id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0905.4482
Deanna Needell
Deanna Needell
Topics in Compressed Sensing
null
null
null
null
math.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing has a wide range of applications that include error correction, imaging, radar and many more. Given a sparse signal in a high dimensional space, one wishes to reconstruct that signal accurately and efficiently from a number of linear measurements much less than its actual dimension. Although in theory it is clear that this is possible, the difficulty lies in the construction of algorithms that perform the recovery efficiently, as well as determining which kind of linear measurements allow for the reconstruction. There have been two distinct major approaches to sparse recovery that each present different benefits and shortcomings. The first, L1-minimization methods such as Basis Pursuit, use a linear optimization problem to recover the signal. This method provides strong guarantees and stability, but relies on Linear Programming, whose methods do not yet have strong polynomially bounded runtimes. The second approach uses greedy methods that compute the support of the signal iteratively. These methods are usually much faster than Basis Pursuit, but until recently had not been able to provide the same guarantees. This gap between the two approaches was bridged when we developed and analyzed the greedy algorithm Regularized Orthogonal Matching Pursuit (ROMP). ROMP provides similar guarantees to Basis Pursuit as well as the speed of a greedy algorithm. Our more recent algorithm Compressive Sampling Matching Pursuit (CoSaMP) improves upon these guarantees, and is optimal in every important aspect.
[ { "version": "v1", "created": "Wed, 27 May 2009 17:46:29 GMT" } ]
2009-05-28T00:00:00
[ [ "Needell", "Deanna", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.4487
Cheng Qi
Qi Cheng and Xianmeng Meng and Celi Sun and Jiazhe Chen
Bounding the Sum of Square Roots via Lattice Reduction
To appear in Mathematics of Computation
null
10.1090/S0025-5718-09-02304-7
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $k$ and $n$ be positive integers. Define $R(n,k)$ to be the minimum positive value of $$ | e_i \sqrt{s_1} + e_2 \sqrt{s_2} + ... + e_k \sqrt{s_k} -t | $$ where $ s_1, s_2, ..., s_k$ are positive integers no larger than $n$, $t$ is an integer and $e_i\in \{1,0, -1\}$ for all $1\leq i\leq k$. It is important in computational geometry to determine a good lower and upper bound of $ R(n,k)$. In this paper we show that this problem is closely related to the shortest vector problem in certain integral lattices and present an algorithm to find lower bounds based on lattice reduction algorithms. Although we can only prove an exponential time upper bound for the algorithm, it is efficient for large $k$ when an exhaustive search for the minimum value is clearly infeasible. It produces lower bounds much better than the root separation technique does. Based on numerical data, we formulate a conjecture on the length of the shortest nonzero vector in the lattice, whose validation implies that our algorithm runs in polynomial time and the problem of comparing two sums of square roots of small integers can be solved in polynomial time. As a side result, we obtain constructive upper bounds for $R(n,k)$ when $ n$ is much smaller than $2^{2k}$.
[ { "version": "v1", "created": "Wed, 27 May 2009 18:23:11 GMT" } ]
2015-05-13T00:00:00
[ [ "Cheng", "Qi", "" ], [ "Meng", "Xianmeng", "" ], [ "Sun", "Celi", "" ], [ "Chen", "Jiazhe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0905.4541
Tarik Ait-Idir
Tarik Ait-Idir, and Samir Saoudi
Turbo Packet Combining Strategies for the MIMO-ISI ARQ Channel
13 pages, 7 figures, and 2 tables
IEEE Transactions on Communications, vol. 57, no. 12, pp. 3782-3793, Dec. 2009
10.1109/TCOMM.2009.12.080318
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the issue of efficient turbo packet combining techniques for coded transmission with a Chase-type automatic repeat request (ARQ) protocol operating over a multiple-input--multiple-output (MIMO) channel with intersymbol interference (ISI). First of all, we investigate the outage probability and the outage-based power loss of the MIMO-ISI ARQ channel when optimal maximum a posteriori (MAP) turbo packet combining is used at the receiver. We show that the ARQ delay (i.e., the maximum number of ARQ rounds) does not completely translate into a diversity gain. We then introduce two efficient turbo packet combining algorithms that are inspired by minimum mean square error (MMSE)-based turbo equalization techniques. Both schemes can be viewed as low-complexity versions of the optimal MAP turbo combiner. The first scheme is called signal-level turbo combining and performs packet combining and multiple transmission ISI cancellation jointly at the signal-level. The second scheme, called symbol-level turbo combining, allows ARQ rounds to be separately turbo equalized, while combining is performed at the filter output. We conduct a complexity analysis where we demonstrate that both algorithms have almost the same computational cost as the conventional log-likelihood ratio (LLR)-level combiner. Simulation results show that both proposed techniques outperform LLR-level combining, while for some representative MIMO configurations, signal-level combining has better ISI cancellation capability and achievable diversity order than that of symbol-level combining.
[ { "version": "v1", "created": "Thu, 28 May 2009 00:38:15 GMT" }, { "version": "v2", "created": "Sun, 31 May 2009 17:29:49 GMT" }, { "version": "v3", "created": "Wed, 4 Aug 2010 17:24:13 GMT" } ]
2010-08-05T00:00:00
[ [ "Ait-Idir", "Tarik", "" ], [ "Saoudi", "Samir", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.4545
Alexandre Graell i Amat Dr.
Alexandre Graell i Amat and Raphael Le Bidan
Minimum Distance and Convergence Analysis of Hamming-Accumulate-Acccumulate Codes
To appear in IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this letter we consider the ensemble of codes formed by the serial concatenation of a Hamming code and two accumulate codes. We show that this ensemble is asymptotically good, in the sense that most codes in the ensemble have minimum distance growing linearly with the block length. Thus, the resulting codes achieve high minimum distances with high probability, about half or more of the minimum distance of a typical random linear code of the same rate and length in our examples. The proposed codes also show reasonably good iterative convergence thresholds, which makes them attractive for applications requiring high code rates and low error rates, such as optical communications and magnetic recording.
[ { "version": "v1", "created": "Thu, 28 May 2009 13:40:27 GMT" } ]
2009-05-29T00:00:00
[ [ "Amat", "Alexandre Graell i", "" ], [ "Bidan", "Raphael Le", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.4567
Ugo Dal Lago
Ugo Dal Lago, Andrea Masini and Margherita Zorzi
Confluence Results for a Quantum Lambda Calculus with Measurements
21 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A strong confluence result for Q*, a quantum lambda-calculus with measurements, is proved. More precisely, confluence is shown to hold both for finite and infinite computations. The technique used in the confluence proof is syntactical but innovative. This makes Q* different from similar quantum lambda calculi, which are either measurement-free or provided with a reduction strategy.
[ { "version": "v1", "created": "Thu, 28 May 2009 07:46:18 GMT" } ]
2009-05-29T00:00:00
[ [ "Lago", "Ugo Dal", "" ], [ "Masini", "Andrea", "" ], [ "Zorzi", "Margherita", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.4570
Zhi-Hua Zhou
Yang Yu, Zhi-Hua Zhou
Weak Evolvability Equals Strong Evolvability
This paper has been withdrawn by the authors
null
null
null
cs.AI cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An updated version will be uploaded later.
[ { "version": "v1", "created": "Thu, 28 May 2009 08:09:46 GMT" }, { "version": "v2", "created": "Wed, 17 Feb 2010 04:26:06 GMT" } ]
2010-02-17T00:00:00
[ [ "Yu", "Yang", "" ], [ "Zhou", "Zhi-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0905.4581
Piotr Bania
Piotr Bania
Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs
10 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays most of the malware applications are either packed or protected. This techniques are applied especially to evade signature based detectors and also to complicate the job of reverse engineers or security analysts. The time one must spend on unpacking or decrypting malware layers is often very long and in fact remains the most complicated task in the overall process of malware analysis. In this report author proposes MmmBop as a relatively new concept of using dynamic binary instrumentation techniques for unpacking and bypassing detection by self-modifying and highly aggressive packed binary code. MmmBop is able to deal with most of the known and unknown packing algorithms and it is also suitable to successfully bypass most of currently used anti-reversing tricks. This framework does not depend on any other 3rd party software and it is developed entirely in user mode (ring3). MmmBop supports the IA-32 architecture and it is targeted for Microsoft Windows XP, some of the further deliberations will be referring directly to this operating system.
[ { "version": "v1", "created": "Thu, 28 May 2009 09:08:17 GMT" } ]
2009-05-29T00:00:00
[ [ "Bania", "Piotr", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0905.4592
Omar Sakka
Omar Sakka (LIESP), Valerie Botta-Genoulaz (LIESP), Lorraine Trilling (LIESP)
Mod\'elisation des facteurs influen\c{c}ant la performance de la cha\^ine logistique
7 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Improvement of industrial performance such as cost, lead-time, adaptability, variety and traceability is the major finality of companies. At this need corresponds the necessity to collaborate and to strengthen their coordination mechanisms. Information exchange becomes then a strategic question: what is the nature of the information that can be shared with customers and suppliers? Which impact on the performance of a company is expectable? What about the performance of the whole supply chain? It is essential for a company to identify the information whose exchange contributes to its performance and to control its information flows. This study aims to release from the literature the main tendencies of collaboration practices and information exchanges leading to the performance and to propose a model of hypothesis gathering these practices.
[ { "version": "v1", "created": "Thu, 28 May 2009 09:49:02 GMT" } ]
2009-05-29T00:00:00
[ [ "Sakka", "Omar", "", "LIESP" ], [ "Botta-Genoulaz", "Valerie", "", "LIESP" ], [ "Trilling", "Lorraine", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0905.4596
Dominique Duval
Dominique Duval (LMC - IMAG), Jean-Claude Reynaud (LSR - IMAG)
About raising and handling exceptions
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a unified framework for dealing with a deduction system and a denotational semantics of exceptions. It is based on the fact that handling exceptions can be seen as a kind of generalized case distinction. This point of view on exceptions has been introduced in 2004, it is based on the notion of diagrammatic logic, which assumes some familiarity with category theory. Extensive sums of types can be used for dealing with case distinctions. The aim of this new paper is to focus on the role of generalized extensivity property for dealing with exceptions. Moreover, the presentation of this paper makes only a restricted use of category theory.
[ { "version": "v1", "created": "Thu, 28 May 2009 10:01:47 GMT" } ]
2009-05-29T00:00:00
[ [ "Duval", "Dominique", "", "LMC - IMAG" ], [ "Reynaud", "Jean-Claude", "", "LSR - IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.4598
Florentina Pintea
Claudiu Chirilov
Iterative Methods for Systems' Solving - a C# approach
8 pages,exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009), 71-78
null
null
cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work wishes to support various mathematical issues concerning the iterative methods with the help of new programming languages. We consider a way to show how problems in math have an answer by using different academic resources and different thoughts. Here we treat methods like Gauss-Seidel's, Cramer's and Gauss-Jordan's.
[ { "version": "v1", "created": "Thu, 28 May 2009 10:10:06 GMT" } ]
2009-05-29T00:00:00
[ [ "Chirilov", "Claudiu", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0905.4601
Florentina Pintea
Alexandru Cicortas, Victoria Stana Iordan, Alexandra Emilia Fortis
Considerations on Construction Ontologies
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),79-88
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper proposes an analysis on some existent ontologies, in order to point out ways to resolve semantic heterogeneity in information systems. Authors are highlighting the tasks in a Knowledge Acquisiton System and identifying aspects related to the addition of new information to an intelligent system. A solution is proposed, as a combination of ontology reasoning services and natural languages generation. A multi-agent system will be conceived with an extractor agent, a reasoner agent and a competence management agent.
[ { "version": "v1", "created": "Thu, 28 May 2009 10:19:02 GMT" } ]
2009-05-29T00:00:00
[ [ "Cicortas", "Alexandru", "" ], [ "Iordan", "Victoria Stana", "" ], [ "Fortis", "Alexandra Emilia", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.4604
Florentina Pintea
Adrian Cojocariu, Cristina Ofelia Stanciu
XML Technologies in Computer Assisted Learning and Testing Systems
6 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),89-94
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The learning and assessment activities have undergone major changes due to the development of modern technologies. The computer-assisted learning and testing has proven a number of advantages in the development of modern educational system. The paper suggests a solution for the computer-assisted testing, which uses XML technologies, a solution that could make the basis for developing a learning computer-assisted system.
[ { "version": "v1", "created": "Thu, 28 May 2009 10:25:32 GMT" } ]
2009-05-29T00:00:00
[ [ "Cojocariu", "Adrian", "" ], [ "Stanciu", "Cristina Ofelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0905.4605
Florentina Pintea
Ovidiu Crista
Techniques for Securing Data Exchange between a Database Server and a Client Program
6 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),95-100
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of the presented work is to illustrate a method by which the data exchange between a standalone computer software and a shared database server can be protected of unauthorized interceptation of the traffic in Internet network, a transport network for data managed by those two systems, interceptation by which an attacker could gain illegetimate access to the database, threatening this way the data integrity and compromising the database.
[ { "version": "v1", "created": "Thu, 28 May 2009 10:29:20 GMT" } ]
2009-05-29T00:00:00
[ [ "Crista", "Ovidiu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0905.4608
Florentina Pintea
Georgiana-Petruta Fintineanu, Florentina Anica Pintea
Designing a Framework to Develop WEB Graphical Interfaces for ORACLE Databases - Web Dialog
6 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),125-130
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present article aims to describe a project consisting in designing a framework of applications used to create graphical interfaces with an Oracle distributed database. The development of the project supposed the use of the latest technologies: database Oracle server, Tomcat web server, JDBC (Java library used for accessing a database), JSP and Tag Library (for the development of graphical interfaces).
[ { "version": "v1", "created": "Thu, 28 May 2009 10:54:45 GMT" } ]
2009-05-29T00:00:00
[ [ "Fintineanu", "Georgiana-Petruta", "" ], [ "Pintea", "Florentina Anica", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0905.4610
Florentina Pintea
Alexandra-Emilia Fortis
Indexing Research Papers in Open Access Databases
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),131-140
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper synthesizes the actions performed in order to transform a classic scientific research journal - 'Annals. Computer Science Series' - available only in printed form until 2008, into a modern e-journal with free access to the full text of the articles. For achieving this goal, the research papers have been included in various article databases, portals and library catalogs which offered a high visibility to the journal.
[ { "version": "v1", "created": "Thu, 28 May 2009 11:06:19 GMT" } ]
2009-05-29T00:00:00
[ [ "Fortis", "Alexandra-Emilia", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0905.4611
Florentina Pintea
Ioana Iacob
The Effectiveness of Computer Assisted Classes for English as a Second Language
8 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),141-148
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present study aims to evaluate the efficiency of the computer assisted English classes and to emphasize the necessity of developing sound methodological strategies adjusted to the new technology. It also present the benefits of using the computer in the pre-school and elementary school classes, highlighted by a report on the comparative observation of four groups of children studying English in a computer assisted environment.
[ { "version": "v1", "created": "Thu, 28 May 2009 11:12:41 GMT" } ]
2009-05-29T00:00:00
[ [ "Iacob", "Ioana", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0905.4612
Inge Bethke
Jan A. Bergstra and Inge Bethke
Straight-line instruction sequence completeness for total calculation on cancellation meadows
24 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A combination of program algebra with the theory of meadows is designed leading to a theory of computation in algebraic structures which use in addition to a zero test and copying instructions the instruction set $\{x \Leftarrow 0, x \Leftarrow 1, x\Leftarrow -x, x\Leftarrow x^{-1}, x\Leftarrow x+y, x\Leftarrow x\cdot y\}$. It is proven that total functions on cancellation meadows can be computed by straight-line programs using at most 5 auxiliary variables. A similar result is obtained for signed meadows.
[ { "version": "v1", "created": "Thu, 28 May 2009 11:13:58 GMT" }, { "version": "v2", "created": "Fri, 29 May 2009 14:14:17 GMT" } ]
2009-05-29T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Bethke", "Inge", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.4613
Florentina Pintea
Daniela Ilea
Athos - The C# GUI Generator
8 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),149-156
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This application comes to help software architects and developers during the long process between user's stories, designing the application's structure and actually coding it.
[ { "version": "v1", "created": "Thu, 28 May 2009 11:17:25 GMT" } ]
2009-05-29T00:00:00
[ [ "Ilea", "Daniela", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0905.4614
Alexander Artikis
A. Artikis, M. Sergot and G. Paliouras
A Logic Programming Approach to Activity Recognition
The original publication is available in the Proceedings of the 2nd ACM international workshop on Events in multimedia, 2010
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have been developing a system for recognising human activity given a symbolic representation of video content. The input of our system is a set of time-stamped short-term activities detected on video frames. The output of our system is a set of recognised long-term activities, which are pre-defined temporal combinations of short-term activities. The constraints on the short-term activities that, if satisfied, lead to the recognition of a long-term activity, are expressed using a dialect of the Event Calculus. We illustrate the expressiveness of the dialect by showing the representation of several typical complex activities. Furthermore, we present a detailed evaluation of the system through experimentation on a benchmark dataset of surveillance videos.
[ { "version": "v1", "created": "Thu, 28 May 2009 11:44:04 GMT" }, { "version": "v2", "created": "Mon, 29 Apr 2013 17:06:25 GMT" } ]
2013-04-30T00:00:00
[ [ "Artikis", "A.", "" ], [ "Sergot", "M.", "" ], [ "Paliouras", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0905.4627
Claudio Lucchese
Paolo Bolettieri, Andrea Esuli, Fabrizio Falchi, Claudio Lucchese, Raffaele Perego, Tommaso Piccioli and Fausto Rabitti
CoPhIR: a Test Collection for Content-Based Image Retrieval
15 pages
null
null
null
cs.MM cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The scalability, as well as the effectiveness, of the different Content-based Image Retrieval (CBIR) approaches proposed in literature, is today an important research issue. Given the wealth of images on the Web, CBIR systems must in fact leap towards Web-scale datasets. In this paper, we report on our experience in building a test collection of 100 million images, with the corresponding descriptive features, to be used in experimenting new scalable techniques for similarity searching, and comparing their results. In the context of the SAPIR (Search on Audio-visual content using Peer-to-peer Information Retrieval) European project, we had to experiment our distributed similarity searching technology on a realistic data set. Therefore, since no large-scale collection was available for research purposes, we had to tackle the non-trivial process of image crawling and descriptive feature extraction (we used five MPEG-7 features) using the European EGEE computer GRID. The result of this effort is CoPhIR, the first CBIR test collection of such scale. CoPhIR is now open to the research community for experiments and comparisons, and access to the collection was already granted to more than 50 research groups worldwide.
[ { "version": "v1", "created": "Thu, 28 May 2009 12:14:07 GMT" }, { "version": "v2", "created": "Mon, 1 Jun 2009 07:44:19 GMT" } ]
2009-06-01T00:00:00
[ [ "Bolettieri", "Paolo", "" ], [ "Esuli", "Andrea", "" ], [ "Falchi", "Fabrizio", "" ], [ "Lucchese", "Claudio", "" ], [ "Perego", "Raffaele", "" ], [ "Piccioli", "Tommaso", "" ], [ "Rabitti", "Fausto", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0905.4656
Li Li
Zhiheng Li, Li Li, Yudong Chen, Yi Zhang
Quantization Errors of fGn and fBm Signals
null
Zhiheng Li, Yudong Chen, Li Li*, Yi Zhang, "Quantization errors of uniformly quantized fGn and fBm signals," IEEE Signal Processing Letters, vol. 16, no. 12, pp. 1059-1062, 2009.
10.1109/LSP.2009.2030115
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this Letter, we show that under the assumption of high resolution, the quantization errors of fGn and fBm signals with uniform quantizer can be treated as uncorrelated white noises.
[ { "version": "v1", "created": "Thu, 28 May 2009 13:58:25 GMT" } ]
2009-09-29T00:00:00
[ [ "Li", "Zhiheng", "" ], [ "Li", "Li", "" ], [ "Chen", "Yudong", "" ], [ "Zhang", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.4684
Yan Xin
Yan Xin and Honghai Zhang
A Simple Sequential Spectrum Sensing Scheme for Cognitive Radio
29 pages, 3 figures, submitted to IEEE Transactions on Signal Processing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive radio that supports a secondary and opportunistic access to licensed spectrum shows great potential to dramatically improve spectrum utilization. Spectrum sensing performed by secondary users to detect unoccupied spectrum bands, is a key enabling technique for cognitive radio. This paper proposes a truncated sequential spectrum sensing scheme, namely the sequential shifted chi-square test (SSCT). The SSCT has a simple test statistic and does not rely on any deterministic knowledge about primary signals. As figures of merit, the exact false-alarm probability is derived, and the miss-detection probability as well as the average sample number (ASN) are evaluated by using a numerical integration algorithm. Corroborating numerical examples show that, in comparison with fixed-sample size detection schemes such as energy detection, the SSCT delivers considerable reduction on the ASN while maintaining a comparable detection performance.
[ { "version": "v1", "created": "Thu, 28 May 2009 15:47:09 GMT" } ]
2009-05-29T00:00:00
[ [ "Xin", "Yan", "" ], [ "Zhang", "Honghai", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.4700
Zuleita Ka Ming Ho
Zuleita Ka Ming Ho, Vincent K. N. Lau, Roger S. K. Cheng
Cross-Layer Design of FDD-OFDM Systems based on ACK/NAK Feedbacks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well-known that cross-layer scheduling which adapts power, rate and user allocation can achieve significant gain on system capacity. However, conventional cross-layer designs all require channel state information at the base station (CSIT) which is difficult to obtain in practice. In this paper, we focus on cross-layer resource optimization based on ACK/NAK feedback flows in OFDM systems without explicit CSIT. While the problem can be modeled as Markov Decision Process (MDP), brute force approach by policy iteration or value iteration cannot lead to any viable solution. Thus, we derive a simple closed-form solution for the MDP cross-layer problem, which is asymptotically optimal for sufficiently small target packet error rate (PER). The proposed solution also has low complexity and is suitable for realtime implementation. It is also shown to achieve significant performance gain compared with systems that do not utilize the ACK/NAK feedbacks for cross-layer designs or cross-layer systems that utilize very unreliable CSIT for adaptation with mismatch in CSIT error statistics. Asymptotic analysis is also provided to obtain useful design insights.
[ { "version": "v1", "created": "Thu, 28 May 2009 16:55:17 GMT" } ]
2009-05-29T00:00:00
[ [ "Ho", "Zuleita Ka Ming", "" ], [ "Lau", "Vincent K. N.", "" ], [ "Cheng", "Roger S. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.4713
Leonard Kwuida
Leonard Kwuida, Rokia Missaoui, Lahcen Boumedjout, Jean Vaillancourt
Mining Generalized Patterns from Large Databases using Ontologies
null
null
null
null
cs.AI cs.DB cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Formal Concept Analysis (FCA) is a mathematical theory based on the formalization of the notions of concept and concept hierarchies. It has been successfully applied to several Computer Science fields such as data mining,software engineering, and knowledge engineering, and in many domains like medicine, psychology, linguistics and ecology. For instance, it has been exploited for the design, mapping and refinement of ontologies. In this paper, we show how FCA can benefit from a given domain ontology by analyzing the impact of a taxonomy (on objects and/or attributes) on the resulting concept lattice. We willmainly concentrate on the usage of a taxonomy to extract generalized patterns (i.e., knowledge generated from data when elements of a given domain ontology are used) in the form of concepts and rules, and improve navigation through these patterns. To that end, we analyze three generalization cases and show their impact on the size of the generalized pattern set. Different scenarios of simultaneous generalizations on both objects and attributes are also discussed
[ { "version": "v1", "created": "Thu, 28 May 2009 18:34:37 GMT" } ]
2009-05-29T00:00:00
[ [ "Kwuida", "Leonard", "" ], [ "Missaoui", "Rokia", "" ], [ "Boumedjout", "Lahcen", "" ], [ "Vaillancourt", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0905.4717
Mehrdad Nojoumian
Mehrdad Nojoumian and Timothy C. Lethbridge
Reengineering PDF-Based Documents Targeting Complex Software Specifications
27 pages, 15 figures; International Journal of Knowledge and Web Intelligence (IJKWI), Inderscience Publishers, 2011
International Journal of Knowledge and Web Intelligence (IJKWI), Inderscience, vol. 2, no. 4, pp. 292-319, 2011
10.1504/IJKWI.2011.045165
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article aims at reengineering of PDF-based complex documents, where specifications of the Object Management Group (OMG) are our initial targets. Our motivation is that such specifications are dense and intricate to use, and tend to have complicated structures. Our objective is therefore to create an approach that allows us to reengineer PDF-based documents, and to illustrate how to make more usable versions of electronic documents (such as specifications, technical books, etc) so that end users to have a better experience with them. The first step was to extract the logical structure of the document in a meaningful XML format for subsequent processing. Our initial assumption was that, many key concepts of a document are expressed in this structure. In the next phase, we created a multilayer hypertext version of the document to facilitate browsing and navigating. Although we initially focused on OMG software specifications, we chose a general approach for different phases of our work including format conversions, logical structure extraction, text extraction, multilayer hypertext generation, and concept exploration. As a consequence, we can process other complex documents to achieve our goals.
[ { "version": "v1", "created": "Thu, 28 May 2009 19:23:21 GMT" }, { "version": "v2", "created": "Thu, 27 Oct 2011 22:46:20 GMT" }, { "version": "v3", "created": "Mon, 31 Oct 2011 21:23:11 GMT" } ]
2012-02-14T00:00:00
[ [ "Nojoumian", "Mehrdad", "" ], [ "Lethbridge", "Timothy C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0905.4745
Mark Tygert
Mark Tygert
A fast algorithm for computing minimal-norm solutions to underdetermined systems of linear equations
13 pages, 4 tables
null
null
UCLA Computational and Applied Math. Technical Report 09-48
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a randomized algorithm for computing the minimal-norm solution to an underdetermined system of linear equations. Given an arbitrary full-rank m x n matrix A with m<n, any m x 1 vector b, and any positive real number epsilon less than 1, the procedure computes an n x 1 vector x approximating to relative precision epsilon or better the n x 1 vector p of minimal Euclidean norm satisfying Ap=b. The algorithm typically requires O(mn log(sqrt(n)/epsilon) + m**3) floating-point operations, generally less than the O(m**2 n) required by the classical schemes based on QR-decompositions or bidiagonalization. We present several numerical examples illustrating the performance of the algorithm.
[ { "version": "v1", "created": "Thu, 28 May 2009 20:40:11 GMT" }, { "version": "v2", "created": "Tue, 8 Sep 2009 18:25:05 GMT" } ]
2009-09-08T00:00:00
[ [ "Tygert", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0905.4757
Michael Neely
Michael J. Neely
Stochastic Optimization for Markov Modulated Networks with Application to Delay Constrained Wireless Scheduling
This version adds an author and includes simulation results. It also corrects an error in the earlier version of this arxiv tech report, concerning use of a norm defined in terms of expectations (see footnote 4 of the current version for a discussion of the error). The current paper uses a standard norm without expectations
null
null
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a wireless system with a small number of delay constrained users and a larger number of users without delay constraints. We develop a scheduling algorithm that reacts to time varying channels and maximizes throughput utility (to within a desired proximity), stabilizes all queues, and satisfies the delay constraints. The problem is solved by reducing the constrained optimization to a set of weighted stochastic shortest path problems, which act as natural generalizations of max-weight policies to Markov decision networks. We also present approximation results for the corresponding shortest path problems, and discuss the additional complexity and delay incurred as compared to systems without delay constraints. The solution technique is general and applies to other constrained stochastic decision problems.
[ { "version": "v1", "created": "Thu, 28 May 2009 21:55:30 GMT" }, { "version": "v2", "created": "Thu, 28 Jul 2011 03:43:01 GMT" } ]
2011-07-29T00:00:00
[ [ "Neely", "Michael J.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0905.4761
Gregory Leighton
Gregory Leighton, Denilson Barbosa
Optimizing XML Compression
16 pages, extended version of paper accepted for XSym 2009
null
10.1007/978-3-642-03555-5_8
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The eXtensible Markup Language (XML) provides a powerful and flexible means of encoding and exchanging data. As it turns out, its main advantage as an encoding format (namely, its requirement that all open and close markup tags are present and properly balanced) yield also one of its main disadvantages: verbosity. XML-conscious compression techniques seek to overcome this drawback. Many of these techniques first separate XML structure from the document content, and then compress each independently. Further compression gains can be realized by identifying and compressing together document content that is highly similar, thereby amortizing the storage costs of auxiliary information required by the chosen compression algorithm. Additionally, the proper choice of compression algorithm is an important factor not only for the achievable compression gain, but also for access performance. Hence, choosing a compression configuration that optimizes compression gain requires one to determine (1) a partitioning strategy for document content, and (2) the best available compression algorithm to apply to each set within this partition. In this paper, we show that finding an optimal compression configuration with respect to compression gain is an NP-hard optimization problem. This problem remains intractable even if one considers a single compression algorithm for all content. We also describe an approximation algorithm for selecting a partitioning strategy for document content based on the branch-and-bound paradigm.
[ { "version": "v1", "created": "Thu, 28 May 2009 22:36:57 GMT" } ]
2015-05-13T00:00:00
[ [ "Leighton", "Gregory", "" ], [ "Barbosa", "Denilson", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0905.4771
Kalyana Babu Nakshatrala
K. B. Nakshatrala and A. J. Valocchi
Variational structure of the optimal artificial diffusion method for the advection-diffusion equation
2 Figures
null
null
null
cs.CE cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this research note we provide a variational basis for the optimal artificial diffusion method, which has been a cornerstone in developing many stabilized methods. The optimal artificial diffusion method produces exact nodal solutions when applied to one-dimensional problems with constant coefficients and forcing function. We first present a variational principle for a multi-dimensional advective-diffusive system, and then derive a new stable weak formulation. When applied to one-dimensional problems with constant coefficients and forcing function, this resulting weak formulation will be equivalent to the optimal artificial diffusion method. We present representative numerical results to corroborate our theoretical findings.
[ { "version": "v1", "created": "Fri, 29 May 2009 01:49:38 GMT" }, { "version": "v2", "created": "Tue, 6 Jul 2010 17:05:31 GMT" }, { "version": "v3", "created": "Wed, 15 Dec 2010 02:23:48 GMT" } ]
2015-03-13T00:00:00
[ [ "Nakshatrala", "K. B.", "" ], [ "Valocchi", "A. J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0905.4813
Peter Hancock
Neil Ghani, Peter Hancock, Dirk Pattinson
Representations of Stream Processors Using Nested Fixed Points
null
Logical Methods in Computer Science, Volume 5, Issue 3 (September 15, 2009) lmcs:713
10.2168/LMCS-5(3:9)2009
null
cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define representations of continuous functions on infinite streams of discrete values, both in the case of discrete-valued functions, and in the case of stream-valued functions. We define also an operation on the representations of two continuous functions between streams that yields a representation of their composite. In the case of discrete-valued functions, the representatives are well-founded (finite-path) trees of a certain kind. The underlying idea can be traced back to Brouwer's justification of bar-induction, or to Kreisel and Troelstra's elimination of choice-sequences. In the case of stream-valued functions, the representatives are non-wellfounded trees pieced together in a coinductive fashion from well-founded trees. The definition requires an alternating fixpoint construction of some ubiquity.
[ { "version": "v1", "created": "Fri, 29 May 2009 09:40:23 GMT" }, { "version": "v2", "created": "Tue, 15 Sep 2009 07:10:30 GMT" } ]
2015-07-01T00:00:00
[ [ "Ghani", "Neil", "" ], [ "Hancock", "Peter", "" ], [ "Pattinson", "Dirk", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.4850
Joaquin Garcia-Alfaro
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas
A Survey on Cross-Site Scripting Attacks
15 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web applications are becoming truly pervasive in all kinds of business models and organizations. Today, most critical systems such as those related to health care, banking, or even emergency response, are relying on these applications. They must therefore include, in addition to the expected value offered to their users, reliable mechanisms to ensure their security. In this paper, we focus on the specific problem of cross-site scripting attacks against web applications. We present a study of this kind of attacks, and survey current approaches for their prevention. Applicability and limitations of each proposal are also discussed.
[ { "version": "v1", "created": "Fri, 29 May 2009 13:03:57 GMT" } ]
2009-06-01T00:00:00
[ [ "Garcia-Alfaro", "Joaquin", "" ], [ "Navarro-Arribas", "Guillermo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0905.4860
Florentina Pintea
Alin Isac, Claudia Isac
Informatics Issues Used in the Production Dashboard
6 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),157-162
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this paper is to present some computer aspects regarding the implementation and the employing of a dashboard in relation to the production activity. The paper begins with the theoretical presentation of the managerial perspective regarding the necessity of using the dashboard. The main functions of the dashboard in the production activity and the way it is employed are presented in the second part of the paper.
[ { "version": "v1", "created": "Fri, 29 May 2009 13:33:13 GMT" } ]
2009-06-01T00:00:00
[ [ "Isac", "Alin", "" ], [ "Isac", "Claudia", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0905.4863
Florentina Pintea
K. S. Jasmine, R. Vasantha
Derivation of UML Based Performance Models for Design Assessment in a Reuse Based Software Development Approach
18 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),163-180
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reuse-based software development provides an opportunity for better quality and increased productivity in the software products. One of the most critical aspects of the quality of a software system is its performance. The systematic application of software performance engineering techniques throughout the development process can help to identify design alternatives that preserve desirable qualities such as extensibility and reusability while meeting performance objectives. In the present scenario, most of the performance failures are due to a lack of consideration of performance issues early in the development process, especially in the design phase. These performance failures results in damaged customer relations, lost productivity for users, cost overruns due to tuning or redesign, and missed market windows. In this paper, we propose UML based Performance Models for design assessment in a reuse based software development scenario.
[ { "version": "v1", "created": "Fri, 29 May 2009 13:42:19 GMT" } ]
2009-06-01T00:00:00
[ [ "Jasmine", "K. S.", "" ], [ "Vasantha", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0905.4864
Florentina Pintea
Tiberiu Marius Karnyanszky, Ovidiu Crista, Catalin Tuican
Computer Based Interpretation of the Students' Evaluation of the Teaching Staff
8 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),181-188
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to offer a full support for universities and quality assessment committees in retrieving the feedback from their students regarding to their teaching staff. The computer based application presented before ([Cri07]) collects data from the students. Another part of the application, presented in this paper, processes this data and presents the statistical results concerning each teacher.
[ { "version": "v1", "created": "Fri, 29 May 2009 13:49:44 GMT" } ]
2009-06-01T00:00:00
[ [ "Karnyanszky", "Tiberiu Marius", "" ], [ "Crista", "Ovidiu", "" ], [ "Tuican", "Catalin", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0905.4887
Mikael Vejdemo-Johansson
Vin de Silva and Mikael Vejdemo-Johansson
Persistent Cohomology and Circular Coordinates
10 pages, 7 figures. To appear in the proceedings of the ACM Symposium on Computational Geometry 2009
SCG '09: Proceedings of the 25th annual symposium on Computational geometry (2009) pp 227--236
10.1145/1542362.1542406
null
math.AT cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nonlinear dimensionality reduction (NLDR) algorithms such as Isomap, LLE and Laplacian Eigenmaps address the problem of representing high-dimensional nonlinear data in terms of low-dimensional coordinates which represent the intrinsic structure of the data. This paradigm incorporates the assumption that real-valued coordinates provide a rich enough class of functions to represent the data faithfully and efficiently. On the other hand, there are simple structures which challenge this assumption: the circle, for example, is one-dimensional but its faithful representation requires two real coordinates. In this work, we present a strategy for constructing circle-valued functions on a statistical data set. We develop a machinery of persistent cohomology to identify candidates for significant circle-structures in the data, and we use harmonic smoothing and integration to obtain the circle-valued coordinate functions themselves. We suggest that this enriched class of coordinate functions permits a precise NLDR analysis of a broader range of realistic data sets.
[ { "version": "v1", "created": "Fri, 29 May 2009 15:01:09 GMT" } ]
2009-06-12T00:00:00
[ [ "de Silva", "Vin", "" ], [ "Vejdemo-Johansson", "Mikael", "" ] ]
[ { "class": "Mathematics", "code": "math.AT", "description": "Homotopy theory, homological algebra, algebraic treatments of manifolds", "span": "(Algebraic Topology)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0905.4902
Florentina Pintea
Dan L. Lacrama, Ioan Snep
Flexible frontiers for text division into rows
6 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),199-204
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an original solution for flexible hand-written text division into rows. Unlike the standard procedure, the proposed method avoids the isolated characters extensions amputation and reduces the recognition error rate in the final stage.
[ { "version": "v1", "created": "Fri, 29 May 2009 15:35:10 GMT" } ]
2009-06-01T00:00:00
[ [ "Lacrama", "Dan L.", "" ], [ "Snep", "Ioan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0905.4905
Florentina Pintea
Lucian Luca, Lucian L. Luca
Aspects Regarding Operations with Fuzzy Processes
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),205-214
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the notion of fuzzy process as a formalism for the idea of fuzzy contact between a device and its environment. The notions of absolute correctness and relative correctness are defined. In order to work with concurrency it has been built an approach to manipulate the interactive processes as a single process and the resulted behavior has been observed.
[ { "version": "v1", "created": "Fri, 29 May 2009 15:43:32 GMT" } ]
2009-06-01T00:00:00
[ [ "Luca", "Lucian", "" ], [ "Luca", "Lucian L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.4906
Florentina Pintea
Lucian Luca, Lucian L. Luca
On Some Manipulations with Fuzzy Processes
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),215-224
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper starts from the observation on the complexity of the manipulation of fuzzy processes that increases very rapidly with the extents of the processes representation. Therefore, a productive approach is to divide the problem into smaller parts, treated separately and then the results combined. Some algebraic results obtained by the authors are presented.
[ { "version": "v1", "created": "Fri, 29 May 2009 15:47:17 GMT" } ]
2009-06-01T00:00:00
[ [ "Luca", "Lucian", "" ], [ "Luca", "Lucian L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0905.4909
Florentina Pintea
Laura Maruster, Stefan Maruster
On the Convex Feasibility Problem
14 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),225-238
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The convergence of the projection algorithm for solving the convex feasibility problem for a family of closed convex sets, is in connection with the regularity properties of the family. In the paper [18] are pointed out four cases of such a family depending of the two characteristics: the emptiness and boudedness of the intersection of the family. The case four (the interior of the intersection is empty and the intersection itself is bounded) is unsolved. In this paper we give a (partial) answer for the case four: in the case of two closed convex sets in R3 the regularity property holds.
[ { "version": "v1", "created": "Fri, 29 May 2009 15:53:02 GMT" } ]
2009-06-01T00:00:00
[ [ "Maruster", "Laura", "" ], [ "Maruster", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0905.4918
Josep M. Pujol
Josep M. Pujol, Vijay Erramilli and Pablo Rodriguez
Divide and Conquer: Partitioning Online Social Networks
7 pages, 4 figures
null
null
null
cs.NI cs.AI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Online Social Networks (OSNs) have exploded in terms of scale and scope over the last few years. The unprecedented growth of these networks present challenges in terms of system design and maintenance. One way to cope with this is by partitioning such large networks and assigning these partitions to different machines. However, social networks possess unique properties that make the partitioning problem non-trivial. The main contribution of this paper is to understand different properties of social networks and how these properties can guide the choice of a partitioning algorithm. Using large scale measurements representing real OSNs, we first characterize different properties of social networks, and then we evaluate qualitatively different partitioning methods that cover the design space. We expose different trade-offs involved and understand them in light of properties of social networks. We show that a judicious choice of a partitioning scheme can help improve performance.
[ { "version": "v1", "created": "Fri, 29 May 2009 16:29:40 GMT" } ]
2009-06-01T00:00:00
[ [ "Pujol", "Josep M.", "" ], [ "Erramilli", "Vijay", "" ], [ "Rodriguez", "Pablo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0905.4923
James Currie
James D. Currie
Lexicographically least words in the orbit closure of the Rudin-Shapiro word
9 pages
null
null
null
cs.FL math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an effective characterization of the lexicographically least word in the orbit closure of the Rudin-Shapiro word w having a specified prefix. In particular, the lexicographically least word in the orbit closure of the Rudin-Shapiro word is 0w. This answers a question Allouche et al.
[ { "version": "v1", "created": "Fri, 29 May 2009 17:14:46 GMT" }, { "version": "v2", "created": "Mon, 1 Jun 2009 15:13:42 GMT" }, { "version": "v3", "created": "Mon, 4 Oct 2010 20:12:31 GMT" } ]
2010-10-06T00:00:00
[ [ "Currie", "James D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0905.4926
Sergey Loyka
Vladimir Mordachev, Sergey Loyka
On Node Density -- Outage Probability Tradeoff in Wireless Networks
IEEE Journal on Selected Areas in Communications, accepted, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A statistical model of interference in wireless networks is considered, which is based on the traditional propagation channel model and a Poisson model of random spatial distribution of nodes in 1-D, 2-D and 3-D spaces with both uniform and non-uniform densities. The power of nearest interferer is used as a major performance indicator, instead of a traditionally-used total interference power, since at the low outage region, they have the same statistics so that the former is an accurate approximation of the latter. This simplifies the problem significantly and allows one to develop a unified framework for the outage probability analysis, including the impacts of complete/partial interference cancelation, of different types of fading and of linear filtering, either alone or in combination with each other. When a given number of nearest interferers are completely canceled, the outage probability is shown to scale down exponentially in this number. Three different models of partial cancelation are considered and compared via their outage probabilities. The partial cancelation level required to eliminate the impact of an interferer is quantified. The effect of a broad class of fading processes (including all popular fading models) is included in the analysis in a straightforward way, which can be positive or negative depending on a particular model and propagation/system parameters. The positive effect of linear filtering (e.g. by directional antennas) is quantified via a new statistical selectivity parameter. The analysis results in formulation of a tradeoff relationship between the network density and the outage probability, which is a result of the interplay between random geometry of node locations, the propagation path loss and the distortion effects at the victim receiver.
[ { "version": "v1", "created": "Fri, 29 May 2009 17:40:29 GMT" } ]
2009-06-01T00:00:00
[ [ "Mordachev", "Vladimir", "" ], [ "Loyka", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0905.4930
Maxwell Young
Therese Biedl, Stephane Durocher, Holger H. Hoos, Shuang Luan, Jared Saia and Maxwell Young
Improved Approximation Algorithms for Segment Minimization in Intensity Modulated Radiation Therapy
18 pages
"A Note on Improving the Performance of Approximation Algorithms for Radiation Therapy''. Information Processing Letters, 111(7), 326-333, 2011
10.1016/j.ipl.2010.12.011
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
he segment minimization problem consists of finding the smallest set of integer matrices that sum to a given intensity matrix, such that each summand has only one non-zero value, and the non-zeroes in each row are consecutive. This has direct applications in intensity-modulated radiation therapy, an effective form of cancer treatment. We develop three approximation algorithms for matrices with arbitrarily many rows. Our first two algorithms improve the approximation factor from the previous best of $1+\log_2 h $ to (roughly) $3/2 \cdot (1+\log_3 h)$ and $11/6\cdot(1+\log_4{h})$, respectively, where $h$ is the largest entry in the intensity matrix. We illustrate the limitations of the specific approach used to obtain these two algorithms by proving a lower bound of $\frac{(2b-2)}{b}\cdot\log_b{h} + \frac{1}{b}$ on the approximation guarantee. Our third algorithm improves the approximation factor from $2 \cdot (\log D+1)$ to $24/13 \cdot (\log D+1)$, where $D$ is (roughly) the largest difference between consecutive elements of a row of the intensity matrix. Finally, experimentation with these algorithms shows that they perform well with respect to the optimum and outperform other approximation algorithms on 77% of the 122 test cases we consider, which include both real world and synthetic data.
[ { "version": "v1", "created": "Fri, 29 May 2009 17:56:06 GMT" }, { "version": "v2", "created": "Wed, 2 Sep 2009 23:26:59 GMT" } ]
2011-09-27T00:00:00
[ [ "Biedl", "Therese", "" ], [ "Durocher", "Stephane", "" ], [ "Hoos", "Holger H.", "" ], [ "Luan", "Shuang", "" ], [ "Saia", "Jared", "" ], [ "Young", "Maxwell", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0905.4937
Daniil Ryabko
Daniil Ryabko (INRIA Futurs, LIFL, INRIA Lille - Nord Europe)
A criterion for hypothesis testing for stationary processes
part or this report appeared as: Test, vol. 21(2), pp. 317-329, 2012
null
null
null
math.ST cs.IT math.IT math.PR stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a finite-valued sample $X_1,...,X_n$ we wish to test whether it was generated by a stationary ergodic process belonging to a family $H_0$, or it was generated by a stationary ergodic process outside $H_0$. We require the Type I error of the test to be uniformly bounded, while the type II error has to be mande not more than a finite number of times with probability 1. For this notion of consistency we provide necessary and sufficient conditions on the family $H_0$ for the existence of a consistent test. This criterion is illustrated with applications to testing for a membership to parametric families, generalizing some existing results. In addition, we analyze a stronger notion of consistency, which requires finite-sample guarantees on error of both types, and provide some necessary and some sufficient conditions for the existence of a consistent test. We emphasize that no assumption on the process distributions are made beyond stationarity and ergodicity.
[ { "version": "v1", "created": "Fri, 29 May 2009 18:20:24 GMT" }, { "version": "v2", "created": "Sat, 30 May 2009 09:34:36 GMT" }, { "version": "v3", "created": "Mon, 19 Oct 2009 09:59:10 GMT" }, { "version": "v4", "created": "Sat, 27 Dec 2014 00:10:22 GMT" } ]
2014-12-30T00:00:00
[ [ "Ryabko", "Daniil", "", "INRIA Futurs, LIFL, INRIA Lille - Nord Europe" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0906.0037
Nadia Fawaz
Nadia Fawaz, Keyvan Zarifi, Merouane Debbah, David Gesbert
Asymptotic Capacity and Optimal Precoding in MIMO Multi-Hop Relay Networks
45 pages, 7 figures, submitted to IEEE Transactions on Information Theory, December 2008
null
10.1109/TIT.2011.2111830
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-hop relaying system is analyzed where data sent by a multi-antenna source is relayed by successive multi-antenna relays until it reaches a multi-antenna destination. Assuming correlated fading at each hop, each relay receives a faded version of the signal from the previous level, performs linear precoding and retransmits it to the next level. Using free probability theory and assuming that the noise power at relaying levels-- but not at destination-- is negligible, the closed-form expression of the asymptotic instantaneous end-to-end mutual information is derived as the number of antennas at all levels grows large. The so-obtained deterministic expression is independent from the channel realizations while depending only on channel statistics. Moreover, it also serves as the asymptotic value of the average end-to-end mutual information. The optimal singular vectors of the precoding matrices that maximize the average mutual information with finite number of antennas at all levels are also provided. It turns out that the optimal precoding singular vectors are aligned to the eigenvectors of the channel correlation matrices. Thus they can be determined using only the known channel statistics. As the optimal precoding singular vectors are independent from the system size, they are also optimal in the asymptotic regime.
[ { "version": "v1", "created": "Fri, 29 May 2009 22:44:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Fawaz", "Nadia", "" ], [ "Zarifi", "Keyvan", "" ], [ "Debbah", "Merouane", "" ], [ "Gesbert", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0049
Serguei Mokhov
Serguei A. Mokhov, Joey Paquet, and Mourad Debbabi
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid
11 pages, 7 figures; related to arXiv:0904.3789 and arXiv:0905.2449
null
null
null
cs.LO cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work-in-progress focuses on the refinement of application of the intensional logic to cyberforensic analysis and its benefits are compared with the finite-state automata approach. This work extends the use of the scientific intensional programming paradigm onto modeling and implementation of a cyberforensics investigation process with the backtrace of event reconstruction, modeling the evidence as multidimensional hierarchical contexts, and proving or disproving the claims with it in the intensional manner of evaluation. This is a practical, context-aware improvement over the finite state automata (FSA) approach we have seen in the related works. As a base implementation language model we use in this approach is a new dialect of the Lucid programming language, that we call Forensic Lucid and in this paper we focus on defining hierarchical contexts based on the intensional logic for the evaluation of cyberforensic expressions.
[ { "version": "v1", "created": "Sat, 30 May 2009 02:04:15 GMT" } ]
2009-06-02T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "Paquet", "Joey", "" ], [ "Debbabi", "Mourad", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.0052
Brian Tomasik
Brian Tomasik
A Minimum Description Length Approach to Multitask Feature Selection
29 pages, 3 figures, undergraduate thesis
null
null
null
cs.LG cs.AI
http://creativecommons.org/licenses/by/3.0/
Many regression problems involve not one but several response variables (y's). Often the responses are suspected to share a common underlying structure, in which case it may be advantageous to share information across them; this is known as multitask learning. As a special case, we can use multiple responses to better identify shared predictive features -- a project we might call multitask feature selection. This thesis is organized as follows. Section 1 introduces feature selection for regression, focusing on ell_0 regularization methods and their interpretation within a Minimum Description Length (MDL) framework. Section 2 proposes a novel extension of MDL feature selection to the multitask setting. The approach, called the "Multiple Inclusion Criterion" (MIC), is designed to borrow information across regression tasks by more easily selecting features that are associated with multiple responses. We show in experiments on synthetic and real biological data sets that MIC can reduce prediction error in settings where features are at least partially shared across responses. Section 3 surveys hypothesis testing by regression with a single response, focusing on the parallel between the standard Bonferroni correction and an MDL approach. Mirroring the ideas in Section 2, Section 4 proposes a novel MIC approach to hypothesis testing with multiple responses and shows that on synthetic data with significant sharing of features across responses, MIC sometimes outperforms standard FDR-controlling methods in terms of finding true positives for a given level of false positives. Section 5 concludes.
[ { "version": "v1", "created": "Sat, 30 May 2009 03:41:37 GMT" } ]
2009-06-02T00:00:00
[ [ "Tomasik", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.0060
Minas Gjoka
Minas Gjoka, Maciej Kurant, Carter T. Butts, Athina Markopoulou
A Walk in Facebook: Uniform Sampling of Users in Online Social Networks
published in IEEE INFOCOM '10; IEEE Journal on Selected Areas in Communications (JSAC), Special Issue on Measurement of Internet Topologies, 2011 under the title "Practical Recommendations on Crawling Online Social Networks"
null
null
null
cs.SI cs.NI physics.data-an physics.soc-ph stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our goal in this paper is to develop a practical framework for obtaining a uniform sample of users in an online social network (OSN) by crawling its social graph. Such a sample allows to estimate any user property and some topological properties as well. To this end, first, we consider and compare several candidate crawling techniques. Two approaches that can produce approximately uniform samples are the Metropolis-Hasting random walk (MHRW) and a re-weighted random walk (RWRW). Both have pros and cons, which we demonstrate through a comparison to each other as well as to the "ground truth." In contrast, using Breadth-First-Search (BFS) or an unadjusted Random Walk (RW) leads to substantially biased results. Second, and in addition to offline performance assessment, we introduce online formal convergence diagnostics to assess sample quality during the data collection process. We show how these diagnostics can be used to effectively determine when a random walk sample is of adequate size and quality. Third, as a case study, we apply the above methods to Facebook and we collect the first, to the best of our knowledge, representative sample of Facebook users. We make it publicly available and employ it to characterize several key properties of Facebook.
[ { "version": "v1", "created": "Sat, 30 May 2009 05:26:36 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 05:25:50 GMT" }, { "version": "v3", "created": "Tue, 12 Oct 2010 23:47:24 GMT" }, { "version": "v4", "created": "Fri, 4 Feb 2011 08:19:03 GMT" }, { "version": "v5", "created": "Fri, 17 Jun 2011 05:37:43 GMT" } ]
2015-03-13T00:00:00
[ [ "Gjoka", "Minas", "" ], [ "Kurant", "Maciej", "" ], [ "Butts", "Carter T.", "" ], [ "Markopoulou", "Athina", "" ] ]
[ { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" } ]
0906.0065
Serguei Mokhov
Serguei A. Mokhov, Lee Wei Huynh, Jian Li (Concordia University, Montreal, Canada)
Managing Distributed MARF with SNMP
39 pages, 16 figures, TOC, index. A large portion of this report has been published at PDPTA'08. This 2007 report is a successor of the original DMARF work documented at arXiv:0905.2459 ; v2 adds missing .ind file for the index
Proceedings of PDPTA'08 (2008), Volume 2, pp. 948-954
null
null
cs.DC cs.CV
http://creativecommons.org/licenses/by/3.0/
The scope of this project's work focuses on the research and prototyping of the extension of the Distributed MARF such that its services can be managed through the most popular management protocol familiarly, SNMP. The rationale behind SNMP vs. MARF's proprietary management protocols, is that can be integrated with the use of common network service and device management, so the administrators can manage MARF nodes via a already familiar protocol, as well as monitor their performance, gather statistics, set desired configuration, etc. perhaps using the same management tools they've been using for other network devices and application servers.
[ { "version": "v1", "created": "Sat, 30 May 2009 06:42:55 GMT" }, { "version": "v2", "created": "Sun, 26 Jul 2009 23:00:45 GMT" } ]
2009-07-27T00:00:00
[ [ "Mokhov", "Serguei A.", "", "Concordia University,\n Montreal, Canada" ], [ "Huynh", "Lee Wei", "", "Concordia University,\n Montreal, Canada" ], [ "Li", "Jian", "", "Concordia University,\n Montreal, Canada" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.0072
Jakub Michaliszyn
Jerzy Marcinkowski, Jakub Michaliszyn
The cost of being co-Buchi is nonlinear
12 pages, 4 figures; added information about grand
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well known, and easy to see, that not each nondeterministic Buchi automaton on infinite words can be simulated by a nondeterministic co-Buchi automaton. We show that in the cases when such a simulation is possible, the number of states needed for it can grow nonlinearly. More precisely, we show a sequence of - as we believe, simple and elegant - languages which witness the existence of a nondeterministic Buchi automaton with n states, which can be simulated by a nondeterministic co-Buchi automaton, but cannot be simulated by any nondeterministic co-Buchi automaton with less than c*n^{7/6} states for some constant c. This improves on the best previously known lower bound of 3(n-1)/2.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 15:47:18 GMT" }, { "version": "v2", "created": "Sun, 7 Jun 2009 09:10:28 GMT" } ]
2009-06-07T00:00:00
[ [ "Marcinkowski", "Jerzy", "" ], [ "Michaliszyn", "Jakub", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.0080
L.T. Handoko
Z. Akbar and L.T. Handoko
Reverse method for labeling the information from semi-structured web pages
5 pages, Proceeding of the 2009 International Conference on Signal Processing Systems pp. 551-555
null
10.1109/ICSPS.2009.86
FISIKALIPI-09017
cs.IR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new technique to infer the structure and extract the tokens of data from the semi-structured web sources which are generated using a consistent template or layout with some implicit regularities. The attributes are extracted and labeled reversely from the region of interest of targeted contents. This is in contrast with the existing techniques which always generate the trees from the root. We argue and show that our technique is simpler, more accurate and effective especially to detect the changes of the templates of targeted web pages.
[ { "version": "v1", "created": "Sat, 30 May 2009 14:22:04 GMT" }, { "version": "v2", "created": "Thu, 6 Aug 2009 17:36:09 GMT" } ]
2009-08-06T00:00:00
[ [ "Akbar", "Z.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.0151
Didehvar Farzaad
Mahtab Hoseininia, Farzad Didehvar, Mir Mehdi Seyyed Esfahani
Inventory competition in a multi channel distribution system: The Nash and Stackelberg game
20 pages, 1 figure
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates inventory management in a multi channel distribution system consisting of one manufacturer and an arbitrary number of retailers that face stochastic demand. Existence of the pure Nash equilibrium is proved and parameter restriction which implies uniqueness of it is derived. Also the Stackelberg game where the manufacturer plays a roll as a leader is discussed. Under specified parameter restrictions which guarantee profitability, sufficient condition for uniqueness of Stackelberg equilibrium is obtained. In addition comparison with simultaneous move game is made. The result shows that when whole prices are equal to production cost, manufacturer carries more inventory than simultaneous move game. Keywords: Inventory management, Substitution, Nash equilibrium, Stackelberg equilibrium.
[ { "version": "v1", "created": "Sun, 31 May 2009 12:25:12 GMT" } ]
2009-06-02T00:00:00
[ [ "Hoseininia", "Mahtab", "" ], [ "Didehvar", "Farzad", "" ], [ "Esfahani", "Mir Mehdi Seyyed", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.0202
Abedelaziz Mohaisen
Abedelaziz Mohaisen and Dowon Hong
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
3 pages, 1 figure, appeared as a letter in ETRI journal
Abedelaziz Mohaisen, and Dowon Hong: Mitigating the ICA Attack against Rotation-Based Transformation for Privacy Preserving Clustering, ETRI Journal, vol.30, no.6, Dec. 2008, pp.868-870
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 03:31:26 GMT" } ]
2009-06-02T00:00:00
[ [ "Mohaisen", "Abedelaziz", "" ], [ "Hong", "Dowon", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.0205
Forrest Sheng Bao
Yuanlin Zhang and Forrest Sheng Bao
A Survey of Tree Convex Sets Test
13 pages, 5 figures, 2 tables
null
null
null
cs.DS cs.CC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Tree convex sets refer to a collection of sets such that each set in the collection is a subtree of a tree whose nodes are the elements of these sets. They extend the concept of row convex sets each of which is an interval over a total ordering of the elements of those sets. They have been applied to identify tractable Constraint Satisfaction Problems and Combinatorial Auction Problems. Recently, polynomial algorithms have been proposed to recognize tree convex sets. In this paper, we review the materials that are the key to a linear recognition algorithm.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 03:54:42 GMT" } ]
2009-06-03T00:00:00
[ [ "Zhang", "Yuanlin", "" ], [ "Bao", "Forrest Sheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.0211
Sumio Watanabe
Sumio Watanabe
Equations of States in Statistical Learning for a Nonparametrizable and Regular Case
null
null
10.1587/transfun.E93.A.617
null
cs.LG
http://creativecommons.org/licenses/publicdomain/
Many learning machines that have hierarchical structure or hidden variables are now being used in information science, artificial intelligence, and bioinformatics. However, several learning machines used in such fields are not regular but singular statistical models, hence their generalization performance is still left unknown. To overcome these problems, in the previous papers, we proved new equations in statistical learning, by which we can estimate the Bayes generalization loss from the Bayes training loss and the functional variance, on the condition that the true distribution is a singularity contained in a learning machine. In this paper, we prove that the same equations hold even if a true distribution is not contained in a parametric model. Also we prove that, the proposed equations in a regular case are asymptotically equivalent to the Takeuchi information criterion. Therefore, the proposed equations are always applicable without any condition on the unknown true distribution.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 04:47:15 GMT" }, { "version": "v2", "created": "Wed, 3 Jun 2009 03:25:56 GMT" } ]
2015-05-13T00:00:00
[ [ "Watanabe", "Sumio", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.0231
Kimikazu Kato
Kimikazu Kato and Tikara Hosino
Solving $k$-Nearest Neighbor Problem on Multiple Graphics Processors
5 pages, 8 figures, 1 table
null
null
null
cs.IR cs.DS cs.NE
http://creativecommons.org/licenses/by/3.0/
The recommendation system is a software system to predict customers' unknown preferences from known preferences. In the recommendation system, customers' preferences are encoded into vectors, and finding the nearest vectors to each vector is an essential part. This vector-searching part of the problem is called a $k$-nearest neighbor problem. We give an effective algorithm to solve this problem on multiple graphics processor units (GPUs). Our algorithm consists of two parts: an $N$-body problem and a partial sort. For a algorithm of the $N$-body problem, we applied the idea of a known algorithm for the $N$-body problem in physics, although another trick is need to overcome the problem of small sized shared memory. For the partial sort, we give a novel GPU algorithm which is effective for small $k$. In our partial sort algorithm, a heap is accessed in parallel by threads with a low cost of synchronization. Both of these two parts of our algorithm utilize maximal power of coalesced memory access, so that a full bandwidth is achieved. By an experiment, we show that when the size of the problem is large, an implementation of the algorithm on two GPUs runs more than 330 times faster than a single core implementation on a latest CPU. We also show that our algorithm scales well with respect to the number of GPUs.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 08:14:13 GMT" }, { "version": "v2", "created": "Tue, 2 Jun 2009 06:48:21 GMT" }, { "version": "v3", "created": "Thu, 15 Jul 2010 02:23:22 GMT" } ]
2010-07-16T00:00:00
[ [ "Kato", "Kimikazu", "" ], [ "Hosino", "Tikara", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0906.0237
Thomas Roche
Thomas Roche and C\'edric Tavernier
Multi-Linear cryptanalysis in Power Analysis Attacks MLPA
16 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Power analysis attacks against embedded secret key cryptosystems are widely studied since the seminal paper of Paul Kocher, Joshua Ja, and Benjamin Jun in 1998 where has been introduced the powerful Differential Power Analysis. The strength of DPA is such that it became necessary to develop sound and efficient countermeasures. Nowadays embedded cryptographic primitives usually integrate one or several of these countermeasures (e.g. masking techniques, asynchronous designs, balanced dynamic dual-rail gates designs, noise adding, power consumption smoothing, etc. ...). This document presents a simple, yet interesting, countermeasure to DPA and HO-DPA attacks, called brutal countermeasure and new power analysis attacks using multi-linear approximations (MLPA attacks) based on very recent and still unpublished results of Tavernier et al..
[ { "version": "v1", "created": "Mon, 1 Jun 2009 08:34:50 GMT" } ]
2009-06-02T00:00:00
[ [ "Roche", "Thomas", "" ], [ "Tavernier", "Cédric", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.0247
Albert Guill\'en i F\`abregas
Tung T. Kim and Albert Guillen i Fabregas
Coded Modulation with Mismatched CSIT over Block-Fading Channels
submitted to the IEEE Transactions on Information Theory. To be presented (in part) at the 2009 IEEE International Symposium on Information Theory, Seoul, South Korea, June-July 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reliable communication over delay-constrained block-fading channels with discrete inputs and mismatched (imperfect) channel state information at the transmitter (CSIT) is studied. The CSIT mismatch is modeled as Gaussian random variables, whose variances decay as a power of the signal-to-noise ratio (SNR). A special focus is placed on the large-SNR decay of the outage probability when power control with long-term power constraints is used. Without explicitly characterizing the corresponding power allocation algorithms, we derive the outage exponent as a function of the system parameters, including the CSIT noise variance exponent and the exponent of the peak power constraint. It is shown that CSIT, even if noisy, is always beneficial and leads to important gains in terms of exponents. It is also shown that when multidimensional rotations or precoders are used at the transmitter, further exponent gains can be attained, but at the expense of larger decoding complexity.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 09:57:18 GMT" } ]
2009-06-02T00:00:00
[ [ "Kim", "Tung T.", "" ], [ "Fabregas", "Albert Guillen i", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0249
Arash Ghasemmehdi
Arash Ghasemmehdi and Erik Agrell
Faster Projection in Sphere Decoding
null
IEEE Transactions on Information Theory, vol. 57, no. 6, pp. 3530-3536, June 2011
10.1109/TIT.2011.2143830
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most of the calculations in standard sphere decoders are redundant, in the sense that they either calculate quantities that are never used or calculate some quantities more than once. A new method, which is applicable to lattices as well as finite constellations, is proposed to avoid these redundant calculations while still returning the same result. Pseudocode is given to facilitate immediate implementation. Simulations show that the speed gain with the proposed method increases linearly with the lattice dimension. At dimension 60, the new algorithms avoid about 75% of all floating-point operations.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 10:13:14 GMT" }, { "version": "v2", "created": "Wed, 1 Dec 2010 21:36:03 GMT" } ]
2015-01-07T00:00:00
[ [ "Ghasemmehdi", "Arash", "" ], [ "Agrell", "Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0252
Jeong Hoon Lee
Jeong-Hoon Lee, Kyu-Young Whang, Hyo-Sang Lim, Byung-Suk Lee, and Jun-Seok Heo
Progressive Processing of Continuous Range Queries in Hierarchical Wireless Sensor Networks
41 pages, 20 figures
null
10.1587/transinf.E93.D.1832
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problem of processing continuous range queries in a hierarchical wireless sensor network. Contrasted with the traditional approach of building networks in a "flat" structure using sensor devices of the same capability, the hierarchical approach deploys devices of higher capability in a higher tier, i.e., a tier closer to the server. While query processing in flat sensor networks has been widely studied, the study on query processing in hierarchical sensor networks has been inadequate. In wireless sensor networks, the main costs that should be considered are the energy for sending data and the storage for storing queries. There is a trade-off between these two costs. Based on this, we first propose a progressive processing method that effectively processes a large number of continuous range queries in hierarchical sensor networks. The proposed method uses the query merging technique proposed by Xiang et al. as the basis and additionally considers the trade-off between the two costs. More specifically, it works toward reducing the storage cost at lower-tier nodes by merging more queries, and toward reducing the energy cost at higher-tier nodes by merging fewer queries (thereby reducing "false alarms"). We then present how to build a hierarchical sensor network that is optimal with respect to the weighted sum of the two costs. It allows for a cost-based systematic control of the trade-off based on the relative importance between the storage and energy in a given network environment and application. Experimental results show that the proposed method achieves a near-optimal control between the storage and energy and reduces the cost by 0.989~84.995 times compared with the cost achieved using the flat (i.e., non-hierarchical) setup as in the work by Xiang et al.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 11:04:04 GMT" } ]
2015-05-13T00:00:00
[ [ "Lee", "Jeong-Hoon", "" ], [ "Whang", "Kyu-Young", "" ], [ "Lim", "Hyo-Sang", "" ], [ "Lee", "Byung-Suk", "" ], [ "Heo", "Jun-Seok", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0906.0268
Vincent N\'elis
Vincent Nelis and Joel Goossens
MORA: an Energy-Aware Slack Reclamation Scheme for Scheduling Sporadic Real-Time Tasks upon Multiprocessor Platforms
11 pages
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the global and preemptive energy-aware scheduling problem of sporadic constrained-deadline tasks on DVFS-identical multiprocessor platforms. We propose an online slack reclamation scheme which profits from the discrepancy between the worst- and actual-case execution time of the tasks by slowing down the speed of the processors in order to save energy. Our algorithm called MORA takes into account the application-specific consumption profile of the tasks. We demonstrate that MORA does not jeopardize the system schedulability and we show by performing simulations that it can save up to 32% of energy (in average) compared to execution without using any energy-aware algorithm.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 12:10:10 GMT" } ]
2009-06-02T00:00:00
[ [ "Nelis", "Vincent", "" ], [ "Goossens", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0906.0281
L.T. Handoko
I. Firmansyah, Z. Akbar, L.T. Handoko
Microcontroller based distributed and networked control system for public cluster
4 pages, Proceeding of the International Conference on Quality in Research 2009
null
null
FISIKALIPI-09022
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the architecture and application of the distributed control in public cluster, a parallel machine which is open for public access. Following the nature of public cluster, the integrated distributed control system is fully accessible through network using a user-friendly web interface. The system is intended mainly to control the power of each node in a block of parallel computers provided to certain users. This is especially important to extend the life-time of related hardwares, and to reduce the whole running and maintainance costs. The system consists of two parts : the master- and node-controllers, and both are connected each other through RS-485 interface. Each node-controller is assigned with a unique address to distinguish each of them. We also discuss briefly the implementation of the system at the LIPI Public Cluster.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 13:25:21 GMT" } ]
2009-06-02T00:00:00
[ [ "Firmansyah", "I.", "" ], [ "Akbar", "Z.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.0298
Vincent Lau
Vincent K. N. Lau and Yan Chen
Delay-Optimal Power and Precoder Adaptation for Multi-stream MIMO Systems
null
IEEE Transactions on Wireless Communications, June 2009
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider delay-optimal MIMO precoder and power allocation design for a MIMO Link in wireless fading channels. There are $L$ data streams spatially multiplexed onto the MIMO link with heterogeneous packet arrivals and delay requirements. The transmitter is assumed to have knowledge of the channel state information (CSI) as well as the joint queue state information (QSI) of the $L$ buffers. Using $L$-dimensional Markov Decision Process (MDP), we obtain optimal precoding and power allocation policies for general delay regime, which consists of an online solution and an offline solution. The online solution has negligible complexity but the offline solution has worst case complexity ${\cal O}((N+1)^L)$ where $N$ is the buffer size. Using {\em static sorting} of the $L$ eigenchannels, we decompose the MDP into $L$ independent 1-dimensional subproblems and obtained low complexity offline solution with linear complexity order ${\cal O}(NL)$ and close-to-optimal performance.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 14:48:33 GMT" } ]
2009-06-02T00:00:00
[ [ "Lau", "Vincent K. N.", "" ], [ "Chen", "Yan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0311
Christophe Paoli
Christophe Paoli, Cyril Voyant, Marc Muselli, Marie-Laure Nivet
Solar radiation forecasting using ad-hoc time series preprocessing and neural networks
14 pages, 8 figures, 2009 International Conference on Intelligent Computing
null
null
null
cs.AI cs.NA physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present an application of neural networks in the renewable energy domain. We have developed a methodology for the daily prediction of global solar radiation on a horizontal surface. We use an ad-hoc time series preprocessing and a Multi-Layer Perceptron (MLP) in order to predict solar radiation at daily horizon. First results are promising with nRMSE < 21% and RMSE < 998 Wh/m2. Our optimized MLP presents prediction similar to or even better than conventional methods such as ARIMA techniques, Bayesian inference, Markov chains and k-Nearest-Neighbors approximators. Moreover we found that our data preprocessing approach can reduce significantly forecasting errors.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 16:02:10 GMT" } ]
2009-06-02T00:00:00
[ [ "Paoli", "Christophe", "" ], [ "Voyant", "Cyril", "" ], [ "Muselli", "Marc", "" ], [ "Nivet", "Marie-Laure", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0906.0328
Andrea Pasquinucci
Andrea Pasquinucci
Rivisiting Token/Bucket Algorithms in New Applications
7 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a somehow peculiar Token/Bucket problem which at first sight looks confusing and difficult to solve. The winning approach to solve the problem consists in going back to the simple and traditional methods to solve computer science problems like the one taught to us by Knuth. Somehow the main trick is to be able to specify clearly what needs to be achieved, and then the solution, even if complex, appears almost by itself.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 18:06:45 GMT" } ]
2009-06-02T00:00:00
[ [ "Pasquinucci", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.0330
Gregory Chirikjian
Gregory S. Chirikjian
Information-Theoretic Inequalities on Unimodular Lie Groups
null
null
null
null
cs.IT math-ph math.IT math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classical inequalities used in information theory such as those of de Bruijn, Fisher, and Kullback carry over from the setting of probability theory on Euclidean space to that of unimodular Lie groups. These are groups that posses integration measures that are invariant under left and right shifts, which means that even in noncommutative cases they share many of the useful features of Euclidean space. In practical engineering terms the rotation group and Euclidean motion group are the unimodular Lie groups of most interest, and the development of information theory applicable to these Lie groups opens up the potential to study problems relating to image reconstruction from irregular or random projection directions, information gathering in mobile robotics, satellite attitude control, and bacterial chemotaxis and information processing. Several definitions are extended from the Euclidean case to that of Lie groups including the Fisher information matrix, and inequalities analogous to those in classical information theory are derived and stated in the form of fifteen small theorems. In all such inequalities, addition of random variables is replaced with the group product, and the appropriate generalization of convolution of probability densities is employed.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 18:12:39 GMT" } ]
2009-06-02T00:00:00
[ [ "Chirikjian", "Gregory S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0906.0343
Michael LaMar
M. Drew LaMar
Algorithms for realizing degree sequences of directed graphs
35 pages, 14 figures
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Havel-Hakimi algorithm for constructing realizations of degree sequences for undirected graphs has been used extensively in the literature. A result by Kleitman and Wang extends the Havel-Hakimi algorithm to degree sequences for directed graphs. In this paper we go a step further and describe a modification of Kleitman and Wang's algorithm that is a more natural extension of Havel-Hakimi's algorithm, in the sense that our extension can be made equivalent to Havel-Hakimi's algorithm when the degree sequence has equal in and out degrees and an even degree sum. We identify special degree sequences, called directed 3-cycle anchored, that are ill-defined for the algorithm and force a particular local structure on all directed graph realizations. We give structural characterizations of these realizations, as well as characterizations of the ill-defined degree sequences, leading to a well-defined algorithm.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 19:11:43 GMT" }, { "version": "v2", "created": "Tue, 8 Jun 2010 17:07:14 GMT" } ]
2015-03-13T00:00:00
[ [ "LaMar", "M. Drew", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.0346
Sebastien Li-Thiao-Te
S\'ebastien Li-Thiao-T\'e (CMLA)
Semiparametric Estimation of a Noise Model with Quantization Errors
19 p
null
null
null
cs.DM math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The detectors in mass spectrometers are precise enough to count ion events. In practice, the statistics of chemical noise are affected by large quantization errors and overdispersion because of amplification in the detector. The detector signal is modelled as X =floor(t N) where N represents integer-valued ion counts and t represents the gain parameter. When t <= 1, the gain parameter cannot be recovered without a priori information on N. When t > 1 however, we introduce compatible lattices and derive an estimator for t that is optimal, independent of N and enables subsequent analyses of the ion counts.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 19:15:32 GMT" } ]
2009-06-02T00:00:00
[ [ "Li-Thiao-Té", "Sébastien", "", "CMLA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0906.0350
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Eliana-Dina Tirsa, Nicolae Tapus, Florin Pop, Ciprian Mihai Dobre
Towards a Centralized Scheduling Framework for Communication Flows in Distributed Systems
null
Proceedings of the 17th International Conference on Control Systems and Computer Science (CSCS), vol. 1, pp. 441-448, Bucharest, Romania, 26-29 May, 2009. (ISSN: 2066-4451)
null
null
cs.DS cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The overall performance of a distributed system is highly dependent on the communication efficiency of the system. Although network resources (links, bandwidth) are becoming increasingly more available, the communication performance of data transfers involving large volumes of data does not necessarily improve at the same rate. This is due to the inefficient usage of the available network resources. A solution to this problem consists of data transfer scheduling techniques, which manage and allocate the network resources in an efficient manner. In this paper we present several online and offline data transfer optimization techniques, in the context of a centrally controlled distributed system.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 19:30:03 GMT" } ]
2009-06-02T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Tirsa", "Eliana-Dina", "" ], [ "Tapus", "Nicolae", "" ], [ "Pop", "Florin", "" ], [ "Dobre", "Ciprian Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.0376
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Eliana-Dina Tirsa, Alexandru Costan, Nicolae Tapus
Offline Algorithms for Several Network Design, Clustering and QoS Optimization Problems
null
Proceedings of the 17th International Conference on Control Systems and Computer Science (CSCS), vol. 1, pp. 273-280, Bucharest, Romania, 26-29 May, 2009. (ISSN: 2066-4451)
null
null
cs.DS cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address several network design, clustering and Quality of Service (QoS) optimization problems and present novel, efficient, offline algorithms which compute optimal or near-optimal solutions. The QoS optimization problems consist of reliability improvement (by computing backup shortest paths) and network link upgrades (in order to reduce the latency on several paths). The network design problems consist of determining small diameter networks, as well as very well connected and regular network topologies. The network clustering problems consider only the restricted model of static and mobile path networks, for which we were able to develop optimal algorithms.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 20:31:10 GMT" } ]
2009-06-03T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Tirsa", "Eliana-Dina", "" ], [ "Costan", "Alexandru", "" ], [ "Tapus", "Nicolae", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.0379
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Eliana-Dina Tirsa, Nicolae Tapus
Data Distribution Optimization using Offline Algorithms and a Peer-to-Peer Small Diameter Tree Architecture with Bounded Node Degrees
null
Proc. of the 17th Intl. Conf. on Control Systems and Computer Science (CSCS), vol. 2, pp. 445-452, 2009 (3rd Intl. Workshop on High Performance Grid Middleware - HiPerGrid). (ISSN: 2066-4451)
null
null
cs.DC cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multicast data transfers occur in many distributed systems and applications (e.g. IPTV, Grids, content delivery networks). Because of this, efficient multicast data distribution optimization techniques are required. In the first part of this paper we present a small diameter, bounded degree, collaborative peer-to-peer multicast tree architecture, which supports dynamic node arrivals and departures making local decisions only. The architecture is fault tolerant and, at low arrival and departure rates, converges towards a theoretically optimal structure. In the second part of the paper we consider several offline data distribution optimization problems, for which we present novel and time-efficient algorithmic solutions.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 21:07:18 GMT" } ]
2009-06-03T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Tirsa", "Eliana-Dina", "" ], [ "Tapus", "Nicolae", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.0380
Damiano Mazza
Damiano Mazza
Observational Equivalence and Full Abstraction in the Symmetric Interaction Combinators
null
Logical Methods in Computer Science, Volume 5, Issue 4 (December 22, 2009) lmcs:1150
10.2168/LMCS-5(4:6)2009
null
cs.LO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The symmetric interaction combinators are an equally expressive variant of Lafont's interaction combinators. They are a graph-rewriting model of deterministic computation. We define two notions of observational equivalence for them, analogous to normal form and head normal form equivalence in the lambda-calculus. Then, we prove a full abstraction result for each of the two equivalences. This is obtained by interpreting nets as certain subsets of the Cantor space, called edifices, which play the same role as Boehm trees in the theory of the lambda-calculus.
[ { "version": "v1", "created": "Mon, 1 Jun 2009 21:14:58 GMT" }, { "version": "v2", "created": "Wed, 11 Nov 2009 16:05:46 GMT" }, { "version": "v3", "created": "Tue, 22 Dec 2009 09:11:40 GMT" } ]
2015-07-01T00:00:00
[ [ "Mazza", "Damiano", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.0391
Ilya Volnyansky
Ilya Volnyansky, Vladimir Pestov
Curse of Dimensionality in Pivot-based Indexes
9 pp., 4 figures, latex 2e, a revised submission to the 2nd International Workshop on Similarity Search and Applications, 2009
Proc. 2nd Int. Workshop on Similarity Search and Applications (SISAP 2009), Prague, Aug. 29-30, 2009, T. Skopal and P. Zezula (eds.), IEEE Computer Society, Los Alamitos--Washington--Tokyo, 2009, pp. 39-46.
10.1109/SISAP.2009.9
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We offer a theoretical validation of the curse of dimensionality in the pivot-based indexing of datasets for similarity search, by proving, in the framework of statistical learning, that in high dimensions no pivot-based indexing scheme can essentially outperform the linear scan. A study of the asymptotic performance of pivot-based indexing schemes is performed on a sequence of datasets modeled as samples $X_d$ picked in i.i.d. fashion from metric spaces $\Omega_d$. We allow the size of the dataset $n=n_d$ to be such that $d$, the ``dimension'', is superlogarithmic but subpolynomial in $n$. The number of pivots is allowed to grow as $o(n/d)$. We pick the least restrictive cost model of similarity search where we count each distance calculation as a single computation and disregard the rest. We demonstrate that if the intrinsic dimension of the spaces $\Omega_d$ in the sense of concentration of measure phenomenon is $O(d)$, then the performance of similarity search pivot-based indexes is asymptotically linear in $n$.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 00:41:46 GMT" }, { "version": "v2", "created": "Thu, 18 Jun 2009 23:50:44 GMT" } ]
2016-11-17T00:00:00
[ [ "Volnyansky", "Ilya", "" ], [ "Pestov", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.0409
Xin Han
Xin Han, Francis Y.L. Chin, Hing-Fung Ting, Guochuan Zhang
A New Upper Bound on 2D Online Bin Packing
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 2D Online Bin Packing is a fundamental problem in Computer Science and the determination of its asymptotic competitive ratio has attracted great research attention. In a long series of papers, the lower bound of this ratio has been improved from 1.808, 1.856 to 1.907 and its upper bound reduced from 3.25, 3.0625, 2.8596, 2.7834 to 2.66013. In this paper, we rewrite the upper bound record to 2.5545. Our idea for the improvement is as follows. In SODA 2002 \cite{SS03}, Seiden and van Stee proposed an elegant algorithm called $H \otimes B$, comprised of the {\em Harmonic algorithm} $H$ and the {\em Improved Harmonic algorithm} $B$, for the two-dimensional online bin packing problem and proved that the algorithm has an asymptotic competitive ratio of at most 2.66013. Since the best known online algorithm for one-dimensional bin packing is the {\em Super Harmonic algorithm} \cite{S02}, a natural question to ask is: could a better upper bound be achieved by using the Super Harmonic algorithm instead of the Improved Harmonic algorithm? However, as mentioned in \cite{SS03}, the previous analysis framework does not work. In this paper, we give a positive answer for the above question. A new upper bound of 2.5545 is obtained for 2-dimensional online bin packing. The main idea is to develop new weighting functions for the Super Harmonic algorithm and propose new techniques to bound the total weight in a rectangular bin.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 02:30:11 GMT" } ]
2009-06-03T00:00:00
[ [ "Han", "Xin", "" ], [ "Chin", "Francis Y. L.", "" ], [ "Ting", "Hing-Fung", "" ], [ "Zhang", "Guochuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.0422
Natalia Vanetik Dr
Natalia Vanetik
Computing the tree number of a cut-outerplanar graph
These results are not incorrect but are covered in other works
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While the notion of arboricity of a graph is well-known in graph theory, very few results are dedicated to the minimal number of trees covering the edges of a graph, called the tree number of a graph.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 05:48:48 GMT" }, { "version": "v2", "created": "Thu, 30 Jul 2020 19:49:49 GMT" } ]
2020-08-03T00:00:00
[ [ "Vanetik", "Natalia", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.0426
Li Li
Li Li, Yudong Chen, Yi Zhang
A Mixed-Fractal Model for Network Traffic
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this short paper, we propose a new multi-fractal flow model, aiming to provide a possible explanation for the crossover phenomena that appear in the estimation of Hurst exponent for network traffic. It is shown that crossover occurs if the network flow consists of several components with different Hurst components. Our results indicate that this model might be useful in network traffic modeling and simulation.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 06:41:19 GMT" } ]
2009-06-03T00:00:00
[ [ "Li", "Li", "" ], [ "Chen", "Yudong", "" ], [ "Zhang", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.0434
Heng Lian
Aditya Chopra, Heng Lian
Total Variation, Adaptive Total Variation and Nonconvex Smoothly Clipped Absolute Deviation Penalty for Denoising Blocky Images
null
null
null
null
cs.CV cs.NA stat.ME
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The total variation-based image denoising model has been generalized and extended in numerous ways, improving its performance in different contexts. We propose a new penalty function motivated by the recent progress in the statistical literature on high-dimensional variable selection. Using a particular instantiation of the majorization-minimization algorithm, the optimization problem can be efficiently solved and the computational procedure realized is similar to the spatially adaptive total variation model. Our two-pixel image model shows theoretically that the new penalty function solves the bias problem inherent in the total variation model. The superior performance of the new penalty is demonstrated through several experiments. Our investigation is limited to "blocky" images which have small total variation.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 07:34:27 GMT" } ]
2011-07-28T00:00:00
[ [ "Chopra", "Aditya", "" ], [ "Lian", "Heng", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" } ]
0906.0447
Samson Lasaulce
S. Lasaulce, M. Debbah, and E. Altman
Methodologies for Analyzing Equilibria in Wireless Games
To appear in IEEE Signal Processing Magazine, Sep. 2009
null
10.1109/MSP.2009.933496
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Under certain assumptions in terms of information and models, equilibria correspond to possible stable outcomes in conflicting or cooperative scenarios where rational entities interact. For wireless engineers, it is of paramount importance to be able to predict and even ensure such states at which the network will effectively operate. In this article, we provide non-exhaustive methodologies for characterizing equilibria in wireless games in terms of existence, uniqueness, selection, and efficiency.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 11:20:34 GMT" } ]
2015-05-13T00:00:00
[ [ "Lasaulce", "S.", "" ], [ "Debbah", "M.", "" ], [ "Altman", "E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.0470
Juan-Manuel Torres-Moreno
Juan-Manuel Torres-Moreno and Mirta B. Gordon
An optimal linear separator for the Sonar Signals Classification task
8 pages, 6 tables
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of classifying sonar signals from rocks and mines first studied by Gorman and Sejnowski has become a benchmark against which many learning algorithms have been tested. We show that both the training set and the test set of this benchmark are linearly separable, although with different hyperplanes. Moreover, the complete set of learning and test patterns together, is also linearly separable. We give the weights that separate these sets, which may be used to compare results found by other algorithms.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 11:52:36 GMT" } ]
2009-06-03T00:00:00
[ [ "Torres-Moreno", "Juan-Manuel", "" ], [ "Gordon", "Mirta B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.0485
Salvatore Mele
Andre Holzner, Peter Igo-Kemenes, Salvatore Mele
First results from the PARSE.Insight project: HEP survey on data preservation, re-use and (open) access
Contribution to the First Workshop on Data Preservation and Long-Term Analysis in High-Energy Physics, DESY, Hamburg, Germany, January 26th-28th 2009
null
null
CERN-OPEN-2009-006
cs.DL hep-ex physics.data-an
http://creativecommons.org/licenses/by-nc-sa/3.0/
There is growing interest in the issues of preservation and re-use of the records of science, in the "digital era". The aim of the PARSE.Insight project, partly financed by the European Commission under the Seventh Framework Program, is twofold: to provide an assessment of the current activities, trends and risks in the field of digital preservation of scientific results, from primary data to published articles; to inform the design of the preservation layer of an emerging e-Infrastructure for e-Science. CERN, as a partner of the PARSE.Insight consortium, is performing an in-depth case study on data preservation, re-use and (open) access within the High-Energy Physics (HEP) community. The first results of this large-scale survey of the attitudes and concerns of HEP scientists are presented. The survey reveals the widespread opinion that data preservation is "very important" to "crucial". At the same time, it also highlights the chronic lack of resources and infrastructure to tackle this issue, as well as deeply-rooted concerns on the access to, and the understanding of, preserved data in future analyses.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 13:55:39 GMT" } ]
2009-06-03T00:00:00
[ [ "Holzner", "Andre", "" ], [ "Igo-Kemenes", "Peter", "" ], [ "Mele", "Salvatore", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0906.0504
Ghadir Haikal
G. Haikal
A stabilized finite element formulation of non-smooth contact
Corrects some miscompiled items
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The computational modeling of many engineering problems using the Finite Element method involves the modeling of two or more bodies that meet through an interface. The interface can be physical, as in multi-physics and contact problems, or purely numerical, as in the coupling of non-conforming meshes. The most critical part of the modeling process is to ensure geometric compatibility and a complete transfer of surface tractions between the different components at the connecting interfaces. Popular contact modeling techniques rely on geometric projections to detect and resolve overlapping or mass interpenetration between two or more contacting bodies. Such approaches have been shown to have two major drawbacks: they are not suitable for contact at highly nonlinear surfaces and sharp corners where smooth normal projections are not feasible, and they fail to guarantee a complete and accurate transfer of pressure across the interface. This dissertation presents a novel formulation for the modeling of contact problems that possesses the ability to resolve complicated contact scenarios effectively, while being simpler to implement and more widely applicable than currently available methods. We show that the formulation boils down to a node-to-surface gap function that works effectively for non-smooth contact. The numerical implementation using the midpoint rule shows the need to guarantee the conservation of the total energy during impact, for which a Lagrange multiplier method is used. We propose a local enrichment of the interface and a simple stabilization procedure based on the discontinuous Galerkin method to guarantee an accurate transfer of the pressure field. The result is a robust interface formulation for contact problems and the coupling of non-conforming meshes.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 01:49:04 GMT" }, { "version": "v2", "created": "Thu, 4 Jun 2009 12:59:43 GMT" }, { "version": "v3", "created": "Mon, 27 Jul 2009 13:35:40 GMT" } ]
2009-09-30T00:00:00
[ [ "Haikal", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0906.0531
Jaeok Park
Jaeok Park and Mihaela van der Schaar
Medium Access Control Protocols With Memory
32 pages, 7 figures, 2 tables
IEEE/ACM Transactions on Networking, 2010
10.1109/TNET.2010.2050699
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many existing medium access control (MAC) protocols utilize past information (e.g., the results of transmission attempts) to adjust the transmission parameters of users. This paper provides a general framework to express and evaluate distributed MAC protocols utilizing a finite length of memory for a given form of feedback information. We define protocols with memory in the context of a slotted random access network with saturated arrivals. We introduce two performance metrics, throughput and average delay, and formulate the problem of finding an optimal protocol. We first show that a TDMA outcome, which is the best outcome in the considered scenario, can be obtained after a transient period by a protocol with (N-1)-slot memory, where N is the total number of users. Next, we analyze the performance of protocols with 1-slot memory using a Markov chain and numerical methods. Protocols with 1-slot memory can achieve throughput arbitrarily close to 1 (i.e., 100% channel utilization) at the expense of large average delay, by correlating successful users in two consecutive slots. Finally, we apply our framework to wireless local area networks.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 16:43:16 GMT" }, { "version": "v2", "created": "Fri, 8 Jan 2010 02:57:13 GMT" } ]
2010-08-03T00:00:00
[ [ "Park", "Jaeok", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0550
Josep Rif\`a
J. Borges J. Rifa V. Zinoviev
On linear completely regular codes with covering radius $\rho=1$. Construction and classification
Submitted to IEEE, Trans. Inf. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Completely regular codes with covering radius $\rho=1$ must have minimum distance $d\leq 3$. For $d=3$, such codes are perfect and their parameters are well known. In this paper, the cases $d=1$ and $d=2$ are studied and completely characterized when the codes are linear. Moreover, it is proven that all these codes are completely transitive.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 17:48:02 GMT" } ]
2009-06-03T00:00:00
[ [ "Zinoviev", "J. Borges J. Rifa V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0557
Tian Lan
Tian Lan, David Kao, Mung Chiang, Ashutosh Sabharwal
An Axiomatic Theory of Fairness in Network Resource Allocation
null
null
null
null
cs.NI cs.PF
http://creativecommons.org/licenses/by-nc-sa/3.0/
We present a set of five axioms for fairness measures in resource allocation. A family of fairness measures satisfying the axioms is constructed. Well-known notions such as alpha-fairness, Jain's index, and entropy are shown to be special cases. Properties of fairness measures satisfying the axioms are proven, including Schur-concavity. Among the engineering implications is a generalized Jain's index that tunes the resolution of the fairness measure, a new understanding of alpha-fair utility functions, and an interpretation of "larger alpha is more fair". We also construct an alternative set of four axioms to capture efficiency objectives and feasibility constraints.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 18:52:24 GMT" }, { "version": "v2", "created": "Wed, 3 Jun 2009 19:26:31 GMT" }, { "version": "v3", "created": "Mon, 24 Aug 2009 20:37:29 GMT" }, { "version": "v4", "created": "Wed, 7 Oct 2009 19:31:14 GMT" } ]
2009-10-07T00:00:00
[ [ "Lan", "Tian", "" ], [ "Kao", "David", "" ], [ "Chiang", "Mung", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.0558
Haim Kaplan
Haim Kaplan and Micha Sharir and Eugenii Shustin
On lines and Joints
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $L$ be a set of $n$ lines in $\reals^d$, for $d\ge 3$. A {\em joint} of $L$ is a point incident to at least $d$ lines of $L$, not all in a common hyperplane. Using a very simple algebraic proof technique, we show that the maximum possible number of joints of $L$ is $\Theta(n^{d/(d-1)})$. For $d=3$, this is a considerable simplification of the orignal algebraic proof of Guth and Katz~\cite{GK}, and of the follow-up simpler proof of Elekes et al. \cite{EKS}.
[ { "version": "v1", "created": "Tue, 2 Jun 2009 18:56:35 GMT" } ]
2009-06-03T00:00:00
[ [ "Kaplan", "Haim", "" ], [ "Sharir", "Micha", "" ], [ "Shustin", "Eugenii", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.0612
Santo Fortunato Dr
Santo Fortunato
Community detection in graphs
Review article. 103 pages, 42 figures, 2 tables. Two sections expanded + minor modifications. Three figures + one table + references added. Final version published in Physics Reports
Physics Reports 486, 75-174 (2010)
10.1016/j.physrep.2009.11.002
null
physics.soc-ph cond-mat.stat-mech cs.IR physics.bio-ph physics.comp-ph q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The modern science of networks has brought significant advances to our understanding of complex systems. One of the most relevant features of graphs representing real systems is community structure, or clustering, i. e. the organization of vertices in clusters, with many edges joining vertices of the same cluster and comparatively few edges joining vertices of different clusters. Such clusters, or communities, can be considered as fairly independent compartments of a graph, playing a similar role like, e. g., the tissues or the organs in the human body. Detecting communities is of great importance in sociology, biology and computer science, disciplines where systems are often represented as graphs. This problem is very hard and not yet satisfactorily solved, despite the huge effort of a large interdisciplinary community of scientists working on it over the past few years. We will attempt a thorough exposition of the topic, from the definition of the main elements of the problem, to the presentation of most methods developed, with a special focus on techniques designed by statistical physicists, from the discussion of crucial issues like the significance of clustering and how methods should be tested and compared against each other, to the description of applications to real networks.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 10:20:48 GMT" }, { "version": "v2", "created": "Mon, 25 Jan 2010 14:53:31 GMT" } ]
2010-09-17T00:00:00
[ [ "Fortunato", "Santo", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0906.0651
Maria Potop-Butucaru
Zohir Bouzid (LIP6), Maria Potop-Butucaru (LIP6, INRIA Rocquencourt), S\'ebastien Tixeuil (LIP6, INRIA Futurs)
Optimal Byzantine Resilient Convergence in Asynchronous Robot Networks
null
null
10.1007/978-3-642-05118-0_12
null
cs.DC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the first deterministic algorithm that tolerates up to $f$ byzantine faults in $3f+1$-sized networks and performs in the asynchronous CORDA model. Our solution matches the previously established lower bound for the semi-synchronous ATOM model on the number of tolerated Byzantine robots. Our algorithm works under bounded scheduling assumptions for oblivious robots moving in a uni-dimensional space.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 06:39:38 GMT" } ]
2015-05-13T00:00:00
[ [ "Bouzid", "Zohir", "", "LIP6" ], [ "Potop-Butucaru", "Maria", "", "LIP6, INRIA Rocquencourt" ], [ "Tixeuil", "Sébastien", "", "LIP6, INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0906.0667
Harald Kosch
Florian Niedermeier, Michael Niedermeier, and Harald Kosch
Quality assessment of the MPEG-4 scalable video CODEC
null
published in a shorter version at ICIAP 2009 Conference
null
null
cs.MM cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the performance of the emerging MPEG-4 SVC CODEC is evaluated. In the first part, a brief introduction on the subject of quality assessment and the development of the MPEG-4 SVC CODEC is given. After that, the used test methodologies are described in detail, followed by an explanation of the actual test scenarios. The main part of this work concentrates on the performance analysis of the MPEG-4 SVC CODEC - both objective and subjective.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 09:31:34 GMT" } ]
2009-06-04T00:00:00
[ [ "Niedermeier", "Florian", "" ], [ "Niedermeier", "Michael", "" ], [ "Kosch", "Harald", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.0675
Laurent Romary
Martin Holmes (HCMC), Laurent Romary (INRIA Saclay - Ile de France, IDSL)
Encoding models for scholarly literature
null
Publishing and digital libraries: Legal and organizational issues, Ioannis Iglezakis, Tatiana-Eleni Synodinou, Sarantos Kapidakis (Ed.) (2010) -
10.4018/978-1-60960-031-0
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine the issue of digital formats for document encoding, archiving and publishing, through the specific example of "born-digital" scholarly journal articles. We will begin by looking at the traditional workflow of journal editing and publication, and how these practices have made the transition into the online domain. We will examine the range of different file formats in which electronic articles are currently stored and published. We will argue strongly that, despite the prevalence of binary and proprietary formats such as PDF and MS Word, XML is a far superior encoding choice for journal articles. Next, we look at the range of XML document structures (DTDs, Schemas) which are in common use for encoding journal articles, and consider some of their strengths and weaknesses. We will suggest that, despite the existence of specialized schemas intended specifically for journal articles (such as NLM), and more broadly-used publication-oriented schemas such as DocBook, there are strong arguments in favour of developing a subset or customization of the Text Encoding Initiative (TEI) schema for the purpose of journal-article encoding; TEI is already in use in a number of journal publication projects, and the scale and precision of the TEI tagset makes it particularly appropriate for encoding scholarly articles. We will outline the document structure of a TEI-encoded journal article, and look in detail at suggested markup patterns for specific features of journal articles.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 09:53:12 GMT" } ]
2010-10-13T00:00:00
[ [ "Holmes", "Martin", "", "HCMC" ], [ "Romary", "Laurent", "", "INRIA Saclay - Ile de France,\n IDSL" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0906.0684
Chris Giannella
Chris Giannella
New Instability Results for High Dimensional Nearest Neighbor Search
null
Information Processing Letters 109(19), 2009.
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a dataset of n(d) points generated independently from R^d according to a common p.d.f. f_d with support(f_d) = [0,1]^d and sup{f_d([0,1]^d)} growing sub-exponentially in d. We prove that: (i) if n(d) grows sub-exponentially in d, then, for any query point q^d in [0,1]^d and any epsilon>0, the ratio of the distance between any two dataset points and q^d is less that 1+epsilon with probability -->1 as d-->infinity; (ii) if n(d)>[4(1+epsilon)]^d for large d, then for all q^d in [0,1]^d (except a small subset) and any epsilon>0, the distance ratio is less than 1+epsilon with limiting probability strictly bounded away from one. Moreover, we provide preliminary results along the lines of (i) when f_d=N(mu_d,Sigma_d).
[ { "version": "v1", "created": "Wed, 3 Jun 2009 15:13:12 GMT" } ]
2009-09-01T00:00:00
[ [ "Giannella", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.0687
Olga Holtz
Olga Holtz, Noam Shomron
Computational Complexity and Numerical Stability of Linear Problems
16 pages; updated to reflect referees' remarks; to appear in Proceedings of the 5th European Congress of Mathematics
European Congress of Mathematics Amsterdam, 14-18 July, 2008, EMS Publishing House, pp. 381-400
10.4171/077-1/16
null
cs.CC cs.DS cs.NA math.HO math.NA math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey classical and recent developments in numerical linear algebra, focusing on two issues: computational complexity, or arithmetic costs, and numerical stability, or performance under roundoff error. We present a brief account of the algebraic complexity theory as well as the general error analysis for matrix multiplication and related problems. We emphasize the central role played by the matrix multiplication problem and discuss historical and modern approaches to its solution.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 10:51:40 GMT" }, { "version": "v2", "created": "Sat, 12 Sep 2009 00:59:14 GMT" } ]
2010-06-22T00:00:00
[ [ "Holtz", "Olga", "" ], [ "Shomron", "Noam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.HO", "description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics", "span": "(History and Overview)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0906.0690
Ioannis Kontoyiannis
Peter Harremoes, Oliver Johnson, Ioannis Kontoyiannis
Thinning, Entropy and the Law of Thin Numbers
null
IEEE Transactions on Information Theory, Vol 56/9, 2010, pages 4228-4244
10.1109/TIT.2010.2053893
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Renyi's "thinning" operation on a discrete random variable is a natural discrete analog of the scaling operation for continuous random variables. The properties of thinning are investigated in an information-theoretic context, especially in connection with information-theoretic inequalities related to Poisson approximation results. The classical Binomial-to-Poisson convergence (sometimes referred to as the "law of small numbers" is seen to be a special case of a thinning limit theorem for convolutions of discrete distributions. A rate of convergence is provided for this limit, and nonasymptotic bounds are also established. This development parallels, in part, the development of Gaussian inequalities leading to the information-theoretic version of the central limit theorem. In particular, a "thinning Markov chain" is introduced, and it is shown to play a role analogous to that of the Ornstein-Uhlenbeck process in connection to the entropy power inequality.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 11:45:43 GMT" } ]
2010-08-17T00:00:00
[ [ "Harremoes", "Peter", "" ], [ "Johnson", "Oliver", "" ], [ "Kontoyiannis", "Ioannis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0906.0695
Brijesh Rai Kumar
Brijesh Kumar Rai, and Bikash Kumar Dey
On network coding for sum-networks
Accepted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2169532
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A directed acyclic network is considered where all the terminals need to recover the sum of the symbols generated at all the sources. We call such a network a sum-network. It is shown that there exists a solvably (and linear solvably) equivalent sum-network for any multiple-unicast network, and thus for any directed acyclic communication network. It is also shown that there exists a linear solvably equivalent multiple-unicast network for every sum-network. It is shown that for any set of polynomials having integer coefficients, there exists a sum-network which is scalar linear solvable over a finite field F if and only if the polynomials have a common root in F. For any finite or cofinite set of prime numbers, a network is constructed which has a vector linear solution of any length if and only if the characteristic of the alphabet field is in the given set. The insufficiency of linear network coding and unachievability of the network coding capacity are proved for sum-networks by using similar known results for communication networks. Under fractional vector linear network coding, a sum-network and its reverse network are shown to be equivalent. However, under non-linear coding, it is shown that there exists a solvable sum-network whose reverse network is not solvable.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 12:22:52 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2009 23:34:13 GMT" }, { "version": "v3", "created": "Mon, 17 Aug 2009 11:52:43 GMT" }, { "version": "v4", "created": "Tue, 30 Aug 2011 08:36:18 GMT" } ]
2016-11-18T00:00:00
[ [ "Rai", "Brijesh Kumar", "" ], [ "Dey", "Bikash Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0716
Sebastian Bernhardsson
Sebastian Bernhardsson, Luis Enrique Correa da Rocha and Petter Minnhagen
Size dependent word frequencies and translational invariance of books
10 pages, 2 appendices (6 pages), 5 figures
Physica A 389:2, pp. 330-341 (2010)
10.1016/j.physa.2009.09.022
null
cs.CL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown that a real novel shares many characteristic features with a null model in which the words are randomly distributed throughout the text. Such a common feature is a certain translational invariance of the text. Another is that the functional form of the word-frequency distribution of a novel depends on the length of the text in the same way as the null model. This means that an approximate power-law tail ascribed to the data will have an exponent which changes with the size of the text-section which is analyzed. A further consequence is that a novel cannot be described by text-evolution models like the Simon model. The size-transformation of a novel is found to be well described by a specific Random Book Transformation. This size transformation in addition enables a more precise determination of the functional form of the word-frequency distribution. The implications of the results are discussed.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 13:52:30 GMT" } ]
2009-10-14T00:00:00
[ [ "Bernhardsson", "Sebastian", "" ], [ "da Rocha", "Luis Enrique Correa", "" ], [ "Minnhagen", "Petter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0906.0724
Piotr Bania
Piotr Bania
Dynamic Data Flow Analysis via Virtual Code Integration (aka The SpiderPig case)
48 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Paper addresses the process of dynamic data flow analysis using virtual code integration (VCI), often refered to as dynamic binary rewriting. This article will try to demonstrate all of the techniques that were applied in the SpiderPig project. It will also discuss the main differences between the methods that were employed and those used in other available software, as well as introducing other related work. SpiderPig's approach was found to be very fast and was transparent enough for reliable and usable data flow analysis. It was created with the purpose of providing a tool which would aid vulnerability and security researchers with tracing and analyzing any necessary data and its further propagation through a program. At the current state it works on IA-32 platforms with Microsoft Windows systems and it supports FPU, SSE, MMX and all of the IA-32 general instructions. SpiderPig also demonstrates the usage of a virtual code integration (VCI) framework which allows for modifying the target application code at the instruction level. By this I mean that the VCI framework allows for custom code insertion, original code modification and full customization of the original application's code. Instructions can be swapped out, deleted or modified at a whim, without corrupting the surrounding code and side-effects of the modification are resolved.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 14:32:37 GMT" } ]
2009-06-04T00:00:00
[ [ "Bania", "Piotr", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.0731
Paul Vitanyi
Paul M.B. Vitanyi (CWI, Amsterdam)
Distributed elections in an Archimedean ring of processors
null
16th ACM Symposium on Theory of Computing, Washington D.C., 1984, 542 - 547
null
null
cs.DC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Unlimited asynchronism is intolerable in real physically distributed computer systems. Such systems, synchronous or not, use clocks and timeouts. Therefore the magnitudes of elapsed absolute time in the system need to satisfy the axiom of Archimedes. Under this restriction of asynchronicity logically time-independent solutions can be derived which are nonetheless better (in number of message passes) than is possible otherwise. The use of clocks by the individual processors, in elections in a ring of asynchronous processors without central control, allows a deterministic solution which requires but a linear number of message passes. To obtain the result it has to be assumed that the clocks measure finitely proportional absolute time-spans for their time units, that is, the magnitudes of elapsed time in the ring network satisfy the axiom of Archimedes. As a result, some basic subtilities associated with distributed computations are highlighted. For instance, the known nonlinear lower bound on the required number of message passes is cracked. For the synchronous case, in which the necessary assumptions hold a fortiori, the method is -asymptotically- the most efficient one yet, and of optimal order of magnitude. The deterministic algorithm is of -asymptotically- optimal bit complexity, and, in the synchronous case, also yields an optimal method to determine the ring size. All of these results improve the known ones.
[ { "version": "v1", "created": "Wed, 27 May 2009 16:07:56 GMT" } ]
2009-06-04T00:00:00
[ [ "Vitanyi", "Paul M. B.", "", "CWI, Amsterdam" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.0739
Kun Zheng
Kun Zheng, Husheng Li, Seddik M. Djouadi and Jun Wang
Spectrum Sensing in Low SNR Regime via Stochastic Resonance
5 pages, 9 figures, submitted to Asilomar 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing is essential in cognitive radio to enable dynamic spectrum access. In many scenarios, primary user signal must be detected reliably in low signal-to-noise ratio (SNR) regime under required sensing time. We propose to use stochastic resonance, a nonlinear filter having certain resonance frequency, to detect primary users when the SNR is very low. Both block and sequential detection schemes are studied. Simulation results show that, under the required false alarm rate, both detection probability and average detection delay can be substantially improved. A few implementation issues are also discussed.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 16:29:22 GMT" } ]
2009-06-04T00:00:00
[ [ "Zheng", "Kun", "" ], [ "Li", "Husheng", "" ], [ "Djouadi", "Seddik M.", "" ], [ "Wang", "Jun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0744
Lalitha Sankar
Lalitha Sankar, Xiaohu Shang, Elza Erkip, and H. Vincent Poor
Ergodic Fading Interference Channels: Sum-Capacity and Separability
accepted for publication in the IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2119270
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sum-capacity for specific sub-classes of ergodic fading Gaussian two-user interference channels (IFCs) is developed under the assumption of perfect channel state information at all transmitters and receivers. For the sub-classes of uniformly strong (every fading state is strong) and ergodic very strong two-sided IFCs (a mix of strong and weak fading states satisfying specific fading averaged conditions) the optimality of completely decoding the interference, i.e., converting the IFC to a compound multiple access channel (C-MAC), is proved. It is also shown that this capacity-achieving scheme requires encoding and decoding jointly across all fading states. As an achievable scheme and also as a topic of independent interest, the capacity region and the corresponding optimal power policies for an ergodic fading C-MAC are developed. For the sub-class of uniformly weak IFCs (every fading state is weak), genie-aided outer bounds are developed. The bounds are shown to be achieved by treating interference as noise and by separable coding for one-sided fading IFCs. Finally, for the sub-class of one-sided hybrid IFCs (a mix of weak and strong states that do not satisfy ergodic very strong conditions), an achievable scheme involving rate splitting and joint coding across all fading states is developed and is shown to perform at least as well as a separable coding scheme.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 17:04:15 GMT" }, { "version": "v2", "created": "Tue, 25 Jan 2011 16:05:11 GMT" } ]
2016-11-17T00:00:00
[ [ "Sankar", "Lalitha", "" ], [ "Shang", "Xiaohu", "" ], [ "Erkip", "Elza", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0798
Subhash Kak
Subhash Kak
Single Neuron Memories and the Network's Proximity Matrix
10 pages
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper extends the treatment of single-neuron memories obtained by the B-matrix approach. The spreading of the activity within the network is determined by the network's proximity matrix which represents the separations amongst the neurons through the neural pathways.
[ { "version": "v1", "created": "Wed, 3 Jun 2009 23:10:25 GMT" } ]
2009-06-05T00:00:00
[ [ "Kak", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0906.0840
Christoph Studer
Christoph Studer and Helmut B\"olcskei
Soft-Input Soft-Output Single Tree-Search Sphere Decoding
submitted to the IEEE Trans. Inf. Theory, June 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Soft-input soft-output (SISO) detection algorithms form the basis for iterative decoding. The computational complexity of SISO detection often poses significant challenges for practical receiver implementations, in particular in the context of multiple-input multiple-output (MIMO) wireless communication systems. In this paper, we present a low-complexity SISO sphere-decoding algorithm, based on the single tree-search paradigm proposed originally for soft-output MIMO detection in Studer, et al., IEEE J-SAC, 2008. The new algorithm incorporates clipping of the extrinsic log-likelihood ratios (LLRs) into the tree-search, which results in significant complexity savings and allows to cover a large performance/complexity tradeoff region by adjusting a single parameter. Furthermore, we propose a new method for correcting approximate LLRs --resulting from sub-optimal detectors-- which (often significantly) improves detection performance at low additional computational complexity.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 06:30:28 GMT" } ]
2009-06-05T00:00:00
[ [ "Studer", "Christoph", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]