultimately, we introduce a time-symmetric representation that
unifies all these quantities, compressing the two directional representations
into one. The resulting compression offers a new conception of the amount of
information stored in the present.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 00:57:21 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Ellison",
"Christopher J.",
""
],
[
"Mahoney",
"John R.",
""
],
[
"Crutchfield",
"James P.",
""
]
]
| [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0905.3602 | Fainan Hanif | Muhammad Fainan Hanif and Peter J. Smith | Level Crossing Rates of Interference in Cognitive Radio Networks | submitted to the IEEE Transactions on Wireless Communications | IEEE Transactions on Wireless Communications, vol.9, no.4,
pp.1283-1287, 2010 | 10.1109/TWC.2010.04.090749 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The future deployment of cognitive radios is critically dependent on the fact
that the incumbent primary user system must remain as oblivious as possible to
their presence. This in turn heavily relies on the fluctuations of the
interfering cognitive radio signals. In this letter we compute the level
crossing rates of the cumulative interference created by the cognitive radios.
We derive analytical formulae for the level crossing rates in Rayleigh and
Rician fast fading conditions. We approximate Rayleigh and Rician level
crossing rates using fluctuation rates of gamma and scaled noncentral $\chi^2$
processes respectively. The analytical results and the approximations used in
their derivations are verified by Monte Carlo simulations and the analysis is
applied to a particular CR allocation strategy.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 04:06:43 GMT"
}
]
| 2013-01-03T00:00:00 | [
[
"Hanif",
"Muhammad Fainan",
""
],
[
"Smith",
"Peter J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3640 | Mattheos Protopapas | Mattheos K. Protopapas, Elias B. Kosmatopoulos, Francesco Battaglia | Coevolutionary Genetic Algorithms for Establishing Nash Equilibrium in
Symmetric Cournot Games | 18 pages, 4 figures | Advances in Decision Sciences, vol. 2010, Article ID 573107 | 10.1155/2010/573107 | null | cs.GT cs.LG | http://creativecommons.org/licenses/by/3.0/ | We use co-evolutionary genetic algorithms to model the players' learning
process in several Cournot models, and evaluate them in terms of their
convergence to the Nash Equilibrium. The "social-learning" versions of the two
co-evolutionary algorithms we introduce, establish Nash Equilibrium in those
models, in contrast to the "individual learning" versions which, as we see
here, do not imply the convergence of the players' strategies to the Nash
outcome. When players use "canonical co-evolutionary genetic algorithms" as
learning algorithms, the process of the game is an ergodic Markov Chain, and
therefore we analyze simulation results using both the relevant methodology and
more general statistical tests, to find that in the "social" case, states
leading to NE play are highly frequent at the stationary distribution of the
chain, in contrast to the "individual learning" case, when NE is not reached at
all in our simulations; to find that the expected Hamming distance of the
states at the limiting distribution from the "NE state" is significantly
smaller in the "social" than in the "individual learning case"; to estimate the
expected time that the "social" algorithms need to get to the "NE state" and
verify their robustness and finally to show that a large fraction of the games
played are indeed at the Nash Equilibrium.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 19:07:21 GMT"
}
]
| 2010-05-13T00:00:00 | [
[
"Protopapas",
"Mattheos K.",
""
],
[
"Kosmatopoulos",
"Elias B.",
""
],
[
"Battaglia",
"Francesco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0905.3668 | Balder ten Cate | Johan van Benthem, Balder ten Cate, Jouko Vaananen | Lindstrom theorems for fragments of first-order logic | Appears in Logical Methods in Computer Science (LMCS) | Logical Methods in Computer Science, Volume 5, Issue 3 (August 3,
2009) lmcs:895 | 10.2168/LMCS-5(3:3)2009 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Lindstr\"om theorems characterize logics in terms of model-theoretic
conditions such as Compactness and the L\"owenheim-Skolem property. Most
existing characterizations of this kind concern extensions of first-order
logic. But on the other hand, many logics relevant to computer science are
fragments or extensions of fragments of first-order logic, e.g., k-variable
logics and various modal logics. Finding Lindstr\"om theorems for these
languages can be challenging, as most known techniques rely on coding arguments
that seem to require the full expressive power of first-order logic. In this
paper, we provide Lindstr\"om theorems for several fragments of first-order
logic, including the k-variable fragments for k>2, Tarski's relation algebra,
graded modal logic, and the binary guarded fragment. We use two different proof
techniques. One is a modification of the original Lindstr\"om proof. The other
involves the modal concepts of bisimulation, tree unraveling, and finite depth.
Our results also imply semantic preservation theorems.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 12:10:07 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 09:39:35 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"van Benthem",
"Johan",
""
],
[
"Cate",
"Balder ten",
""
],
[
"Vaananen",
"Jouko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.3678 | Vadim Madgazin | Vadim R. Madgazin | Major and minor. The formula of musical emotions | 22 pages, 3 figures, in Russian, added figures, changed content | null | null | null | cs.SD q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The new formulas, which determine sign and amplitude of utilitarian emotions,
are proposed on the basis of the information theory of emotions. In area of
perception of musical chords the force of emotions depends on the relative
pitch of sounds of major and minor chords.
Is advanced hypothesis that in the perception of a musical chord in the
psyche caused by the subject value of some objective function L. This function
is expressed directly through the proportion of the pitch of chord. Major
chords are expressed as the straight proportions, which generate idea about an
increase in the objective function (L>1) and are caused positive utilitarian
emotions. Minor chords are expressed as the inverse proportion, which generate
idea about the decrease of objective function (L<1) and are caused negative
utilitarian emotions.
The formula of musical emotions is advanced: Pwe = log(L) =
(1/M)*log(n1*n2*n3* ... *nM), where M is a quantity of voices of chord, ni -
integer number (or reciprocal fraction) from the pitch proportion, which
corresponds to the i-th voice of chord.
Confined experimental check is produced. The limits of the applicability of
the formula of musical emotions are investigated.
Keywords: sound, music, chord, major, minor, emotions, the formula of musical
emotions, the information theory of emotions.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 13:40:36 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jul 2009 10:57:50 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Sep 2009 11:19:59 GMT"
}
]
| 2009-09-01T00:00:00 | [
[
"Madgazin",
"Vadim R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
]
|
0905.3689 | Nihar Jindal | Mari Kobayashi, Nihar Jindal, Giuseppe Caire | Optimized Training and Feedback for MIMO Downlink Channels | To appear at IEEE Information Theory Workshop, Volos, Greece, June
2009 | null | 10.1109/ITWNIT.2009.5158576 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a MIMO fading broadcast channel where channel state information
is acquired at user terminals via downlink training and channel feedback is
used to provide transmitter channel state information (CSIT) to the base
station. The feedback channel (the corresponding uplink) is modeled as an AWGN
channel, orthogonal across users. The total bandwidth consumed is the sum of
the bandwidth/resources used for downlink training, channel feedback, and data
transmission. Assuming that the channel follows a block fading model and that
zeroforcing beamforming is used, we optimize the net achievable rate for
unquantized (analog) and quantized (digital) channel feedback. The optimal
number of downlink training pilots is seen to be essentially the same for both
feedback techniques, but digital feedback is shown to provide a larger net rate
than analog feedback.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 14:24:39 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Kobayashi",
"Mari",
""
],
[
"Jindal",
"Nihar",
""
],
[
"Caire",
"Giuseppe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3709 | Rustam Tagiew | Rustam Tagiew | Towards Barter Double Auction as Model for Bilateral Social Cooperations | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The idea of this paper is an advanced game concept. This concept is expected
to model non-monetary bilateral cooperations between self-interested agents.
Such non-monetary cases are social cooperations like allocation of high level
jobs or sexual relationships among humans. In a barter double auction, there is
a big amount of agents. Every agent has a vector of parameters which specifies
his demand and a vector which specifies his offer. Two agents can achieve a
commitment through barter exchange. The subjective satisfaction level (a number
between 0% and 100%) of an agent is as high as small is the distance between
his demand and the accepted offer. This paper introduces some facets of this
complex game concept.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 15:39:19 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Tagiew",
"Rustam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0905.3713 | Limin Xiang | Limin Xiang | A formal proof of the four color theorem | 9 pages, 2 Figures | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A formal proof has not been found for the four color theorem since 1852 when
Francis Guthrie first conjectured the four color theorem. Why? A bad idea, we
think, directed people to a rough road. Using a similar method to that for the
formal proof of the five color theorem, a formal proof is proposed in this
paper of the four color theorem, namely, every planar graph is four-colorable.
The formal proof proposed can also be regarded as an algorithm to color a
planar graph using four colors so that no two adjacent vertices receive the
same color.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 15:57:26 GMT"
},
{
"version": "v2",
"created": "Wed, 27 May 2009 09:44:28 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Xiang",
"Limin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.3715 | Anil Hirani | Evan VanderZee, Anil N. Hirani, Vadim Zharnitsky, Damrong Guoy | A Dihedral Acute Triangulation of the Cube | Minor edits for journal version. Added some material to the
introduction | null | null | null | cs.CG math.MG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that there exists a dihedral acute triangulation of the
three-dimensional cube. The method of constructing the acute triangulation is
described, and symmetries of the triangulation are discussed.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 18:45:05 GMT"
},
{
"version": "v2",
"created": "Tue, 26 May 2009 19:20:04 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Jun 2009 18:11:22 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Aug 2009 19:52:02 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"VanderZee",
"Evan",
""
],
[
"Hirani",
"Anil N.",
""
],
[
"Zharnitsky",
"Vadim",
""
],
[
"Guoy",
"Damrong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
]
|
0905.3720 | Toby Walsh | Toby Walsh | Where are the really hard manipulation problems? The phase transition in
manipulating the veto rule | Proceedings of the Twenty-first International Joint Conference on
Artificial Intelligence (IJCAI-09) | IJCAI-2009 | null | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Voting is a simple mechanism to aggregate the preferences of agents. Many
voting rules have been shown to be NP-hard to manipulate. However, a number of
recent theoretical results suggest that this complexity may only be in the
worst-case since manipulation is often easy in practice. In this paper, we show
that empirical studies are useful in improving our understanding of this issue.
We demonstrate that there is a smooth transition in the probability that a
coalition can elect a desired candidate using the veto rule as the size of the
manipulating coalition increases. We show that a rescaled probability curve
displays a simple and universal form independent of the size of the problem. We
argue that manipulation of the veto rule is asymptotically easy for many
independent and identically distributed votes even when the coalition of
manipulators is critical in size. Based on this argument, we identify a
situation in which manipulation is computationally hard. This is when votes are
highly correlated and the election is "hung". We show, however, that even a
single uncorrelated voter is enough to make manipulation easy again.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 16:26:53 GMT"
}
]
| 2009-05-25T00:00:00 | [
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.3733 | Christian Koller | Christian Koller, Alexandre Graell i Amat, Joerg Kliewer, Daniel J.
Costello Jr | Trapping Set Enumerators for Repeat Multiple Accumulate Code Ensembles | 5 pages, to appear in proc. IEEE ISIT, June 2009 | null | 10.1109/ISIT.2009.5205355 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The serial concatenation of a repetition code with two or more accumulators
has the advantage of a simple encoder structure. Furthermore, the resulting
ensemble is asymptotically good and exhibits minimum distance growing linearly
with block length. However, in practice these codes cannot be decoded by a
maximum likelihood decoder, and iterative decoding schemes must be employed.
For low-density parity-check codes, the notion of trapping sets has been
introduced to estimate the performance of these codes under iterative message
passing decoding. In this paper, we present a closed form finite length
ensemble trapping set enumerator for repeat multiple accumulate codes by
creating a trellis representation of trapping sets. We also obtain the
asymptotic expressions when the block length tends to infinity and evaluate
them numerically.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 17:40:16 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Koller",
"Christian",
""
],
[
"Amat",
"Alexandre Graell i",
""
],
[
"Kliewer",
"Joerg",
""
],
[
"Costello",
"Daniel J.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3755 | Toby Walsh | Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy
Quimper and Toby Walsh | Decompositions of All Different, Global Cardinality and Related
Constraints | Proceedings of the Twenty-first International Joint Conference on
Artificial Intelligence (IJCAI-09) | IJCAI-2009 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that some common and important global constraints like ALL-DIFFERENT
and GCC can be decomposed into simple arithmetic constraints on which we
achieve bound or range consistency, and in some cases even greater pruning.
These decompositions can be easily added to new solvers. They also provide
other constraints with access to the state of the propagator by sharing of
variables. Such sharing can be used to improve propagation between constraints.
We report experiments with our decomposition in a pseudo-Boolean solver.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 20:45:30 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Bessiere",
"Christian",
""
],
[
"Katsirelos",
"George",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Quimper",
"Claude-Guy",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.3757 | Toby Walsh | Christian Bessiere, George Katsirelos, Nina Narodytska and Toby Walsh | Circuit Complexity and Decompositions of Global Constraints | Proceedings of the Twenty-first International Joint Conference on
Artificial Intelligence (IJCAI-09). Old file included deleted | IJCAI-2009 | null | null | cs.AI cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that tools from circuit complexity can be used to study
decompositions of global constraints. In particular, we study decompositions of
global constraints into conjunctive normal form with the property that unit
propagation on the decomposition enforces the same level of consistency as a
specialized propagation algorithm. We prove that a constraint propagator has a
a polynomial size decomposition if and only if it can be computed by a
polynomial size monotone Boolean circuit. Lower bounds on the size of monotone
Boolean circuits thus translate to lower bounds on the size of decompositions
of global constraints. For instance, we prove that there is no polynomial sized
decomposition of the domain consistency propagator for the ALLDIFFERENT
constraint.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 21:06:04 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Bessiere",
"Christian",
""
],
[
"Katsirelos",
"George",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.3763 | Toby Walsh | Suresh Manandhar, Armagan Tarim, Toby Walsh | Scenario-based Stochastic Constraint Programming | Proceedings of the Eighteenth International Joint Conference on
Artificial Intelligence (IJCAI-03) | IJCAI 2003: 257-262 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To model combinatorial decision problems involving uncertainty and
probability, we extend the stochastic constraint programming framework proposed
in [Walsh, 2002] along a number of important dimensions (e.g. to multiple
chance constraints and to a range of new objectives). We also provide a new
(but equivalent) semantics based on scenarios. Using this semantics, we can
compile stochastic constraint programs down into conventional (nonstochastic)
constraint programs. This allows us to exploit the full power of existing
constraint solvers. We have implemented this framework for decision making
under uncertainty in stochastic OPL, a language which is based on the OPL
constraint modelling language [Hentenryck et al., 1999]. To illustrate the
potential of this framework, we model a wide range of problems in areas as
diverse as finance, agriculture and production.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 21:23:40 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Manandhar",
"Suresh",
""
],
[
"Tarim",
"Armagan",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.3766 | Toby Walsh | Carmel Domshlak, Francesca Rossi, Kristen Brent Venable, Toby Walsh | Reasoning about soft constraints and conditional preferences: complexity
results and approximation techniques | Proceedings of the Eighteenth International Joint Conference on
Artificial Intelligence (IJCAI-03) | IJCAI 2003: 215-220 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many real life optimization problems contain both hard and soft constraints,
as well as qualitative conditional preferences. However, there is no single
formalism to specify all three kinds of information. We therefore propose a
framework, based on both CP-nets and soft constraints, that handles both hard
and soft constraints as well as conditional preferences efficiently and
uniformly. We study the complexity of testing the consistency of preference
statements, and show how soft constraints can faithfully approximate the
semantics of conditional preference statements whilst improving the
computational complexity
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 21:55:20 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Domshlak",
"Carmel",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"Kristen Brent",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.3769 | Toby Walsh | Alan M. Frisch, Ian Miguel, Zeynep Kiziltan, Brahim Hnich, Toby Walsh | Multiset Ordering Constraints | Proceedings of the Eighteenth International Joint Conference on
Artificial Intelligence (IJCAI-03) | IJCAI 2003: 221-226 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We identify a new and important global (or non-binary) constraint. This
constraint ensures that the values taken by two vectors of variables, when
viewed as multisets, are ordered. This constraint is useful for a number of
different applications including breaking symmetry and fuzzy constraint
satisfaction. We propose and implement an efficient linear time algorithm for
enforcing generalised arc consistency on such a multiset ordering constraint.
Experimental results on several problem domains show considerable promise.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 21:51:13 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Frisch",
"Alan M.",
""
],
[
"Miguel",
"Ian",
""
],
[
"Kiziltan",
"Zeynep",
""
],
[
"Hnich",
"Brahim",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.3771 | Subhash Kak | Subhash Kak | Memory Retrieved from Single Neurons | 12 pages | null | null | null | cs.NE q-bio.NC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper examines the problem of accessing a vector memory from a single
neuron in a Hebbian neural network. It begins with the review of the author's
earlier method, which is different from the Hopfield model in that it recruits
neighboring neurons by spreading activity, making it possible for single or
group of neurons to become associated with vector memories. Some open issues
associated with this approach are identified. It is suggested that fragments
that generate stored memories could be associated with single neurons through
local spreading activity.
| [
{
"version": "v1",
"created": "Fri, 22 May 2009 22:09:59 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Kak",
"Subhash",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
]
|
0905.3802 | Fabio Fassetti | Fabio Fassetti, Luigi Palopoli | On the complexity of identifying Head Elementary Set Free programs | 11 pages. To appear in Theory and Practice of Logic Programming
(TPLP) | null | null | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Head-elementary-set-free programs were proposed in (Gebser et al. 2007) and
shown to generalize over head-cycle-free programs while retaining their nice
properties. It was left as an open problem in (Gebser et al. 2007) to establish
the complexity of identifying head-elementary-set-free programs. This note
solves the open problem, by showing that the problem is complete for co-NP.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 11:00:13 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Fassetti",
"Fabio",
""
],
[
"Palopoli",
"Luigi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.3812 | Subhas Ghosh | Subhas Kumar Ghosh and Koushik Sinha | Some Results On Convex Greedy Embedding Conjecture for 3-Connected
Planar Graphs | 19 pages, A short version of this paper has been accepted for
presentation in FCT 2009 - 17th International Symposium on Fundamentals of
Computation Theory | null | 10.1007/978-3-642-03409-1_14 | null | cs.DS cs.CG cs.DM cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A greedy embedding of a graph $G = (V,E)$ into a metric space $(X,d)$ is a
function $x : V(G) \to X$ such that in the embedding for every pair of
non-adjacent vertices $x(s), x(t)$ there exists another vertex $x(u)$ adjacent
to $x(s)$ which is closer to $x(t)$ than $x(s)$. This notion of greedy
embedding was defined by Papadimitriou and Ratajczak (Theor. Comput. Sci.
2005), where authors conjectured that every 3-connected planar graph has a
greedy embedding (possibly planar and convex) in the Euclidean plane. Recently,
greedy embedding conjecture has been proved by Leighton and Moitra (FOCS 2008).
However, their algorithm do not result in a drawing that is planar and convex
for all 3-connected planar graph in the Euclidean plane. In this work we
consider the planar convex greedy embedding conjecture and make some progress.
We derive a new characterization of planar convex greedy embedding that given a
3-connected planar graph $G = (V,E)$, an embedding $x: V \to \bbbr^2$ of $G$ is
a planar convex greedy embedding if and only if, in the embedding $x$, weight
of the maximum weight spanning tree ($T$) and weight of the minimum weight
spanning tree ($\func{MST}$) satisfies $\WT(T)/\WT(\func{MST}) \leq
(\card{V}-1)^{1 - \delta}$, for some $0 < \delta \leq 1$.
| [
{
"version": "v1",
"created": "Sat, 23 May 2009 12:21:58 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Ghosh",
"Subhas Kumar",
""
],
[
"Sinha",
"Koushik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.3830 | Fionn Murtagh | F. Murtagh, A. Ganz, S. McKie, J. Mothe and K. Englmeier | Tag Clouds for Displaying Semantics: The Case of Filmscripts | 23 pages, 7 figures | Information Visualization 9, 253-262, 2010 | 10.1057/ivs.2009.19 | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We relate tag clouds to other forms of visualization, including planar or
reduced dimensionality mapping, and Kohonen self-organizing maps. Using a
modified tag cloud visualization, we incorporate other information into it,
including text sequence and most pertinent words. Our notion of word pertinence
goes beyond just word frequency and instead takes a word in a mathematical
sense as located at the average of all of its pairwise relationships. We
capture semantics through context, taken as all pairwise relationships. Our
domain of application is that of filmscript analysis. The analysis of
filmscripts, always important for cinema, is experiencing a major gain in
importance in the context of television. Our objective in this work is to
visualize the semantics of filmscript, and beyond filmscript any other
partially structured, time-ordered, sequence of text segments. In particular we
develop an innovative approach to plot characterization.
| [
{
"version": "v1",
"created": "Sat, 23 May 2009 16:11:18 GMT"
}
]
| 2011-06-14T00:00:00 | [
[
"Murtagh",
"F.",
""
],
[
"Ganz",
"A.",
""
],
[
"McKie",
"S.",
""
],
[
"Mothe",
"J.",
""
],
[
"Englmeier",
"K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.3858 | Aman Jain | Aman Jain, Sanjeev R. Kulkarni, Sergio Verdu | Multicasting in Large Wireless Networks: Bounds on the Minimum Energy
per Bit | 40 pages, 4 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider scaling laws for maximal energy efficiency of communicating a
message to all the nodes in a wireless network, as the number of nodes in the
network becomes large. Two cases of large wireless networks are studied --
dense random networks and constant density (extended) random networks. In
addition, we also study finite size regular networks in order to understand how
regularity in node placement affects energy consumption.
We first establish an information-theoretic lower bound on the minimum energy
per bit for multicasting in arbitrary wireless networks when the channel state
information is not available at the transmitters. Upper bounds are obtained by
constructing a simple flooding scheme that requires no information at the
receivers about the channel states or the locations and identities of the
nodes. The gap between the upper and lower bounds is only a constant factor for
dense random networks and regular networks, and differs by a poly-logarithmic
factor for extended random networks. Furthermore, we show that the proposed
upper and lower bounds for random networks hold almost surely in the node
locations as the number of nodes approaches infinity.
| [
{
"version": "v1",
"created": "Sat, 23 May 2009 22:42:45 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Jain",
"Aman",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Verdu",
"Sergio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3885 | Piotr Faliszewski | E. Elkind, P. Faliszewski, A. Slinko | Swap Bribery | 17 pages | null | 10.1007/978-3-642-04645-2_27 | null | cs.GT cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In voting theory, bribery is a form of manipulative behavior in which an
external actor (the briber) offers to pay the voters to change their votes in
order to get her preferred candidate elected. We investigate a model of bribery
where the price of each vote depends on the amount of change that the voter is
asked to implement. Specifically, in our model the briber can change a voter's
preference list by paying for a sequence of swaps of consecutive candidates.
Each swap may have a different price; the price of a bribery is the sum of the
prices of all swaps that it involves. We prove complexity results for this
model, which we call swap bribery, for a broad class of election systems,
including variants of approval and k-approval, Borda, Copeland, and maximin.
| [
{
"version": "v1",
"created": "Sun, 24 May 2009 10:01:53 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Elkind",
"E.",
""
],
[
"Faliszewski",
"P.",
""
],
[
"Slinko",
"A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.3927 | Russell K. Standish | Russell K. Standish | SuperNOVA: a novel algorithm for graph automorphism calculations | This paper was rejected for publication, primarily because it
implements known techniques. I have updated the manuscript with experimental
data comparing the algorithm with other well known automorphism
implementations | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The graph isomorphism problem is of practical importance, as well as being a
theoretical curiosity in computational complexity theory in that it is not
known whether it is $NP$-complete or $P$. However, for many graphs, the problem
is tractable, and related to the problem of finding the automorphism group of
the graph. Perhaps the most well known state-of-the art implementation for
finding the automorphism group is Nauty. However, Nauty is particularly
susceptible to poor performance on star configurations, where the spokes of the
star are isomorphic with each other. In this work, I present an algorithm that
explodes these star configurations, reducing the problem to a sequence of
simpler automorphism group calculations.
| [
{
"version": "v1",
"created": "Sun, 24 May 2009 22:44:38 GMT"
},
{
"version": "v2",
"created": "Sun, 23 Dec 2012 01:03:43 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Standish",
"Russell K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.3934 | Onur Ozan Koyluoglu | O. Ozan Koyluoglu and Hesham El Gamal | Cooperative encoding for secrecy in interference channels | Submitted to IEEE Transactions on Information Theory (submitted May
2009 and revised September 2010) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the fundamental performance limits of the two-user
interference channel in the presence of an external eavesdropper. In this
setting, we construct an inner bound, to the secrecy capacity region, based on
the idea of cooperative encoding in which the two users cooperatively design
their randomized codebooks and jointly optimize their channel prefixing
distributions. Our achievability scheme also utilizes message-splitting in
order to allow for partial decoding of the interference at the non-intended
receiver. Outer bounds are then derived and used to establish the optimality of
the proposed scheme in certain cases. In the Gaussian case, the previously
proposed cooperative jamming and noise-forwarding techniques are shown to be
special cases of our proposed approach. Overall, our results provide structural
insights on how the interference can be exploited to increase the secrecy
capacity of wireless networks.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 01:06:56 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Apr 2011 20:47:26 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Koyluoglu",
"O. Ozan",
""
],
[
"Gamal",
"Hesham El",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.3946 | Chih-Hong Cheng | Chih-Hong Cheng, Christian Buckl, Javier Esparza, Alois Knoll | FTOS-Verify: Analysis and Verification of Non-Functional Properties for
Fault-Tolerant Systems | (bibliography update) | null | null | null | cs.DC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The focus of the tool FTOS is to alleviate designers' burden by offering code
generation for non-functional aspects including fault-tolerance mechanisms. One
crucial aspect in this context is to ensure that user-selected mechanisms for
the system model are sufficient to resist faults as specified in the underlying
fault hypothesis. In this paper, formal approaches in verification are proposed
to assist the claim. We first raise the precision of FTOS into pure
mathematical constructs, and formulate the deterministic assumption, which is
necessary as an extension of Giotto-like systems (e.g., FTOS) to equip with
fault-tolerance abilities. We show that local properties of a system with the
deterministic assumption will be preserved in a modified synchronous system
used as the verification model. This enables the use of techniques known from
hardware verification. As for implementation, we develop a prototype tool
called FTOS-Verify, deploy it as an Eclipse add-on for FTOS, and conduct
several case studies.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 06:11:42 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Cheng",
"Chih-Hong",
""
],
[
"Buckl",
"Christian",
""
],
[
"Esparza",
"Javier",
""
],
[
"Knoll",
"Alois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.3949 | Glenn Hurlbert | David S. Herscovici, Benjamin D. Hester and Glenn H. Hurlbert | t-Pebbling and Extensions | 29 pages | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Graph pebbling is the study of moving discrete pebbles from certain initial
distributions on the vertices of a graph to various target distributions via
pebbling moves. A pebbling move removes two pebbles from a vertex and places
one pebble on one of its neighbors (losing the other as a toll). For t >= 1 the
t-pebbling number of a graph is the minimum number of pebbles necessary so that
from any initial distribution of them it is possible to move t pebbles to any
vertex. We provide the best possible upper bound on the t-pebbling number of a
diameter two graph, proving a conjecture of Curtis, et al., in the process. We
also give a linear time (in the number of edges) algorithm to t-pebble such
graphs, as well as a quartic time (in the number of vertices) algorithm to
compute the pebbling number of such graphs, improving the best known result of
Bekmetjev and Cusack. Furthermore, we show that, for complete graphs, cycles,
trees, and cubes, we can allow the target to be any distribution of t pebbles
without increasing the corresponding t-pebbling numbers; we conjecture that
this behavior holds for all graphs. Finally, we explore fractional and optimal
fractional versions of pebbling, proving the fractional pebbling number
conjecture of Hurlbert and using linear optimization to reveal results on the
optimal fractional pebbling number of vertex-transitive graphs.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 06:12:00 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Mar 2011 22:13:03 GMT"
}
]
| 2011-03-24T00:00:00 | [
[
"Herscovici",
"David S.",
""
],
[
"Hester",
"Benjamin D.",
""
],
[
"Hurlbert",
"Glenn H.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.3951 | Chih-Hong Cheng | Chih-Hong Cheng, Christian Buckl, Javier Esparza, Alois Knoll | Modeling and Verification for Timing Satisfaction of Fault-Tolerant
Systems with Finiteness | 1. Appear in the 13-th IEEE/ACM International Symposium on
Distributed Simulation and Real Time Applications (DS-RT'09). 2. Compared to
the DS-RT version, we add motivations for editing automata, and footnote that
the sketch of editing algo is only applicable in our job-processing element
to avoid ambiguity (because actions are chained) | null | 10.1109/DS-RT.2009.20 | null | cs.DC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The increasing use of model-based tools enables further use of formal
verification techniques in the context of distributed real-time systems. To
avoid state explosion, it is necessary to construct verification models that
focus on the aspects under consideration.
In this paper, we discuss how we construct a verification model for timing
analysis in distributed real-time systems. We (1) give observations concerning
restrictions of timed automata to model these systems, (2) formulate
mathematical representations on how to perform model-to-model transformation to
derive verification models from system models, and (3) propose some theoretical
criteria how to reduce the model size. The latter is in particular important,
as for the verification of complex systems, an efficient model reflecting the
properties of the system under consideration is equally important to the
verification algorithm itself. Finally, we present an extension of the
model-based development tool FTOS, designed to develop fault-tolerant systems,
to demonstrate %the benefits of our approach.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 05:58:03 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 09:21:10 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Oct 2009 09:24:30 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Cheng",
"Chih-Hong",
""
],
[
"Buckl",
"Christian",
""
],
[
"Esparza",
"Javier",
""
],
[
"Knoll",
"Alois",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.3964 | Mahzad Kalantari | Mahzad Kalantari, Amir Hashemi, Franck Jung, JeanPierre Guedon | A New Solution to the Relative Orientation Problem using only 3 Points
and the Vertical Direction | null | null | 10.1007/s10851-010-0234-2 | 0924-9907 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new method to recover the relative pose between two
images, using three points and the vertical direction information. The vertical
direction can be determined in two ways: 1- using direct physical measurement
like IMU (inertial measurement unit), 2- using vertical vanishing point. This
knowledge of the vertical direction solves 2 unknowns among the 3 parameters of
the relative rotation, so that only 3 homologous points are requested to
position a couple of images. Rewriting the coplanarity equations leads to a
simpler solution. The remaining unknowns resolution is performed by an
algebraic method using Grobner bases. The elements necessary to build a
specific algebraic solver are given in this paper, allowing for a real-time
implementation. The results on real and synthetic data show the efficiency of
this method.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 08:29:01 GMT"
}
]
| 2010-11-15T00:00:00 | [
[
"Kalantari",
"Mahzad",
""
],
[
"Hashemi",
"Amir",
""
],
[
"Jung",
"Franck",
""
],
[
"Guedon",
"JeanPierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0905.3967 | Maria Potop-Butucaru | Zohir Bouzid (LIP6), Maria Potop-Butucaru (LIP6, INRIA Rocquencourt),
S\'ebastien Tixeuil (LIP6, INRIA Futurs) | Optimal byzantine resilient convergence in oblivious robot networks | null | null | null | null | cs.DC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a set of robots with arbitrary initial location and no agreement on a
global coordinate system, convergence requires that all robots asymptotically
approach the exact same, but unknown beforehand, location. Robots are
oblivious-- they do not recall the past computations -- and are allowed to move
in a one-dimensional space. Additionally, robots cannot communicate directly,
instead they obtain system related information only via visual sensors. We draw
a connection between the convergence problem in robot networks, and the
distributed \emph{approximate agreement} problem (that requires correct
processes to decide, for some constant $\epsilon$, values distance $\epsilon$
apart and within the range of initial proposed values). Surprisingly, even
though specifications are similar, the convergence implementation in robot
networks requires specific assumptions about synchrony and Byzantine
resilience. In more details, we prove necessary and sufficient conditions for
the convergence of mobile robots despite a subset of them being Byzantine (i.e.
they can exhibit arbitrary behavior). Additionally, we propose a deterministic
convergence algorithm for robot networks and analyze its correctness and
complexity in various synchrony settings. The proposed algorithm tolerates f
Byzantine robots for (2f+1)-sized robot networks in fully synchronous networks,
(3f+1)-sized in semi-synchronous networks. These bounds are optimal for the
class of cautious algorithms, which guarantee that correct robots always move
inside the range of positions of the correct robots.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:17:06 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Bouzid",
"Zohir",
"",
"LIP6"
],
[
"Potop-Butucaru",
"Maria",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6, INRIA Futurs"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0905.3993 | Angelos Mantzaflaris | Angelos Mantzaflaris (INRIA Sophia Antipolis), Bernard Mourrain (INRIA
Sophia Antipolis), Elias P. P. Tsigaridas (INRIA Sophia Antipolis) | Continued Fraction Expansion of Real Roots of Polynomial Systems | 10 pages | SNC, conference on Symbolic-Numeric Computation, Kyoto : Japan
(2009) | 10.1145/1577190.1577207 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new algorithm for isolating the real roots of a system of
multivariate polynomials, given in the monomial basis. It is inspired by
existing subdivision methods in the Bernstein basis; it can be seen as
generalization of the univariate continued fraction algorithm or alternatively
as a fully analog of Bernstein subdivision in the monomial basis. The
representation of the subdivided domains is done through homographies, which
allows us to use only integer arithmetic and to treat efficiently unbounded
regions. We use univariate bounding functions, projection and preconditionning
techniques to reduce the domain of search. The resulting boxes have optimized
rational coordinates, corresponding to the first terms of the continued
fraction expansion of the real roots. An extension of Vincent's theorem to
multivariate polynomials is proved and used for the termination of the
algorithm. New complexity bounds are provided for a simplified version of the
algorithm. Examples computed with a preliminary C++ implementation illustrate
the approach.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 10:39:17 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Nov 2010 05:49:26 GMT"
}
]
| 2010-11-12T00:00:00 | [
[
"Mantzaflaris",
"Angelos",
"",
"INRIA Sophia Antipolis"
],
[
"Mourrain",
"Bernard",
"",
"INRIA\n Sophia Antipolis"
],
[
"Tsigaridas",
"Elias P. P.",
"",
"INRIA Sophia Antipolis"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0905.3998 | Pierre Hyvernat | Pierre Hyvernat (IML) | Predicate Transformers and Linear Logic, yet another denotational model | null | Computer Science and Logic 2004, Karpacz : Pologne (2004) | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the refinement calculus, monotonic predicate transformers are used to
model specifications for (imperative) programs. Together with a natural notion
of simulation, they form a category enjoying many algebraic properties. We
build on this structure to make predicate transformers into a de notational
model of full linear logic: all the logical constructions have a natural
interpretation in terms of predicate transformers (i.e. in terms of
specifications). We then interpret proofs of a formula by a safety property for
the corresponding specification.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:16:00 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Hyvernat",
"Pierre",
"",
"IML"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0905.4021 | Jean-Marc Kelif | Jean-Marc Kelif | A Physical Model of Wireless Network | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using an approach developed in physics, we propose a new framework for the
study of cellular networks. The key idea of the physical network model we
propose is to replace the discrete base stations (BS) entities by a continuum
of transmitters which are spatially distributed in the network. This allows us
to establish a closed form formula of the other-cell downlink interference
factor f, as a function of the location of the mobile. We define here f as the
ratio of outer cell received power (i.e. the power received from other cells)
to the inner cell received power. This physical model allows calculating the
influence of interference on any mobile in a cell, whatever its position.
Results obtained with that closed-form formula are close to the ones obtained
by simulations using a traditional hexagonal network model. Since the physical
model allows to establish a closed form formula of the interference factor, it
allows to do analytical studies of wireless networks such as outage
probability, quality of service, capacity.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 11:06:11 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Kelif",
"Jean-Marc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0905.4022 | Paramveer Dhillon | Paramveer S. Dhillon, Dean Foster and Lyle Ungar | Transfer Learning Using Feature Selection | Masters' Thesis | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present three related ways of using Transfer Learning to improve feature
selection. The three methods address different problems, and hence share
different kinds of information between tasks or feature classes, but all three
are based on the information theoretic Minimum Description Length (MDL)
principle and share the same underlying Bayesian interpretation. The first
method, MIC, applies when predictive models are to be built simultaneously for
multiple tasks (``simultaneous transfer'') that share the same set of features.
MIC allows each feature to be added to none, some, or all of the task models
and is most beneficial for selecting a small set of predictive features from a
large pool of features, as is common in genomic and biological datasets. Our
second method, TPC (Three Part Coding), uses a similar methodology for the case
when the features can be divided into feature classes. Our third method,
Transfer-TPC, addresses the ``sequential transfer'' problem in which the task
to which we want to transfer knowledge may not be known in advance and may have
different amounts of data than the other tasks. Transfer-TPC is most beneficial
when we want to transfer knowledge between tasks which have unequal amounts of
labeled data, for example the data for disambiguating the senses of different
verbs. We demonstrate the effectiveness of these approaches with experimental
results on real world data pertaining to genomics and to Word Sense
Disambiguation (WSD).
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 14:29:59 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Dhillon",
"Paramveer S.",
""
],
[
"Foster",
"Dean",
""
],
[
"Ungar",
"Lyle",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0905.4023 | Joakim Jalden | Joakim Jalden, Petros Elia | DMT Optimality of LR-Aided Linear Decoders for a General Class of
Channels, Lattice Designs, and System Models | 16 pages, 1 figure (3 subfigures), submitted to the IEEE Transactions
on Information Theory | null | 10.1109/TIT.2010.2059493 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The work identifies the first general, explicit, and non-random MIMO
encoder-decoder structures that guarantee optimality with respect to the
diversity-multiplexing tradeoff (DMT), without employing a computationally
expensive maximum-likelihood (ML) receiver. Specifically, the work establishes
the DMT optimality of a class of regularized lattice decoders, and more
importantly the DMT optimality of their lattice-reduction (LR)-aided linear
counterparts. The results hold for all channel statistics, for all channel
dimensions, and most interestingly, irrespective of the particular lattice-code
applied. As a special case, it is established that the LLL-based LR-aided
linear implementation of the MMSE-GDFE lattice decoder facilitates DMT optimal
decoding of any lattice code at a worst-case complexity that grows at most
linearly in the data rate. This represents a fundamental reduction in the
decoding complexity when compared to ML decoding whose complexity is generally
exponential in rate.
The results' generality lends them applicable to a plethora of pertinent
communication scenarios such as quasi-static MIMO, MIMO-OFDM, ISI,
cooperative-relaying, and MIMO-ARQ channels, in all of which the DMT optimality
of the LR-aided linear decoder is guaranteed. The adopted approach yields
insight, and motivates further study, into joint transceiver designs with an
improved SNR gap to ML decoding.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 14:31:40 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Jalden",
"Joakim",
""
],
[
"Elia",
"Petros",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4039 | Paul Vitanyi | Rudi L. Cilibrasi (software consultant Oakland, CA) and Paul M.B.
Vitanyi (CWI, Amsterdam) | Normalized Web Distance and Word Similarity | Latex, 20 pages, 7 figures, to appear in: Handbook of Natural
Language Processing, Second Edition, Nitin Indurkhya and Fred J. Damerau
Eds., CRC Press, Taylor and Francis Group, Boca Raton, FL, 2010, ISBN
978-1420085921 | null | null | null | cs.CL cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a great deal of work in cognitive psychology, linguistics, and
computer science, about using word (or phrase) frequencies in context in text
corpora to develop measures for word similarity or word association, going back
to at least the 1960s. The goal of this chapter is to introduce the
normalizedis a general way to tap the amorphous low-grade knowledge available
for free on the Internet, typed in by local users aiming at personal
gratification of diverse objectives, and yet globally achieving what is
effectively the largest semantic electronic database in the world. Moreover,
this database is available for all by using any search engine that can return
aggregate page-count estimates for a large range of search-queries. In the
paper introducing the NWD it was called `normalized Google distance (NGD),' but
since Google doesn't allow computer searches anymore, we opt for the more
neutral and descriptive NWD. web distance (NWD) method to determine similarity
between words and phrases. It
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 15:42:40 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Cilibrasi",
"Rudi L.",
"",
"software consultant Oakland, CA"
],
[
"Vitanyi",
"Paul M. B.",
"",
"CWI, Amsterdam"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0905.4057 | Waleed Saad | Walid Saad, Zhu Han, Merouane Debbah, Are Hj{\o}rungnes and Tamer
Basar | Coalitional Game Theory for Communication Networks: A Tutorial | IEEE Signal Processing Magazine, Special Issue on Game Theory, to
appear, 2009. IEEE Signal Processing Magazine, Special Issue on Game Theory,
to appear, 2009 | null | 10.1109/MSP.2009.000000 | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Game theoretical techniques have recently become prevalent in many
engineering applications, notably in communications. With the emergence of
cooperation as a new communication paradigm, and the need for self-organizing,
decentralized, and autonomic networks, it has become imperative to seek
suitable game theoretical tools that allow to analyze and study the behavior
and interactions of the nodes in future communication networks. In this
context, this tutorial introduces the concepts of cooperative game theory,
namely coalitional games, and their potential applications in communication and
wireless networks. For this purpose, we classify coalitional games into three
categories: Canonical coalitional games, coalition formation games, and
coalitional graph games. This new classification represents an
application-oriented approach for understanding and analyzing coalitional
games. For each class of coalitional games, we present the fundamental
components, introduce the key properties, mathematical techniques, and solution
concepts, and describe the methodologies for applying these games in several
applications drawn from the state-of-the-art research in communications. In a
nutshell, this article constitutes a unified treatment of coalitional game
theory tailored to the demands of communications and network engineers.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 18:50:02 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Saad",
"Walid",
""
],
[
"Han",
"Zhu",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Hjørungnes",
"Are",
""
],
[
"Basar",
"Tamer",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4059 | Pierre Hyvernat | Pierre Hyvernat (Universit\'e de Savoie) | Coherent and finiteness spaces | short note | Logical Methods in Computer Science, Volume 7, Issue 3 (September
22, 2011) lmcs:1131 | 10.2168/LMCS-7(3:15)2011 | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This short note presents a new relation between coherent spaces and
finiteness spaces. This takes the form of a functor from COH to FIN commuting
with the additive and multiplicative structure of linear logic. What makes this
correspondence possible and conceptually interesting is the use of the infinite
Ramsey theorem. Along the way, the question of the cardinality of the
collection of finiteness spaces on N is answered. Basic knowledge about
coherent spaces and finiteness spaces is assumed.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:05:41 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 17:46:25 GMT"
},
{
"version": "v3",
"created": "Mon, 26 Jul 2010 19:17:05 GMT"
},
{
"version": "v4",
"created": "Sun, 31 Jul 2011 09:49:07 GMT"
},
{
"version": "v5",
"created": "Tue, 20 Sep 2011 20:14:31 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Hyvernat",
"Pierre",
"",
"Université de Savoie"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0905.4060 | Pierre Hyvernat | Pierre Hyvernat (LAMA) | A Completeness Theorem for "Total Boolean Functions" | short note | null | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Christine Tasson introduced an algebraic notion of totality for a
denotational model of linear logic in the category of vector spaces. The notion
of total boolean function is, in a way, quite intuitive. This note provides a
positive answer to the question of completeness of the "boolean centroidal
calculus" w.r.t. total boolean functions.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:08:20 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 17:46:04 GMT"
}
]
| 2009-11-03T00:00:00 | [
[
"Hyvernat",
"Pierre",
"",
"LAMA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0905.4062 | Pierre Hyvernat | Pierre Hyvernat (LAMA) | Interaction Systems and Linear Logic, a different games semantics | 39 pages | null | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define a model for linear logic based on two well-known ingredients: games
and simulations. This model is interesting in the following respect: while it
is obvious that the objects interpreting formulas are games and that everything
is developed with the intuition of interaction in mind, the notion of morphism
is very different from traditional morphisms in games semantics. In particular,
we make no use of the notion of strategy! The resulting structure is very
different from what is usually found in categories of games. We start by
defining several constructions on those games and show, using elementary
considerations, that they enjoy the appropriate algebraic properties making
this category a denotational model for intuitionistic linear logic. An
interesting point is that the tensor product corresponds to a strongly
synchronous operation on games. This category can also, using traditional
translations, serve as a model for the simply typed -calculus. We use some of
the additional structure of the category to extend this to a model of the
simply typed differential -calculus. Once this is done, we go a little further
by constructing a reflexive object in this category, thus getting a concrete
non-trivial model for the untyped differential -calculus. We then show, using a
highly non-constructive principle, that this category is in fact a model for
full classical linear logic ; and we finally have a brief look at the related
notions of predicate transformers and containers.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:09:58 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Hyvernat",
"Pierre",
"",
"LAMA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0905.4063 | Pierre Hyvernat | Peter Hancock, Pierre Hyvernat (IML) | Programming interfaces and basic topology | null | Annals of Pure and Applied Logic 137, 1--3 (2006) 189--239 | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A pattern of interaction that arises again and again in programming is a
"handshake", in which two agents exchange data. The exchange is thought of as
provision of a service. Each interaction is initiated by a specific agent--the
client or Angel--and concluded by the other--the server or Demon. We present a
category in which the objects--called interaction structures in the
paper--serve as descriptions of services provided across such handshaken
interfaces. The morphisms--called (general) simulations--model components that
provide one such service, relying on another. The morphisms are relations
between the underlying sets of the interaction structures. The proof that a
relation is a simulation can serve (in principle) as an executable program,
whose specification is that it provides the service described by its domain,
given an implementation of the service described by its codomain. This category
is then shown to coincide with the subcategory of "generated" basic topologies
in Sambin's terminology, where a basic topology is given by a closure operator
whose induced sup-lattice structure need not be distributive; and moreover,
this operator is inductively generated from a basic cover relation. This
coincidence provides topologists with a natural source of examples for
non-distributive formal topology. It raises a number of questions of interest
both for formal topology and programming. The extra structure needed to make
such a basic topology into a real formal topology is then interpreted in the
context of interaction structures.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:11:54 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Hancock",
"Peter",
"",
"IML"
],
[
"Hyvernat",
"Pierre",
"",
"IML"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0905.4064 | Tom Hirschowitz | Andr\'e Hirschowitz (JAD), Michel Hirschowitz (LIX, LIST), Tom
Hirschowitz (LAMA) | Contraction-free proofs and finitary games for Linear Logic | 19 pages, uses tikz and Paul Taylor's diagrams | MFPS 2009, Oxford : Royaume-Uni (2009) | 10.1016/j.entcs.2009.07.095 | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the standard sequent presentations of Girard's Linear Logic (LL), there
are two "non-decreasing" rules, where the premises are not smaller than the
conclusion, namely the cut and the contraction rules. It is a universal concern
to eliminate the cut rule. We show that, using an admissible modification of
the tensor rule, contractions can be eliminated, and that cuts can be
simultaneously limited to a single initial occurrence. This view leads to a
consistent, but incomplete game model for LL with exponentials, which is
finitary, in the sense that each play is finite. The game is based on a set of
inference rules which does not enjoy cut elimination. Nevertheless, the cut
rule is valid in the model.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:14:40 GMT"
}
]
| 2009-09-04T00:00:00 | [
[
"Hirschowitz",
"André",
"",
"JAD"
],
[
"Hirschowitz",
"Michel",
"",
"LIX, LIST"
],
[
"Hirschowitz",
"Tom",
"",
"LAMA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0905.4066 | Pierre Hyvernat | Pierre Hyvernat (IML) | Synchronous Games, Simulations and lambda-calculus | null | Games for Logic and Programming Languages, European Conferences on
Theory and Practice of Software (ETAPS 2005), Edinburgh : Royaume-Uni (2005) | null | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We refine a model for linear logic based on two well-known ingredients: games
and simulations. We have already shown that usual simulation relations form a
sound notion of morphism between games; and that we can interpret all linear
logic in this way. One particularly interesting point is that we interpret
multiplicative connectives by synchronous operations on games. We refine this
work by giving computational contents to our simulation relations. To achieve
that, we need to restrict to intuitionistic linear logic. This allows to work
in a constructive setting, thus keeping a computational content to the proofs.
We then extend it by showing how to interpret some of the additional structure
of the exponentials. To be more precise, we first give a denotational model for
the typed lambda-calculus; and then give a denotational model for the
differential lambda-calculus of Ehrhard and Regnier. Both this models are
proved correct constructively.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:36:05 GMT"
}
]
| 2009-05-26T00:00:00 | [
[
"Hyvernat",
"Pierre",
"",
"IML"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0905.4068 | {\L}ukasz Je\.z | {\L}ukasz Je\.z | A 4/3-competitive randomized algorithm for online scheduling of packets
with agreeable deadlines | 11 pages, 3-4 figures; new version due to STACS submission | null | null | null | cs.DS | http://creativecommons.org/licenses/by/3.0/ | In 2005 Li et al. gave a phi-competitive deterministic online algorithm for
scheduling of packets with agreeable deadlines with a very interesting
analysis. This is known to be optimal due to a lower bound by Hajek. We claim
that the algorithm by Li et al. can be slightly simplified, while retaining its
competitive ratio. Then we introduce randomness to the modified algorithm and
argue that the competitive ratio against oblivious adversary is at most 4/3.
Note that this still leaves a gap between the best known lower bound of 5/4 by
Chin et al. for randomised algorithms against oblivious adversary.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 19:43:24 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 15:45:18 GMT"
},
{
"version": "v3",
"created": "Tue, 5 Jan 2010 19:34:28 GMT"
},
{
"version": "v4",
"created": "Wed, 3 Feb 2010 12:42:48 GMT"
}
]
| 2010-02-03T00:00:00 | [
[
"Jeż",
"Łukasz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.4087 | Fangwen Fu | Fangwen Fu, Mihaela van der Schaar | Structural Solutions for Cross-Layer Optimization of Wireless Multimedia
Transmission | null | null | null | null | cs.MM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a systematic solution to the problem of cross-layer
optimization for delay-sensitive media transmission over time-varying wireless
channels as well as investigate the structures and properties of this solution,
such that it can be easily implemented in various multimedia systems and
applications. Specifically, we formulate this problem as a finite-horizon
Markov decision process (MDP) by explicitly considering the users'
heterogeneous multimedia traffic characteristics (e.g. delay deadlines,
distortion impacts and dependencies etc.), time-varying network conditions as
well as, importantly, their ability to adapt their cross-layer transmission
strategies in response to these dynamics. Based on the heterogeneous
characteristics of the media packets, we are able to express the transmission
priorities between packets as a new type of directed acyclic graph (DAG). This
DAG provides the necessary structure for determining the optimal cross-layer
actions in each time slot: the root packet in the DAG will always be selected
for transmission since it has the highest positive marginal utility; and the
complexity of the proposed cross-layer solution is demonstrated to linearly
increase w.r.t. the number of disconnected packet pairs in the DAG and
exponentially increase w.r.t. the number of packets on which the current
packets depend on. The simulation results demonstrate that the proposed
solution significantly outperforms existing state-of-the-art cross-layer
solutions. Moreover, we show that our solution provides the upper bound
performance for the cross-layer optimization solutions with delayed feedback
such as the well-known RaDiO framework.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 22:09:58 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Fu",
"Fangwen",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4090 | Bart Jacobs | Bart Jacobs | Orthomodular lattices, Foulis Semigroups and Dagger Kernel Categories | 31 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is a sequel to arXiv:0902.2355 and continues the study of quantum
logic via dagger kernel categories. It develops the relation between these
categories and both orthomodular lattices and Foulis semigroups. The relation
between the latter two notions has been uncovered in the 1960s. The current
categorical perspective gives a broader context and reconstructs this
relationship between orthomodular lattices and Foulis semigroups as special
instance.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 22:38:41 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Jacobs",
"Bart",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4091 | Cong Shen | Cong Shen and Michael P. Fitz | Hybrid ARQ in Multiple-Antenna Slow Fading Channels: Performance Limits
and Optimal Linear Dispersion Code Design | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on studying the fundamental performance limits and linear
dispersion code design for the MIMO-ARQ slow fading channel. Optimal average
rate of well-known HARQ protocols is analyzed. The optimal design of space-time
coding for the MIMO-ARQ channel is discussed. Information-theoretic measures
are used to optimize the rate assignment and derive the optimum design
criterion, which is then used to evaluate the optimality of existing space-time
codes. A different design criterion, which is obtained from the error
probability analysis of space-time coded MIMO-HARQ, is presented. Examples are
studied to reveal the gain of ARQ feedback in space-time coded MIMO systems.
| [
{
"version": "v1",
"created": "Mon, 25 May 2009 22:42:30 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Shen",
"Cong",
""
],
[
"Fitz",
"Michael P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4100 | Vahab Mirrokni | Jon Feldman, Aranyak Mehta, Vahab Mirrokni, S. Muthukrishnan | Online Stochastic Matching: Beating 1-1/e | null | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the online stochastic bipartite matching problem, in a form
motivated by display ad allocation on the Internet. In the online, but
adversarial case, the celebrated result of Karp, Vazirani and Vazirani gives an
approximation ratio of $1-1/e$. In the online, stochastic case when nodes are
drawn repeatedly from a known distribution, the greedy algorithm matches this
approximation ratio, but still, no algorithm is known that beats the $1 - 1/e$
bound.
Our main result is a 0.67-approximation online algorithm for stochastic
bipartite matching, breaking this $1 - {1/e}$ barrier. Furthermore, we show
that no online algorithm can produce a $1-\epsilon$ approximation for an
arbitrarily small $\epsilon$ for this problem.
We employ a novel application of the idea of the power of two choices from
load balancing: we compute two disjoint solutions to the expected instance, and
use both of them in the online algorithm in a prescribed preference order.
To identify these two disjoint solutions, we solve a max flow problem in a
boosted flow graph, and then carefully decompose this maximum flow to two
edge-disjoint (near-)matchings. These two offline solutions are used to
characterize an upper bound for the optimum in any scenario. This is done by
identifying a cut whose value we can bound under the arrival distribution.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 00:28:01 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Feldman",
"Jon",
""
],
[
"Mehta",
"Aranyak",
""
],
[
"Mirrokni",
"Vahab",
""
],
[
"Muthukrishnan",
"S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.4103 | Naomichi Hatano | Ernesto Estrada, Naomichi Hatano | Communicability Graph and Community Structures in Complex Networks | 36 pages, 5 figures, to appear in Applied Mathematics and Computation | Appl. Math. Comp. 214 (2009) 500-511 | 10.1016/j.amc.2009.04.024 | null | physics.soc-ph cond-mat.stat-mech cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We use the concept of the network communicability (Phys. Rev. E 77 (2008)
036111) to define communities in a complex network. The communities are defined
as the cliques of a communicability graph, which has the same set of nodes as
the complex network and links determined by the communicability function. Then,
the problem of finding the network communities is transformed to an all-clique
problem of the communicability graph. We discuss the efficiency of this
algorithm of community detection. In addition, we extend here the concept of
the communicability to account for the strength of the interactions between the
nodes by using the concept of inverse temperature of the network. Finally, we
develop an algorithm to manage the different degrees of overlapping between the
communities in a complex network. We then analyze the USA airport network, for
which we successfully detect two big communities of the eastern airports and of
the western/central airports as well as two bridging central communities. In
striking contrast, a well-known algorithm groups all but two of the continental
airports into one community.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 00:48:35 GMT"
}
]
| 2009-07-17T00:00:00 | [
[
"Estrada",
"Ernesto",
""
],
[
"Hatano",
"Naomichi",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0905.4138 | Christos Attikos | Christos Attikos, Michael Doumpos | Faster estimation of the correlation fractal dimension using
box-counting | 4 pages, to appear in BCI 2009 - 4th Balkan Conference in Informatics | null | null | null | cs.DB cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fractal dimension is widely adopted in spatial databases and data mining,
among others as a measure of dataset skewness. State-of-the-art algorithms for
estimating the fractal dimension exhibit linear runtime complexity whether
based on box-counting or approximation schemes. In this paper, we revisit a
correlation fractal dimension estimation algorithm that redundantly rescans the
dataset and, extending that work, we propose another linear, yet faster and as
accurate method, which completes in a single pass.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 08:52:42 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Attikos",
"Christos",
""
],
[
"Doumpos",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.4147 | Zvika Brakerski | Zvika Brakerski and Boaz Patt-Shamir | Distributed Discovery of Large Near-Cliques | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an undirected graph and $0\le\epsilon\le1$, a set of nodes is called
$\epsilon$-near clique if all but an $\epsilon$ fraction of the pairs of nodes
in the set have a link between them. In this paper we present a fast
synchronous network algorithm that uses small messages and finds a near-clique.
Specifically, we present a constant-time algorithm that finds, with constant
probability of success, a linear size $\epsilon$-near clique if there exists an
$\epsilon^3$-near clique of linear size in the graph. The algorithm uses
messages of $O(\log n)$ bits. The failure probability can be reduced to
$n^{-\Omega(1)}$ in $O(\log n)$ time, and the algorithm also works if the graph
contains a clique of size $\Omega(n/\log^{\alpha}\log n)$ for some $\alpha \in
(0,1)$.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 09:51:35 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Brakerski",
"Zvika",
""
],
[
"Patt-Shamir",
"Boaz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0905.4160 | Murat Guzeltepe Mr | Murat Guzeltepe, Mehmet Ozen | Codes over Quaternion Integers with Respect to Lipschitz Metric | The paper cannot give enough novalities. The technic had been already
known | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I want to withdraw this paper.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 10:47:37 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Dec 2009 12:48:51 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Mar 2010 07:48:56 GMT"
},
{
"version": "v4",
"created": "Tue, 10 May 2011 07:46:51 GMT"
},
{
"version": "v5",
"created": "Sat, 18 Oct 2014 06:47:45 GMT"
}
]
| 2014-10-21T00:00:00 | [
[
"Guzeltepe",
"Murat",
""
],
[
"Ozen",
"Mehmet",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4162 | Dima Shepelyansky L | D.L. Shepelyansky and O.V. Zhirov (CNRS, Toulouse & BINP, Novosibirsk) | Google matrix, dynamical attractors and Ulam networks | 9 pages, 11 figs; discussion, refs and fig added, data, title
modified, research at http://www.quantware.ups-tlse.fr | Phys. Rev. E v.81, p.036213 (2010) | 10.1103/PhysRevE.81.036213 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the properties of the Google matrix generated by a coarse-grained
Perron-Frobenius operator of the Chirikov typical map with dissipation. The
finite size matrix approximant of this operator is constructed by the Ulam
method. This method applied to the simple dynamical model creates the directed
Ulam networks with approximate scale-free scaling and characteristics being
rather similar to those of the World Wide Web. The simple dynamical attractors
play here the role of popular web sites with a strong concentration of
PageRank. A variation of the Google parameter $\alpha$ or other parameters of
the dynamical map can drive the PageRank of the Google matrix to a delocalized
phase with a strange attractor where the Google search becomes inefficient.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 11:03:39 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Aug 2009 16:12:18 GMT"
}
]
| 2010-03-19T00:00:00 | [
[
"Shepelyansky",
"D. L.",
"",
"CNRS, Toulouse & BINP, Novosibirsk"
],
[
"Zhirov",
"O. V.",
"",
"CNRS, Toulouse & BINP, Novosibirsk"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0905.4163 | Murat Guzeltepe Mr | Murat Guzeltepe, Mehmet Ozen | Cyclic Codes over Some Finite Rings | null | null | null | null | cs.IT math.CO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper cyclic codes are established with respect to the Mannheim
metric over some finite rings by using Gaussian integers and the decoding
algorithm for these codes is given.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 11:06:33 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Guzeltepe",
"Murat",
""
],
[
"Ozen",
"Mehmet",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4164 | Joakim Knudsen | Joakim Grahl Knudsen, Constanza Riera, Lars Eirik Danielsen, Matthew
G. Parker, and Eirik Rosnes | Iterative Decoding on Multiple Tanner Graphs Using Random Edge Local
Complementation | 5 pages, to appear in proc. IEEE ISIT, June 2009 | null | 10.1109/ISIT.2009.5205625 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose to enhance the performance of the sum-product
algorithm (SPA) by interleaving SPA iterations with a random local graph update
rule. This rule is known as edge local complementation (ELC), and has the
effect of modifying the Tanner graph while preserving the code. We have
previously shown how the ELC operation can be used to implement an iterative
permutation group decoder (SPA-PD)--one of the most successful iterative
soft-decision decoding strategies at small blocklengths. In this work, we
exploit the fact that ELC can also give structurally distinct parity-check
matrices for the same code. Our aim is to describe a simple iterative decoder,
running SPA-PD on distinct structures, based entirely on random usage of the
ELC operation. This is called SPA-ELC, and we focus on small blocklength codes
with strong algebraic structure. In particular, we look at the extended Golay
code and two extended quadratic residue codes. Both error rate performance and
average decoding complexity, measured by the average total number of messages
required in the decoding, significantly outperform those of the standard SPA,
and compares well with SPA-PD. However, in contrast to SPA-PD, which requires a
global action on the Tanner graph, we obtain a performance improvement via
local action alone. Such localized algorithms are of mathematical interest in
their own right, but are also suited to parallel/distributed realizations.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 11:11:19 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Knudsen",
"Joakim Grahl",
""
],
[
"Riera",
"Constanza",
""
],
[
"Danielsen",
"Lars Eirik",
""
],
[
"Parker",
"Matthew G.",
""
],
[
"Rosnes",
"Eirik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4165 | Murat Guzeltepe Mr | Murat Guzeltepe, Mehmet Ozen | Cyclic Codes over Some Finite Quaternion Integer Rings | null | null | 10.1016/j.jfranklin.2010.02.008 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, cyclic codes are established over some finite quaternion
integer rings with respect to the quaternion Mannheim distance, and de- coding
algorithm for these codes is given.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 11:11:34 GMT"
}
]
| 2010-03-24T00:00:00 | [
[
"Guzeltepe",
"Murat",
""
],
[
"Ozen",
"Mehmet",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4193 | Tomas Masopust | Tomas Masopust | Answers to Questions Formulated in the Paper "On States Observability in
Deterministic Finite Automata" | null | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper gives answers to questions formulated as open in the paper "On
State Observability in Deterministic Finite Automata" by A. Mateescu and Gh.
Paun. Specifically, it demonstrates that for all k >= 2, the families of
regular languages acceptable by deterministic finite automata with no more than
k semi-observable states, denoted by Tk, are anti-AFL's, and that the family T1
differs in the closure property under Kleene +.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 13:07:53 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Masopust",
"Tomas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0905.4200 | Tom Hirschowitz | Richard Garner, Tom Hirschowitz (LAMA), Aur\'elien Pardon (LIP) | Variable binding, symmetric monoidal closed theories, and bigraphs | An introduction to two more technical previous preprints. Accepted at
Concur '09 | null | null | null | cs.LO cs.PL math.CT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates the use of symmetric monoidal closed (SMC) structure
for representing syntax with variable binding, in particular for languages with
linear aspects. In our setting, one first specifies an SMC theory T, which may
express binding operations, in a way reminiscent from higher-order abstract
syntax. This theory generates an SMC category S(T) whose morphisms are, in a
sense, terms in the desired syntax. We apply our approach to Jensen and
Milner's (abstract binding) bigraphs, which are linear w.r.t. processes. This
leads to an alternative category of bigraphs, which we compare to the original.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 13:43:16 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Garner",
"Richard",
"",
"LAMA"
],
[
"Hirschowitz",
"Tom",
"",
"LAMA"
],
[
"Pardon",
"Aurélien",
"",
"LIP"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
]
|
0905.4201 | Florentina Pintea | A.T. Akinwalle, F.T. Ibharalu | The Usefulness of Multilevel Hash Tables with Multiple Hash Functions in
Large Databases | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),11-20 | null | null | cs.DS cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work, attempt is made to select three good hash functions which
uniformly distribute hash values that permute their internal states and allow
the input bits to generate different output bits. These functions are used in
different levels of hash tables that are coded in Java Programming Language and
a quite number of data records serve as primary data for testing the
performances. The result shows that the two-level hash tables with three
different hash functions give a superior performance over one-level hash table
with two hash functions or zero-level hash table with one function in term of
reducing the conflict keys and quick lookup for a particular element. The
result assists to reduce the complexity of join operation in query language
from O(n2) to O(1) by placing larger query result, if any, in multilevel hash
tables with multiple hash functions and generate shorter query result.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 13:47:23 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Akinwalle",
"A. T.",
""
],
[
"Ibharalu",
"F. T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0905.4203 | Florentina Pintea | Alasu Paul Sabrin | Multimedia Aplication for Solving a Sudoku Game | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),21-30 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article explains the way in which, with the help of Action Script 3 in
combination with Flash, a method of solving Sudoku game was implemented,
through searching for the certain numbers and after that trying to guess for
the squares where there are two possible numbers.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 13:54:46 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Sabrin",
"Alasu Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4205 | Florentina Pintea | Cristian Anghel, Vlad Muia, Miodrag Stoianovici | Development and Optimization of a Multimedia Product | 6 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009), 31-36 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents a new concept of a multimedia interactive product. It
is a multiuser versatile platform that can be used for different purposes. The
first implementation of the platform is a multiplayer game called Texas Hold
'em, which is a very popular community card game. The paper shows the product's
multimedia structure where Hardware and Software work together in creating a
realistic feeling for the users.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 14:06:05 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Anghel",
"Cristian",
""
],
[
"Muia",
"Vlad",
""
],
[
"Stoianovici",
"Miodrag",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0905.4226 | Stefano Zacchiroli | Pietro Abate (PPS), Jaap Boender (PPS), Roberto Di Cosmo (PPS),
Stefano Zacchiroli (PPS) | Strong Dependencies between Software Components | null | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Component-based systems often describe context requirements in terms of
explicit inter-component dependencies. Studying large instances of such
systems?such as free and open source software (FOSS) distributions?in terms of
declared dependencies between packages is appealing. It is however also
misleading when the language to express dependencies is as expressive as
boolean formulae, which is often the case. In such settings, a more appropriate
notion of component dependency exists: strong dependency. This paper introduces
such notion as a first step towards modeling semantic, rather then syntactic,
inter-component relationships. Furthermore, a notion of component sensitivity
is derived from strong dependencies, with ap- plications to quality assurance
and to the evaluation of upgrade risks. An empirical study of strong
dependencies and sensitivity is presented, in the context of one of the
largest, freely available, component-based system.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 14:20:59 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Abate",
"Pietro",
"",
"PPS"
],
[
"Boender",
"Jaap",
"",
"PPS"
],
[
"Di Cosmo",
"Roberto",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0905.4237 | Prasanta K. Panigrahi | Prasanta K. Panigrahi, Sayantan Ghosh, P. Manimaran, Dilip P. Ahalpara | Statistical Properties of Fluctuations: A Method to Check Market
Behavior | 9 pages, 6 figures, Econophys-IV, Kolkata, 2009 | Econophysics & Economics of Games, Social Choices and Quantitative
Techniques, pp.110-118, Springer-Verlag, Milan (2009) | 10.1007/978-88-470-1501-2_13 | null | q-fin.ST cs.DS physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We analyze the Bombay stock exchange (BSE) price index over the period of
last 12 years. Keeping in mind the large fluctuations in last few years, we
carefully find out the transient, non-statistical and locally structured
variations. For that purpose, we make use of Daubechies wavelet and
characterize the fractal behavior of the returns using a recently developed
wavelet based fluctuation analysis method. the returns show a fat-tail
distribution as also weak non-statistical behavior. We have also carried out
continuous wavelet as well as Fourier power spectral analysis to characterize
the periodic nature and correlation properties of the time series.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 19:53:34 GMT"
}
]
| 2010-07-26T00:00:00 | [
[
"Panigrahi",
"Prasanta K.",
""
],
[
"Ghosh",
"Sayantan",
""
],
[
"Manimaran",
"P.",
""
],
[
"Ahalpara",
"Dilip P.",
""
]
]
| [
{
"class": "Quantitative Finance",
"code": "q-fin.ST",
"description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data",
"span": "(Statistical Finance)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0905.4241 | Bernard Chazelle | Bernard Chazelle | The Convergence of Bird Flocking | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We bound the time it takes for a group of birds to reach steady state in a
standard flocking model. We prove that (i) within single exponential time
fragmentation ceases and each bird settles on a fixed flying direction; (ii)
the flocking network converges only after a number of steps that is an iterated
exponential of height logarithmic in the number of birds. We also prove the
highly surprising result that this bound is optimal. The model directs the
birds to adjust their velocities repeatedly by averaging them with their
neighbors within a fixed radius. The model is deterministic, but we show that
it can tolerate a reasonable amount of stochastic or even adversarial noise.
Our methods are highly general and we speculate that the results extend to a
wider class of models based on undirected flocking networks, whether defined
metrically or topologically. This work introduces new techniques of broader
interest, including the "flight net," the "iterated spectral shift," and a
certain "residue-clearing" argument in circuit complexity.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 16:53:08 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"Chazelle",
"Bernard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0905.4251 | Daniel de Carvalho | Daniel de Carvalho | Execution Time of lambda-Terms via Denotational Semantics and
Intersection Types | 36 pages | null | null | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The multiset based relational model of linear logic induces a semantics of
the type free lambda-calculus, which corresponds to a non-idempotent
intersection type system, System R. We prove that, in System R, the size of the
type derivations and the size of the types are closely related to the execution
time of lambda-terms in a particular environment machine, Krivine's machine.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 17:21:53 GMT"
}
]
| 2009-05-27T00:00:00 | [
[
"de Carvalho",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.4303 | Jaspreet Singh | Jaspreet Singh and Upamanyu Madhow | On Block Noncoherent Communication with Low-Precision Phase Quantization
at the Receiver | IEEE ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider communication over the block noncoherent AWGN channel with
low-precision Analog-to-Digital Converters (ADCs) at the receiver. For standard
uniform Phase Shift Keying (PSK) modulation, we investigate the performance of
a receiver architecture that quantizes only the phase of the received signal;
this has the advantage of being implementable without automatic gain control,
using multiple 1-bit ADCs preceded by analog multipliers. We study the
structure of the transition density of the resulting channel model. Several
results, based on the symmetry inherent in the channel, are provided to
characterize this transition density. A low complexity procedure for computing
the channel capacity is obtained using these results. Numerical capacity
computations for QPSK show that 8-bin phase quantization of the received signal
recovers more than 80-85 % of the capacity attained with unquantized
observations, while 12-bin phase quantization recovers above 90-95 % of the
unquantized capacity. Dithering the constellation is shown to improve the
performance in the face of drastic quantization.
| [
{
"version": "v1",
"created": "Tue, 26 May 2009 23:58:22 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Singh",
"Jaspreet",
""
],
[
"Madhow",
"Upamanyu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4322 | Florentina Pintea | Valerian Antohe, Constantin Stanciu | Mathematical Models in Danube Water Quality | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009), 37-46 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The mathematical shaping in the study of water quality has become a branch of
environmental engineering. The comprehension and effective application of
mathematical models in studying environmental phenomena keep up with the
results in the domain of mathematics and the development of specialized
software as well. Integrated software programs simulate and predict extreme
events, propose solutions, analyzing and processing data in due time. This
paper presents a browsing through some mathematical categories of processing
the statistical data, examples and their analysis concerning the degree of
water pollution downstream the river Danube.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 13:49:42 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Antohe",
"Valerian",
""
],
[
"Stanciu",
"Constantin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4325 | Masahiro Takeoka | Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi,
Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby
Lenhart, Norbert Luetkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi
Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada,
Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa
Tomita, Morio Toyoshima, Rodney van Meter, Atsuhiro Yamagishi, Yoshihisa
Yamamoto, Akihiro Yamamura | Updating Quantum Cryptography Report ver. 1 | 74 pages | null | null | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum cryptographic technology (QCT) is expected to be a fundamental
technology for realizing long-term information security even against
as-yet-unknown future technologies. More advanced security could be achieved
using QCT together with contemporary cryptographic technologies. To develop and
spread the use of QCT, it is necessary to standardize devices, protocols, and
security requirements and thus enable interoperability in a multi-vendor,
multi-network, and multi-service environment. This report is a technical
summary of QCT and related topics from the viewpoints of 1) consensual
establishment of specifications and requirements of QCT for standardization and
commercialization and 2) the promotion of research and design to realize
New-Generation Quantum Cryptography.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 05:41:56 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Dodson",
"Donna",
""
],
[
"Fujiwara",
"Mikio",
""
],
[
"Grangier",
"Philippe",
""
],
[
"Hayashi",
"Masahito",
""
],
[
"Imafuku",
"Kentaro",
""
],
[
"Kitayama",
"Ken-ichi",
""
],
[
"Kumar",
"Prem",
""
],
[
"Kurtsiefer",
"Christian",
""
],
[
"Lenhart",
"Gaby",
""
],
[
"Luetkenhaus",
"Norbert",
""
],
[
"Matsumoto",
"Tsutomu",
""
],
[
"Munro",
"William J.",
""
],
[
"Nishioka",
"Tsuyoshi",
""
],
[
"Peev",
"Momtchil",
""
],
[
"Sasaki",
"Masahide",
""
],
[
"Sata",
"Yutaka",
""
],
[
"Takada",
"Atsushi",
""
],
[
"Takeoka",
"Masahiro",
""
],
[
"Tamaki",
"Kiyoshi",
""
],
[
"Tanaka",
"Hidema",
""
],
[
"Tokura",
"Yasuhiro",
""
],
[
"Tomita",
"Akihisa",
""
],
[
"Toyoshima",
"Morio",
""
],
[
"van Meter",
"Rodney",
""
],
[
"Yamagishi",
"Atsuhiro",
""
],
[
"Yamamoto",
"Yoshihisa",
""
],
[
"Yamamura",
"Akihiro",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0905.4332 | Francien Dechesne | Yanjing Wang and Francien Dechesne | On expressive power and class invariance | 18 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In computer science, various logical languages are defined to analyze
properties of systems. One way to pinpoint the essential differences between
those logics is to compare their expressivity in terms of distinguishing power
and expressive power. In this paper, we study those two concepts by regarding
the latter notion as the former lifted to classes of models. We show some
general results on lifting an invariance relation on models to one on classes
of models, such that when the former corresponds to the distinguishing power of
a logic, the latter corresponds to its expressive power, given certain
compactness requirements. In particular, we introduce the notion of class
bisimulation to capture the expressive power of modal logics. We demonstrate
the application of our results by revisiting modal definability with our new
insights.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 13:15:37 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Wang",
"Yanjing",
""
],
[
"Dechesne",
"Francien",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4341 | Daniil Ryabko | Daniil Ryabko (INRIA Futurs, LIFL, INRIA Lille - Nord Europe) | Characterizing predictable classes of processes | null | null | null | null | cs.AI cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem is sequence prediction in the following setting. A sequence
$x_1,...,x_n,...$ of discrete-valued observations is generated according to
some unknown probabilistic law (measure) $\mu$. After observing each outcome,
it is required to give the conditional probabilities of the next observation.
The measure $\mu$ belongs to an arbitrary class $\C$ of stochastic processes.
We are interested in predictors $\rho$ whose conditional probabilities converge
to the "true" $\mu$-conditional probabilities if any $\mu\in\C$ is chosen to
generate the data. We show that if such a predictor exists, then a predictor
can also be obtained as a convex combination of a countably many elements of
$\C$. In other words, it can be obtained as a Bayesian predictor whose prior is
concentrated on a countable set. This result is established for two very
different measures of performance of prediction, one of which is very strong,
namely, total variation, and the other is very weak, namely, prediction in
expected average Kullback-Leibler divergence.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 06:31:32 GMT"
}
]
| 2012-03-20T00:00:00 | [
[
"Ryabko",
"Daniil",
"",
"INRIA Futurs, LIFL, INRIA Lille - Nord Europe"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0905.4369 | Christoph Benzmueller | Christoph Benzmueller | Automating Quantified Multimodal Logics in Simple Type Theory -- A Case
Study | ii + 30 pages | null | null | SEKI Working-Paper SWP-2009-02 | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a case study we investigate whether off the shelf higher-order theorem
provers and model generators can be employed to automate reasoning in and about
quantified multimodal logics. In our experiments we exploit the new TPTP
infrastructure for classical higher-order logic.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 10:13:57 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Benzmueller",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4378 | Zvika Ben-Haim | Zvika Ben-Haim and Yonina C. Eldar | The Cramer-Rao Bound for Sparse Estimation | 11 pages, 2 figures. Submitted to IEEE Transactions on Signal
Processing | null | null | null | math.ST cs.IT math.IT stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to characterize the best achievable performance for
the problem of estimating an unknown parameter having a sparse representation.
Specifically, we consider the setting in which a sparsely representable
deterministic parameter vector is to be estimated from measurements corrupted
by Gaussian noise, and derive a lower bound on the mean-squared error (MSE)
achievable in this setting. To this end, an appropriate definition of bias in
the sparse setting is developed, and the constrained Cramer-Rao bound (CRB) is
obtained. This bound is shown to equal the CRB of an estimator with knowledge
of the support set, for almost all feasible parameter values. Consequently, in
the unbiased case, our bound is identical to the MSE of the oracle estimator.
Combined with the fact that the CRB is achieved at high signal-to-noise ratios
by the maximum likelihood technique, our result provides a new interpretation
for the common practice of using the oracle estimator as a gold standard
against which practical approaches are compared.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 11:02:54 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Jun 2009 10:02:22 GMT"
},
{
"version": "v3",
"created": "Tue, 9 Jun 2009 08:09:14 GMT"
},
{
"version": "v4",
"created": "Tue, 29 Sep 2009 08:56:07 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Ben-Haim",
"Zvika",
""
],
[
"Eldar",
"Yonina C.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0905.4387 | Fahem Kebair | Fahem Kebair and Frederic Serin | Information Modeling for a Dynamic Representation of an Emergency
Situation | 6 | null | null | null | cs.AI cs.MA | http://creativecommons.org/licenses/by/3.0/ | In this paper we propose an approach to build a decision support system that
can help emergency planners and responders to detect and manage emergency
situations. The internal mechanism of the system is independent from the
treated application. Therefore, we think the system may be used or adapted
easily to different case studies. We focus here on a first step in the
decision-support process which concerns the modeling of information issued from
the perceived environment and their representation dynamically using a
multiagent system. This modeling was applied on the RoboCupRescue Simulation
System. An implementation and some results are presented here.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 11:53:48 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Kebair",
"Fahem",
""
],
[
"Serin",
"Frederic",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0905.4430 | Florentina Pintea | Valerian Antohe | Limits of Educational Soft "GeoGebra" in a Critical Constructive Review | 8 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009), 47-54 | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mathematical educational soft explore, investigating in a dynamical way, some
algebraically, geometrically problems, the expected results being used to
involve a lot of mathematical results. One such software soft is GeoGebra. The
software is free and multi-platform dynamic mathematics software for learning
and teaching, awards in Europe and the USA. This paper describes some critical
but constructive investigation using the platform for graph functions and
dynamic geometry.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 14:11:37 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Antohe",
"Valerian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0905.4433 | Florentina Pintea | Sebastien Bruyere, Vincent Pillet, Luc Quoniam | Proposition d'une methode de qualification et de selection d'un logiciel
d'analyse et de suivi du referencement dans les moteurs de recherche | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009), 55-64 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In order to measure website visibility in search engines, there are softwares
for analytics and referencing follow-up. They permit to quantify website's
efficacity of referencing and optimize its positionning in search engines. With
regard to search engines' algorithms' evolution and centralization of Key
Performance Indicators for Marketing decision making, it becomes hard to find
solutions to effectively lead a lot of projects for referencing. That's why we
have built a methodology in order compare, evaluate and choose a software for
analytics and referencing follow-up in search engines.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 14:18:07 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Bruyere",
"Sebastien",
""
],
[
"Pillet",
"Vincent",
""
],
[
"Quoniam",
"Luc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4441 | Antoine Vigneron | Otfried Cheong, Antoine Vigneron, Juyoung Yon | Reverse nearest neighbor queries in fixed dimension | 7 pages, 3 figures; typos corrected; more background material on
compressed quadtrees | null | 10.1142/S0218195911003603 | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reverse nearest neighbor queries are defined as follows: Given an input
point-set P, and a query point q, find all the points p in P whose nearest
point in P U {q} \ {p} is q. We give a data structure to answer reverse nearest
neighbor queries in fixed-dimensional Euclidean space. Our data structure uses
O(n) space, its preprocessing time is O(n log n), and its query time is O(log
n).
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 14:50:12 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Jun 2009 14:57:20 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Sep 2010 13:38:53 GMT"
}
]
| 2014-01-31T00:00:00 | [
[
"Cheong",
"Otfried",
""
],
[
"Vigneron",
"Antoine",
""
],
[
"Yon",
"Juyoung",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.4444 | Barry Wittman | Greg N. Frederickson and Barry Wittman | Approximation Algorithms for the Traveling Repairman and Speeding
Deliveryman Problems | 20 pages, 1 figure | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constant-factor, polynomial-time approximation algorithms are presented for
two variations of the traveling salesman problem with time windows. In the
first variation, the traveling repairman problem, the goal is to find a tour
that visits the maximum possible number of locations during their time windows.
In the second variation, the speeding deliveryman problem, the goal is to find
a tour that uses the minimum possible speedup to visit all locations during
their time windows. For both variations, the time windows are of unit length,
and the distance metric is based on a weighted, undirected graph. Algorithms
with improved approximation ratios are given for the case when the input is
defined on a tree rather than a general graph. The algorithms are also extended
to handle time windows whose lengths fall in any bounded range.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 15:05:28 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Frederickson",
"Greg N.",
""
],
[
"Wittman",
"Barry",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.4452 | Paul Vitanyi | Paul M.B. Vitanyi (CWI, Amsterdam) | Analysis of Sorting Algorithms by Kolmogorov Complexity (A Survey) | 18 Pages, 2 figures, LaTeX | Pp.209--232 in: In: Entropy, Search, Complexity, Bolyai Society
Mathematical Studies, 16, I. Csiszar, G.O.H. Katona, G. Tardos, Eds.,
Springer-Verlag, 2007 | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, many results on the computational complexity of sorting algorithms
were obtained using Kolmogorov complexity (the incompressibility method).
Especially, the usually hard average-case analysis is ammenable to this method.
Here we survey such results about Bubblesort, Heapsort, Shellsort,
Dobosiewicz-sort, Shakersort, and sorting with stacks and queues in sequential
or parallel mode. Especially in the case of Shellsort the uses of Kolmogorov
complexity surprisingly easily resolved problems that had stayed open for a
long time despite strenuous attacks.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 15:30:44 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
"",
"CWI, Amsterdam"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0905.4476 | Ali Tajer | Ali Tajer and Xiaodong Wang | Beacon-Assisted Spectrum Access with Cooperative Cognitive Transmitter
and Receiver | 36 pages, 6 figures, To appear in IEEE Transaction on Mobile
Computing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectrum access is an important function of cognitive radios for detecting
and utilizing spectrum holes without interfering with the legacy systems. In
this paper we propose novel cooperative communication models and show how
deploying such cooperations between a pair of secondary transmitter and
receiver assists them in identifying spectrum opportunities more reliably.
These cooperations are facilitated by dynamically and opportunistically
assigning one of the secondary users as a relay to assist the other one which
results in more efficient spectrum hole detection. Also, we investigate the
impact of erroneous detection of spectrum holes and thereof missing
communication opportunities on the capacity of the secondary channel. The
capacity of the secondary users with interference-avoiding spectrum access is
affected by 1) how effectively the availability of vacant spectrum is sensed by
the secondary transmitter-receiver pair, and 2) how correlated are the
perceptions of the secondary transmitter-receiver pair about network spectral
activity. We show that both factors are improved by using the proposed
cooperative protocols. One of the proposed protocols requires explicit
information exchange in the network. Such information exchange in practice is
prone to wireless channel errors (i.e., is imperfect) and costs bandwidth loss.
We analyze the effects of such imperfect information exchange on the capacity
as well as the effect of bandwidth cost on the achievable throughput. The
protocols are also extended to multiuser secondary networks.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 17:31:11 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Tajer",
"Ali",
""
],
[
"Wang",
"Xiaodong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.