id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0905.4482 | Deanna Needell | Deanna Needell | Topics in Compressed Sensing | null | null | null | null | math.NA cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressed sensing has a wide range of applications that include error
correction, imaging, radar and many more. Given a sparse signal in a high
dimensional space, one wishes to reconstruct that signal accurately and
efficiently from a number of linear measurements much less than its actual
dimension. Although in theory it is clear that this is possible, the difficulty
lies in the construction of algorithms that perform the recovery efficiently,
as well as determining which kind of linear measurements allow for the
reconstruction. There have been two distinct major approaches to sparse
recovery that each present different benefits and shortcomings. The first,
L1-minimization methods such as Basis Pursuit, use a linear optimization
problem to recover the signal. This method provides strong guarantees and
stability, but relies on Linear Programming, whose methods do not yet have
strong polynomially bounded runtimes. The second approach uses greedy methods
that compute the support of the signal iteratively. These methods are usually
much faster than Basis Pursuit, but until recently had not been able to provide
the same guarantees. This gap between the two approaches was bridged when we
developed and analyzed the greedy algorithm Regularized Orthogonal Matching
Pursuit (ROMP). ROMP provides similar guarantees to Basis Pursuit as well as
the speed of a greedy algorithm. Our more recent algorithm Compressive Sampling
Matching Pursuit (CoSaMP) improves upon these guarantees, and is optimal in
every important aspect.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 17:46:29 GMT"
}
]
| 2009-05-28T00:00:00 | [
[
"Needell",
"Deanna",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4487 | Cheng Qi | Qi Cheng and Xianmeng Meng and Celi Sun and Jiazhe Chen | Bounding the Sum of Square Roots via Lattice Reduction | To appear in Mathematics of Computation | null | 10.1090/S0025-5718-09-02304-7 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $k$ and $n$ be positive integers. Define $R(n,k)$ to be the minimum
positive value of $$ | e_i \sqrt{s_1} + e_2 \sqrt{s_2} + ... + e_k \sqrt{s_k}
-t | $$ where $ s_1, s_2, ..., s_k$ are positive integers no larger than $n$,
$t$ is an integer and $e_i\in \{1,0, -1\}$ for all $1\leq i\leq k$. It is
important in computational geometry to determine a good lower and upper bound
of $ R(n,k)$. In this paper we show that this problem is closely related to the
shortest vector problem in certain integral lattices and present an algorithm
to find lower bounds based on lattice reduction algorithms. Although we can
only prove an exponential time upper bound for the algorithm, it is efficient
for large $k$ when an exhaustive search for the minimum value is clearly
infeasible. It produces lower bounds much better than the root separation
technique does. Based on numerical data, we formulate a conjecture on the
length of the shortest nonzero vector in the lattice, whose validation implies
that our algorithm runs in polynomial time and the problem of comparing two
sums of square roots of small integers can be solved in polynomial time. As a
side result, we obtain constructive upper bounds for $R(n,k)$ when $ n$ is much
smaller than $2^{2k}$.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 18:23:11 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Cheng",
"Qi",
""
],
[
"Meng",
"Xianmeng",
""
],
[
"Sun",
"Celi",
""
],
[
"Chen",
"Jiazhe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0905.4541 | Tarik Ait-Idir | Tarik Ait-Idir, and Samir Saoudi | Turbo Packet Combining Strategies for the MIMO-ISI ARQ Channel | 13 pages, 7 figures, and 2 tables | IEEE Transactions on Communications, vol. 57, no. 12, pp.
3782-3793, Dec. 2009 | 10.1109/TCOMM.2009.12.080318 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper addresses the issue of efficient turbo packet combining techniques
for coded transmission with a Chase-type automatic repeat request (ARQ)
protocol operating over a multiple-input--multiple-output (MIMO) channel with
intersymbol interference (ISI). First of all, we investigate the outage
probability and the outage-based power loss of the MIMO-ISI ARQ channel when
optimal maximum a posteriori (MAP) turbo packet combining is used at the
receiver. We show that the ARQ delay (i.e., the maximum number of ARQ rounds)
does not completely translate into a diversity gain. We then introduce two
efficient turbo packet combining algorithms that are inspired by minimum mean
square error (MMSE)-based turbo equalization techniques. Both schemes can be
viewed as low-complexity versions of the optimal MAP turbo combiner. The first
scheme is called signal-level turbo combining and performs packet combining and
multiple transmission ISI cancellation jointly at the signal-level. The second
scheme, called symbol-level turbo combining, allows ARQ rounds to be separately
turbo equalized, while combining is performed at the filter output. We conduct
a complexity analysis where we demonstrate that both algorithms have almost the
same computational cost as the conventional log-likelihood ratio (LLR)-level
combiner. Simulation results show that both proposed techniques outperform
LLR-level combining, while for some representative MIMO configurations,
signal-level combining has better ISI cancellation capability and achievable
diversity order than that of symbol-level combining.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 00:38:15 GMT"
},
{
"version": "v2",
"created": "Sun, 31 May 2009 17:29:49 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Aug 2010 17:24:13 GMT"
}
]
| 2010-08-05T00:00:00 | [
[
"Ait-Idir",
"Tarik",
""
],
[
"Saoudi",
"Samir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4545 | Alexandre Graell i Amat Dr. | Alexandre Graell i Amat and Raphael Le Bidan | Minimum Distance and Convergence Analysis of
Hamming-Accumulate-Acccumulate Codes | To appear in IEEE Transactions on Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this letter we consider the ensemble of codes formed by the serial
concatenation of a Hamming code and two accumulate codes. We show that this
ensemble is asymptotically good, in the sense that most codes in the ensemble
have minimum distance growing linearly with the block length. Thus, the
resulting codes achieve high minimum distances with high probability, about
half or more of the minimum distance of a typical random linear code of the
same rate and length in our examples. The proposed codes also show reasonably
good iterative convergence thresholds, which makes them attractive for
applications requiring high code rates and low error rates, such as optical
communications and magnetic recording.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 13:40:27 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Amat",
"Alexandre Graell i",
""
],
[
"Bidan",
"Raphael Le",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4567 | Ugo Dal Lago | Ugo Dal Lago, Andrea Masini and Margherita Zorzi | Confluence Results for a Quantum Lambda Calculus with Measurements | 21 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A strong confluence result for Q*, a quantum lambda-calculus with
measurements, is proved. More precisely, confluence is shown to hold both for
finite and infinite computations. The technique used in the confluence proof is
syntactical but innovative. This makes Q* different from similar quantum lambda
calculi, which are either measurement-free or provided with a reduction
strategy.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 07:46:18 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Lago",
"Ugo Dal",
""
],
[
"Masini",
"Andrea",
""
],
[
"Zorzi",
"Margherita",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4570 | Zhi-Hua Zhou | Yang Yu, Zhi-Hua Zhou | Weak Evolvability Equals Strong Evolvability | This paper has been withdrawn by the authors | null | null | null | cs.AI cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An updated version will be uploaded later.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 08:09:46 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Feb 2010 04:26:06 GMT"
}
]
| 2010-02-17T00:00:00 | [
[
"Yu",
"Yang",
""
],
[
"Zhou",
"Zhi-Hua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0905.4581 | Piotr Bania | Piotr Bania | Generic Unpacking of Self-modifying, Aggressive, Packed Binary Programs | 10 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nowadays most of the malware applications are either packed or protected.
This techniques are applied especially to evade signature based detectors and
also to complicate the job of reverse engineers or security analysts. The time
one must spend on unpacking or decrypting malware layers is often very long and
in fact remains the most complicated task in the overall process of malware
analysis. In this report author proposes MmmBop as a relatively new concept of
using dynamic binary instrumentation techniques for unpacking and bypassing
detection by self-modifying and highly aggressive packed binary code. MmmBop is
able to deal with most of the known and unknown packing algorithms and it is
also suitable to successfully bypass most of currently used anti-reversing
tricks. This framework does not depend on any other 3rd party software and it
is developed entirely in user mode (ring3). MmmBop supports the IA-32
architecture and it is targeted for Microsoft Windows XP, some of the further
deliberations will be referring directly to this operating system.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 09:08:17 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Bania",
"Piotr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0905.4592 | Omar Sakka | Omar Sakka (LIESP), Valerie Botta-Genoulaz (LIESP), Lorraine Trilling
(LIESP) | Mod\'elisation des facteurs influen\c{c}ant la performance de la
cha\^ine logistique | 7 pages | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Improvement of industrial performance such as cost, lead-time, adaptability,
variety and traceability is the major finality of companies. At this need
corresponds the necessity to collaborate and to strengthen their coordination
mechanisms. Information exchange becomes then a strategic question: what is the
nature of the information that can be shared with customers and suppliers?
Which impact on the performance of a company is expectable? What about the
performance of the whole supply chain? It is essential for a company to
identify the information whose exchange contributes to its performance and to
control its information flows. This study aims to release from the literature
the main tendencies of collaboration practices and information exchanges
leading to the performance and to propose a model of hypothesis gathering these
practices.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 09:49:02 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Sakka",
"Omar",
"",
"LIESP"
],
[
"Botta-Genoulaz",
"Valerie",
"",
"LIESP"
],
[
"Trilling",
"Lorraine",
"",
"LIESP"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0905.4596 | Dominique Duval | Dominique Duval (LMC - IMAG), Jean-Claude Reynaud (LSR - IMAG) | About raising and handling exceptions | null | null | null | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a unified framework for dealing with a deduction system
and a denotational semantics of exceptions. It is based on the fact that
handling exceptions can be seen as a kind of generalized case distinction. This
point of view on exceptions has been introduced in 2004, it is based on the
notion of diagrammatic logic, which assumes some familiarity with category
theory. Extensive sums of types can be used for dealing with case distinctions.
The aim of this new paper is to focus on the role of generalized extensivity
property for dealing with exceptions. Moreover, the presentation of this paper
makes only a restricted use of category theory.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 10:01:47 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Duval",
"Dominique",
"",
"LMC - IMAG"
],
[
"Reynaud",
"Jean-Claude",
"",
"LSR - IMAG"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4598 | Florentina Pintea | Claudiu Chirilov | Iterative Methods for Systems' Solving - a C# approach | 8 pages,exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009), 71-78 | null | null | cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work wishes to support various mathematical issues concerning the
iterative methods with the help of new programming languages. We consider a way
to show how problems in math have an answer by using different academic
resources and different thoughts. Here we treat methods like Gauss-Seidel's,
Cramer's and Gauss-Jordan's.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 10:10:06 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Chirilov",
"Claudiu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0905.4601 | Florentina Pintea | Alexandru Cicortas, Victoria Stana Iordan, Alexandra Emilia Fortis | Considerations on Construction Ontologies | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),79-88 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper proposes an analysis on some existent ontologies, in order to point
out ways to resolve semantic heterogeneity in information systems. Authors are
highlighting the tasks in a Knowledge Acquisiton System and identifying aspects
related to the addition of new information to an intelligent system. A solution
is proposed, as a combination of ontology reasoning services and natural
languages generation. A multi-agent system will be conceived with an extractor
agent, a reasoner agent and a competence management agent.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 10:19:02 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Cicortas",
"Alexandru",
""
],
[
"Iordan",
"Victoria Stana",
""
],
[
"Fortis",
"Alexandra Emilia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.4604 | Florentina Pintea | Adrian Cojocariu, Cristina Ofelia Stanciu | XML Technologies in Computer Assisted Learning and Testing Systems | 6 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),89-94 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The learning and assessment activities have undergone major changes due to
the development of modern technologies. The computer-assisted learning and
testing has proven a number of advantages in the development of modern
educational system. The paper suggests a solution for the computer-assisted
testing, which uses XML technologies, a solution that could make the basis for
developing a learning computer-assisted system.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 10:25:32 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Cojocariu",
"Adrian",
""
],
[
"Stanciu",
"Cristina Ofelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4605 | Florentina Pintea | Ovidiu Crista | Techniques for Securing Data Exchange between a Database Server and a
Client Program | 6 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),95-100 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of the presented work is to illustrate a method by which the data
exchange between a standalone computer software and a shared database server
can be protected of unauthorized interceptation of the traffic in Internet
network, a transport network for data managed by those two systems,
interceptation by which an attacker could gain illegetimate access to the
database, threatening this way the data integrity and compromising the
database.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 10:29:20 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Crista",
"Ovidiu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0905.4608 | Florentina Pintea | Georgiana-Petruta Fintineanu, Florentina Anica Pintea | Designing a Framework to Develop WEB Graphical Interfaces for ORACLE
Databases - Web Dialog | 6 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),125-130 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present article aims to describe a project consisting in designing a
framework of applications used to create graphical interfaces with an Oracle
distributed database. The development of the project supposed the use of the
latest technologies: database Oracle server, Tomcat web server, JDBC (Java
library used for accessing a database), JSP and Tag Library (for the
development of graphical interfaces).
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 10:54:45 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Fintineanu",
"Georgiana-Petruta",
""
],
[
"Pintea",
"Florentina Anica",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4610 | Florentina Pintea | Alexandra-Emilia Fortis | Indexing Research Papers in Open Access Databases | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),131-140 | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper synthesizes the actions performed in order to transform a classic
scientific research journal - 'Annals. Computer Science Series' - available
only in printed form until 2008, into a modern e-journal with free access to
the full text of the articles. For achieving this goal, the research papers
have been included in various article databases, portals and library catalogs
which offered a high visibility to the journal.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 11:06:19 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Fortis",
"Alexandra-Emilia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0905.4611 | Florentina Pintea | Ioana Iacob | The Effectiveness of Computer Assisted Classes for English as a Second
Language | 8 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),141-148 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present study aims to evaluate the efficiency of the computer assisted
English classes and to emphasize the necessity of developing sound
methodological strategies adjusted to the new technology. It also present the
benefits of using the computer in the pre-school and elementary school classes,
highlighted by a report on the comparative observation of four groups of
children studying English in a computer assisted environment.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 11:12:41 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Iacob",
"Ioana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4612 | Inge Bethke | Jan A. Bergstra and Inge Bethke | Straight-line instruction sequence completeness for total calculation on
cancellation meadows | 24 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A combination of program algebra with the theory of meadows is designed
leading to a theory of computation in algebraic structures which use in
addition to a zero test and copying instructions the instruction set $\{x
\Leftarrow 0, x \Leftarrow 1, x\Leftarrow -x, x\Leftarrow x^{-1}, x\Leftarrow
x+y, x\Leftarrow x\cdot y\}$. It is proven that total functions on cancellation
meadows can be computed by straight-line programs using at most 5 auxiliary
variables. A similar result is obtained for signed meadows.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 11:13:58 GMT"
},
{
"version": "v2",
"created": "Fri, 29 May 2009 14:14:17 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Bergstra",
"Jan A.",
""
],
[
"Bethke",
"Inge",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4613 | Florentina Pintea | Daniela Ilea | Athos - The C# GUI Generator | 8 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),149-156 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This application comes to help software architects and developers during the
long process between user's stories, designing the application's structure and
actually coding it.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 11:17:25 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Ilea",
"Daniela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0905.4614 | Alexander Artikis | A. Artikis, M. Sergot and G. Paliouras | A Logic Programming Approach to Activity Recognition | The original publication is available in the Proceedings of the 2nd
ACM international workshop on Events in multimedia, 2010 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We have been developing a system for recognising human activity given a
symbolic representation of video content. The input of our system is a set of
time-stamped short-term activities detected on video frames. The output of our
system is a set of recognised long-term activities, which are pre-defined
temporal combinations of short-term activities. The constraints on the
short-term activities that, if satisfied, lead to the recognition of a
long-term activity, are expressed using a dialect of the Event Calculus. We
illustrate the expressiveness of the dialect by showing the representation of
several typical complex activities. Furthermore, we present a detailed
evaluation of the system through experimentation on a benchmark dataset of
surveillance videos.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 11:44:04 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Apr 2013 17:06:25 GMT"
}
]
| 2013-04-30T00:00:00 | [
[
"Artikis",
"A.",
""
],
[
"Sergot",
"M.",
""
],
[
"Paliouras",
"G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0905.4627 | Claudio Lucchese | Paolo Bolettieri, Andrea Esuli, Fabrizio Falchi, Claudio Lucchese,
Raffaele Perego, Tommaso Piccioli and Fausto Rabitti | CoPhIR: a Test Collection for Content-Based Image Retrieval | 15 pages | null | null | null | cs.MM cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The scalability, as well as the effectiveness, of the different Content-based
Image Retrieval (CBIR) approaches proposed in literature, is today an important
research issue. Given the wealth of images on the Web, CBIR systems must in
fact leap towards Web-scale datasets. In this paper, we report on our
experience in building a test collection of 100 million images, with the
corresponding descriptive features, to be used in experimenting new scalable
techniques for similarity searching, and comparing their results. In the
context of the SAPIR (Search on Audio-visual content using Peer-to-peer
Information Retrieval) European project, we had to experiment our distributed
similarity searching technology on a realistic data set. Therefore, since no
large-scale collection was available for research purposes, we had to tackle
the non-trivial process of image crawling and descriptive feature extraction
(we used five MPEG-7 features) using the European EGEE computer GRID. The
result of this effort is CoPhIR, the first CBIR test collection of such scale.
CoPhIR is now open to the research community for experiments and comparisons,
and access to the collection was already granted to more than 50 research
groups worldwide.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 12:14:07 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Jun 2009 07:44:19 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Bolettieri",
"Paolo",
""
],
[
"Esuli",
"Andrea",
""
],
[
"Falchi",
"Fabrizio",
""
],
[
"Lucchese",
"Claudio",
""
],
[
"Perego",
"Raffaele",
""
],
[
"Piccioli",
"Tommaso",
""
],
[
"Rabitti",
"Fausto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0905.4656 | Li Li | Zhiheng Li, Li Li, Yudong Chen, Yi Zhang | Quantization Errors of fGn and fBm Signals | null | Zhiheng Li, Yudong Chen, Li Li*, Yi Zhang, "Quantization errors of
uniformly quantized fGn and fBm signals," IEEE Signal Processing Letters,
vol. 16, no. 12, pp. 1059-1062, 2009. | 10.1109/LSP.2009.2030115 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this Letter, we show that under the assumption of high resolution, the
quantization errors of fGn and fBm signals with uniform quantizer can be
treated as uncorrelated white noises.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 13:58:25 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Li",
"Zhiheng",
""
],
[
"Li",
"Li",
""
],
[
"Chen",
"Yudong",
""
],
[
"Zhang",
"Yi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4684 | Yan Xin | Yan Xin and Honghai Zhang | A Simple Sequential Spectrum Sensing Scheme for Cognitive Radio | 29 pages, 3 figures, submitted to IEEE Transactions on Signal
Processing | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cognitive radio that supports a secondary and opportunistic access to
licensed spectrum shows great potential to dramatically improve spectrum
utilization. Spectrum sensing performed by secondary users to detect unoccupied
spectrum bands, is a key enabling technique for cognitive radio. This paper
proposes a truncated sequential spectrum sensing scheme, namely the sequential
shifted chi-square test (SSCT). The SSCT has a simple test statistic and does
not rely on any deterministic knowledge about primary signals. As figures of
merit, the exact false-alarm probability is derived, and the miss-detection
probability as well as the average sample number (ASN) are evaluated by using a
numerical integration algorithm. Corroborating numerical examples show that, in
comparison with fixed-sample size detection schemes such as energy detection,
the SSCT delivers considerable reduction on the ASN while maintaining a
comparable detection performance.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 15:47:09 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Xin",
"Yan",
""
],
[
"Zhang",
"Honghai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4700 | Zuleita Ka Ming Ho | Zuleita Ka Ming Ho, Vincent K. N. Lau, Roger S. K. Cheng | Cross-Layer Design of FDD-OFDM Systems based on ACK/NAK Feedbacks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well-known that cross-layer scheduling which adapts power, rate and
user allocation can achieve significant gain on system capacity. However,
conventional cross-layer designs all require channel state information at the
base station (CSIT) which is difficult to obtain in practice. In this paper, we
focus on cross-layer resource optimization based on ACK/NAK feedback flows in
OFDM systems without explicit CSIT. While the problem can be modeled as Markov
Decision Process (MDP), brute force approach by policy iteration or value
iteration cannot lead to any viable solution. Thus, we derive a simple
closed-form solution for the MDP cross-layer problem, which is asymptotically
optimal for sufficiently small target packet error rate (PER). The proposed
solution also has low complexity and is suitable for realtime implementation.
It is also shown to achieve significant performance gain compared with systems
that do not utilize the ACK/NAK feedbacks for cross-layer designs or
cross-layer systems that utilize very unreliable CSIT for adaptation with
mismatch in CSIT error statistics. Asymptotic analysis is also provided to
obtain useful design insights.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 16:55:17 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Ho",
"Zuleita Ka Ming",
""
],
[
"Lau",
"Vincent K. N.",
""
],
[
"Cheng",
"Roger S. K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4713 | Leonard Kwuida | Leonard Kwuida, Rokia Missaoui, Lahcen Boumedjout, Jean Vaillancourt | Mining Generalized Patterns from Large Databases using Ontologies | null | null | null | null | cs.AI cs.DB cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Formal Concept Analysis (FCA) is a mathematical theory based on the
formalization of the notions of concept and concept hierarchies. It has been
successfully applied to several Computer Science fields such as data
mining,software engineering, and knowledge engineering, and in many domains
like medicine, psychology, linguistics and ecology. For instance, it has been
exploited for the design, mapping and refinement of ontologies. In this paper,
we show how FCA can benefit from a given domain ontology by analyzing the
impact of a taxonomy (on objects and/or attributes) on the resulting concept
lattice. We willmainly concentrate on the usage of a taxonomy to extract
generalized patterns (i.e., knowledge generated from data when elements of a
given domain ontology are used) in the form of concepts and rules, and improve
navigation through these patterns. To that end, we analyze three generalization
cases and show their impact on the size of the generalized pattern set.
Different scenarios of simultaneous generalizations on both objects and
attributes are also discussed
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 18:34:37 GMT"
}
]
| 2009-05-29T00:00:00 | [
[
"Kwuida",
"Leonard",
""
],
[
"Missaoui",
"Rokia",
""
],
[
"Boumedjout",
"Lahcen",
""
],
[
"Vaillancourt",
"Jean",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0905.4717 | Mehrdad Nojoumian | Mehrdad Nojoumian and Timothy C. Lethbridge | Reengineering PDF-Based Documents Targeting Complex Software
Specifications | 27 pages, 15 figures; International Journal of Knowledge and Web
Intelligence (IJKWI), Inderscience Publishers, 2011 | International Journal of Knowledge and Web Intelligence (IJKWI),
Inderscience, vol. 2, no. 4, pp. 292-319, 2011 | 10.1504/IJKWI.2011.045165 | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article aims at reengineering of PDF-based complex documents, where
specifications of the Object Management Group (OMG) are our initial targets.
Our motivation is that such specifications are dense and intricate to use, and
tend to have complicated structures. Our objective is therefore to create an
approach that allows us to reengineer PDF-based documents, and to illustrate
how to make more usable versions of electronic documents (such as
specifications, technical books, etc) so that end users to have a better
experience with them. The first step was to extract the logical structure of
the document in a meaningful XML format for subsequent processing. Our initial
assumption was that, many key concepts of a document are expressed in this
structure. In the next phase, we created a multilayer hypertext version of the
document to facilitate browsing and navigating. Although we initially focused
on OMG software specifications, we chose a general approach for different
phases of our work including format conversions, logical structure extraction,
text extraction, multilayer hypertext generation, and concept exploration. As a
consequence, we can process other complex documents to achieve our goals.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 19:23:21 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Oct 2011 22:46:20 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Oct 2011 21:23:11 GMT"
}
]
| 2012-02-14T00:00:00 | [
[
"Nojoumian",
"Mehrdad",
""
],
[
"Lethbridge",
"Timothy C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0905.4745 | Mark Tygert | Mark Tygert | A fast algorithm for computing minimal-norm solutions to underdetermined
systems of linear equations | 13 pages, 4 tables | null | null | UCLA Computational and Applied Math. Technical Report 09-48 | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a randomized algorithm for computing the minimal-norm solution
to an underdetermined system of linear equations. Given an arbitrary full-rank
m x n matrix A with m<n, any m x 1 vector b, and any positive real number
epsilon less than 1, the procedure computes an n x 1 vector x approximating to
relative precision epsilon or better the n x 1 vector p of minimal Euclidean
norm satisfying Ap=b. The algorithm typically requires O(mn
log(sqrt(n)/epsilon) + m**3) floating-point operations, generally less than the
O(m**2 n) required by the classical schemes based on QR-decompositions or
bidiagonalization. We present several numerical examples illustrating the
performance of the algorithm.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 20:40:11 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Sep 2009 18:25:05 GMT"
}
]
| 2009-09-08T00:00:00 | [
[
"Tygert",
"Mark",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0905.4757 | Michael Neely | Michael J. Neely | Stochastic Optimization for Markov Modulated Networks with Application
to Delay Constrained Wireless Scheduling | This version adds an author and includes simulation results. It also
corrects an error in the earlier version of this arxiv tech report,
concerning use of a norm defined in terms of expectations (see footnote 4 of
the current version for a discussion of the error). The current paper uses a
standard norm without expectations | null | null | null | math.OC cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a wireless system with a small number of delay constrained users
and a larger number of users without delay constraints. We develop a scheduling
algorithm that reacts to time varying channels and maximizes throughput utility
(to within a desired proximity), stabilizes all queues, and satisfies the delay
constraints. The problem is solved by reducing the constrained optimization to
a set of weighted stochastic shortest path problems, which act as natural
generalizations of max-weight policies to Markov decision networks. We also
present approximation results for the corresponding shortest path problems, and
discuss the additional complexity and delay incurred as compared to systems
without delay constraints. The solution technique is general and applies to
other constrained stochastic decision problems.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 21:55:30 GMT"
},
{
"version": "v2",
"created": "Thu, 28 Jul 2011 03:43:01 GMT"
}
]
| 2011-07-29T00:00:00 | [
[
"Neely",
"Michael J.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
]
|
0905.4761 | Gregory Leighton | Gregory Leighton, Denilson Barbosa | Optimizing XML Compression | 16 pages, extended version of paper accepted for XSym 2009 | null | 10.1007/978-3-642-03555-5_8 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The eXtensible Markup Language (XML) provides a powerful and flexible means
of encoding and exchanging data. As it turns out, its main advantage as an
encoding format (namely, its requirement that all open and close markup tags
are present and properly balanced) yield also one of its main disadvantages:
verbosity. XML-conscious compression techniques seek to overcome this drawback.
Many of these techniques first separate XML structure from the document
content, and then compress each independently. Further compression gains can be
realized by identifying and compressing together document content that is
highly similar, thereby amortizing the storage costs of auxiliary information
required by the chosen compression algorithm. Additionally, the proper choice
of compression algorithm is an important factor not only for the achievable
compression gain, but also for access performance. Hence, choosing a
compression configuration that optimizes compression gain requires one to
determine (1) a partitioning strategy for document content, and (2) the best
available compression algorithm to apply to each set within this partition. In
this paper, we show that finding an optimal compression configuration with
respect to compression gain is an NP-hard optimization problem. This problem
remains intractable even if one considers a single compression algorithm for
all content. We also describe an approximation algorithm for selecting a
partitioning strategy for document content based on the branch-and-bound
paradigm.
| [
{
"version": "v1",
"created": "Thu, 28 May 2009 22:36:57 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Leighton",
"Gregory",
""
],
[
"Barbosa",
"Denilson",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0905.4771 | Kalyana Babu Nakshatrala | K. B. Nakshatrala and A. J. Valocchi | Variational structure of the optimal artificial diffusion method for the
advection-diffusion equation | 2 Figures | null | null | null | cs.CE cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this research note we provide a variational basis for the optimal
artificial diffusion method, which has been a cornerstone in developing many
stabilized methods. The optimal artificial diffusion method produces exact
nodal solutions when applied to one-dimensional problems with constant
coefficients and forcing function. We first present a variational principle for
a multi-dimensional advective-diffusive system, and then derive a new stable
weak formulation. When applied to one-dimensional problems with constant
coefficients and forcing function, this resulting weak formulation will be
equivalent to the optimal artificial diffusion method. We present
representative numerical results to corroborate our theoretical findings.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 01:49:38 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Jul 2010 17:05:31 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Dec 2010 02:23:48 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Nakshatrala",
"K. B.",
""
],
[
"Valocchi",
"A. J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0905.4813 | Peter Hancock | Neil Ghani, Peter Hancock, Dirk Pattinson | Representations of Stream Processors Using Nested Fixed Points | null | Logical Methods in Computer Science, Volume 5, Issue 3 (September
15, 2009) lmcs:713 | 10.2168/LMCS-5(3:9)2009 | null | cs.DS cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define representations of continuous functions on infinite streams of
discrete values, both in the case of discrete-valued functions, and in the case
of stream-valued functions. We define also an operation on the representations
of two continuous functions between streams that yields a representation of
their composite.
In the case of discrete-valued functions, the representatives are
well-founded (finite-path) trees of a certain kind. The underlying idea can be
traced back to Brouwer's justification of bar-induction, or to Kreisel and
Troelstra's elimination of choice-sequences. In the case of stream-valued
functions, the representatives are non-wellfounded trees pieced together in a
coinductive fashion from well-founded trees. The definition requires an
alternating fixpoint construction of some ubiquity.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 09:40:23 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Sep 2009 07:10:30 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Ghani",
"Neil",
""
],
[
"Hancock",
"Peter",
""
],
[
"Pattinson",
"Dirk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4850 | Joaquin Garcia-Alfaro | Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas | A Survey on Cross-Site Scripting Attacks | 15 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Web applications are becoming truly pervasive in all kinds of business models
and organizations. Today, most critical systems such as those related to health
care, banking, or even emergency response, are relying on these applications.
They must therefore include, in addition to the expected value offered to their
users, reliable mechanisms to ensure their security. In this paper, we focus on
the specific problem of cross-site scripting attacks against web applications.
We present a study of this kind of attacks, and survey current approaches for
their prevention. Applicability and limitations of each proposal are also
discussed.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 13:03:57 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Garcia-Alfaro",
"Joaquin",
""
],
[
"Navarro-Arribas",
"Guillermo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0905.4860 | Florentina Pintea | Alin Isac, Claudia Isac | Informatics Issues Used in the Production Dashboard | 6 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),157-162 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this paper is to present some computer aspects regarding the
implementation and the employing of a dashboard in relation to the production
activity. The paper begins with the theoretical presentation of the managerial
perspective regarding the necessity of using the dashboard. The main functions
of the dashboard in the production activity and the way it is employed are
presented in the second part of the paper.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 13:33:13 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Isac",
"Alin",
""
],
[
"Isac",
"Claudia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4863 | Florentina Pintea | K. S. Jasmine, R. Vasantha | Derivation of UML Based Performance Models for Design Assessment in a
Reuse Based Software Development Approach | 18 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),163-180 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reuse-based software development provides an opportunity for better quality
and increased productivity in the software products. One of the most critical
aspects of the quality of a software system is its performance. The systematic
application of software performance engineering techniques throughout the
development process can help to identify design alternatives that preserve
desirable qualities such as extensibility and reusability while meeting
performance objectives. In the present scenario, most of the performance
failures are due to a lack of consideration of performance issues early in the
development process, especially in the design phase. These performance failures
results in damaged customer relations, lost productivity for users, cost
overruns due to tuning or redesign, and missed market windows. In this paper,
we propose UML based Performance Models for design assessment in a reuse based
software development scenario.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 13:42:19 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Jasmine",
"K. S.",
""
],
[
"Vasantha",
"R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0905.4864 | Florentina Pintea | Tiberiu Marius Karnyanszky, Ovidiu Crista, Catalin Tuican | Computer Based Interpretation of the Students' Evaluation of the
Teaching Staff | 8 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),181-188 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to offer a full support for universities and
quality assessment committees in retrieving the feedback from their students
regarding to their teaching staff. The computer based application presented
before ([Cri07]) collects data from the students. Another part of the
application, presented in this paper, processes this data and presents the
statistical results concerning each teacher.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 13:49:44 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Karnyanszky",
"Tiberiu Marius",
""
],
[
"Crista",
"Ovidiu",
""
],
[
"Tuican",
"Catalin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0905.4887 | Mikael Vejdemo-Johansson | Vin de Silva and Mikael Vejdemo-Johansson | Persistent Cohomology and Circular Coordinates | 10 pages, 7 figures. To appear in the proceedings of the ACM
Symposium on Computational Geometry 2009 | SCG '09: Proceedings of the 25th annual symposium on Computational
geometry (2009) pp 227--236 | 10.1145/1542362.1542406 | null | math.AT cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nonlinear dimensionality reduction (NLDR) algorithms such as Isomap, LLE and
Laplacian Eigenmaps address the problem of representing high-dimensional
nonlinear data in terms of low-dimensional coordinates which represent the
intrinsic structure of the data. This paradigm incorporates the assumption that
real-valued coordinates provide a rich enough class of functions to represent
the data faithfully and efficiently. On the other hand, there are simple
structures which challenge this assumption: the circle, for example, is
one-dimensional but its faithful representation requires two real coordinates.
In this work, we present a strategy for constructing circle-valued functions on
a statistical data set. We develop a machinery of persistent cohomology to
identify candidates for significant circle-structures in the data, and we use
harmonic smoothing and integration to obtain the circle-valued coordinate
functions themselves. We suggest that this enriched class of coordinate
functions permits a precise NLDR analysis of a broader range of realistic data
sets.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 15:01:09 GMT"
}
]
| 2009-06-12T00:00:00 | [
[
"de Silva",
"Vin",
""
],
[
"Vejdemo-Johansson",
"Mikael",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AT",
"description": "Homotopy theory, homological algebra, algebraic treatments of manifolds",
"span": "(Algebraic Topology)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0905.4902 | Florentina Pintea | Dan L. Lacrama, Ioan Snep | Flexible frontiers for text division into rows | 6 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),199-204 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents an original solution for flexible hand-written text
division into rows. Unlike the standard procedure, the proposed method avoids
the isolated characters extensions amputation and reduces the recognition error
rate in the final stage.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 15:35:10 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Lacrama",
"Dan L.",
""
],
[
"Snep",
"Ioan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0905.4905 | Florentina Pintea | Lucian Luca, Lucian L. Luca | Aspects Regarding Operations with Fuzzy Processes | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),205-214 | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces the notion of fuzzy process as a formalism for the idea
of fuzzy contact between a device and its environment. The notions of absolute
correctness and relative correctness are defined. In order to work with
concurrency it has been built an approach to manipulate the interactive
processes as a single process and the resulted behavior has been observed.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 15:43:32 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Luca",
"Lucian",
""
],
[
"Luca",
"Lucian L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4906 | Florentina Pintea | Lucian Luca, Lucian L. Luca | On Some Manipulations with Fuzzy Processes | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),215-224 | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper starts from the observation on the complexity of the manipulation
of fuzzy processes that increases very rapidly with the extents of the
processes representation. Therefore, a productive approach is to divide the
problem into smaller parts, treated separately and then the results combined.
Some algebraic results obtained by the authors are presented.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 15:47:17 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Luca",
"Lucian",
""
],
[
"Luca",
"Lucian L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0905.4909 | Florentina Pintea | Laura Maruster, Stefan Maruster | On the Convex Feasibility Problem | 14 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),225-238 | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The convergence of the projection algorithm for solving the convex
feasibility problem for a family of closed convex sets, is in connection with
the regularity properties of the family. In the paper [18] are pointed out four
cases of such a family depending of the two characteristics: the emptiness and
boudedness of the intersection of the family. The case four (the interior of
the intersection is empty and the intersection itself is bounded) is unsolved.
In this paper we give a (partial) answer for the case four: in the case of two
closed convex sets in R3 the regularity property holds.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 15:53:02 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Maruster",
"Laura",
""
],
[
"Maruster",
"Stefan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0905.4918 | Josep M. Pujol | Josep M. Pujol, Vijay Erramilli and Pablo Rodriguez | Divide and Conquer: Partitioning Online Social Networks | 7 pages, 4 figures | null | null | null | cs.NI cs.AI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Online Social Networks (OSNs) have exploded in terms of scale and scope over
the last few years. The unprecedented growth of these networks present
challenges in terms of system design and maintenance. One way to cope with this
is by partitioning such large networks and assigning these partitions to
different machines. However, social networks possess unique properties that
make the partitioning problem non-trivial. The main contribution of this paper
is to understand different properties of social networks and how these
properties can guide the choice of a partitioning algorithm. Using large scale
measurements representing real OSNs, we first characterize different properties
of social networks, and then we evaluate qualitatively different partitioning
methods that cover the design space. We expose different trade-offs involved
and understand them in light of properties of social networks. We show that a
judicious choice of a partitioning scheme can help improve performance.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 16:29:40 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Pujol",
"Josep M.",
""
],
[
"Erramilli",
"Vijay",
""
],
[
"Rodriguez",
"Pablo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0905.4923 | James Currie | James D. Currie | Lexicographically least words in the orbit closure of the Rudin-Shapiro
word | 9 pages | null | null | null | cs.FL math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an effective characterization of the lexicographically least word in
the orbit closure of the Rudin-Shapiro word w having a specified prefix. In
particular, the lexicographically least word in the orbit closure of the
Rudin-Shapiro word is 0w. This answers a question Allouche et al.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 17:14:46 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Jun 2009 15:13:42 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Oct 2010 20:12:31 GMT"
}
]
| 2010-10-06T00:00:00 | [
[
"Currie",
"James D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0905.4926 | Sergey Loyka | Vladimir Mordachev, Sergey Loyka | On Node Density -- Outage Probability Tradeoff in Wireless Networks | IEEE Journal on Selected Areas in Communications, accepted, 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A statistical model of interference in wireless networks is considered, which
is based on the traditional propagation channel model and a Poisson model of
random spatial distribution of nodes in 1-D, 2-D and 3-D spaces with both
uniform and non-uniform densities. The power of nearest interferer is used as a
major performance indicator, instead of a traditionally-used total interference
power, since at the low outage region, they have the same statistics so that
the former is an accurate approximation of the latter. This simplifies the
problem significantly and allows one to develop a unified framework for the
outage probability analysis, including the impacts of complete/partial
interference cancelation, of different types of fading and of linear filtering,
either alone or in combination with each other. When a given number of nearest
interferers are completely canceled, the outage probability is shown to scale
down exponentially in this number. Three different models of partial
cancelation are considered and compared via their outage probabilities. The
partial cancelation level required to eliminate the impact of an interferer is
quantified. The effect of a broad class of fading processes (including all
popular fading models) is included in the analysis in a straightforward way,
which can be positive or negative depending on a particular model and
propagation/system parameters. The positive effect of linear filtering (e.g. by
directional antennas) is quantified via a new statistical selectivity
parameter. The analysis results in formulation of a tradeoff relationship
between the network density and the outage probability, which is a result of
the interplay between random geometry of node locations, the propagation path
loss and the distortion effects at the victim receiver.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 17:40:29 GMT"
}
]
| 2009-06-01T00:00:00 | [
[
"Mordachev",
"Vladimir",
""
],
[
"Loyka",
"Sergey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0905.4930 | Maxwell Young | Therese Biedl, Stephane Durocher, Holger H. Hoos, Shuang Luan, Jared
Saia and Maxwell Young | Improved Approximation Algorithms for Segment Minimization in Intensity
Modulated Radiation Therapy | 18 pages | "A Note on Improving the Performance of Approximation Algorithms
for Radiation Therapy''. Information Processing Letters, 111(7), 326-333,
2011 | 10.1016/j.ipl.2010.12.011 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | he segment minimization problem consists of finding the smallest set of
integer matrices that sum to a given intensity matrix, such that each summand
has only one non-zero value, and the non-zeroes in each row are consecutive.
This has direct applications in intensity-modulated radiation therapy, an
effective form of cancer treatment. We develop three approximation algorithms
for matrices with arbitrarily many rows. Our first two algorithms improve the
approximation factor from the previous best of $1+\log_2 h $ to (roughly) $3/2
\cdot (1+\log_3 h)$ and $11/6\cdot(1+\log_4{h})$, respectively, where $h$ is
the largest entry in the intensity matrix. We illustrate the limitations of the
specific approach used to obtain these two algorithms by proving a lower bound
of $\frac{(2b-2)}{b}\cdot\log_b{h} + \frac{1}{b}$ on the approximation
guarantee. Our third algorithm improves the approximation factor from $2 \cdot
(\log D+1)$ to $24/13 \cdot (\log D+1)$, where $D$ is (roughly) the largest
difference between consecutive elements of a row of the intensity matrix.
Finally, experimentation with these algorithms shows that they perform well
with respect to the optimum and outperform other approximation algorithms on
77% of the 122 test cases we consider, which include both real world and
synthetic data.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 17:56:06 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Sep 2009 23:26:59 GMT"
}
]
| 2011-09-27T00:00:00 | [
[
"Biedl",
"Therese",
""
],
[
"Durocher",
"Stephane",
""
],
[
"Hoos",
"Holger H.",
""
],
[
"Luan",
"Shuang",
""
],
[
"Saia",
"Jared",
""
],
[
"Young",
"Maxwell",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0905.4937 | Daniil Ryabko | Daniil Ryabko (INRIA Futurs, LIFL, INRIA Lille - Nord Europe) | A criterion for hypothesis testing for stationary processes | part or this report appeared as: Test, vol. 21(2), pp. 317-329, 2012 | null | null | null | math.ST cs.IT math.IT math.PR stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a finite-valued sample $X_1,...,X_n$ we wish to test whether it was
generated by a stationary ergodic process belonging to a family $H_0$, or it
was generated by a stationary ergodic process outside $H_0$. We require the
Type I error of the test to be uniformly bounded, while the type II error has
to be mande not more than a finite number of times with probability 1. For this
notion of consistency we provide necessary and sufficient conditions on the
family $H_0$ for the existence of a consistent test. This criterion is
illustrated with applications to testing for a membership to parametric
families, generalizing some existing results. In addition, we analyze a
stronger notion of consistency, which requires finite-sample guarantees on
error of both types, and provide some necessary and some sufficient conditions
for the existence of a consistent test. We emphasize that no assumption on the
process distributions are made beyond stationarity and ergodicity.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 18:20:24 GMT"
},
{
"version": "v2",
"created": "Sat, 30 May 2009 09:34:36 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Oct 2009 09:59:10 GMT"
},
{
"version": "v4",
"created": "Sat, 27 Dec 2014 00:10:22 GMT"
}
]
| 2014-12-30T00:00:00 | [
[
"Ryabko",
"Daniil",
"",
"INRIA Futurs, LIFL, INRIA Lille - Nord Europe"
]
]
| [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0906.0037 | Nadia Fawaz | Nadia Fawaz, Keyvan Zarifi, Merouane Debbah, David Gesbert | Asymptotic Capacity and Optimal Precoding in MIMO Multi-Hop Relay
Networks | 45 pages, 7 figures, submitted to IEEE Transactions on Information
Theory, December 2008 | null | 10.1109/TIT.2011.2111830 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A multi-hop relaying system is analyzed where data sent by a multi-antenna
source is relayed by successive multi-antenna relays until it reaches a
multi-antenna destination. Assuming correlated fading at each hop, each relay
receives a faded version of the signal from the previous level, performs linear
precoding and retransmits it to the next level. Using free probability theory
and assuming that the noise power at relaying levels-- but not at destination--
is negligible, the closed-form expression of the asymptotic instantaneous
end-to-end mutual information is derived as the number of antennas at all
levels grows large. The so-obtained deterministic expression is independent
from the channel realizations while depending only on channel statistics.
Moreover, it also serves as the asymptotic value of the average end-to-end
mutual information. The optimal singular vectors of the precoding matrices that
maximize the average mutual information with finite number of antennas at all
levels are also provided. It turns out that the optimal precoding singular
vectors are aligned to the eigenvectors of the channel correlation matrices.
Thus they can be determined using only the known channel statistics. As the
optimal precoding singular vectors are independent from the system size, they
are also optimal in the asymptotic regime.
| [
{
"version": "v1",
"created": "Fri, 29 May 2009 22:44:57 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Fawaz",
"Nadia",
""
],
[
"Zarifi",
"Keyvan",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Gesbert",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0049 | Serguei Mokhov | Serguei A. Mokhov, Joey Paquet, and Mourad Debbabi | Towards Automated Deduction in Blackmail Case Analysis with Forensic
Lucid | 11 pages, 7 figures; related to arXiv:0904.3789 and arXiv:0905.2449 | null | null | null | cs.LO cs.CR cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work-in-progress focuses on the refinement of application of the
intensional logic to cyberforensic analysis and its benefits are compared with
the finite-state automata approach. This work extends the use of the scientific
intensional programming paradigm onto modeling and implementation of a
cyberforensics investigation process with the backtrace of event
reconstruction, modeling the evidence as multidimensional hierarchical
contexts, and proving or disproving the claims with it in the intensional
manner of evaluation. This is a practical, context-aware improvement over the
finite state automata (FSA) approach we have seen in the related works. As a
base implementation language model we use in this approach is a new dialect of
the Lucid programming language, that we call Forensic Lucid and in this paper
we focus on defining hierarchical contexts based on the intensional logic for
the evaluation of cyberforensic expressions.
| [
{
"version": "v1",
"created": "Sat, 30 May 2009 02:04:15 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
],
[
"Paquet",
"Joey",
""
],
[
"Debbabi",
"Mourad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.0052 | Brian Tomasik | Brian Tomasik | A Minimum Description Length Approach to Multitask Feature Selection | 29 pages, 3 figures, undergraduate thesis | null | null | null | cs.LG cs.AI | http://creativecommons.org/licenses/by/3.0/ | Many regression problems involve not one but several response variables
(y's). Often the responses are suspected to share a common underlying
structure, in which case it may be advantageous to share information across
them; this is known as multitask learning. As a special case, we can use
multiple responses to better identify shared predictive features -- a project
we might call multitask feature selection.
This thesis is organized as follows. Section 1 introduces feature selection
for regression, focusing on ell_0 regularization methods and their
interpretation within a Minimum Description Length (MDL) framework. Section 2
proposes a novel extension of MDL feature selection to the multitask setting.
The approach, called the "Multiple Inclusion Criterion" (MIC), is designed to
borrow information across regression tasks by more easily selecting features
that are associated with multiple responses. We show in experiments on
synthetic and real biological data sets that MIC can reduce prediction error in
settings where features are at least partially shared across responses. Section
3 surveys hypothesis testing by regression with a single response, focusing on
the parallel between the standard Bonferroni correction and an MDL approach.
Mirroring the ideas in Section 2, Section 4 proposes a novel MIC approach to
hypothesis testing with multiple responses and shows that on synthetic data
with significant sharing of features across responses, MIC sometimes
outperforms standard FDR-controlling methods in terms of finding true positives
for a given level of false positives. Section 5 concludes.
| [
{
"version": "v1",
"created": "Sat, 30 May 2009 03:41:37 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Tomasik",
"Brian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.0060 | Minas Gjoka | Minas Gjoka, Maciej Kurant, Carter T. Butts, Athina Markopoulou | A Walk in Facebook: Uniform Sampling of Users in Online Social Networks | published in IEEE INFOCOM '10; IEEE Journal on Selected Areas in
Communications (JSAC), Special Issue on Measurement of Internet Topologies,
2011 under the title "Practical Recommendations on Crawling Online Social
Networks" | null | null | null | cs.SI cs.NI physics.data-an physics.soc-ph stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Our goal in this paper is to develop a practical framework for obtaining a
uniform sample of users in an online social network (OSN) by crawling its
social graph. Such a sample allows to estimate any user property and some
topological properties as well. To this end, first, we consider and compare
several candidate crawling techniques. Two approaches that can produce
approximately uniform samples are the Metropolis-Hasting random walk (MHRW) and
a re-weighted random walk (RWRW). Both have pros and cons, which we demonstrate
through a comparison to each other as well as to the "ground truth." In
contrast, using Breadth-First-Search (BFS) or an unadjusted Random Walk (RW)
leads to substantially biased results. Second, and in addition to offline
performance assessment, we introduce online formal convergence diagnostics to
assess sample quality during the data collection process. We show how these
diagnostics can be used to effectively determine when a random walk sample is
of adequate size and quality. Third, as a case study, we apply the above
methods to Facebook and we collect the first, to the best of our knowledge,
representative sample of Facebook users. We make it publicly available and
employ it to characterize several key properties of Facebook.
| [
{
"version": "v1",
"created": "Sat, 30 May 2009 05:26:36 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 05:25:50 GMT"
},
{
"version": "v3",
"created": "Tue, 12 Oct 2010 23:47:24 GMT"
},
{
"version": "v4",
"created": "Fri, 4 Feb 2011 08:19:03 GMT"
},
{
"version": "v5",
"created": "Fri, 17 Jun 2011 05:37:43 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Gjoka",
"Minas",
""
],
[
"Kurant",
"Maciej",
""
],
[
"Butts",
"Carter T.",
""
],
[
"Markopoulou",
"Athina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
]
|
0906.0065 | Serguei Mokhov | Serguei A. Mokhov, Lee Wei Huynh, Jian Li (Concordia University,
Montreal, Canada) | Managing Distributed MARF with SNMP | 39 pages, 16 figures, TOC, index. A large portion of this report has
been published at PDPTA'08. This 2007 report is a successor of the original
DMARF work documented at arXiv:0905.2459 ; v2 adds missing .ind file for the
index | Proceedings of PDPTA'08 (2008), Volume 2, pp. 948-954 | null | null | cs.DC cs.CV | http://creativecommons.org/licenses/by/3.0/ | The scope of this project's work focuses on the research and prototyping of
the extension of the Distributed MARF such that its services can be managed
through the most popular management protocol familiarly, SNMP. The rationale
behind SNMP vs. MARF's proprietary management protocols, is that can be
integrated with the use of common network service and device management, so the
administrators can manage MARF nodes via a already familiar protocol, as well
as monitor their performance, gather statistics, set desired configuration,
etc. perhaps using the same management tools they've been using for other
network devices and application servers.
| [
{
"version": "v1",
"created": "Sat, 30 May 2009 06:42:55 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Jul 2009 23:00:45 GMT"
}
]
| 2009-07-27T00:00:00 | [
[
"Mokhov",
"Serguei A.",
"",
"Concordia University,\n Montreal, Canada"
],
[
"Huynh",
"Lee Wei",
"",
"Concordia University,\n Montreal, Canada"
],
[
"Li",
"Jian",
"",
"Concordia University,\n Montreal, Canada"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.0072 | Jakub Michaliszyn | Jerzy Marcinkowski, Jakub Michaliszyn | The cost of being co-Buchi is nonlinear | 12 pages, 4 figures; added information about grand | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well known, and easy to see, that not each nondeterministic Buchi
automaton on infinite words can be simulated by a nondeterministic co-Buchi
automaton. We show that in the cases when such a simulation is possible, the
number of states needed for it can grow nonlinearly. More precisely, we show a
sequence of - as we believe, simple and elegant - languages which witness the
existence of a nondeterministic Buchi automaton with n states, which can be
simulated by a nondeterministic co-Buchi automaton, but cannot be simulated by
any nondeterministic co-Buchi automaton with less than c*n^{7/6} states for
some constant c. This improves on the best previously known lower bound of
3(n-1)/2.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 15:47:18 GMT"
},
{
"version": "v2",
"created": "Sun, 7 Jun 2009 09:10:28 GMT"
}
]
| 2009-06-07T00:00:00 | [
[
"Marcinkowski",
"Jerzy",
""
],
[
"Michaliszyn",
"Jakub",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.0080 | L.T. Handoko | Z. Akbar and L.T. Handoko | Reverse method for labeling the information from semi-structured web
pages | 5 pages, Proceeding of the 2009 International Conference on Signal
Processing Systems pp. 551-555 | null | 10.1109/ICSPS.2009.86 | FISIKALIPI-09017 | cs.IR cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new technique to infer the structure and extract the tokens of
data from the semi-structured web sources which are generated using a
consistent template or layout with some implicit regularities. The attributes
are extracted and labeled reversely from the region of interest of targeted
contents. This is in contrast with the existing techniques which always
generate the trees from the root. We argue and show that our technique is
simpler, more accurate and effective especially to detect the changes of the
templates of targeted web pages.
| [
{
"version": "v1",
"created": "Sat, 30 May 2009 14:22:04 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Aug 2009 17:36:09 GMT"
}
]
| 2009-08-06T00:00:00 | [
[
"Akbar",
"Z.",
""
],
[
"Handoko",
"L. T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.0151 | Didehvar Farzaad | Mahtab Hoseininia, Farzad Didehvar, Mir Mehdi Seyyed Esfahani | Inventory competition in a multi channel distribution system: The Nash
and Stackelberg game | 20 pages, 1 figure | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates inventory management in a multi channel distribution
system consisting of one manufacturer and an arbitrary number of retailers that
face stochastic demand. Existence of the pure Nash equilibrium is proved and
parameter restriction which implies uniqueness of it is derived. Also the
Stackelberg game where the manufacturer plays a roll as a leader is discussed.
Under specified parameter restrictions which guarantee profitability,
sufficient condition for uniqueness of Stackelberg equilibrium is obtained. In
addition comparison with simultaneous move game is made. The result shows that
when whole prices are equal to production cost, manufacturer carries more
inventory than simultaneous move game. Keywords: Inventory management,
Substitution, Nash equilibrium, Stackelberg equilibrium.
| [
{
"version": "v1",
"created": "Sun, 31 May 2009 12:25:12 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Hoseininia",
"Mahtab",
""
],
[
"Didehvar",
"Farzad",
""
],
[
"Esfahani",
"Mir Mehdi Seyyed",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.0202 | Abedelaziz Mohaisen | Abedelaziz Mohaisen and Dowon Hong | Mitigating the ICA Attack against Rotation Based Transformation for
Privacy Preserving Clustering | 3 pages, 1 figure, appeared as a letter in ETRI journal | Abedelaziz Mohaisen, and Dowon Hong: Mitigating the ICA Attack
against Rotation-Based Transformation for Privacy Preserving Clustering, ETRI
Journal, vol.30, no.6, Dec. 2008, pp.868-870 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rotation based transformation (RBT) for privacy preserving data mining
(PPDM) is vulnerable to the independent component analysis (ICA) attack. This
paper introduces a modified multiple rotation based transformation (MRBT)
technique for special mining applications mitigating the ICA attack while
maintaining the advantages of the RBT.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 03:31:26 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Mohaisen",
"Abedelaziz",
""
],
[
"Hong",
"Dowon",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.0205 | Forrest Sheng Bao | Yuanlin Zhang and Forrest Sheng Bao | A Survey of Tree Convex Sets Test | 13 pages, 5 figures, 2 tables | null | null | null | cs.DS cs.CC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Tree convex sets refer to a collection of sets such that each set in the
collection is a subtree of a tree whose nodes are the elements of these sets.
They extend the concept of row convex sets each of which is an interval over a
total ordering of the elements of those sets. They have been applied to
identify tractable Constraint Satisfaction Problems and Combinatorial Auction
Problems. Recently, polynomial algorithms have been proposed to recognize tree
convex sets. In this paper, we review the materials that are the key to a
linear recognition algorithm.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 03:54:42 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Zhang",
"Yuanlin",
""
],
[
"Bao",
"Forrest Sheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.0211 | Sumio Watanabe | Sumio Watanabe | Equations of States in Statistical Learning for a Nonparametrizable and
Regular Case | null | null | 10.1587/transfun.E93.A.617 | null | cs.LG | http://creativecommons.org/licenses/publicdomain/ | Many learning machines that have hierarchical structure or hidden variables
are now being used in information science, artificial intelligence, and
bioinformatics. However, several learning machines used in such fields are not
regular but singular statistical models, hence their generalization performance
is still left unknown. To overcome these problems, in the previous papers, we
proved new equations in statistical learning, by which we can estimate the
Bayes generalization loss from the Bayes training loss and the functional
variance, on the condition that the true distribution is a singularity
contained in a learning machine. In this paper, we prove that the same
equations hold even if a true distribution is not contained in a parametric
model. Also we prove that, the proposed equations in a regular case are
asymptotically equivalent to the Takeuchi information criterion. Therefore, the
proposed equations are always applicable without any condition on the unknown
true distribution.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 04:47:15 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 03:25:56 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Watanabe",
"Sumio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.0231 | Kimikazu Kato | Kimikazu Kato and Tikara Hosino | Solving $k$-Nearest Neighbor Problem on Multiple Graphics Processors | 5 pages, 8 figures, 1 table | null | null | null | cs.IR cs.DS cs.NE | http://creativecommons.org/licenses/by/3.0/ | The recommendation system is a software system to predict customers' unknown
preferences from known preferences. In the recommendation system, customers'
preferences are encoded into vectors, and finding the nearest vectors to each
vector is an essential part. This vector-searching part of the problem is
called a $k$-nearest neighbor problem. We give an effective algorithm to solve
this problem on multiple graphics processor units (GPUs).
Our algorithm consists of two parts: an $N$-body problem and a partial sort.
For a algorithm of the $N$-body problem, we applied the idea of a known
algorithm for the $N$-body problem in physics, although another trick is need
to overcome the problem of small sized shared memory. For the partial sort, we
give a novel GPU algorithm which is effective for small $k$. In our partial
sort algorithm, a heap is accessed in parallel by threads with a low cost of
synchronization. Both of these two parts of our algorithm utilize maximal power
of coalesced memory access, so that a full bandwidth is achieved.
By an experiment, we show that when the size of the problem is large, an
implementation of the algorithm on two GPUs runs more than 330 times faster
than a single core implementation on a latest CPU. We also show that our
algorithm scales well with respect to the number of GPUs.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 08:14:13 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Jun 2009 06:48:21 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Jul 2010 02:23:22 GMT"
}
]
| 2010-07-16T00:00:00 | [
[
"Kato",
"Kimikazu",
""
],
[
"Hosino",
"Tikara",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0906.0237 | Thomas Roche | Thomas Roche and C\'edric Tavernier | Multi-Linear cryptanalysis in Power Analysis Attacks MLPA | 16 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Power analysis attacks against embedded secret key cryptosystems are widely
studied since the seminal paper of Paul Kocher, Joshua Ja, and Benjamin Jun in
1998 where has been introduced the powerful Differential Power Analysis. The
strength of DPA is such that it became necessary to develop sound and efficient
countermeasures. Nowadays embedded cryptographic primitives usually integrate
one or several of these countermeasures (e.g. masking techniques, asynchronous
designs, balanced dynamic dual-rail gates designs, noise adding, power
consumption smoothing, etc. ...). This document presents a simple, yet
interesting, countermeasure to DPA and HO-DPA attacks, called brutal
countermeasure and new power analysis attacks using multi-linear approximations
(MLPA attacks) based on very recent and still unpublished results of Tavernier
et al..
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 08:34:50 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Roche",
"Thomas",
""
],
[
"Tavernier",
"Cédric",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.0247 | Albert Guill\'en i F\`abregas | Tung T. Kim and Albert Guillen i Fabregas | Coded Modulation with Mismatched CSIT over Block-Fading Channels | submitted to the IEEE Transactions on Information Theory. To be
presented (in part) at the 2009 IEEE International Symposium on Information
Theory, Seoul, South Korea, June-July 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Reliable communication over delay-constrained block-fading channels with
discrete inputs and mismatched (imperfect) channel state information at the
transmitter (CSIT) is studied. The CSIT mismatch is modeled as Gaussian random
variables, whose variances decay as a power of the signal-to-noise ratio (SNR).
A special focus is placed on the large-SNR decay of the outage probability when
power control with long-term power constraints is used. Without explicitly
characterizing the corresponding power allocation algorithms, we derive the
outage exponent as a function of the system parameters, including the CSIT
noise variance exponent and the exponent of the peak power constraint. It is
shown that CSIT, even if noisy, is always beneficial and leads to important
gains in terms of exponents. It is also shown that when multidimensional
rotations or precoders are used at the transmitter, further exponent gains can
be attained, but at the expense of larger decoding complexity.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 09:57:18 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Kim",
"Tung T.",
""
],
[
"Fabregas",
"Albert Guillen i",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0249 | Arash Ghasemmehdi | Arash Ghasemmehdi and Erik Agrell | Faster Projection in Sphere Decoding | null | IEEE Transactions on Information Theory, vol. 57, no. 6, pp.
3530-3536, June 2011 | 10.1109/TIT.2011.2143830 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most of the calculations in standard sphere decoders are redundant, in the
sense that they either calculate quantities that are never used or calculate
some quantities more than once. A new method, which is applicable to lattices
as well as finite constellations, is proposed to avoid these redundant
calculations while still returning the same result. Pseudocode is given to
facilitate immediate implementation. Simulations show that the speed gain with
the proposed method increases linearly with the lattice dimension. At dimension
60, the new algorithms avoid about 75% of all floating-point operations.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 10:13:14 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Dec 2010 21:36:03 GMT"
}
]
| 2015-01-07T00:00:00 | [
[
"Ghasemmehdi",
"Arash",
""
],
[
"Agrell",
"Erik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0252 | Jeong Hoon Lee | Jeong-Hoon Lee, Kyu-Young Whang, Hyo-Sang Lim, Byung-Suk Lee, and
Jun-Seok Heo | Progressive Processing of Continuous Range Queries in Hierarchical
Wireless Sensor Networks | 41 pages, 20 figures | null | 10.1587/transinf.E93.D.1832 | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the problem of processing continuous range queries in
a hierarchical wireless sensor network. Contrasted with the traditional
approach of building networks in a "flat" structure using sensor devices of the
same capability, the hierarchical approach deploys devices of higher capability
in a higher tier, i.e., a tier closer to the server. While query processing in
flat sensor networks has been widely studied, the study on query processing in
hierarchical sensor networks has been inadequate. In wireless sensor networks,
the main costs that should be considered are the energy for sending data and
the storage for storing queries. There is a trade-off between these two costs.
Based on this, we first propose a progressive processing method that
effectively processes a large number of continuous range queries in
hierarchical sensor networks. The proposed method uses the query merging
technique proposed by Xiang et al. as the basis and additionally considers the
trade-off between the two costs. More specifically, it works toward reducing
the storage cost at lower-tier nodes by merging more queries, and toward
reducing the energy cost at higher-tier nodes by merging fewer queries (thereby
reducing "false alarms"). We then present how to build a hierarchical sensor
network that is optimal with respect to the weighted sum of the two costs. It
allows for a cost-based systematic control of the trade-off based on the
relative importance between the storage and energy in a given network
environment and application. Experimental results show that the proposed method
achieves a near-optimal control between the storage and energy and reduces the
cost by 0.989~84.995 times compared with the cost achieved using the flat
(i.e., non-hierarchical) setup as in the work by Xiang et al.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 11:04:04 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Lee",
"Jeong-Hoon",
""
],
[
"Whang",
"Kyu-Young",
""
],
[
"Lim",
"Hyo-Sang",
""
],
[
"Lee",
"Byung-Suk",
""
],
[
"Heo",
"Jun-Seok",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0906.0268 | Vincent N\'elis | Vincent Nelis and Joel Goossens | MORA: an Energy-Aware Slack Reclamation Scheme for Scheduling Sporadic
Real-Time Tasks upon Multiprocessor Platforms | 11 pages | null | null | null | cs.OS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we address the global and preemptive energy-aware scheduling
problem of sporadic constrained-deadline tasks on DVFS-identical multiprocessor
platforms. We propose an online slack reclamation scheme which profits from the
discrepancy between the worst- and actual-case execution time of the tasks by
slowing down the speed of the processors in order to save energy. Our algorithm
called MORA takes into account the application-specific consumption profile of
the tasks. We demonstrate that MORA does not jeopardize the system
schedulability and we show by performing simulations that it can save up to 32%
of energy (in average) compared to execution without using any energy-aware
algorithm.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 12:10:10 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Nelis",
"Vincent",
""
],
[
"Goossens",
"Joel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
]
|
0906.0281 | L.T. Handoko | I. Firmansyah, Z. Akbar, L.T. Handoko | Microcontroller based distributed and networked control system for
public cluster | 4 pages, Proceeding of the International Conference on Quality in
Research 2009 | null | null | FISIKALIPI-09022 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the architecture and application of the distributed control in
public cluster, a parallel machine which is open for public access. Following
the nature of public cluster, the integrated distributed control system is
fully accessible through network using a user-friendly web interface. The
system is intended mainly to control the power of each node in a block of
parallel computers provided to certain users. This is especially important to
extend the life-time of related hardwares, and to reduce the whole running and
maintainance costs. The system consists of two parts : the master- and
node-controllers, and both are connected each other through RS-485 interface.
Each node-controller is assigned with a unique address to distinguish each of
them. We also discuss briefly the implementation of the system at the LIPI
Public Cluster.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 13:25:21 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Firmansyah",
"I.",
""
],
[
"Akbar",
"Z.",
""
],
[
"Handoko",
"L. T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.0298 | Vincent Lau | Vincent K. N. Lau and Yan Chen | Delay-Optimal Power and Precoder Adaptation for Multi-stream MIMO
Systems | null | IEEE Transactions on Wireless Communications, June 2009 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we consider delay-optimal MIMO precoder and power allocation
design for a MIMO Link in wireless fading channels. There are $L$ data streams
spatially multiplexed onto the MIMO link with heterogeneous packet arrivals and
delay requirements. The transmitter is assumed to have knowledge of the channel
state information (CSI) as well as the joint queue state information (QSI) of
the $L$ buffers. Using $L$-dimensional Markov Decision Process (MDP), we obtain
optimal precoding and power allocation policies for general delay regime, which
consists of an online solution and an offline solution. The online solution has
negligible complexity but the offline solution has worst case complexity ${\cal
O}((N+1)^L)$ where $N$ is the buffer size. Using {\em static sorting} of the
$L$ eigenchannels, we decompose the MDP into $L$ independent 1-dimensional
subproblems and obtained low complexity offline solution with linear complexity
order ${\cal O}(NL)$ and close-to-optimal performance.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 14:48:33 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Lau",
"Vincent K. N.",
""
],
[
"Chen",
"Yan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0311 | Christophe Paoli | Christophe Paoli, Cyril Voyant, Marc Muselli, Marie-Laure Nivet | Solar radiation forecasting using ad-hoc time series preprocessing and
neural networks | 14 pages, 8 figures, 2009 International Conference on Intelligent
Computing | null | null | null | cs.AI cs.NA physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present an application of neural networks in the renewable
energy domain. We have developed a methodology for the daily prediction of
global solar radiation on a horizontal surface. We use an ad-hoc time series
preprocessing and a Multi-Layer Perceptron (MLP) in order to predict solar
radiation at daily horizon. First results are promising with nRMSE < 21% and
RMSE < 998 Wh/m2. Our optimized MLP presents prediction similar to or even
better than conventional methods such as ARIMA techniques, Bayesian inference,
Markov chains and k-Nearest-Neighbors approximators. Moreover we found that our
data preprocessing approach can reduce significantly forecasting errors.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 16:02:10 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Paoli",
"Christophe",
""
],
[
"Voyant",
"Cyril",
""
],
[
"Muselli",
"Marc",
""
],
[
"Nivet",
"Marie-Laure",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0906.0328 | Andrea Pasquinucci | Andrea Pasquinucci | Rivisiting Token/Bucket Algorithms in New Applications | 7 pages | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a somehow peculiar Token/Bucket problem which at first sight
looks confusing and difficult to solve. The winning approach to solve the
problem consists in going back to the simple and traditional methods to solve
computer science problems like the one taught to us by Knuth. Somehow the main
trick is to be able to specify clearly what needs to be achieved, and then the
solution, even if complex, appears almost by itself.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 18:06:45 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Pasquinucci",
"Andrea",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.0330 | Gregory Chirikjian | Gregory S. Chirikjian | Information-Theoretic Inequalities on Unimodular Lie Groups | null | null | null | null | cs.IT math-ph math.IT math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classical inequalities used in information theory such as those of de Bruijn,
Fisher, and Kullback carry over from the setting of probability theory on
Euclidean space to that of unimodular Lie groups. These are groups that posses
integration measures that are invariant under left and right shifts, which
means that even in noncommutative cases they share many of the useful features
of Euclidean space. In practical engineering terms the rotation group and
Euclidean motion group are the unimodular Lie groups of most interest, and the
development of information theory applicable to these Lie groups opens up the
potential to study problems relating to image reconstruction from irregular or
random projection directions, information gathering in mobile robotics,
satellite attitude control, and bacterial chemotaxis and information
processing. Several definitions are extended from the Euclidean case to that of
Lie groups including the Fisher information matrix, and inequalities analogous
to those in classical information theory are derived and stated in the form of
fifteen small theorems. In all such inequalities, addition of random variables
is replaced with the group product, and the appropriate generalization of
convolution of probability densities is employed.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 18:12:39 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Chirikjian",
"Gregory S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0906.0343 | Michael LaMar | M. Drew LaMar | Algorithms for realizing degree sequences of directed graphs | 35 pages, 14 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Havel-Hakimi algorithm for constructing realizations of degree sequences
for undirected graphs has been used extensively in the literature. A result by
Kleitman and Wang extends the Havel-Hakimi algorithm to degree sequences for
directed graphs. In this paper we go a step further and describe a modification
of Kleitman and Wang's algorithm that is a more natural extension of
Havel-Hakimi's algorithm, in the sense that our extension can be made
equivalent to Havel-Hakimi's algorithm when the degree sequence has equal in
and out degrees and an even degree sum. We identify special degree sequences,
called directed 3-cycle anchored, that are ill-defined for the algorithm and
force a particular local structure on all directed graph realizations. We give
structural characterizations of these realizations, as well as
characterizations of the ill-defined degree sequences, leading to a
well-defined algorithm.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 19:11:43 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jun 2010 17:07:14 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"LaMar",
"M. Drew",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.0346 | Sebastien Li-Thiao-Te | S\'ebastien Li-Thiao-T\'e (CMLA) | Semiparametric Estimation of a Noise Model with Quantization Errors | 19 p | null | null | null | cs.DM math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The detectors in mass spectrometers are precise enough to count ion events.
In practice, the statistics of chemical noise are affected by large
quantization errors and overdispersion because of amplification in the
detector. The detector signal is modelled as X =floor(t N) where N represents
integer-valued ion counts and t represents the gain parameter. When t <= 1, the
gain parameter cannot be recovered without a priori information on N. When t >
1 however, we introduce compatible lattices and derive an estimator for t that
is optimal, independent of N and enables subsequent analyses of the ion counts.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 19:15:32 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Li-Thiao-Té",
"Sébastien",
"",
"CMLA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0906.0350 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Eliana-Dina Tirsa, Nicolae Tapus, Florin Pop,
Ciprian Mihai Dobre | Towards a Centralized Scheduling Framework for Communication Flows in
Distributed Systems | null | Proceedings of the 17th International Conference on Control
Systems and Computer Science (CSCS), vol. 1, pp. 441-448, Bucharest, Romania,
26-29 May, 2009. (ISSN: 2066-4451) | null | null | cs.DS cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The overall performance of a distributed system is highly dependent on the
communication efficiency of the system. Although network resources (links,
bandwidth) are becoming increasingly more available, the communication
performance of data transfers involving large volumes of data does not
necessarily improve at the same rate. This is due to the inefficient usage of
the available network resources. A solution to this problem consists of data
transfer scheduling techniques, which manage and allocate the network resources
in an efficient manner. In this paper we present several online and offline
data transfer optimization techniques, in the context of a centrally controlled
distributed system.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 19:30:03 GMT"
}
]
| 2009-06-02T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tirsa",
"Eliana-Dina",
""
],
[
"Tapus",
"Nicolae",
""
],
[
"Pop",
"Florin",
""
],
[
"Dobre",
"Ciprian Mihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.0376 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Eliana-Dina Tirsa, Alexandru Costan, Nicolae
Tapus | Offline Algorithms for Several Network Design, Clustering and QoS
Optimization Problems | null | Proceedings of the 17th International Conference on Control
Systems and Computer Science (CSCS), vol. 1, pp. 273-280, Bucharest, Romania,
26-29 May, 2009. (ISSN: 2066-4451) | null | null | cs.DS cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we address several network design, clustering and Quality of
Service (QoS) optimization problems and present novel, efficient, offline
algorithms which compute optimal or near-optimal solutions. The QoS
optimization problems consist of reliability improvement (by computing backup
shortest paths) and network link upgrades (in order to reduce the latency on
several paths). The network design problems consist of determining small
diameter networks, as well as very well connected and regular network
topologies. The network clustering problems consider only the restricted model
of static and mobile path networks, for which we were able to develop optimal
algorithms.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 20:31:10 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tirsa",
"Eliana-Dina",
""
],
[
"Costan",
"Alexandru",
""
],
[
"Tapus",
"Nicolae",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.0379 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Eliana-Dina Tirsa, Nicolae Tapus | Data Distribution Optimization using Offline Algorithms and a
Peer-to-Peer Small Diameter Tree Architecture with Bounded Node Degrees | null | Proc. of the 17th Intl. Conf. on Control Systems and Computer
Science (CSCS), vol. 2, pp. 445-452, 2009 (3rd Intl. Workshop on High
Performance Grid Middleware - HiPerGrid). (ISSN: 2066-4451) | null | null | cs.DC cs.DS cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multicast data transfers occur in many distributed systems and applications
(e.g. IPTV, Grids, content delivery networks). Because of this, efficient
multicast data distribution optimization techniques are required. In the first
part of this paper we present a small diameter, bounded degree, collaborative
peer-to-peer multicast tree architecture, which supports dynamic node arrivals
and departures making local decisions only. The architecture is fault tolerant
and, at low arrival and departure rates, converges towards a theoretically
optimal structure. In the second part of the paper we consider several offline
data distribution optimization problems, for which we present novel and
time-efficient algorithmic solutions.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 21:07:18 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tirsa",
"Eliana-Dina",
""
],
[
"Tapus",
"Nicolae",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.0380 | Damiano Mazza | Damiano Mazza | Observational Equivalence and Full Abstraction in the Symmetric
Interaction Combinators | null | Logical Methods in Computer Science, Volume 5, Issue 4 (December
22, 2009) lmcs:1150 | 10.2168/LMCS-5(4:6)2009 | null | cs.LO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The symmetric interaction combinators are an equally expressive variant of
Lafont's interaction combinators. They are a graph-rewriting model of
deterministic computation. We define two notions of observational equivalence
for them, analogous to normal form and head normal form equivalence in the
lambda-calculus. Then, we prove a full abstraction result for each of the two
equivalences. This is obtained by interpreting nets as certain subsets of the
Cantor space, called edifices, which play the same role as Boehm trees in the
theory of the lambda-calculus.
| [
{
"version": "v1",
"created": "Mon, 1 Jun 2009 21:14:58 GMT"
},
{
"version": "v2",
"created": "Wed, 11 Nov 2009 16:05:46 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Dec 2009 09:11:40 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Mazza",
"Damiano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.0391 | Ilya Volnyansky | Ilya Volnyansky, Vladimir Pestov | Curse of Dimensionality in Pivot-based Indexes | 9 pp., 4 figures, latex 2e, a revised submission to the 2nd
International Workshop on Similarity Search and Applications, 2009 | Proc. 2nd Int. Workshop on Similarity Search and Applications
(SISAP 2009), Prague, Aug. 29-30, 2009, T. Skopal and P. Zezula (eds.), IEEE
Computer Society, Los Alamitos--Washington--Tokyo, 2009, pp. 39-46. | 10.1109/SISAP.2009.9 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We offer a theoretical validation of the curse of dimensionality in the
pivot-based indexing of datasets for similarity search, by proving, in the
framework of statistical learning, that in high dimensions no pivot-based
indexing scheme can essentially outperform the linear scan.
A study of the asymptotic performance of pivot-based indexing schemes is
performed on a sequence of datasets modeled as samples $X_d$ picked in i.i.d.
fashion from metric spaces $\Omega_d$. We allow the size of the dataset $n=n_d$
to be such that $d$, the ``dimension'', is superlogarithmic but subpolynomial
in $n$. The number of pivots is allowed to grow as $o(n/d)$. We pick the least
restrictive cost model of similarity search where we count each distance
calculation as a single computation and disregard the rest.
We demonstrate that if the intrinsic dimension of the spaces $\Omega_d$ in
the sense of concentration of measure phenomenon is $O(d)$, then the
performance of similarity search pivot-based indexes is asymptotically linear
in $n$.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 00:41:46 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jun 2009 23:50:44 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Volnyansky",
"Ilya",
""
],
[
"Pestov",
"Vladimir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.0409 | Xin Han | Xin Han, Francis Y.L. Chin, Hing-Fung Ting, Guochuan Zhang | A New Upper Bound on 2D Online Bin Packing | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The 2D Online Bin Packing is a fundamental problem in Computer Science and
the determination of its asymptotic competitive ratio has attracted great
research attention. In a long series of papers, the lower bound of this ratio
has been improved from 1.808, 1.856 to 1.907 and its upper bound reduced from
3.25, 3.0625, 2.8596, 2.7834 to 2.66013. In this paper, we rewrite the upper
bound record to 2.5545. Our idea for the improvement is as follows. In SODA
2002 \cite{SS03}, Seiden and van Stee proposed an elegant algorithm called $H
\otimes B$, comprised of the {\em Harmonic algorithm} $H$ and the {\em Improved
Harmonic algorithm} $B$, for the two-dimensional online bin packing problem and
proved that the algorithm has an asymptotic competitive ratio of at most
2.66013. Since the best known online algorithm for one-dimensional bin packing
is the {\em Super Harmonic algorithm} \cite{S02}, a natural question to ask is:
could a better upper bound be achieved by using the Super Harmonic algorithm
instead of the Improved Harmonic algorithm? However, as mentioned in
\cite{SS03}, the previous analysis framework does not work. In this paper, we
give a positive answer for the above question. A new upper bound of 2.5545 is
obtained for 2-dimensional online bin packing. The main idea is to develop new
weighting functions for the Super Harmonic algorithm and propose new techniques
to bound the total weight in a rectangular bin.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 02:30:11 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Han",
"Xin",
""
],
[
"Chin",
"Francis Y. L.",
""
],
[
"Ting",
"Hing-Fung",
""
],
[
"Zhang",
"Guochuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.0422 | Natalia Vanetik Dr | Natalia Vanetik | Computing the tree number of a cut-outerplanar graph | These results are not incorrect but are covered in other works | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | While the notion of arboricity of a graph is well-known in graph theory, very
few results are dedicated to the minimal number of trees covering the edges of
a graph, called the tree number of a graph.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 05:48:48 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2020 19:49:49 GMT"
}
]
| 2020-08-03T00:00:00 | [
[
"Vanetik",
"Natalia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.0426 | Li Li | Li Li, Yudong Chen, Yi Zhang | A Mixed-Fractal Model for Network Traffic | null | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this short paper, we propose a new multi-fractal flow model, aiming to
provide a possible explanation for the crossover phenomena that appear in the
estimation of Hurst exponent for network traffic. It is shown that crossover
occurs if the network flow consists of several components with different Hurst
components. Our results indicate that this model might be useful in network
traffic modeling and simulation.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 06:41:19 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Li",
"Li",
""
],
[
"Chen",
"Yudong",
""
],
[
"Zhang",
"Yi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.0434 | Heng Lian | Aditya Chopra, Heng Lian | Total Variation, Adaptive Total Variation and Nonconvex Smoothly Clipped
Absolute Deviation Penalty for Denoising Blocky Images | null | null | null | null | cs.CV cs.NA stat.ME | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The total variation-based image denoising model has been generalized and
extended in numerous ways, improving its performance in different contexts. We
propose a new penalty function motivated by the recent progress in the
statistical literature on high-dimensional variable selection. Using a
particular instantiation of the majorization-minimization algorithm, the
optimization problem can be efficiently solved and the computational procedure
realized is similar to the spatially adaptive total variation model. Our
two-pixel image model shows theoretically that the new penalty function solves
the bias problem inherent in the total variation model. The superior
performance of the new penalty is demonstrated through several experiments. Our
investigation is limited to "blocky" images which have small total variation.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 07:34:27 GMT"
}
]
| 2011-07-28T00:00:00 | [
[
"Chopra",
"Aditya",
""
],
[
"Lian",
"Heng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
}
]
|
0906.0447 | Samson Lasaulce | S. Lasaulce, M. Debbah, and E. Altman | Methodologies for Analyzing Equilibria in Wireless Games | To appear in IEEE Signal Processing Magazine, Sep. 2009 | null | 10.1109/MSP.2009.933496 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Under certain assumptions in terms of information and models, equilibria
correspond to possible stable outcomes in conflicting or cooperative scenarios
where rational entities interact. For wireless engineers, it is of paramount
importance to be able to predict and even ensure such states at which the
network will effectively operate. In this article, we provide non-exhaustive
methodologies for characterizing equilibria in wireless games in terms of
existence, uniqueness, selection, and efficiency.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 11:20:34 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Lasaulce",
"S.",
""
],
[
"Debbah",
"M.",
""
],
[
"Altman",
"E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.0470 | Juan-Manuel Torres-Moreno | Juan-Manuel Torres-Moreno and Mirta B. Gordon | An optimal linear separator for the Sonar Signals Classification task | 8 pages, 6 tables | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of classifying sonar signals from rocks and mines first studied
by Gorman and Sejnowski has become a benchmark against which many learning
algorithms have been tested. We show that both the training set and the test
set of this benchmark are linearly separable, although with different
hyperplanes. Moreover, the complete set of learning and test patterns together,
is also linearly separable. We give the weights that separate these sets, which
may be used to compare results found by other algorithms.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 11:52:36 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Torres-Moreno",
"Juan-Manuel",
""
],
[
"Gordon",
"Mirta B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.0485 | Salvatore Mele | Andre Holzner, Peter Igo-Kemenes, Salvatore Mele | First results from the PARSE.Insight project: HEP survey on data
preservation, re-use and (open) access | Contribution to the First Workshop on Data Preservation and Long-Term
Analysis in High-Energy Physics, DESY, Hamburg, Germany, January 26th-28th
2009 | null | null | CERN-OPEN-2009-006 | cs.DL hep-ex physics.data-an | http://creativecommons.org/licenses/by-nc-sa/3.0/ | There is growing interest in the issues of preservation and re-use of the
records of science, in the "digital era". The aim of the PARSE.Insight project,
partly financed by the European Commission under the Seventh Framework Program,
is twofold: to provide an assessment of the current activities, trends and
risks in the field of digital preservation of scientific results, from primary
data to published articles; to inform the design of the preservation layer of
an emerging e-Infrastructure for e-Science. CERN, as a partner of the
PARSE.Insight consortium, is performing an in-depth case study on data
preservation, re-use and (open) access within the High-Energy Physics (HEP)
community. The first results of this large-scale survey of the attitudes and
concerns of HEP scientists are presented. The survey reveals the widespread
opinion that data preservation is "very important" to "crucial". At the same
time, it also highlights the chronic lack of resources and infrastructure to
tackle this issue, as well as deeply-rooted concerns on the access to, and the
understanding of, preserved data in future analyses.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 13:55:39 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Holzner",
"Andre",
""
],
[
"Igo-Kemenes",
"Peter",
""
],
[
"Mele",
"Salvatore",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0906.0504 | Ghadir Haikal | G. Haikal | A stabilized finite element formulation of non-smooth contact | Corrects some miscompiled items | null | null | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The computational modeling of many engineering problems using the Finite
Element method involves the modeling of two or more bodies that meet through an
interface. The interface can be physical, as in multi-physics and contact
problems, or purely numerical, as in the coupling of non-conforming meshes. The
most critical part of the modeling process is to ensure geometric compatibility
and a complete transfer of surface tractions between the different components
at the connecting interfaces. Popular contact modeling techniques rely on
geometric projections to detect and resolve overlapping or mass
interpenetration between two or more contacting bodies. Such approaches have
been shown to have two major drawbacks: they are not suitable for contact at
highly nonlinear surfaces and sharp corners where smooth normal projections are
not feasible, and they fail to guarantee a complete and accurate transfer of
pressure across the interface. This dissertation presents a novel formulation
for the modeling of contact problems that possesses the ability to resolve
complicated contact scenarios effectively, while being simpler to implement and
more widely applicable than currently available methods. We show that the
formulation boils down to a node-to-surface gap function that works effectively
for non-smooth contact. The numerical implementation using the midpoint rule
shows the need to guarantee the conservation of the total energy during impact,
for which a Lagrange multiplier method is used. We propose a local enrichment
of the interface and a simple stabilization procedure based on the
discontinuous Galerkin method to guarantee an accurate transfer of the pressure
field. The result is a robust interface formulation for contact problems and
the coupling of non-conforming meshes.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 01:49:04 GMT"
},
{
"version": "v2",
"created": "Thu, 4 Jun 2009 12:59:43 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Jul 2009 13:35:40 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Haikal",
"G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0906.0531 | Jaeok Park | Jaeok Park and Mihaela van der Schaar | Medium Access Control Protocols With Memory | 32 pages, 7 figures, 2 tables | IEEE/ACM Transactions on Networking, 2010 | 10.1109/TNET.2010.2050699 | null | cs.NI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many existing medium access control (MAC) protocols utilize past information
(e.g., the results of transmission attempts) to adjust the transmission
parameters of users. This paper provides a general framework to express and
evaluate distributed MAC protocols utilizing a finite length of memory for a
given form of feedback information. We define protocols with memory in the
context of a slotted random access network with saturated arrivals. We
introduce two performance metrics, throughput and average delay, and formulate
the problem of finding an optimal protocol. We first show that a TDMA outcome,
which is the best outcome in the considered scenario, can be obtained after a
transient period by a protocol with (N-1)-slot memory, where N is the total
number of users. Next, we analyze the performance of protocols with 1-slot
memory using a Markov chain and numerical methods. Protocols with 1-slot memory
can achieve throughput arbitrarily close to 1 (i.e., 100% channel utilization)
at the expense of large average delay, by correlating successful users in two
consecutive slots. Finally, we apply our framework to wireless local area
networks.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 16:43:16 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Jan 2010 02:57:13 GMT"
}
]
| 2010-08-03T00:00:00 | [
[
"Park",
"Jaeok",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0550 | Josep Rif\`a | J. Borges J. Rifa V. Zinoviev | On linear completely regular codes with covering radius $\rho=1$.
Construction and classification | Submitted to IEEE, Trans. Inf. Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Completely regular codes with covering radius $\rho=1$ must have minimum
distance $d\leq 3$. For $d=3$, such codes are perfect and their parameters are
well known. In this paper, the cases $d=1$ and $d=2$ are studied and completely
characterized when the codes are linear. Moreover, it is proven that all these
codes are completely transitive.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 17:48:02 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Zinoviev",
"J. Borges J. Rifa V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0557 | Tian Lan | Tian Lan, David Kao, Mung Chiang, Ashutosh Sabharwal | An Axiomatic Theory of Fairness in Network Resource Allocation | null | null | null | null | cs.NI cs.PF | http://creativecommons.org/licenses/by-nc-sa/3.0/ | We present a set of five axioms for fairness measures in resource allocation.
A family of fairness measures satisfying the axioms is constructed. Well-known
notions such as alpha-fairness, Jain's index, and entropy are shown to be
special cases. Properties of fairness measures satisfying the axioms are
proven, including Schur-concavity. Among the engineering implications is a
generalized Jain's index that tunes the resolution of the fairness measure, a
new understanding of alpha-fair utility functions, and an interpretation of
"larger alpha is more fair". We also construct an alternative set of four
axioms to capture efficiency objectives and feasibility constraints.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 18:52:24 GMT"
},
{
"version": "v2",
"created": "Wed, 3 Jun 2009 19:26:31 GMT"
},
{
"version": "v3",
"created": "Mon, 24 Aug 2009 20:37:29 GMT"
},
{
"version": "v4",
"created": "Wed, 7 Oct 2009 19:31:14 GMT"
}
]
| 2009-10-07T00:00:00 | [
[
"Lan",
"Tian",
""
],
[
"Kao",
"David",
""
],
[
"Chiang",
"Mung",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.0558 | Haim Kaplan | Haim Kaplan and Micha Sharir and Eugenii Shustin | On lines and Joints | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $L$ be a set of $n$ lines in $\reals^d$, for $d\ge 3$. A {\em joint} of
$L$ is a point incident to at least $d$ lines of $L$, not all in a common
hyperplane. Using a very simple algebraic proof technique, we show that the
maximum possible number of joints of $L$ is $\Theta(n^{d/(d-1)})$. For $d=3$,
this is a considerable simplification of the orignal algebraic proof of Guth
and Katz~\cite{GK}, and of the follow-up simpler proof of Elekes et al.
\cite{EKS}.
| [
{
"version": "v1",
"created": "Tue, 2 Jun 2009 18:56:35 GMT"
}
]
| 2009-06-03T00:00:00 | [
[
"Kaplan",
"Haim",
""
],
[
"Sharir",
"Micha",
""
],
[
"Shustin",
"Eugenii",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.0612 | Santo Fortunato Dr | Santo Fortunato | Community detection in graphs | Review article. 103 pages, 42 figures, 2 tables. Two sections
expanded + minor modifications. Three figures + one table + references added.
Final version published in Physics Reports | Physics Reports 486, 75-174 (2010) | 10.1016/j.physrep.2009.11.002 | null | physics.soc-ph cond-mat.stat-mech cs.IR physics.bio-ph physics.comp-ph q-bio.QM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The modern science of networks has brought significant advances to our
understanding of complex systems. One of the most relevant features of graphs
representing real systems is community structure, or clustering, i. e. the
organization of vertices in clusters, with many edges joining vertices of the
same cluster and comparatively few edges joining vertices of different
clusters. Such clusters, or communities, can be considered as fairly
independent compartments of a graph, playing a similar role like, e. g., the
tissues or the organs in the human body. Detecting communities is of great
importance in sociology, biology and computer science, disciplines where
systems are often represented as graphs. This problem is very hard and not yet
satisfactorily solved, despite the huge effort of a large interdisciplinary
community of scientists working on it over the past few years. We will attempt
a thorough exposition of the topic, from the definition of the main elements of
the problem, to the presentation of most methods developed, with a special
focus on techniques designed by statistical physicists, from the discussion of
crucial issues like the significance of clustering and how methods should be
tested and compared against each other, to the description of applications to
real networks.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 10:20:48 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jan 2010 14:53:31 GMT"
}
]
| 2010-09-17T00:00:00 | [
[
"Fortunato",
"Santo",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0906.0651 | Maria Potop-Butucaru | Zohir Bouzid (LIP6), Maria Potop-Butucaru (LIP6, INRIA Rocquencourt),
S\'ebastien Tixeuil (LIP6, INRIA Futurs) | Optimal Byzantine Resilient Convergence in Asynchronous Robot Networks | null | null | 10.1007/978-3-642-05118-0_12 | null | cs.DC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the first deterministic algorithm that tolerates up to $f$
byzantine faults in $3f+1$-sized networks and performs in the asynchronous
CORDA model. Our solution matches the previously established lower bound for
the semi-synchronous ATOM model on the number of tolerated Byzantine robots.
Our algorithm works under bounded scheduling assumptions for oblivious robots
moving in a uni-dimensional space.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 06:39:38 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Bouzid",
"Zohir",
"",
"LIP6"
],
[
"Potop-Butucaru",
"Maria",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6, INRIA Futurs"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0906.0667 | Harald Kosch | Florian Niedermeier, Michael Niedermeier, and Harald Kosch | Quality assessment of the MPEG-4 scalable video CODEC | null | published in a shorter version at ICIAP 2009 Conference | null | null | cs.MM cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the performance of the emerging MPEG-4 SVC CODEC is evaluated.
In the first part, a brief introduction on the subject of quality assessment
and the development of the MPEG-4 SVC CODEC is given. After that, the used test
methodologies are described in detail, followed by an explanation of the actual
test scenarios. The main part of this work concentrates on the performance
analysis of the MPEG-4 SVC CODEC - both objective and subjective.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 09:31:34 GMT"
}
]
| 2009-06-04T00:00:00 | [
[
"Niedermeier",
"Florian",
""
],
[
"Niedermeier",
"Michael",
""
],
[
"Kosch",
"Harald",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.0675 | Laurent Romary | Martin Holmes (HCMC), Laurent Romary (INRIA Saclay - Ile de France,
IDSL) | Encoding models for scholarly literature | null | Publishing and digital libraries: Legal and organizational issues,
Ioannis Iglezakis, Tatiana-Eleni Synodinou, Sarantos Kapidakis (Ed.) (2010) - | 10.4018/978-1-60960-031-0 | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We examine the issue of digital formats for document encoding, archiving and
publishing, through the specific example of "born-digital" scholarly journal
articles. We will begin by looking at the traditional workflow of journal
editing and publication, and how these practices have made the transition into
the online domain. We will examine the range of different file formats in which
electronic articles are currently stored and published. We will argue strongly
that, despite the prevalence of binary and proprietary formats such as PDF and
MS Word, XML is a far superior encoding choice for journal articles. Next, we
look at the range of XML document structures (DTDs, Schemas) which are in
common use for encoding journal articles, and consider some of their strengths
and weaknesses. We will suggest that, despite the existence of specialized
schemas intended specifically for journal articles (such as NLM), and more
broadly-used publication-oriented schemas such as DocBook, there are strong
arguments in favour of developing a subset or customization of the Text
Encoding Initiative (TEI) schema for the purpose of journal-article encoding;
TEI is already in use in a number of journal publication projects, and the
scale and precision of the TEI tagset makes it particularly appropriate for
encoding scholarly articles. We will outline the document structure of a
TEI-encoded journal article, and look in detail at suggested markup patterns
for specific features of journal articles.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 09:53:12 GMT"
}
]
| 2010-10-13T00:00:00 | [
[
"Holmes",
"Martin",
"",
"HCMC"
],
[
"Romary",
"Laurent",
"",
"INRIA Saclay - Ile de France,\n IDSL"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0906.0684 | Chris Giannella | Chris Giannella | New Instability Results for High Dimensional Nearest Neighbor Search | null | Information Processing Letters 109(19), 2009. | null | null | cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a dataset of n(d) points generated independently from R^d according
to a common p.d.f. f_d with support(f_d) = [0,1]^d and sup{f_d([0,1]^d)}
growing sub-exponentially in d. We prove that: (i) if n(d) grows
sub-exponentially in d, then, for any query point q^d in [0,1]^d and any
epsilon>0, the ratio of the distance between any two dataset points and q^d is
less that 1+epsilon with probability -->1 as d-->infinity; (ii) if
n(d)>[4(1+epsilon)]^d for large d, then for all q^d in [0,1]^d (except a small
subset) and any epsilon>0, the distance ratio is less than 1+epsilon with
limiting probability strictly bounded away from one. Moreover, we provide
preliminary results along the lines of (i) when f_d=N(mu_d,Sigma_d).
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 15:13:12 GMT"
}
]
| 2009-09-01T00:00:00 | [
[
"Giannella",
"Chris",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.0687 | Olga Holtz | Olga Holtz, Noam Shomron | Computational Complexity and Numerical Stability of Linear Problems | 16 pages; updated to reflect referees' remarks; to appear in
Proceedings of the 5th European Congress of Mathematics | European Congress of Mathematics Amsterdam, 14-18 July, 2008, EMS
Publishing House, pp. 381-400 | 10.4171/077-1/16 | null | cs.CC cs.DS cs.NA math.HO math.NA math.RA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We survey classical and recent developments in numerical linear algebra,
focusing on two issues: computational complexity, or arithmetic costs, and
numerical stability, or performance under roundoff error. We present a brief
account of the algebraic complexity theory as well as the general error
analysis for matrix multiplication and related problems. We emphasize the
central role played by the matrix multiplication problem and discuss historical
and modern approaches to its solution.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 10:51:40 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Sep 2009 00:59:14 GMT"
}
]
| 2010-06-22T00:00:00 | [
[
"Holtz",
"Olga",
""
],
[
"Shomron",
"Noam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.HO",
"description": "Biographies, philosophy of mathematics, mathematics education, recreational mathematics, communication of mathematics, ethics in mathematics",
"span": "(History and Overview)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
]
|
0906.0690 | Ioannis Kontoyiannis | Peter Harremoes, Oliver Johnson, Ioannis Kontoyiannis | Thinning, Entropy and the Law of Thin Numbers | null | IEEE Transactions on Information Theory, Vol 56/9, 2010, pages
4228-4244 | 10.1109/TIT.2010.2053893 | null | cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Renyi's "thinning" operation on a discrete random variable is a natural
discrete analog of the scaling operation for continuous random variables. The
properties of thinning are investigated in an information-theoretic context,
especially in connection with information-theoretic inequalities related to
Poisson approximation results. The classical Binomial-to-Poisson convergence
(sometimes referred to as the "law of small numbers" is seen to be a special
case of a thinning limit theorem for convolutions of discrete distributions. A
rate of convergence is provided for this limit, and nonasymptotic bounds are
also established. This development parallels, in part, the development of
Gaussian inequalities leading to the information-theoretic version of the
central limit theorem. In particular, a "thinning Markov chain" is introduced,
and it is shown to play a role analogous to that of the Ornstein-Uhlenbeck
process in connection to the entropy power inequality.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 11:45:43 GMT"
}
]
| 2010-08-17T00:00:00 | [
[
"Harremoes",
"Peter",
""
],
[
"Johnson",
"Oliver",
""
],
[
"Kontoyiannis",
"Ioannis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0906.0695 | Brijesh Rai Kumar | Brijesh Kumar Rai, and Bikash Kumar Dey | On network coding for sum-networks | Accepted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2011.2169532 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A directed acyclic network is considered where all the terminals need to
recover the sum of the symbols generated at all the sources. We call such a
network a sum-network. It is shown that there exists a solvably (and linear
solvably) equivalent sum-network for any multiple-unicast network, and thus for
any directed acyclic communication network. It is also shown that there exists
a linear solvably equivalent multiple-unicast network for every sum-network. It
is shown that for any set of polynomials having integer coefficients, there
exists a sum-network which is scalar linear solvable over a finite field F if
and only if the polynomials have a common root in F. For any finite or cofinite
set of prime numbers, a network is constructed which has a vector linear
solution of any length if and only if the characteristic of the alphabet field
is in the given set. The insufficiency of linear network coding and
unachievability of the network coding capacity are proved for sum-networks by
using similar known results for communication networks. Under fractional vector
linear network coding, a sum-network and its reverse network are shown to be
equivalent. However, under non-linear coding, it is shown that there exists a
solvable sum-network whose reverse network is not solvable.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 12:22:52 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jul 2009 23:34:13 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Aug 2009 11:52:43 GMT"
},
{
"version": "v4",
"created": "Tue, 30 Aug 2011 08:36:18 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Rai",
"Brijesh Kumar",
""
],
[
"Dey",
"Bikash Kumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0716 | Sebastian Bernhardsson | Sebastian Bernhardsson, Luis Enrique Correa da Rocha and Petter
Minnhagen | Size dependent word frequencies and translational invariance of books | 10 pages, 2 appendices (6 pages), 5 figures | Physica A 389:2, pp. 330-341 (2010) | 10.1016/j.physa.2009.09.022 | null | cs.CL physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is shown that a real novel shares many characteristic features with a null
model in which the words are randomly distributed throughout the text. Such a
common feature is a certain translational invariance of the text. Another is
that the functional form of the word-frequency distribution of a novel depends
on the length of the text in the same way as the null model. This means that an
approximate power-law tail ascribed to the data will have an exponent which
changes with the size of the text-section which is analyzed. A further
consequence is that a novel cannot be described by text-evolution models like
the Simon model. The size-transformation of a novel is found to be well
described by a specific Random Book Transformation. This size transformation in
addition enables a more precise determination of the functional form of the
word-frequency distribution. The implications of the results are discussed.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 13:52:30 GMT"
}
]
| 2009-10-14T00:00:00 | [
[
"Bernhardsson",
"Sebastian",
""
],
[
"da Rocha",
"Luis Enrique Correa",
""
],
[
"Minnhagen",
"Petter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0906.0724 | Piotr Bania | Piotr Bania | Dynamic Data Flow Analysis via Virtual Code Integration (aka The
SpiderPig case) | 48 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Paper addresses the process of dynamic data flow analysis using virtual code
integration (VCI), often refered to as dynamic binary rewriting. This article
will try to demonstrate all of the techniques that were applied in the
SpiderPig project. It will also discuss the main differences between the
methods that were employed and those used in other available software, as well
as introducing other related work. SpiderPig's approach was found to be very
fast and was transparent enough for reliable and usable data flow analysis. It
was created with the purpose of providing a tool which would aid vulnerability
and security researchers with tracing and analyzing any necessary data and its
further propagation through a program. At the current state it works on IA-32
platforms with Microsoft Windows systems and it supports FPU, SSE, MMX and all
of the IA-32 general instructions. SpiderPig also demonstrates the usage of a
virtual code integration (VCI) framework which allows for modifying the target
application code at the instruction level. By this I mean that the VCI
framework allows for custom code insertion, original code modification and full
customization of the original application's code. Instructions can be swapped
out, deleted or modified at a whim, without corrupting the surrounding code and
side-effects of the modification are resolved.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 14:32:37 GMT"
}
]
| 2009-06-04T00:00:00 | [
[
"Bania",
"Piotr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.0731 | Paul Vitanyi | Paul M.B. Vitanyi (CWI, Amsterdam) | Distributed elections in an Archimedean ring of processors | null | 16th ACM Symposium on Theory of Computing, Washington D.C., 1984,
542 - 547 | null | null | cs.DC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Unlimited asynchronism is intolerable in real physically distributed computer
systems. Such systems, synchronous or not, use clocks and timeouts. Therefore
the magnitudes of elapsed absolute time in the system need to satisfy the axiom
of Archimedes. Under this restriction of asynchronicity logically
time-independent solutions can be derived which are nonetheless better (in
number of message passes) than is possible otherwise. The use of clocks by the
individual processors, in elections in a ring of asynchronous processors
without central control, allows a deterministic solution which requires but a
linear number of message passes. To obtain the result it has to be assumed that
the clocks measure finitely proportional absolute time-spans for their time
units, that is, the magnitudes of elapsed time in the ring network satisfy the
axiom of Archimedes. As a result, some basic subtilities associated with
distributed computations are highlighted. For instance, the known nonlinear
lower bound on the required number of message passes is cracked. For the
synchronous case, in which the necessary assumptions hold a fortiori, the
method is -asymptotically- the most efficient one yet, and of optimal order of
magnitude. The deterministic algorithm is of -asymptotically- optimal bit
complexity, and, in the synchronous case, also yields an optimal method to
determine the ring size. All of these results improve the known ones.
| [
{
"version": "v1",
"created": "Wed, 27 May 2009 16:07:56 GMT"
}
]
| 2009-06-04T00:00:00 | [
[
"Vitanyi",
"Paul M. B.",
"",
"CWI, Amsterdam"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.0739 | Kun Zheng | Kun Zheng, Husheng Li, Seddik M. Djouadi and Jun Wang | Spectrum Sensing in Low SNR Regime via Stochastic Resonance | 5 pages, 9 figures, submitted to Asilomar 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectrum sensing is essential in cognitive radio to enable dynamic spectrum
access. In many scenarios, primary user signal must be detected reliably in low
signal-to-noise ratio (SNR) regime under required sensing time. We propose to
use stochastic resonance, a nonlinear filter having certain resonance
frequency, to detect primary users when the SNR is very low. Both block and
sequential detection schemes are studied. Simulation results show that, under
the required false alarm rate, both detection probability and average detection
delay can be substantially improved. A few implementation issues are also
discussed.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 16:29:22 GMT"
}
]
| 2009-06-04T00:00:00 | [
[
"Zheng",
"Kun",
""
],
[
"Li",
"Husheng",
""
],
[
"Djouadi",
"Seddik M.",
""
],
[
"Wang",
"Jun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0744 | Lalitha Sankar | Lalitha Sankar, Xiaohu Shang, Elza Erkip, and H. Vincent Poor | Ergodic Fading Interference Channels: Sum-Capacity and Separability | accepted for publication in the IEEE Transactions on Information
Theory | null | 10.1109/TIT.2011.2119270 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The sum-capacity for specific sub-classes of ergodic fading Gaussian two-user
interference channels (IFCs) is developed under the assumption of perfect
channel state information at all transmitters and receivers. For the
sub-classes of uniformly strong (every fading state is strong) and ergodic very
strong two-sided IFCs (a mix of strong and weak fading states satisfying
specific fading averaged conditions) the optimality of completely decoding the
interference, i.e., converting the IFC to a compound multiple access channel
(C-MAC), is proved. It is also shown that this capacity-achieving scheme
requires encoding and decoding jointly across all fading states. As an
achievable scheme and also as a topic of independent interest, the capacity
region and the corresponding optimal power policies for an ergodic fading C-MAC
are developed. For the sub-class of uniformly weak IFCs (every fading state is
weak), genie-aided outer bounds are developed. The bounds are shown to be
achieved by treating interference as noise and by separable coding for
one-sided fading IFCs. Finally, for the sub-class of one-sided hybrid IFCs (a
mix of weak and strong states that do not satisfy ergodic very strong
conditions), an achievable scheme involving rate splitting and joint coding
across all fading states is developed and is shown to perform at least as well
as a separable coding scheme.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 17:04:15 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Jan 2011 16:05:11 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Sankar",
"Lalitha",
""
],
[
"Shang",
"Xiaohu",
""
],
[
"Erkip",
"Elza",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0798 | Subhash Kak | Subhash Kak | Single Neuron Memories and the Network's Proximity Matrix | 10 pages | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper extends the treatment of single-neuron memories obtained by the
B-matrix approach. The spreading of the activity within the network is
determined by the network's proximity matrix which represents the separations
amongst the neurons through the neural pathways.
| [
{
"version": "v1",
"created": "Wed, 3 Jun 2009 23:10:25 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Kak",
"Subhash",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0906.0840 | Christoph Studer | Christoph Studer and Helmut B\"olcskei | Soft-Input Soft-Output Single Tree-Search Sphere Decoding | submitted to the IEEE Trans. Inf. Theory, June 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Soft-input soft-output (SISO) detection algorithms form the basis for
iterative decoding. The computational complexity of SISO detection often poses
significant challenges for practical receiver implementations, in particular in
the context of multiple-input multiple-output (MIMO) wireless communication
systems. In this paper, we present a low-complexity SISO sphere-decoding
algorithm, based on the single tree-search paradigm proposed originally for
soft-output MIMO detection in Studer, et al., IEEE J-SAC, 2008. The new
algorithm incorporates clipping of the extrinsic log-likelihood ratios (LLRs)
into the tree-search, which results in significant complexity savings and
allows to cover a large performance/complexity tradeoff region by adjusting a
single parameter. Furthermore, we propose a new method for correcting
approximate LLRs --resulting from sub-optimal detectors-- which (often
significantly) improves detection performance at low additional computational
complexity.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 06:30:28 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Studer",
"Christoph",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.