id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0906.0845
Florentina Pintea
Mohd Nazri Ismail
Analyzing of MOS and Codec Selection for Voice over IP Technology
14 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),263-276
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this research, we propose an architectural solution to implement the voice over IP (VoIP) service in campus environment network. Voice over IP (VoIP) technology has become a discussion issue for this time being. Today, the deployment of this technology on an organization truly can give a great financial benefit over traditional telephony. Therefore, this study is to analyze the VoIP Codec selection and investigate the Mean Opinion Score (MOS) performance areas evolved with the quality of service delivered by soft phone and IP phone. This study focuses on quality of voice prediction such as i) accuracy of MOS between automated system and human perception and ii) different types of codec performance measurement via human perception using MOS technique. In this study, network management system (NMS) is used to monitor and capture the performance of VoIP in campus environment. In addition, the most apparent of implementing soft phone and IP phone in campus environment is to define the best codec selection that can be used in operational environment. Based on the finding result, the MOS measurement through automated and manual system is able to predict and evaluate VoIP performance. In addition, based on manual MOS measurement, VoIP conversations over LAN contribute more reliability and availability performance compare to WAN.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 07:14:39 GMT" } ]
2009-06-05T00:00:00
[ [ "Ismail", "Mohd Nazri", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.0851
Florentina Pintea
Vasiliy Saiko
Specific Characteristics of Applying the Paired Comparison Method for Parameterization of Consumer Wants
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),305-314
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article describes the main problems concerned with using expert assessment method in consumer preference researches. The author proved the expediency of using a 3-point measurement scale. The author suggested an algorithm for controlling the judgments' consistency that includes analyzing and correcting the input estimates in real-time mode.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 08:20:50 GMT" } ]
2009-06-05T00:00:00
[ [ "Saiko", "Vasiliy", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.0857
Michael Weiss
Enrico Formenti, Alberto Dennunzio and Michael Weiss
2D cellular automata: dynamics and undecidability
24 pages, 12 figures. paper submitted to an international conference
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce the notion of quasi-expansivity for 2D CA and we show that it shares many properties with expansivity (that holds only for 1D CA). Similarly, we introduce the notions of quasi-sensitivity and prove that the classical dichotomy theorem holds in this new setting. Moreover, we show a tight relation between closingness and openness for 2D CA. Finally, the undecidability of closingness property for 2D CA is proved.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 10:14:01 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2009 15:58:08 GMT" } ]
2009-09-29T00:00:00
[ [ "Formenti", "Enrico", "" ], [ "Dennunzio", "Alberto", "" ], [ "Weiss", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.0859
Florentina Pintea
Emil Daniel Schwab
A Partial Order on Bipartite Graphs with n Vertices
10 pages,exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),315-324
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper examines a partial order on bipartite graphs (X1, X2, E) with n vertices, X1UX2={1,2,...,n}. This partial order is a natural partial order of subobjects of an object in a triangular category with bipartite graphs as morphisms.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:25:43 GMT" } ]
2009-06-05T00:00:00
[ [ "Schwab", "Emil Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.0861
Florentina Pintea
A. A. Shumeyko, S. L. Sotnik
Using Genetic Algorithms for Texts Classification Problems
16 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),325-340
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The avalanche quantity of the information developed by mankind has led to concept of automation of knowledge extraction - Data Mining ([1]). This direction is connected with a wide spectrum of problems - from recognition of the fuzzy set to creation of search machines. Important component of Data Mining is processing of the text information. Such problems lean on concept of classification and clustering ([2]). Classification consists in definition of an accessory of some element (text) to one of in advance created classes. Clustering means splitting a set of elements (texts) on clusters which quantity are defined by localization of elements of the given set in vicinities of these some natural centers of these clusters. Realization of a problem of classification initially should lean on the given postulates, basic of which - the aprioristic information on primary set of texts and a measure of affinity of elements and classes.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:41:47 GMT" } ]
2009-06-05T00:00:00
[ [ "Shumeyko", "A. A.", "" ], [ "Sotnik", "S. L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0906.0862
Daniel Karapetyan
Gregory Gutin and Daniel Karapetyan
A Memetic Algorithm for the Multidimensional Assignment Problem
14 pages
Lecture Notes in Computer Science 5752 (2009) 125-129
10.1007/978-3-642-03751-1_12
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Multidimensional Assignment Problem (MAP or s-AP in the case of s dimensions) is an extension of the well-known assignment problem. The most studied case of MAP is 3-AP, though the problems with larger values of s have also a number of applications. In this paper we propose a memetic algorithm for MAP that is a combination of a genetic algorithm with a local search procedure. The main contribution of the paper is an idea of dynamically adjusted generation size, that yields an outstanding flexibility of the algorithm to perform well for both small and large fixed running times. The results of computational experiments for several instance families show that the proposed algorithm produces solutions of very high quality in a reasonable time and outperforms the state-of-the art 3-AP memetic algorithm.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:44:59 GMT" } ]
2010-03-30T00:00:00
[ [ "Gutin", "Gregory", "" ], [ "Karapetyan", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.0863
Florentina Pintea
Cristina Ofelia Stanciu
Decision Support Systems Architectures
8 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),341-348
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the main components of the decision assisting systems. Further on three types of architectures of these systems are described, analyzed, and respectively compared, namely: the network architecture, the centralized architecture and the hierarchical architecture.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:46:45 GMT" } ]
2009-06-05T00:00:00
[ [ "Stanciu", "Cristina Ofelia", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.0866
Florentina Pintea
Virgiliu Streian, Adela Ionescu
Web Publishing of the Files Obtained by Flash
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),349-358
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this article is to familiarize the user with the Web publishing of the files obtained by Flash. The article contains an overview of Macromedia Flash 5, as well as the running of a Playing Flash movie, information on Flash and Generator, the publishing of Flash movies, a HTLM publishing for Flash Player files and publishing by Generator templates.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:52:22 GMT" } ]
2009-06-05T00:00:00
[ [ "Streian", "Virgiliu", "" ], [ "Ionescu", "Adela", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0906.0867
Florentina Pintea
Ramona Vasilescu
PDF/A standard for long term archiving
8 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),359-366
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
PDF/A is defined by ISO 19005-1 as a file format based on PDF format. The standard provides a mechanism for representing electronic documents in a way that preserves their visual appearance over time, independent of the tools and systems used for creating or storing the files.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 09:56:14 GMT" } ]
2009-06-05T00:00:00
[ [ "Vasilescu", "Ramona", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0906.0869
Florentina Pintea
Valentin Vieriu, Catalin Tuican
Adobe AIR, Bringing Rich Internet Applications to the Desktop
14 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),367-380
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rich Internet Applications are the new trend in software development today. Adobe AIR offers the possibility to create cross-platform desktop applications using popular Web technologies like HTML, JavaScript, Flash and Flex. This article is focused on presenting the advantages that this new environment has to offer for the web development community and how quickly you can develop a desktop application using Adobe AIR.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 10:00:21 GMT" } ]
2009-06-05T00:00:00
[ [ "Vieriu", "Valentin", "" ], [ "Tuican", "Catalin", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.0871
Florentina Pintea
Tiberiu Marius Karnyanszky, Mihai Titu
Upon the Modeling and the Optimization of the Debiting Process through Computer Aided Non-Conventional Technologies
10 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),189-198
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The debiting process of the remarkable properties materials can be managed through unconventional technologies as the complex electrical erosion. We present the modeling of the previous experimental results to obtain a mathematical dependence of the output parameters (processing time, surface quality) on the input parameters (voltage or current). All the experimental data are memorized on a database and for each particular debiting process a new dependence is built. Because all the experiments applied in the Romanian laboratories or practical applications of the nonconventional technological processes in the factories were based on the particular conditions of one activity, this papers presents the technical implementation of a computer-aided solution that keeps all previous experimental data, optimizes the processing conditions and eventual manage the driving gear. The flow-chart we present in this paper offers a solution for practitioners to reduce the electrical consumption while a technological processing of special materials is necessary. The computer program and the database can be easily adapted to any technological processes (conventional or not).
[ { "version": "v1", "created": "Thu, 4 Jun 2009 10:06:06 GMT" } ]
2009-06-05T00:00:00
[ [ "Karnyanszky", "Tiberiu Marius", "" ], [ "Titu", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.0872
Boris Yangel
Boris Yangel
Fast Weak Learner Based on Genetic Algorithm
4 pages, acmsiggraph latex style packed with the latex source in the single archive
null
null
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An approach to the acceleration of parametric weak classifier boosting is proposed. Weak classifier is called parametric if it has fixed number of parameters and, so, can be represented as a point into multidimensional space. Genetic algorithm is used instead of exhaustive search to learn parameters of such classifier. Proposed approach also takes cases when effective algorithm for learning some of the classifier parameters exists into account. Experiments confirm that such an approach can dramatically decrease classifier training time while keeping both training and test errors small.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 10:25:08 GMT" } ]
2009-06-05T00:00:00
[ [ "Yangel", "Boris", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0906.0877
Florentina Pintea
Florentina Anica Pintea, Georgiana Petruta Fintineanu, Bogdan Ioan Selariu
PayPal in Romania
8 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),277-284
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The present paper refers to the usefulness of online payment through PayPal and to the development of this payment manner in Romania. PayPal is an example of a payment intermediary service that facilitates worldwide e-commerce.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 10:31:19 GMT" } ]
2009-06-05T00:00:00
[ [ "Pintea", "Florentina Anica", "" ], [ "Fintineanu", "Georgiana Petruta", "" ], [ "Selariu", "Bogdan Ioan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.0885
Yongxin Tong
Yongxin Tong, Li Zhao, Dan Yu, Shilong Ma, Ke Xu
Mining Compressed Repetitive Gapped Sequential Patterns Efficiently
19 pages, 7 figures
The 5th International Conference on Advanced Data Mining and Applications (ADMA2009)
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mining frequent sequential patterns from sequence databases has been a central research topic in data mining and various efficient mining sequential patterns algorithms have been proposed and studied. Recently, in many problem domains (e.g, program execution traces), a novel sequential pattern mining research, called mining repetitive gapped sequential patterns, has attracted the attention of many researchers, considering not only the repetition of sequential pattern in different sequences but also the repetition within a sequence is more meaningful than the general sequential pattern mining which only captures occurrences in different sequences. However, the number of repetitive gapped sequential patterns generated by even these closed mining algorithms may be too large to understand for users, especially when support threshold is low. In this paper, we propose and study the problem of compressing repetitive gapped sequential patterns. Inspired by the ideas of summarizing frequent itemsets, RPglobal, we develop an algorithm, CRGSgrow (Compressing Repetitive Gapped Sequential pattern grow), including an efficient pruning strategy, SyncScan, and an efficient representative pattern checking scheme, -dominate sequential pattern checking. The CRGSgrow is a two-step approach: in the first step, we obtain all closed repetitive sequential patterns as the candidate set of representative repetitive sequential patterns, and at the same time get the most of representative repetitive sequential patterns; in the second step, we only spend a little time in finding the remaining the representative patterns from the candidate set. An empirical study with both real and synthetic data sets clearly shows that the CRGSgrow has good performance.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 11:17:34 GMT" } ]
2009-06-05T00:00:00
[ [ "Tong", "Yongxin", "" ], [ "Zhao", "Li", "" ], [ "Yu", "Dan", "" ], [ "Ma", "Shilong", "" ], [ "Xu", "Ke", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.0910
Daniel Lemire
Sylvie Noel, Daniel Lemire
On the Challenges of Collaborative Data Processing
to appear as a chapter in an upcoming book (Collaborative Information Behavior)
null
null
null
cs.DB cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The last 30 years have seen the creation of a variety of electronic collaboration tools for science and business. Some of the best-known collaboration tools support text editing (e.g., wikis). Wikipedia's success shows that large-scale collaboration can produce highly valuable content. Meanwhile much structured data is being collected and made publicly available. We have never had access to more powerful databases and statistical packages. Is large-scale collaborative data analysis now possible? Using a quantitative analysis of Web 2.0 data visualization sites, we find evidence that at least moderate open collaboration occurs. We then explore some of the limiting factors of collaboration over data.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 13:28:51 GMT" } ]
2009-06-05T00:00:00
[ [ "Noel", "Sylvie", "" ], [ "Lemire", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0906.0921
Matthew Marriotti
Matthew Marriotti
Course Material Selection Rubric for Creating Network Security Courses
null
null
null
null
cs.CY cs.CR
http://creativecommons.org/licenses/by/3.0/
Teaching network security can be a difficult task for university teachers, especially for teachers at smaller universities where the course loads are more diverse. Creating a new course in network security requires investigation into multiple subject areas within the field and from multiple sources. This task can be daunting and overwhelming for teachers from smaller universities because of their requirement to teach multiple subjects, not just network security. Along with the requirement of teachers to understand the material that they wish to teach, the factors of obsolescence and the ability to build material off of core topics need to be addressed. These three factors are difficult for a smaller university teacher to address without a set of standards to analyze these areas. A rubric addressing these topic areas of timelessness, associability, and simplicity has been created to assist in the selection of materials based on the three criteria. The use of this rubric provides an effective means to choose material for a new course and help teachers to present the material they determine most appropriate to teach.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 14:46:11 GMT" } ]
2009-09-30T00:00:00
[ [ "Marriotti", "Matthew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.0937
Junwei Shao
Xiaorong Hou, Junwei Shao
Spherical Distribution of 5 Points with Maximal Distance Sum
45 pages, 3 figures
null
null
null
cs.DM cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we mainly consider the problem of spherical distribution of 5 points, that is, how to configure 5 points on a sphere such that the mutual distance sum attains the maximum. It is conjectured that the sum of distances is maximal if 5 points form a bipyramid configuration in which case two points are positioned at two poles of the sphere and the other three are positioned uniformly on the equator. We study this problem using interval methods and related technics, and give a proof for the conjecture through computers in finite time.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 15:48:05 GMT" } ]
2009-06-05T00:00:00
[ [ "Hou", "Xiaorong", "" ], [ "Shao", "Junwei", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0906.0958
Sayee Kompalli
Sayee C. Kompalli and Ravi R. Mazumdar
On a Generalized Foster-Lyapunov Type Criterion for the Stability of Multidimensional Markov chains with Applications to the Slotted-Aloha Protocol with Finite Number of Queues
null
null
null
null
cs.IT cs.NI math.IT
http://creativecommons.org/licenses/publicdomain/
In this paper, we generalize a positive recurrence criterion for multidimensional discrete-time Markov chains over countable state spaces due to Rosberg (JAP, Vol. 17, No. 3, 1980). We revisit the stability analysis of well known slotted-Aloha protocol with finite number of queues. Under standard modeling assumptions, we derive a sufficient condition for the stability by applying our positive recurrence criterion. Our sufficiency condition for stability is linear in arrival rates and does not require knowledge of the stationary joint statistics of queue lengths. We believe that the technique reported here could be useful in analyzing other stability problems in countable space Markovian settings. Toward the end, we derive some sufficient conditions for instability of the protocol.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 18:47:24 GMT" } ]
2009-06-08T00:00:00
[ [ "Kompalli", "Sayee C.", "" ], [ "Mazumdar", "Ravi R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0964
Brian Carroll
Brian Carroll
On Sparse Channel Estimation
M.S. Thesis (106 pages, 35 figures)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel Estimation is an essential component in applications such as radar and data communication. In multi path time varying environments, it is necessary to estimate time-shifts, scale-shifts (the wideband equivalent of Doppler-shifts), and the gains/phases of each of the multiple paths. With recent advances in sparse estimation (or "compressive sensing"), new estimation techniques have emerged which yield more accurate estimates of these channel parameters than traditional strategies. These estimation strategies, however, restrict potential estimates of time-shifts and scale-shifts to a finite set of values separated by a choice of grid spacing. A small grid spacing increases the number of potential estimates, thus lowering the quantization error, but also increases complexity and estimation time. Conversely, a large grid spacing lowers the number of potential estimates, thus lowering the complexity and estimation time, but increases the quantization error. In this thesis, we derive an expression which relates the choice of grid spacing to the mean-squared quantization error. Furthermore, we consider the case when scale-shifts are approximated by Doppler-shifts, and derive a similar expression relating the choice of the grid spacing and the quantization error. Using insights gained from these expressions, we further explore the effects of the choice and grid spacing, and examine when a wideband model can be well approximated by a narrowband model.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 19:45:40 GMT" } ]
2009-06-05T00:00:00
[ [ "Carroll", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.0997
B. A. Sethuraman
B.A. Sethuraman
Division Algebras and Wireless Communication
Survey paper, 12 pages; minor edits in second version
null
null
null
math.RA cs.IT math.IT math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey the recent use of division algebras in wireless communication.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 20:42:38 GMT" }, { "version": "v2", "created": "Tue, 9 Jun 2009 19:47:03 GMT" } ]
2009-06-09T00:00:00
[ [ "Sethuraman", "B. A.", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0906.1018
Christoph Koutschan
Christoph Koutschan
Eliminating Human Insight: An Algorithmic Proof of Stembridge's TSPP Theorem
12 pages, 4 figures, submitted to Contemporary Mathematics
null
null
null
cs.SC cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new proof of Stembridge's theorem about the enumeration of totally symmetric plane partitions using the methodology suggested in the recent Koutschan-Kauers-Zeilberger semi-rigorous proof of the Andrews-Robbins q-TSPP conjecture. Our proof makes heavy use of computer algebra and is completely automatic. We describe new methods that make the computations feasible in the first place. The tantalizing aspect of this work is that the same methods can be applied to prove the q-TSPP conjecture (that is a q-analogue of Stembridge's theorem and open for more than 25 years); the only hurdle here is still the computational complexity.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 22:56:08 GMT" } ]
2009-06-08T00:00:00
[ [ "Koutschan", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0906.1019
Aranyak Mehta
Gagan Aggarwal, Gagan Goel, Aranyak Mehta
Efficiency of (Revenue-)Optimal Mechanisms
ACM conference on Electronic Commerce, 2009
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We compare the expected efficiency of revenue maximizing (or {\em optimal}) mechanisms with that of efficiency maximizing ones. We show that the efficiency of the revenue maximizing mechanism for selling a single item with k + log_{e/(e-1)} k + 1 bidders is at least as much as the efficiency of the efficiency maximizing mechanism with k bidders, when bidder valuations are drawn i.i.d. from a Monotone Hazard Rate distribution. Surprisingly, we also show that this bound is tight within a small additive constant of 5.7. In other words, Theta(log k) extra bidders suffice for the revenue maximizing mechanism to match the efficiency of the efficiency maximizing mechanism, while o(log k) do not. This is in contrast to the result of Bulow and Klemperer comparing the revenue of the two mechanisms, where only one extra bidder suffices. More precisely, they show that the revenue of the efficiency maximizing mechanism with k+1 bidders is no less than the revenue of the revenue maximizing mechanism with k bidders. We extend our result for the case of selling t identical items and show that 2.2 log k + t Theta(log log k) extra bidders suffice for the revenue maximizing mechanism to match the efficiency of the efficiency maximizing mechanism. In order to prove our results, we do a classification of Monotone Hazard Rate (MHR) distributions and identify a family of MHR distributions, such that for each class in our classification, there is a member of this family that is pointwise lower than every distribution in that class. This lets us prove interesting structural theorems about distributions with Monotone Hazard Rate.
[ { "version": "v1", "created": "Thu, 4 Jun 2009 23:21:40 GMT" } ]
2009-06-08T00:00:00
[ [ "Aggarwal", "Gagan", "" ], [ "Goel", "Gagan", "" ], [ "Mehta", "Aranyak", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.1030
Stephanie Wehner
Robert Koenig, Stephanie Wehner, Juerg Wullschleger
Unconditional security from noisy quantum storage
25 pages (IEEE two column), 13 figures, v4: published version (to appear in IEEE Transactions on Information Theory), including bit wise min-entropy sampling. however, for experimental purposes block sampling can be much more convenient, please see v3 arxiv version if needed. See arXiv:0911.2302 for a companion paper addressing aspects of a practical implementation using block sampling
IEEE Trans. Inf. Th., vol. 58, no. 3, p. 1962-1984 (2012)
10.1109/TIT.2011.2177772
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to the cheating party. We construct novel protocols for oblivious transfer and bit commitment, and prove that realistic noise levels provide security even against the most general attack. Such unconditional results were previously only known in the so-called bounded-storage model which is a special case of our setting. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 03:47:20 GMT" }, { "version": "v2", "created": "Thu, 25 Jun 2009 23:47:05 GMT" }, { "version": "v3", "created": "Mon, 19 Jul 2010 04:11:20 GMT" }, { "version": "v4", "created": "Thu, 8 Sep 2011 09:09:02 GMT" } ]
2013-12-06T00:00:00
[ [ "Koenig", "Robert", "" ], [ "Wehner", "Stephanie", "" ], [ "Wullschleger", "Juerg", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.1053
Thierry Bouche
Thierry Bouche (IF, CCDNM)
Report on the current state of the French DMLs
null
DML 2009 ? Towards a Digital Mathematics Library, Grand Bend, Ontario : Canada (2009)
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is a survey of the existing digital collections of French mathematical literature, run by non-profit organizations. This includes research monographs, serials, proceedings, Ph. D. theses, collected works, books and personal websites.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 08:10:30 GMT" } ]
2011-01-25T00:00:00
[ [ "Bouche", "Thierry", "", "IF, CCDNM" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0906.1079
Graeme Pope
Graeme Pope
Modified Frame Reconstruction Algorithm for Compressive Sensing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressive sensing is a technique to sample signals well below the Nyquist rate using linear measurement operators. In this paper we present an algorithm for signal reconstruction given such a set of measurements. This algorithm generalises and extends previous iterative hard thresholding algorithms and we give sufficient conditions for successful reconstruction of the original data signal. In addition we show that by underestimating the sparsity of the data signal we can increase the success rate of the algorithm. We also present a number of modifications to this algorithm: the incorporation of a least squares step, polynomial acceleration and an adaptive method for choosing the step-length. These modified algorithms converge to the correct solution under similar conditions to the original un-modified algorithm. Empirical evidence show that these modifications dramatically increase both the success rate and the rate of convergence, and can outperform other algorithms previously used for signal reconstruction in compressive sensing.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 10:01:42 GMT" } ]
2009-06-08T00:00:00
[ [ "Pope", "Graeme", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1084
Arto Annila
Arto Annila
Physical portrayal of computational complexity
16, pages, 7 figures
ISRN Computational Mathematics 2012 ID: 321372, 1-15
10.5402/2012/321372
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computational complexity is examined using the principle of increasing entropy. To consider computation as a physical process from an initial instance to the final acceptance is motivated because many natural processes have been recognized to complete in non-polynomial time (NP). The irreversible process with three or more degrees of freedom is found intractable because, in terms of physics, flows of energy are inseparable from their driving forces. In computational terms, when solving problems in the class NP, decisions will affect subsequently available sets of decisions. The state space of a non-deterministic finite automaton is evolving due to the computation itself hence it cannot be efficiently contracted using a deterministic finite automaton that will arrive at a solution in super-polynomial time. The solution of the NP problem itself is verifiable in polynomial time (P) because the corresponding state is stationary. Likewise the class P set of states does not depend on computational history hence it can be efficiently contracted to the accepting state by a deterministic sequence of dissipative transformations. Thus it is concluded that the class P set of states is inherently smaller than the set of class NP. Since the computational time to contract a given set is proportional to dissipation, the computational complexity class P is a subset of NP.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 10:56:00 GMT" } ]
2012-03-20T00:00:00
[ [ "Annila", "Arto", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.1086
Jean-Marie Vanherpe
Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO)
On Fulkerson conjecture
Accepted for publication in Discussiones Mathematicae Graph Theory; Discussiones Mathematicae Graph Theory (2010) xxx-yyy
Discussiones Mathematicae Graph Theory 31, 2 (2011) 253-272
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If $G$ is a bridgeless cubic graph, Fulkerson conjectured that we can find 6 perfect matchings (a{\em Fulkerson covering}) with the property that every edge of $G$ is contained in exactly two of them. A consequence of the Fulkerson conjecture would be that every bridgeless cubic graph has 3 perfect matchings with empty intersection (this problem is known as the Fan Raspaud Conjecture). A {\em FR-triple} is a set of 3 such perfect matchings. We show here how to derive a Fulkerson covering from two FR-triples. Moreover, we give a simple proof that the Fulkerson conjecture holds true for some classes of well known snarks.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 10:54:55 GMT" }, { "version": "v2", "created": "Mon, 31 May 2010 09:12:31 GMT" } ]
2011-04-01T00:00:00
[ [ "Fouquet", "Jean-Luc", "", "LIFO" ], [ "Vanherpe", "Jean-Marie", "", "LIFO" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.1126
Eric Sopena
Eric Sopena (LaBRI), Jiaojiao Wu (LaBRI)
Coloring the square of the Cartesian product of two cycles
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The square $G^2$ of a graph $G$ is defined on the vertex set of $G$ in such a way that distinct vertices with distance at most two in $G$ are joined by an edge. We study the chromatic number of the square of the Cartesian product $C_m\Box C_n$ of two cycles and show that the value of this parameter is at most 7 except when $m=n=3$, in which case the value is 9, and when $m=n=4$ or $m=3$ and $n=5$, in which case the value is 8. Moreover, we conjecture that whenever $G=C_m\Box C_n$, the chromatic number of $G^2$ equals $\lceil mn/\alpha(G^2) \rceil$, where $\alpha(G^2)$ denotes the size of a maximal independent set in $G^2$.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 19:59:42 GMT" }, { "version": "v2", "created": "Thu, 18 Jun 2009 09:01:51 GMT" }, { "version": "v3", "created": "Mon, 31 May 2010 08:10:47 GMT" } ]
2010-07-28T00:00:00
[ [ "Sopena", "Eric", "", "LaBRI" ], [ "Wu", "Jiaojiao", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.1147
Omer Khalid Mr
Omer Khalid, Richard Anthony, Paul Nillson, Kate Keahey, Markus Schulz, Miltos Petridis, Kevin Parrott
Enabling and Optimizing Pilot Jobs using Xen based Virtual Machines for the HPC Grid Applications
8 pages; Published in VTDC09 workshop which is part of IEEE ICAC09 Conference
Khalid O. et al, Enabling and Optimizing Pilot Jobs using Xen Virtual Machines for HPC Grid Applications,. International Workshop on Virtualiztion Technologies and Distributed Computing, ICAC 09, 2009
10.1145/1555336.1555338
null
cs.DC cs.PF cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The primary motivation for uptake of virtualization have been resource isolation, capacity management and resource customization: isolation and capacity management allow providers to isolate users from the site and control their resources usage while customization allows end-users to easily project the required environment onto a variety of sites. Various approaches have been taken to integrate virtualization with Grid technologies. In this paper, we propose an approach that combines virtualization on the existing software infrastructure such as Pilot Jobs with minimum change on the part of resource providers.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 15:26:14 GMT" } ]
2016-11-17T00:00:00
[ [ "Khalid", "Omer", "" ], [ "Anthony", "Richard", "" ], [ "Nillson", "Paul", "" ], [ "Keahey", "Kate", "" ], [ "Schulz", "Markus", "" ], [ "Petridis", "Miltos", "" ], [ "Parrott", "Kevin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.1148
Tao Zhou
Ming-Sheng Shang, Ci-Hang Jin, Tao Zhou, Yi-Cheng Zhang
Collaborative filtering based on multi-channel diffusion
9 pages, 3 figures
Physica A 388 (2009) 4867-4871
10.1016/j.physa.2009.08.011
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, by applying a diffusion process, we propose a new index to quantify the similarity between two users in a user-object bipartite graph. To deal with the discrete ratings on objects, we use a multi-channel representation where each object is mapped to several channels with the number of channels being equal to the number of different ratings. Each channel represents a certain rating and a user having voted an object will be connected to the channel corresponding to the rating. Diffusion process taking place on such a user-channel bipartite graph gives a new similarity measure of user pairs, which is further demonstrated to be more accurate than the classical Pearson correlation coefficient under the standard collaborative filtering framework.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 15:32:47 GMT" } ]
2009-09-05T00:00:00
[ [ "Shang", "Ming-Sheng", "" ], [ "Jin", "Ci-Hang", "" ], [ "Zhou", "Tao", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.1166
Francesc Rossell\'o
Gabriel Cardona, Merce Llabres, Francesc Rossello, Gabriel Valiente
Comparison of Galled Trees
36 pages
null
null
null
q-bio.PE cs.CE cs.DM q-bio.QM
http://creativecommons.org/licenses/by-nc-sa/3.0/
Galled trees, directed acyclic graphs that model evolutionary histories with isolated hybridization events, have become very popular due to both their biological significance and the existence of polynomial time algorithms for their reconstruction. In this paper we establish to which extent several distance measures for the comparison of evolutionary networks are metrics for galled trees, and hence when they can be safely used to evaluate galled tree reconstruction methods.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 16:55:47 GMT" } ]
2009-06-08T00:00:00
[ [ "Cardona", "Gabriel", "" ], [ "Llabres", "Merce", "" ], [ "Rossello", "Francesc", "" ], [ "Valiente", "Gabriel", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0906.1182
Paolo Mancarella
P. Mancarella, G. Terreni, F. Sadri, F. Toni, U. Endriss
The CIFF Proof Procedure for Abductive Logic Programming with Constraints: Theory, Implementation and Experiments
null
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the CIFF proof procedure for abductive logic programming with constraints, and we prove its correctness. CIFF is an extension of the IFF proof procedure for abductive logic programming, relaxing the original restrictions over variable quantification (allowedness conditions) and incorporating a constraint solver to deal with numerical constraints as in constraint logic programming. Finally, we describe the CIFF system, comparing it with state of the art abductive systems and answer set solvers and showing how to use it to program some applications. (To appear in Theory and Practice of Logic Programming - TPLP).
[ { "version": "v1", "created": "Fri, 5 Jun 2009 16:13:23 GMT" } ]
2009-06-08T00:00:00
[ [ "Mancarella", "P.", "" ], [ "Terreni", "G.", "" ], [ "Sadri", "F.", "" ], [ "Toni", "F.", "" ], [ "Endriss", "U.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.1189
Georg B\"ocherer
Georg B\"ocherer
On the Throughput/Bit-Cost Tradeoff in CSMA Based Cooperative Networks
6 pages. To be presented at SCC 2010
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless local area networks (WLAN) still suffer from a severe performance discrepancy between different users in the uplink. This is because of the spatially varying channel conditions provided by the wireless medium. Cooperative medium access control (MAC) protocols as for example CoopMAC were proposed to mitigate this problem. In this work, it is shown that cooperation implies for cooperating nodes a tradeoff between throughput and bit-cost, which is the energy needed to transmit one bit. The tradeoff depends on the degree of cooperation. For carrier sense multiple access (CSMA) based networks, the throughput/bit-cost tradeoff curve is theoretically derived. A new distributed CSMA protocol called fairMAC is proposed and it is theoretically shown that fairMAC can asymptotically achieve any operating point on the tradeoff curve when the packet lengths go to infinity. The theoretical results are validated through Monte Carlo simulations.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 19:42:40 GMT" }, { "version": "v2", "created": "Wed, 4 Nov 2009 08:27:12 GMT" } ]
2009-11-04T00:00:00
[ [ "Böcherer", "Georg", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1199
Yannick Chevalier
Yannick Chevalier (LORIA), Kourjieh Mounira (IRIT)
On the Decidability of (ground) Reachability Problems for Cryptographic Protocols (extended version)
null
null
null
null
cs.LO cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Analysis of cryptographic protocols in a symbolic model is relative to a deduction system that models the possible actions of an attacker regarding an execution of this protocol. We present in this paper a transformation algorithm for such deduction systems provided the equational theory has the finite variant property. the termination of this transformation entails the decidability of the ground reachability problems. We prove that it is necessary to add one other condition to obtain the decidability of non-ground problems, and provide one new such criterion.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 20:00:15 GMT" } ]
2009-06-09T00:00:00
[ [ "Chevalier", "Yannick", "", "LORIA" ], [ "Mounira", "Kourjieh", "", "IRIT" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.1225
Michael Goodrich
Michael T. Goodrich
Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations
Expanded version with an additional figure; ISSN 0304-3975
Theoretical Computer Science, Volume 408, Issues 2-3, Excursions in Algorithmics: A Collection of Papers in Honor of Franco P. Preparata, 28 November 2008, Pages 199-207
10.1016/j.tcs.2008.08.008
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies pipelined algorithms for protecting distributed grid computations from cheating participants, who wish to be rewarded for tasks they receive but don't perform. We present improved cheater detection algorithms that utilize natural delays that exist in long-term grid computations. In particular, we partition the sequence of grid tasks into two interleaved sequences of task rounds, and we show how to use those rounds to devise the first general-purpose scheme that can catch all cheaters, even when cheaters collude. The main idea of this algorithm might at first seem counter-intuitive--we have the participants check each other's work. A naive implementation of this approach would, of course, be susceptible to collusion attacks, but we show that by, adapting efficient solutions to the parallel processor diagnosis problem, we can tolerate collusions of lazy cheaters, even if the number of such cheaters is a fraction of the total number of participants. We also include a simple economic analysis of cheaters in grid computations and a parameterization of the main deterrent that can be used against them--the probability of being caught.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 22:29:34 GMT" } ]
2009-06-09T00:00:00
[ [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.1226
Jianhua Fan
Jorg Peters and Jianhua Fan
On the Complexity of Smooth Spline Surfaces from Quad Meshes
null
null
null
null
cs.GR cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper derives strong relations that boundary curves of a smooth complex of patches have to obey when the patches are computed by local averaging. These relations restrict the choice of reparameterizations for geometric continuity. In particular, when one bicubic tensor-product B-spline patch is associated with each facet of a quadrilateral mesh with n-valent vertices and we do not want segments of the boundary curves forced to be linear, then the relations dictate the minimal number and multiplicity of knots: For general data, the tensor-product spline patches must have at least two internal double knots per edge to be able to model a G^1-conneced complex of C^1 splines. This lower bound on the complexity of any construction is proven to be sharp by suitably interpreting an existing surface construction. That is, we have a tight bound on the complexity of smoothing quad meshes with bicubic tensor-product B-spline patches.
[ { "version": "v1", "created": "Fri, 5 Jun 2009 22:57:04 GMT" } ]
2009-06-09T00:00:00
[ [ "Peters", "Jorg", "" ], [ "Fan", "Jianhua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.1244
Mark Reid
Mark D. Reid and Robert C. Williamson
Generalised Pinsker Inequalities
21 pages, 3 figures, accepted to COLT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We generalise the classical Pinsker inequality which relates variational divergence to Kullback-Liebler divergence in two ways: we consider arbitrary f-divergences in place of KL divergence, and we assume knowledge of a sequence of values of generalised variational divergences. We then develop a best possible inequality for this doubly generalised situation. Specialising our result to the classical case provides a new and tight explicit bound relating KL to variational divergence (solving a problem posed by Vajda some 40 years ago). The solution relies on exploiting a connection between divergences and the Bayes risk of a learning problem via an integral representation.
[ { "version": "v1", "created": "Sat, 6 Jun 2009 03:32:43 GMT" } ]
2009-06-09T00:00:00
[ [ "Reid", "Mark D.", "" ], [ "Williamson", "Robert C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1245
R Doomun
Marianne Azer, Sherif El-Kassas, Magdy El-Soudani
A Full Image of the Wormhole Attacks - Towards Introducing Complex Wormhole Attacks in wireless Ad Hoc Networks
14 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper analyzes wormhole attack modes and classes and point to its threat impacts on ad hoc networks. New improvements are suggested to these types of attacks.
[ { "version": "v1", "created": "Sat, 6 Jun 2009 03:43:59 GMT" } ]
2009-06-09T00:00:00
[ [ "Azer", "Marianne", "" ], [ "El-Kassas", "Sherif", "" ], [ "El-Soudani", "Magdy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.1272
Pasha Zusmanovich
Askar Dzhumadil'daev and Pasha Zusmanovich
The alternative operad is not Koszul
v3: added corrigendum
Experiment. Math. 20 (2011), 138-144; Corrigendum: 21 (2012), 418
10.1080/10586458.2011.544558 10.1080/10586458.2012.738538
null
math.RA cs.MS cs.SC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using computer calculations, we prove the statement in the title.
[ { "version": "v1", "created": "Sat, 6 Jun 2009 12:44:23 GMT" }, { "version": "v2", "created": "Sat, 21 May 2011 20:34:27 GMT" }, { "version": "v3", "created": "Wed, 13 Mar 2013 18:13:53 GMT" } ]
2013-03-15T00:00:00
[ [ "Dzhumadil'daev", "Askar", "" ], [ "Zusmanovich", "Pasha", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0906.1326
Jianfeng Zhan
Xu Liu, Jianfeng Zhan, Bibo Tu, Ming Zou, Dan Meng
Similarity Analysis in Automatic Performance Debugging of SPMD Parallel Programs
http://iss.ices.utexas.edu/sc08nlplss/program.html
Supercomputing 2008 Workshop on Node Level Parallelism for Large Scale Supercomputers
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different from sequential programs, parallel programs possess their own characteristics which are difficult to analyze in the multi-process or multi-thread environment. This paper presents an innovative method to automatically analyze the SPMD programs. Firstly, with the help of clustering method focusing on similarity analysis, an algorithm is designed to locate performance problems in parallel programs automatically. Secondly a Rough Set method is used to uncover the performance problem and provide the insight into the micro-level causes. Lastly, we have analyzed a production parallel application to verify the effectiveness of our method and system.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 05:45:57 GMT" } ]
2009-06-09T00:00:00
[ [ "Liu", "Xu", "" ], [ "Zhan", "Jianfeng", "" ], [ "Tu", "Bibo", "" ], [ "Zou", "Ming", "" ], [ "Meng", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.1328
Jianfeng Zhan
Wei Zhou, Jianfeng Zhan, Dan Meng
Multidimensional Analysis of System Logs in Large-scale Cluster Systems
null
The Proceeding of 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), Fast abstract
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is effective to improve the reliability and availability of large-scale cluster systems through the analysis of failures. Existed failure analysis methods understand and analyze failures from one or few dimension. The analysis results are partial and with less precision because of the limitation of data source. This paper presents multidimensional analysis based on graph mining to analyze multi-source system logs, which is a promising failure analysis method to get more complete and precise failure knowledge.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 06:03:14 GMT" } ]
2009-06-09T00:00:00
[ [ "Zhou", "Wei", "" ], [ "Zhan", "Jianfeng", "" ], [ "Meng", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.1339
Yonatan Kaspi
Yonatan Kaspi and Neri Merhav
Error Exponents for Broadcast Channels with Degraded Message Sets
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a broadcast channel with a degraded message set, in which a single transmitter sends a common message to two receivers and a private message to one of the receivers only. The main goal of this work is to find new lower bounds to the error exponents of the strong user, the one that should decode both messages, and of the weak user, that should decode only the common message. Unlike previous works, where suboptimal decoders where used, the exponents we derive in this work pertain to optimal decoding and depend on both rates. We take two different approaches. The first approach is based, in part, on variations of Gallager-type bounding techniques that were presented in a much earlier work on error exponents for erasure/list decoding. The resulting lower bounds are quite simple to understand and to compute. The second approach is based on a technique that is rooted in statistical physics, and it is exponentially tight from the initial step and onward. This technique is based on analyzing the statistics of certain enumerators. Numerical results show that the bounds obtained by this technique are tighter than those obtained by the first approach and previous results. The derivation, however, is more complex than the first approach and the retrieved exponents are harder to compute.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 08:13:45 GMT" } ]
2009-06-09T00:00:00
[ [ "Kaspi", "Yonatan", "" ], [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1341
Mugurel Ionut Andreica
Madalina Ecaterina Andreica, Mugurel Ionut Andreica, Angela Andreica
Efficient Algorithms for Several Constrained Activity Scheduling Problems in the Time and Space Domains
null
Proceedings of the 33rd American Romanian Academy of Arts and Sciences' International Congress, vol. 1, pp. 59-63, Sibiu, Romania, 2-5 June, 2009. (ISBN: 978-2-553-01433-8)
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider several constrained activity scheduling problems in the time and space domains, like finding activity orderings which optimize the values of several objective functions (time scheduling) or finding optimal locations where certain types of activities will take place (space scheduling). We present novel, efficient algorithmic solutions for all the considered problems, based on the dynamic programming and greedy techniques. In each case we compute exact, optimal solutions.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 09:35:01 GMT" } ]
2009-06-09T00:00:00
[ [ "Andreica", "Madalina Ecaterina", "" ], [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Angela", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.1343
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Madalina Ecaterina Andreica, Daniel Ardelean
Efficient Algorithms for Several Constrained Resource Allocation, Management and Discovery Problems
null
Proceedings of the 33rd American Romanian Academy of Arts and Sciences' International Congress, vol. 1, pp. 64-68, Sibiu, Romania, 2-5 June, 2009. (ISBN: 978-2-553-01433-8)
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present efficient algorithmic solutions for several constrained resource allocation, management and discovery problems. We consider new types of resource allocation models and constraints, and we present new geometric techniques which are useful when the resources are mapped to points into a multidimensional feature space. We also consider a resource discovery problem for which we present a guessing game theoretical model.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 09:48:40 GMT" } ]
2009-06-09T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Madalina Ecaterina", "" ], [ "Ardelean", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.1346
Jianfeng Zhan
Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan Meng
Phoenix Cloud: Consolidating Different Computing Loads on Shared Cluster System for Large Organization
5 page, 8 figures, The First Workshop of Cloud Computing and its Application, The modified version. The original version is on the web site of http://www.cca08.org/, which is dated from August 13, 2008
The first workshop of cloud computing and its application (CCA 08), Chicago, 2008
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Different departments of a large organization often run dedicated cluster systems for different computing loads, like HPC (high performance computing) jobs or Web service applications. In this paper, we have designed and implemented a cloud management system software Phoenix Cloud to consolidate heterogeneous workloads from different departments affiliated to the same organization on the shared cluster system. We have also proposed cooperative resource provisioning and management policies for a large organization and its affiliated departments, running HPC jobs and Web service applications, to share the consolidated cluster system. The experiments show that in comparison with the case that each department operates its dedicated cluster system, Phoenix Cloud significantly decreases the scale of the required cluster system for a large organization, improves the benefit of the scientific computing department, and at the same time provisions enough resources to the other department running Web services with varying loads.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 10:15:28 GMT" }, { "version": "v2", "created": "Tue, 23 Feb 2010 07:59:05 GMT" }, { "version": "v3", "created": "Wed, 24 Mar 2010 06:01:45 GMT" }, { "version": "v4", "created": "Tue, 6 Apr 2010 23:03:03 GMT" }, { "version": "v5", "created": "Thu, 15 Jul 2010 00:13:39 GMT" }, { "version": "v6", "created": "Sat, 17 Jul 2010 00:03:21 GMT" } ]
2010-07-20T00:00:00
[ [ "Zhan", "Jianfeng", "" ], [ "Wang", "Lei", "" ], [ "Tu", "Bibo", "" ], [ "Li", "Yong", "" ], [ "Wang", "Peng", "" ], [ "Zhou", "Wei", "" ], [ "Meng", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.1350
Jan Schwinghammer
Catalin Hritcu and Jan Schwinghammer
A Step-indexed Semantics of Imperative Objects
null
Logical Methods in Computer Science, Volume 5, Issue 4 (December 18, 2009) lmcs:744
10.2168/LMCS-5(4:2)2009
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Step-indexed semantic interpretations of types were proposed as an alternative to purely syntactic proofs of type safety using subject reduction. The types are interpreted as sets of values indexed by the number of computation steps for which these values are guaranteed to behave like proper elements of the type. Building on work by Ahmed, Appel and others, we introduce a step-indexed semantics for the imperative object calculus of Abadi and Cardelli. Providing a semantic account of this calculus using more `traditional', domain-theoretic approaches has proved challenging due to the combination of dynamically allocated objects, higher-order store, and an expressive type system. Here we show that, using step-indexing, one can interpret a rich type discipline with object types, subtyping, recursive and bounded quantified types in the presence of state.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 11:42:45 GMT" }, { "version": "v2", "created": "Fri, 18 Dec 2009 14:58:00 GMT" } ]
2015-07-01T00:00:00
[ [ "Hritcu", "Catalin", "" ], [ "Schwinghammer", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.1356
Gregory Gutin
G. Gutin, E.J. Kim, S. Szeider, A. Yeo
A Probabilistic Approach to Problems Parameterized Above or Below Tight Bounds
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new approach for establishing fixed-parameter tractability of problems parameterized above tight lower bounds. To illustrate the approach we consider three problems of this type of unknown complexity that were introduced by Mahajan, Raman and Sikdar (J. Comput. Syst. Sci. 75, 2009). We show that a generalization of one of the problems and non-trivial special cases of the other two are fixed-parameter tractable.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 13:17:51 GMT" }, { "version": "v2", "created": "Thu, 30 Jul 2009 18:46:03 GMT" }, { "version": "v3", "created": "Tue, 18 Aug 2009 14:05:19 GMT" } ]
2009-08-18T00:00:00
[ [ "Gutin", "G.", "" ], [ "Kim", "E. J.", "" ], [ "Szeider", "S.", "" ], [ "Yeo", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.1359
Gregory Gutin
G. Gutin, D. Karapetyan, and I. Razgon
Fixed-Parameter Algorithms in Analysis of Heuristics for Extracting Networks in Linear Programs
null
Lecture Notes in Computer Science 5917 (2009) 222-233
10.1007/978-3-642-11269-0
null
cs.DS cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of extracting a maximum-size reflected network in a linear program. This problem has been studied before and a state-of-the-art SGA heuristic with two variations have been proposed. In this paper we apply a new approach to evaluate the quality of SGA\@. In particular, we solve majority of the instances in the testbed to optimality using a new fixed-parameter algorithm, i.e., an algorithm whose runtime is polynomial in the input size but exponential in terms of an additional parameter associated with the given problem. This analysis allows us to conclude that the the existing SGA heuristic, in fact, produces solutions of a very high quality and often reaches the optimal objective values. However, SGA contain two components which leave some space for improvement: building of a spanning tree and searching for an independent set in a graph. In the hope of obtaining even better heuristic, we tried to replace both of these components with some equivalent algorithms. We tried to use a fixed-parameter algorithm instead of a greedy one for searching of an independent set. But even the exact solution of this subproblem improved the whole heuristic insignificantly. Hence, the crucial part of SGA is building of a spanning tree. We tried three different algorithms, and it appears that the Depth-First search is clearly superior to the other ones in building of the spanning tree for SGA. Thereby, by application of fixed-parameter algorithms, we managed to check that the existing SGA heuristic is of a high quality and selected the component which required an improvement. This allowed us to intensify the research in a proper direction which yielded a superior variation of SGA.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 13:59:43 GMT" }, { "version": "v2", "created": "Sat, 31 Oct 2009 15:28:15 GMT" } ]
2010-03-30T00:00:00
[ [ "Gutin", "G.", "" ], [ "Karapetyan", "D.", "" ], [ "Razgon", "I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.1360
S\'ilvio Duarte Queir\'os M.
Silvio M. Duarte Queiros
On the effectiveness of a binless entropy estimator for generalised entropic forms
10 pages. 5 Figures. 2 Appendices with 2 figures
Phys. Rev. E 80, 062101 (2009)
10.1103/PhysRevE.80.062101
null
cs.IT cs.DS math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this manuscript we discuss the effectiveness of the Kozachenko-Leonenko entropy estimator when generalised to cope with entropic forms customarily applied to study systems evincing asymptotic scale invariance and dependence (either linear or non-linear type). We show that when the variables are independently and identically distributed the estimator is only valuable along the whole domain if the data follow the uniform distribution, whereas for other distributions the estimator is only effectual in the limit of the Boltzmann-Gibbs-Shanon entropic form. We also analyse the influence of the dependence (linear and non-linear) between variables on the accuracy of the estimator between variables. As expected in the last case the estimator looses efficiency for the Boltzmann-Gibbs-Shanon entropic form as well.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 14:37:40 GMT" }, { "version": "v2", "created": "Sat, 12 Sep 2009 12:29:12 GMT" }, { "version": "v3", "created": "Mon, 4 Jan 2010 00:01:19 GMT" } ]
2010-01-04T00:00:00
[ [ "Queiros", "Silvio M. Duarte", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0906.1370
Emanuele Viola
Emanuele Viola
Cell-Probe Lower Bounds for Prefix Sums
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that to store n bits x so that each prefix-sum query Sum(i) := sum_{k < i} x_k can be answered by non-adaptively probing q cells of log n bits, one needs memory > n + n/log^{O(q)} n. Our bound matches a recent upper bound of n + n/log^{Omega(q)} n by Patrascu (FOCS 2008), also non-adaptive. We also obtain a n + n/log^{2^{O(q)}} n lower bound for storing a string of balanced brackets so that each Match(i) query can be answered by non-adaptively probing q cells. To obtain these bounds we show that a too efficient data structure allows us to break the correlations between query answers.
[ { "version": "v1", "created": "Sun, 7 Jun 2009 17:25:27 GMT" } ]
2009-06-09T00:00:00
[ [ "Viola", "Emanuele", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.1399
Alexander A. Sherstov
Alexander A. Sherstov
On Quantum-Classical Equivalence for Composed Communication Problems
Journal version
Quantum Information & Computation, 10(5-6):435-455, 2010
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An open problem in communication complexity proposed by several authors is to prove that for every Boolean function f, the task of computing f(x AND y) has polynomially related classical and quantum bounded-error complexities. We solve a variant of this question. For every f, we prove that the task of computing, on input x and y, both of the quantities f(x AND y) and f(x OR y) has polynomially related classical and quantum bounded-error complexities. We further show that the quantum bounded-error complexity is polynomially related to the classical deterministic complexity and the block sensitivity of f. This result holds regardless of prior entanglement.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 01:00:23 GMT" }, { "version": "v2", "created": "Sat, 22 Aug 2009 01:58:29 GMT" }, { "version": "v3", "created": "Wed, 3 Feb 2010 14:15:33 GMT" } ]
2010-02-03T00:00:00
[ [ "Sherstov", "Alexander A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0906.1429
Benjamin Chevallereau
Benjamin Chevallereau (IRCCyN), Alain Bernard (IRCCyN), Pierre M\'evellec (LEMNA)
Am\'eliorer les performances de l'industrie logicielle par une meilleure compr\'ehension des besoins
null
Conf\'erence Internationale de G\'enie Industriel, Bagn\`eres de Bigorre : France (2009)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Actual organization are structured and act with the help of their information systems. In spite of considerable progresses made by computer technology, we note that actors are very often critical on their information systems. Difficulties to product specifications enough detailed for functional profile and interpretable by information system expert is one of reason of this gap between hopes and reality. Our proposition wants to get over this obstacle by organizing user requirements in a common language of operational profile and technical expert.-- Les organisations actuelles se structurent et agissent en s'appuyant sur leurs syst\`emes d'information. Malgr\'e les progr\`es consid\'erables r\'ealis\'es par la technologie informatique, on constate que les acteurs restent tr\`es souvent critiques par rapport \`a leur syst\`emes d'information. Une des causes de cet \'ecart entre les espoirs et la r\'ealit\'e trouve sa source dans la difficult\'e \`a produire un cahier des charges suffisamment d\'etaill\'e pour les op\'erationnels et interpr\'etable par les sp\'ecialistes des syst\`emes d'information. Notre proposition vise \`a surmonter cet obstacle en organisant l'expression des besoins dans un langage commun aux op\'erationnels et aux experts techniques. Pour cela, le langage propos\'e pour exprimer les besoins est bas\'e sur la notion de but. L'ing\'enierie dirig\'ee par les mod\`eles est pr\'esente \`a toute les \'etapes, c'est-\`a-dire au moment de la capture et de l'interpr\'etation.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 08:03:23 GMT" } ]
2009-06-09T00:00:00
[ [ "Chevallereau", "Benjamin", "", "IRCCyN" ], [ "Bernard", "Alain", "", "IRCCyN" ], [ "Mévellec", "Pierre", "", "LEMNA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.1437
Antonios Varvitsiotis
Ioannis Z. Emiris, Elias P. Tsigaridas, Antonios Varvitsiotis
Algebraic methods for counting Euclidean embeddings of rigid graphs
8 pages, 7 figures, 2 tables. To appear in Graph Drawing 2009
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study of (minimally) rigid graphs is motivated by numerous applications, mostly in robotics and bioinformatics. A major open problem concerns the number of embeddings of such graphs, up to rigid motions, in Euclidean space. We capture embeddability by polynomial systems with suitable structure, so that their mixed volume, which bounds the number of common roots, to yield interesting upper bounds on the number of embeddings. We focus on $\RR^2$ and $\RR^3$, where Laman graphs and 1-skeleta of convex simplicial polyhedra, respectively, admit inductive Henneberg constructions. We establish the first lower bound in $\RR^3$ of about $2.52^n$, where $n$ denotes the number of vertices. Moreover, our implementation yields upper bounds for $n \le 10$ in $\RR^2$ and $\RR^3$, which reduce the existing gaps, and tight bounds up to $n=7$ in $\RR^3$.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 08:39:14 GMT" }, { "version": "v2", "created": "Thu, 27 Aug 2009 10:55:53 GMT" } ]
2009-08-27T00:00:00
[ [ "Emiris", "Ioannis Z.", "" ], [ "Tsigaridas", "Elias P.", "" ], [ "Varvitsiotis", "Antonios", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.1467
Animesh Mukherjee
Chris Biemann, Monojit Choudhury and Animesh Mukherjee
Syntax is from Mars while Semantics from Venus! Insights from Spectral Analysis of Distributional Similarity Networks
In the proceedings of ACL 2009 (short paper)
null
null
null
physics.data-an cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the global topology of the syntactic and semantic distributional similarity networks for English through the technique of spectral analysis. We observe that while the syntactic network has a hierarchical structure with strong communities and their mixtures, the semantic network has several tightly knit communities along with a large core without any such well-defined community structure.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 11:20:30 GMT" } ]
2009-06-09T00:00:00
[ [ "Biemann", "Chris", "" ], [ "Choudhury", "Monojit", "" ], [ "Mukherjee", "Animesh", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0906.1487
Wei Sha
Qi Dai and Wei Sha
The Physics of Compressive Sensing and the Gradient-Based Recovery Algorithms
7 pages, 11 Figures. It is a research report which has not been published in any Journal or Conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The physics of compressive sensing (CS) and the gradient-based recovery algorithms are presented. First, the different forms for CS are summarized. Second, the physical meanings of coherence and measurement are given. Third, the gradient-based recovery algorithms and their geometry explanations are provided. Finally, we conclude the report and give some suggestion for future work.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 13:10:34 GMT" } ]
2009-09-30T00:00:00
[ [ "Dai", "Qi", "" ], [ "Sha", "Wei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1489
Martin Mundhenk
Arne Meier, Martin Mundhenk, Thomas Schneider, Michael Thomas, Volker Weber, Felix Weiss
The Complexity of Satisfiability for Fragments of Hybrid Logic -- Part I
null
null
10.1016/j.jal.2010.08.001
null
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The satisfiability problem of hybrid logics with the downarrow binder is known to be undecidable. This initiated a research program on decidable and tractable fragments. In this paper, we investigate the effect of restricting the propositional part of the language on decidability and on the complexity of the satisfiability problem over arbitrary, transitive, total frames, and frames based on equivalence relations. We also consider different sets of modal and hybrid operators. We trace the border of decidability and give the precise complexity of most fragments, in particular for all fragments including negation. For the monotone fragments, we are able to distinguish the easy from the hard cases, depending on the allowed set of operators.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 13:17:35 GMT" } ]
2015-03-13T00:00:00
[ [ "Meier", "Arne", "" ], [ "Mundhenk", "Martin", "" ], [ "Schneider", "Thomas", "" ], [ "Thomas", "Michael", "" ], [ "Weber", "Volker", "" ], [ "Weiss", "Felix", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.1538
Ender Ayanoglu
Ender Ayanoglu
On "A Novel Maximum Likelihood Decoding Algorithm for Orthogonal Space-Time Block Codes"
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The computational complexity of the Maximum Likelihood decoding algorithm in [1], [2] for orthogonal space-time block codes is smaller than specified.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 16:55:22 GMT" }, { "version": "v2", "created": "Fri, 26 Jun 2009 17:42:23 GMT" }, { "version": "v3", "created": "Fri, 31 Jul 2009 01:48:50 GMT" }, { "version": "v4", "created": "Sat, 8 Aug 2009 00:55:45 GMT" } ]
2009-08-08T00:00:00
[ [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1557
Uri Yovel
Asaf Levin, Uri Yovel
Uniform unweighted set cover: The power of non-oblivious local search
31 pages, includes figures
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are given n base elements and a finite collection of subsets of them. The size of any subset varies between p to k (p < k). In addition, we assume that the input contains all possible subsets of size p. Our objective is to find a subcollection of minimum-cardinality which covers all the elements. This problem is known to be NP-hard. We provide two approximation algorithms for it, one for the generic case, and an improved one for the special case of (p,k) = (2,4). The algorithm for the generic case is a greedy one, based on packing phases: at each phase we pick a collection of disjoint subsets covering i new elements, starting from i = k down to i = p+1. At a final step we cover the remaining base elements by the subsets of size p. We derive the exact performance guarantee of this algorithm for all values of k and p, which is less than Hk, where Hk is the k'th harmonic number. However, the algorithm exhibits the known improvement methods over the greedy one for the unweighted k-set cover problem (in which subset sizes are only restricted not to exceed k), and hence it serves as a benchmark for our improved algorithm. The improved algorithm for the special case of (p,k) = (2,4) is based on non-oblivious local search: it starts with a feasible cover, and then repeatedly tries to replace sets of size 3 and 4 so as to maximize an objective function which prefers big sets over small ones. For this case, our generic algorithm achieves an asymptotic approximation ratio of 1.5 + epsilon, and the local search algorithm achieves a better ratio, which is bounded by 1.458333... + epsilon.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 18:26:42 GMT" } ]
2009-06-09T00:00:00
[ [ "Levin", "Asaf", "" ], [ "Yovel", "Uri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.1565
Vitaly Skachek
Vitaly Skachek
Correcting a Fraction of Errors in Nonbinary Expander Codes with Linear Programming
Part of this work was presented at the IEEE International Symposium on Information Theory 2009, Seoul, Korea
null
10.1109/TIT.2011.2137030
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A linear-programming decoder for \emph{nonbinary} expander codes is presented. It is shown that the proposed decoder has the maximum-likelihood certificate properties. It is also shown that this decoder corrects any pattern of errors of a relative weight up to approximately 1/4 \delta_A \delta_B (where \delta_A and \delta_B are the relative minimum distances of the constituent codes).
[ { "version": "v1", "created": "Mon, 8 Jun 2009 19:20:39 GMT" }, { "version": "v2", "created": "Wed, 27 Oct 2010 10:05:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Skachek", "Vitaly", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1593
Didehvar Farzaad
Farzad Didehvar
On Defining 'I' "I logy"
7 pages
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Could we define I? Throughout this article we give a negative answer to this question. More exactly, we show that there is no definition for I in a certain way. But this negative answer depends on our definition of definability. Here, we try to consider sufficient generalized definition of definability. In the middle of paper a paradox will arise which makes us to modify the way we use the concept of property and definability.
[ { "version": "v1", "created": "Sat, 6 Jun 2009 04:34:54 GMT" } ]
2009-06-10T00:00:00
[ [ "Didehvar", "Farzad", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.1599
Tobias Lutz
Tobias Lutz, Christoph Hausl, Ralf K\"otter
Bits Through Deterministic Relay Cascades with Half-Duplex Constraint
accepted for publication in IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2169542
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a relay cascade, i.e. a network where a source node, a sink node and a certain number of intermediate source/relay nodes are arranged on a line and where adjacent node pairs are connected by error-free (q+1)-ary pipes. Suppose the source and a subset of the relays wish to communicate independent information to the sink under the condition that each relay in the cascade is half-duplex constrained. A coding scheme is developed which transfers information by an information-dependent allocation of the transmission and reception slots of the relays. The coding scheme requires synchronization on the symbol level through a shared clock. The coding strategy achieves capacity for a single source. Numerical values for the capacity of cascades of various lengths are provided, and the capacities are significantly higher than the rates which are achievable with a predetermined time-sharing approach. If the cascade includes a source and a certain number of relays with their own information, the strategy achieves the cut-set bound when the rates of the relay sources fall below certain thresholds. For cascades composed of an infinite number of half-duplex constrained relays and a single source, we derive an explicit capacity expression. Remarkably, the capacity in bits/use for q=1 is equal to the logarithm of the golden ratio, and the capacity for q=2 is 1 bit/use.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 21:39:44 GMT" }, { "version": "v2", "created": "Tue, 14 Jul 2009 13:15:18 GMT" }, { "version": "v3", "created": "Mon, 22 Aug 2011 18:39:51 GMT" } ]
2016-11-17T00:00:00
[ [ "Lutz", "Tobias", "" ], [ "Hausl", "Christoph", "" ], [ "Kötter", "Ralf", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1603
Abdellatif Zaidi
Abdellatif Zaidi, Shiva Prasad Kotagiri, J. Nicholas Laneman, Luc Vandendorpe
Multiaccess Channels with State Known to One Encoder: Another Case of Degraded Message Sets
5 pages, Proc. of IEEE International Symposium on Information theory, ISIT 2009, Seoul, Korea
null
10.1109/ISIT.2009.5205986
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a two-user state-dependent multiaccess channel in which only one of the encoders is informed, non-causally, of the channel states. Two independent messages are transmitted: a common message transmitted by both the informed and uninformed encoders, and an individual message transmitted by only the uninformed encoder. We derive inner and outer bounds on the capacity region of this model in the discrete memoryless case as well as the Gaussian case. Further, we show that the bounds for the Gaussian case are tight in some special cases.
[ { "version": "v1", "created": "Mon, 8 Jun 2009 21:42:08 GMT" } ]
2016-11-18T00:00:00
[ [ "Zaidi", "Abdellatif", "" ], [ "Kotagiri", "Shiva Prasad", "" ], [ "Laneman", "J. Nicholas", "" ], [ "Vandendorpe", "Luc", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1618
Fainan Hanif
Muhammad Fainan Hanif and Peter J. Smith
On the Statistics of Cognitive Radio Capacity in Shadowing and Fast Fading Environments (Journal Version)
Submitted to the IEEE Transactions on Wireless Commun. The conference version of this paper appears in Proc. IEEE CrownCom, 2009
IEEE Transactions on Wireless Communications, vol.9, no.2, pp.844-852, 2010
10.1109/TWC.2010.02.090864
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the capacity of the cognitive radio channel in different fading environments under a low interference regime. First we derive the probability that the low interference regime holds under shadow fading as well as Rayleigh and Rician fast fading conditions. We demonstrate that this is the dominant case, especially in practical cognitive radio deployment scenarios. The capacity of the cognitive radio channel depends critically on a power loss parameter, $\alpha$, which governs how much transmit power the cognitive radio dedicates to relaying the primary message. We derive a simple, accurate approximation to $\alpha$ in Rayleigh and Rician fading environments which gives considerable insight into system capacity. We also investigate the effects of system parameters and propagation environment on $\alpha$ and the cognitive radio capacity. In all cases, the use of the approximation is shown to be extremely accurate.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 00:25:38 GMT" } ]
2013-01-03T00:00:00
[ [ "Hanif", "Muhammad Fainan", "" ], [ "Smith", "Peter J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1644
Florentina Pintea
Dorel Micle, Marcel Torok-Oance, Liviu Maruia
The morpho-topographic and cartographic analysis of the archaeological site Cornesti "Iarcuri", Timis County, Romania, using computer sciences methods (GIS and Remote Sensing techniques)
14 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),249-262
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The archaeological site Cornesti "Iarcuri" is the largest earth fortification in Romania, made out of four concentric compounds, spreading over 1780 hectares. It is known since 1700, but it had only a few small attempts of systematic research, the fortress gained interest only after the publishing of some satellite images by Google Earth. It is located in an area of high fields and it occupies three interfluves and contains two streams. Our paper contains a geomorphologic, topographic and cartographic analysis of the site in order to determine the limits, the structure, the morphology, the construction technique and the functionality of such a fortification.Our research is based on satellite image analysis, on archaeological topography, on soil, climate and vegetation analysis as a way to offer a complex image, through this interdisciplinary study of landscape archaeology. Through our work we try not to date the site as this objective will be achieved only after completing the systematic excavations which started in 2007, but only to analyze the co-relationship with the environment.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 07:02:11 GMT" } ]
2009-06-10T00:00:00
[ [ "Micle", "Dorel", "" ], [ "Torok-Oance", "Marcel", "" ], [ "Maruia", "Liviu", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.1667
Florentina Pintea
Rolf Andreas Rasenack
Analyser Framework to verify Software Component
20 pages, exposed on 5th International Conference "Actualities and Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania
Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),285-304
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today, it is important for software companies to build software systems in a short time-interval, to reduce costs and to have a good market position. Therefore well organized and systematic development approaches are required. Reusing software components, which are well tested, can be a good solution to develop software applications in effective manner. The reuse of software components is less expensive and less time consuming than a development from scratch. But it is dangerous to think that software components can be match together without any problems. Software components itself are well tested, of course, but even if they composed together problems occur. Most problems are based on interaction respectively communication. Avoiding such errors a framework has to be developed for analysing software components. That framework determines the compatibility of corresponding software components.The promising approach discussed here, presents a novel technique for analysing software components by applying an Abstract Syntax Language Tree (ASLT). A supportive environment will be designed that checks the compatibility of black-box software components. This article is concerned to the question how can be coupled software components verified by using an analyzer framework and determines the usage of the ASLT. Black-box Software Components and Abstract Syntax Language Tree are the basis for developing the proposed framework and are discussed here to provide the background knowledge. The practical implementation of this framework is discussed and shows the result by using a test environment.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 09:14:25 GMT" } ]
2009-06-10T00:00:00
[ [ "Rasenack", "Rolf Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.1673
Victor Odumuyiwa
Bolanle Oladejo (LORIA), Adenike Osofisan (LORIA), Victor Odumuyiwa (LORIA)
Knowledge Management in Economic Intelligence with Reasoning on Temporal Attributes
null
VSST 2009, S\'eminaire on Veille Strat\'egique Scientifique et Technologique (2009)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People have to make important decisions within a time frame. Hence, it is imperative to employ means or strategy to aid effective decision making. Consequently, Economic Intelligence (EI) has emerged as a field to aid strategic and timely decision making in an organization. In the course of attaining this goal: it is indispensable to be more optimistic towards provision for conservation of intellectual resource invested into the process of decision making. This intellectual resource is nothing else but the knowledge of the actors as well as that of the various processes for effecting decision making. Knowledge has been recognized as a strategic economic resource for enhancing productivity and a key for innovation in any organization or community. Thus, its adequate management with cognizance of its temporal properties is highly indispensable. Temporal properties of knowledge refer to the date and time (known as timestamp) such knowledge is created as well as the duration or interval between related knowledge. This paper focuses on the needs for a user-centered knowledge management approach as well as exploitation of associated temporal properties. Our perspective of knowledge is with respect to decision-problems projects in EI. Our hypothesis is that the possibility of reasoning about temporal properties in exploitation of knowledge in EI projects should foster timely decision making through generation of useful inferences from available and reusable knowledge for a new project.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 09:33:16 GMT" } ]
2009-06-10T00:00:00
[ [ "Oladejo", "Bolanle", "", "LORIA" ], [ "Osofisan", "Adenike", "", "LORIA" ], [ "Odumuyiwa", "Victor", "", "LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.1677
Pablo Piantanida
Pablo Piantanida, Gerald Matz and Pierre Duhamel
Outage Behavior of Discrete Memoryless Channels (DMCs) Under Channel Estimation Errors
To appear in IEEE Transactions on Information Theory, Sep. 2009
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Communication systems are usually designed by assuming perfect channel state information (CSI). However, in many practical scenarios, only a noisy estimate of the channel is available, which may strongly differ from the true channel. This imperfect CSI scenario is addressed by introducing the notion of estimation-induced outage (EIO) capacity. We derive a single-letter characterization of the maximal EIO rate and prove an associated coding theorem and its strong converse for discrete memoryless channels (DMCs). The transmitter and the receiver rely on the channel estimate and the statistics of the estimate to construct codes that guarantee reliable communication with a certain outage probability. This ensures that in the non-outage case the transmission meets the target rate with small error probability, irrespective of the quality of the channel estimate. Applications of the EIO capacity to a single-antenna (non-ergodic) Ricean fading channel are considered. The EIO capacity for this case is compared to the EIO rates of a communication system in which the receiver decodes by using a mismatched ML decoder. The effects of rate-limited feedback to provide the transmitter with quantized CSI are also investigated.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 09:51:55 GMT" } ]
2009-06-10T00:00:00
[ [ "Piantanida", "Pablo", "" ], [ "Matz", "Gerald", "" ], [ "Duhamel", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1680
Pierre Cocheteux
Pierre Cocheteux (CRAN), Alexandre Voisin (CRAN), Eric Levrat (CRAN), Beno\^it Iung (CRAN)
Methodology for assessing system performance loss within a proactive maintenance framework
null
13th IFAC Symposium on Information Control Problems in Manufacturing, INCOM'09, Moscow : Russie (2009)
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Maintenance plays now a critical role in manufacturing for achieving important cost savings and competitive advantage while preserving product conditions. It suggests moving from conventional maintenance practices to predictive strategy. Indeed the maintenance action has to be done at the right time based on the system performance and component Remaining Useful Life (RUL) assessed by a prognostic process. In that way, this paper proposes a methodology in order to evaluate the performance loss of the system according to the degradation of component and the deviations of system input flows. This methodology is supported by the neuro-fuzzy tool ANFIS (Adaptive Neuro-Fuzzy Inference Systems) that allows to integrate knowledge from two different sources: expertise and real data. The feasibility and added value of such methodology is then highlighted through an application case extracted from the TELMA platform used for education and research.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 09:54:49 GMT" } ]
2009-06-10T00:00:00
[ [ "Cocheteux", "Pierre", "", "CRAN" ], [ "Voisin", "Alexandre", "", "CRAN" ], [ "Levrat", "Eric", "", "CRAN" ], [ "Iung", "Benoît", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.1694
Nikolaj Glazunov
Nikolaj Glazunov
Toward a Category Theory Design of Ontological Knowledge Bases
10 pages, Preliminary results to International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K 2009)
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I discuss (ontologies_and_ontological_knowledge_bases / formal_methods_and_theories) duality and its category theory extensions as a step toward a solution to Knowledge-Based Systems Theory. In particular I focus on the example of the design of elements of ontologies and ontological knowledge bases of next three electronic courses: Foundations of Research Activities, Virtual Modeling of Complex Systems and Introduction to String Theory.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 11:03:41 GMT" } ]
2009-06-10T00:00:00
[ [ "Glazunov", "Nikolaj", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.1702
Alexander Russell
Cristopher Moore and Alexander Russell
Approximating the Permanent via Nonabelian Determinants
null
null
null
null
cs.CC cs.DM math.CO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Celebrated work of Jerrum, Sinclair, and Vigoda has established that the permanent of a {0,1} matrix can be approximated in randomized polynomial time by using a rapidly mixing Markov chain. A separate strand of the literature has pursued the possibility of an alternate, purely algebraic, polynomial-time approximation scheme. These schemes work by replacing each 1 with a random element of an algebra A, and considering the determinant of the resulting matrix. When A is noncommutative, this determinant can be defined in several ways. We show that for estimators based on the conventional determinant, the critical ratio of the second moment to the square of the first--and therefore the number of trials we need to obtain a good estimate of the permanent--is (1 + O(1/d))^n when A is the algebra of d by d matrices. These results can be extended to group algebras, and semi-simple algebras in general. We also study the symmetrized determinant of Barvinok, showing that the resulting estimator has small variance when d is large enough. However, for constant d--the only case in which an efficient algorithm is known--we show that the critical ratio exceeds 2^{n} / n^{O(d)}. Thus our results do not provide a new polynomial-time approximation scheme for the permanent. Indeed, they suggest that the algebraic approach to approximating the permanent faces significant obstacles. We obtain these results using diagrammatic techniques in which we express matrix products as contractions of tensor products. When these matrices are random, in either the Haar measure or the Gaussian measure, we can evaluate the trace of these products in terms of the cycle structure of a suitably random permutation. In the symmetrized case, our estimates are then derived by a connection with the character theory of the symmetric group.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 11:55:41 GMT" } ]
2009-06-10T00:00:00
[ [ "Moore", "Cristopher", "" ], [ "Russell", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0906.1713
Marcus Hutter
Marcus Hutter
Feature Reinforcement Learning: Part I: Unstructured MDPs
24 LaTeX pages, 5 diagrams
Journal of Artificial General Intelligence, 1 (2009) pages 3-24
null
null
cs.LG cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
General-purpose, intelligent, learning agents cycle through sequences of observations, actions, and rewards that are complex, uncertain, unknown, and non-Markovian. On the other hand, reinforcement learning is well-developed for small finite state Markov decision processes (MDPs). Up to now, extracting the right state representations out of bare observations, that is, reducing the general agent setup to the MDP framework, is an art that involves significant effort by designers. The primary goal of this work is to automate the reduction process and thereby significantly expand the scope of many existing reinforcement learning algorithms and the agents that employ them. Before we can think of mechanizing this search for suitable MDPs, we need a formal objective criterion. The main contribution of this article is to develop such a criterion. I also integrate the various parts into one learning algorithm. Extensions to more realistic dynamic Bayesian networks are developed in Part II. The role of POMDPs is also considered there.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 12:50:29 GMT" } ]
2009-12-30T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1726
Robin Adams
Robin Adams, Zhaohui Luo
Classical Predicative Logic-Enriched Type Theories
49 pages. Accepted for publication in special edition of Annals of Pure and Applied Logic on Computation in Classical Logic. v2: Minor mistakes corrected
null
10.1016/j.apal.2010.04.005
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A logic-enriched type theory (LTT) is a type theory extended with a primitive mechanism for forming and proving propositions. We construct two LTTs, named LTTO and LTTO*, which we claim correspond closely to the classical predicative systems of second order arithmetic ACAO and ACA. We justify this claim by translating each second-order system into the corresponding LTT, and proving that these translations are conservative. This is part of an ongoing research project to investigate how LTTs may be used to formalise different approaches to the foundations of mathematics. The two LTTs we construct are subsystems of the logic-enriched type theory LTTW, which is intended to formalise the classical predicative foundation presented by Herman Weyl in his monograph Das Kontinuum. The system ACAO has also been claimed to correspond to Weyl's foundation. By casting ACAO and ACA as LTTs, we are able to compare them with LTTW. It is a consequence of the work in this paper that LTTW is strictly stronger than ACAO. The conservativity proof makes use of a novel technique for proving one LTT conservative over another, involving defining an interpretation of the stronger system out of the expressions of the weaker. This technique should be applicable in a wide variety of different cases outside the present work.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 13:44:28 GMT" }, { "version": "v2", "created": "Wed, 18 Aug 2010 10:23:52 GMT" } ]
2010-08-19T00:00:00
[ [ "Adams", "Robin", "" ], [ "Luo", "Zhaohui", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0906.1763
Behnood Gholami
Behnood Gholami (1), Allen R. Tannenbaum (2 and 3) and Wassim M. Haddad (1) ((1) School of Aerospace Engineering, Georgia Institute of Technology (2) School of Electrical & Computer Engineering, Georgia Institute of Technology, (3) Department of Biomedical Engineering, Georgia Institute of Technology)
Segmentation of Facial Expressions Using Semi-Definite Programming and Generalized Principal Component Analysis
Corrected for typos and spacing errors
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we use semi-definite programming and generalized principal component analysis (GPCA) to distinguish between two or more different facial expressions. In the first step, semi-definite programming is used to reduce the dimension of the image data and "unfold" the manifold which the data points (corresponding to facial expressions) reside on. Next, GPCA is used to fit a series of subspaces to the data points and associate each data point with a subspace. Data points that belong to the same subspace are claimed to belong to the same facial expression category. An example is provided.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 19:50:10 GMT" }, { "version": "v2", "created": "Wed, 10 Jun 2009 20:53:21 GMT" } ]
2009-06-10T00:00:00
[ [ "Gholami", "Behnood", "", "2 and 3" ], [ "Tannenbaum", "Allen R.", "", "2 and 3" ], [ "Haddad", "Wassim M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.1777
Andrey Breslav
Andrey Breslav
Creating Textual Language Dialects Using Aspect-like Techniques
extended abstract for GTTSE'09
null
null
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Here we present a work aimed on efficiently creating textual language dialects and supporting tools for them (e.g. compiler front-ends, IDE support, pretty-printers, etc.). A dialect is a language which may be described with a (relatively small) set of changes to some other language (a parent language). For example we can consider SQL dialects used in DB-management systems. We propose to use aspects for grammars to define different features of the anguage and to transform grammars. A dialect is created by defining a syntactical spect which modifies the parent language. This technique is not dependent on any particular language design, AST structure or parsing technology and provides a uniform way for creating dialects, which extend or restrict languages.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 16:30:01 GMT" } ]
2009-06-10T00:00:00
[ [ "Breslav", "Andrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.1814
Renqiang Min
Martin Renqiang Min, David A. Stanley, Zineng Yuan, Anthony Bonner, and Zhaolei Zhang
Large-Margin kNN Classification Using a Deep Encoder Network
13 pages (preliminary version)
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
KNN is one of the most popular classification methods, but it often fails to work well with inappropriate choice of distance metric or due to the presence of numerous class-irrelevant features. Linear feature transformation methods have been widely applied to extract class-relevant information to improve kNN classification, which is very limited in many applications. Kernels have been used to learn powerful non-linear feature transformations, but these methods fail to scale to large datasets. In this paper, we present a scalable non-linear feature mapping method based on a deep neural network pretrained with restricted boltzmann machines for improving kNN classification in a large-margin framework, which we call DNet-kNN. DNet-kNN can be used for both classification and for supervised dimensionality reduction. The experimental results on two benchmark handwritten digit datasets show that DNet-kNN has much better performance than large-margin kNN using a linear mapping and kNN based on a deep autoencoder pretrained with retricted boltzmann machines.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 20:06:45 GMT" } ]
2009-06-11T00:00:00
[ [ "Min", "Martin Renqiang", "" ], [ "Stanley", "David A.", "" ], [ "Yuan", "Zineng", "" ], [ "Bonner", "Anthony", "" ], [ "Zhang", "Zhaolei", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.1835
Ashish Khisti
Ashish Khisti, Suhas Diggavi, Gregory Wornell
Secret-Key Generation using Correlated Sources and Channels
29 Pages, Submitted IEEE Trans. Information Theory
null
10.1109/TIT.2011.2173629
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of generating a shared secret key between two terminals in a joint source-channel setup -- the sender communicates to the receiver over a discrete memoryless wiretap channel and additionally the terminals have access to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret-key capacity. These bounds coincide, establishing the capacity, when the underlying channel consists of independent, parallel and reversely degraded wiretap channels. In the lower bound, the equivocation terms of the source and channel components are functionally additive. The secret-key rate is maximized by optimally balancing the the source and channel contributions. This tradeoff is illustrated in detail for the Gaussian case where it is also shown that Gaussian codebooks achieve the capacity. When the eavesdropper also observes a source sequence, the secret-key capacity is established when the sources and channels of the eavesdropper are a degraded version of the legitimate receiver. Finally the case when the terminals also have access to a public discussion channel is studied. We propose generating separate keys from the source and channel components and establish the optimality of this approach when the when the channel outputs of the receiver and the eavesdropper are conditionally independent given the input.
[ { "version": "v1", "created": "Tue, 9 Jun 2009 22:36:33 GMT" } ]
2016-11-18T00:00:00
[ [ "Khisti", "Ashish", "" ], [ "Diggavi", "Suhas", "" ], [ "Wornell", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.1842
Arash Shaban-Nejad
Arash Shaban-Nejad, Olga Ormandjieva, Mohamad Kassab, Volker Haarslev
Managing Requirement Volatility in an Ontology-Driven Clinical LIMS Using Category Theory. International Journal of Telemedicine and Applications
36 Pages, 16 Figures
International Journal of Telemedicine and Applications, Volume 2009, Article ID 917826, 14 pages, PubMed ID: 19343191
10.1155/2009/917826
null
cs.AI cs.MA
http://creativecommons.org/licenses/by/3.0/
Requirement volatility is an issue in software engineering in general, and in Web-based clinical applications in particular, which often originates from an incomplete knowledge of the domain of interest. With advances in the health science, many features and functionalities need to be added to, or removed from, existing software applications in the biomedical domain. At the same time, the increasing complexity of biomedical systems makes them more difficult to understand, and consequently it is more difficult to define their requirements, which contributes considerably to their volatility. In this paper, we present a novel agent-based approach for analyzing and managing volatile and dynamic requirements in an ontology-driven laboratory information management system (LIMS) designed for Web-based case reporting in medical mycology. The proposed framework is empowered with ontologies and formalized using category theory to provide a deep and common understanding of the functional and nonfunctional requirement hierarchies and their interrelations, and to trace the effects of a change on the conceptual framework.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 00:44:20 GMT" } ]
2009-06-11T00:00:00
[ [ "Shaban-Nejad", "Arash", "" ], [ "Ormandjieva", "Olga", "" ], [ "Kassab", "Mohamad", "" ], [ "Haarslev", "Volker", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0906.1845
Serguei Mokhov
Serguei A. Mokhov
Towards Improving Validation, Verification, Crash Investigations, and Event Reconstruction of Flight-Critical Systems with Self-Forensics
10 pages; a white discussion paper submitted in response to NASA's RFI NNH09ZEA001L at http://prod.nais.nasa.gov/cgi-bin/eps/synopsis.cgi?acqid=134490
null
null
null
cs.SE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a novel concept of self-forensics to complement the standard autonomic self-CHOP properties of the self-managed systems, to be specified in the Forensic Lucid language. We argue that self-forensics, with the forensics taken out of the cybercrime domain, is applicable to "self-dissection" for the purpose of verification of autonomous software and hardware systems of flight-critical systems for automated incident and anomaly analysis and event reconstruction by the engineering teams in a variety of incident scenarios during design and testing as well as actual flight data.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 06:30:48 GMT" } ]
2009-06-11T00:00:00
[ [ "Mokhov", "Serguei A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.1849
Subhas Ghosh
Subhas Kumar Ghosh (Honeywell Technology Solutions) and Janardan Misra (Honeywell Technology Solutions)
A Randomized Algorithm for 3-SAT
null
null
10.1007/s11786-010-0036-3
null
cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we propose and analyze a simple randomized algorithm to find a satisfiable assignment for a Boolean formula in conjunctive normal form (CNF) having at most 3 literals in every clause. Given a k-CNF formula phi on n variables, and alpha in{0,1}^n that satisfies phi, a clause of phi is critical if exactly one literal of that clause is satisfied under assignment alpha. Paturi et. al. (Chicago Journal of Theoretical Computer Science 1999) proposed a simple randomized algorithm (PPZ) for k-SAT for which success probability increases with the number of critical clauses (with respect to a fixed satisfiable solution of the input formula). Here, we first describe another simple randomized algorithm DEL which performs better if the number of critical clauses are less (with respect to a fixed satisfiable solution of the input formula). Subsequently, we combine these two simple algorithms such that the success probability of the combined algorithm is maximum of the success probabilities of PPZ and DEL on every input instance. We show that when the average number of clauses per variable that appear as unique true literal in one or more critical clauses in phi is between 1 and 1.9317, combined algorithm performs better than the PPZ algorithm.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 04:41:52 GMT" } ]
2020-08-11T00:00:00
[ [ "Ghosh", "Subhas Kumar", "", "Honeywell Technology Solutions" ], [ "Misra", "Janardan", "", "Honeywell Technology Solutions" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0906.1900
Philippe Thomas
Philippe Thomas (CRAN), Andr\'e Thomas (CRAN)
How deals with discrete data for the reduction of simulation models using neural network
null
13th IFAC Symp. On Information Control Problems in Manufacturing INCOM'09, Moscou : Russie (2009)
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Simulation is useful for the evaluation of a Master Production/distribution Schedule (MPS). Also, the goal of this paper is the study of the design of a simulation model by reducing its complexity. According to theory of constraints, we want to build reduced models composed exclusively by bottlenecks and a neural network. Particularly a multilayer perceptron, is used. The structure of the network is determined by using a pruning procedure. This work focuses on the impact of discrete data on the results and compares different approaches to deal with these data. This approach is applied to sawmill internal supply chain
[ { "version": "v1", "created": "Wed, 10 Jun 2009 09:56:29 GMT" } ]
2009-06-11T00:00:00
[ [ "Thomas", "Philippe", "", "CRAN" ], [ "Thomas", "André", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0906.1905
Patrick Guio
P. Guio and N. Achilleos
The VOISE Algorithm: a Versatile Tool for Automatic Segmentation of Astronomical Images
9 pages, 7 figures; accepted for publication in MNRAS
Mon. Not. R. Astron. Soc. 398 (2009) 1254-1262
10.1111/j.1365-2966.2009.15218.x
null
astro-ph.IM astro-ph.EP cs.CV physics.data-an stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The auroras on Jupiter and Saturn can be studied with a high sensitivity and resolution by the Hubble Space Telescope (HST) ultraviolet (UV) and far-ultraviolet (FUV) Space Telescope spectrograph (STIS) and Advanced Camera for Surveys (ACS) instruments. We present results of automatic detection and segmentation of Jupiter's auroral emissions as observed by HST ACS instrument with VOronoi Image SEgmentation (VOISE). VOISE is a dynamic algorithm for partitioning the underlying pixel grid of an image into regions according to a prescribed homogeneity criterion. The algorithm consists of an iterative procedure that dynamically constructs a tessellation of the image plane based on a Voronoi Diagram, until the intensity of the underlying image within each region is classified as homogeneous. The computed tessellations allow the extraction of quantitative information about the auroral features such as mean intensity, latitudinal and longitudinal extents and length scales. These outputs thus represent a more automated and objective method of characterising auroral emissions than manual inspection.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 10:48:33 GMT" } ]
2009-09-11T00:00:00
[ [ "Guio", "P.", "" ], [ "Achilleos", "N.", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Physics", "code": "astro-ph.EP", "description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system", "span": "(Earth and Planetary Astrophysics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0906.1947
Sebastien Tixeuil
Mikhail Nesterenko, S\'ebastien Tixeuil (LIP6)
Ideal Stabilization
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define and explore the concept of ideal stabilization. The program is ideally stabilizing if its every state is legitimate. Ideal stabilization allows the specification designer to prescribe with arbitrary degree of precision not only the fault-free program behavior but also its recovery operation. Specifications may or may not mention all possible states. We identify approaches to designing ideal stabilization to both kinds of specifications. For the first kind, we state the necessary condition for an ideally stabilizing solution. On the basis of this condition we prove that there is no ideally stabilizing solution to the leader election problem. We illustrate the utility of the concept by providing examples of well-known programs and proving them ideally stabilizing. Specifically, we prove ideal stabilization of the conflict manager, the alternator, the propagation of information with feedback and the alternating bit protocol.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 14:31:18 GMT" } ]
2009-06-11T00:00:00
[ [ "Nesterenko", "Mikhail", "", "LIP6" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.1953
Serge Gaspers
Martin F\"urer, Serge Gaspers, Shiva Prasad Kasiviswanathan
An Exponential Time 2-Approximation Algorithm for Bandwidth
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The bandwidth of a graph G on n vertices is the minimum b such that the vertices of G can be labeled from 1 to n such that the labels of every pair of adjacent vertices differ by at most b. In this paper, we present a 2-approximation algorithm for the bandwidth problem that takes worst-case O(1.9797^n) time and uses polynomial space. This improves both the previous best 2- and 3-approximation algorithms of Cygan et al. which have an O(3^n) and O(2^n) worst-case time bounds, respectively. Our algorithm is based on constructing bucket decompositions of the input graph. A bucket decomposition partitions the vertex set of a graph into ordered sets (called buckets) of (almost) equal sizes such that all edges are either incident to vertices in the same bucket or to vertices in two consecutive buckets. The idea is to find the smallest bucket size for which there exists a bucket decomposition. The algorithm uses a simple divide-and-conquer strategy along with dynamic programming to achieve this improved time bound.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 15:22:57 GMT" }, { "version": "v2", "created": "Sun, 20 Nov 2011 20:52:28 GMT" }, { "version": "v3", "created": "Sun, 29 Apr 2012 21:13:34 GMT" } ]
2012-05-01T00:00:00
[ [ "Fürer", "Martin", "" ], [ "Gaspers", "Serge", "" ], [ "Kasiviswanathan", "Shiva Prasad", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.1963
Piotr Bania
Piotr Bania
Evading network-level emulation
7 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently more and more attention has been paid to the intrusion detection systems (IDS) which don't rely on signature based detection approach. Such solutions try to increase their defense level by using heuristics detection methods like network-level emulation. This technique allows the intrusion detection systems to stop unknown threats, which normally couldn't be stopped by standard signature detection techniques. In this article author will describe general concepts of network-level emulation technique including its advantages and disadvantages (weak sides) together with providing potential countermeasures against this type of detection method.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 16:02:28 GMT" } ]
2009-06-11T00:00:00
[ [ "Bania", "Piotr", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.1980
Aram Galstyan
Armen Allahverdyan, Aram Galstyan
On Maximum a Posteriori Estimation of Hidden Markov Processes
9 pages, to appear in the Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI-2009)
null
null
null
cs.AI cond-mat.stat-mech cs.IT math.IT physics.data-an stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a theoretical analysis of Maximum a Posteriori (MAP) sequence estimation for binary symmetric hidden Markov processes. We reduce the MAP estimation to the energy minimization of an appropriately defined Ising spin model, and focus on the performance of MAP as characterized by its accuracy and the number of solutions corresponding to a typical observed sequence. It is shown that for a finite range of sufficiently low noise levels, the solution is uniquely related to the observed sequence, while the accuracy degrades linearly with increasing the noise strength. For intermediate noise values, the accuracy is nearly noise-independent, but now there are exponentially many solutions to the estimation problem, which is reflected in non-zero ground-state entropy for the Ising model. Finally, for even larger noise intensities, the number of solutions reduces again, but the accuracy is poor. It is shown that these regimes are different thermodynamic phases of the Ising model that are related to each other via first-order phase transitions.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 17:23:12 GMT" } ]
2009-06-11T00:00:00
[ [ "Allahverdyan", "Armen", "" ], [ "Galstyan", "Aram", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0906.2020
Ravishankar Krishnaswamy
Anupam Gupta, Ravishankar Krishnaswamy, Amit Kumar, Danny Segev
Scheduling with Outliers
23 pages, 3 figures
null
10.1007/978-3-642-03685-9_12
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In classical scheduling problems, we are given jobs and machines, and have to schedule all the jobs to minimize some objective function. What if each job has a specified profit, and we are no longer required to process all jobs -- we can schedule any subset of jobs whose total profit is at least a (hard) target profit requirement, while still approximately minimizing the objective function? We refer to this class of problems as scheduling with outliers. This model was initiated by Charikar and Khuller (SODA'06) on the minimum max-response time in broadcast scheduling. We consider three other well-studied scheduling objectives: the generalized assignment problem, average weighted completion time, and average flow time, and provide LP-based approximation algorithms for them. For the minimum average flow time problem on identical machines, we give a logarithmic approximation algorithm for the case of unit profits based on rounding an LP relaxation; we also show a matching integrality gap. For the average weighted completion time problem on unrelated machines, we give a constant factor approximation. The algorithm is based on randomized rounding of the time-indexed LP relaxation strengthened by the knapsack-cover inequalities. For the generalized assignment problem with outliers, we give a simple reduction to GAP without outliers to obtain an algorithm whose makespan is within 3 times the optimum makespan, and whose cost is at most (1 + \epsilon) times the optimal cost.
[ { "version": "v1", "created": "Wed, 10 Jun 2009 21:22:22 GMT" } ]
2015-05-13T00:00:00
[ [ "Gupta", "Anupam", "" ], [ "Krishnaswamy", "Ravishankar", "" ], [ "Kumar", "Amit", "" ], [ "Segev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2027
Sewoong Oh
Raghunandan H. Keshavan, Andrea Montanari and Sewoong Oh
Matrix Completion from Noisy Entries
22 pages, 3 figures
null
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a matrix M of low-rank, we consider the problem of reconstructing it from noisy observations of a small, random subset of its entries. The problem arises in a variety of applications, from collaborative filtering (the `Netflix problem') to structure-from-motion and positioning. We study a low complexity algorithm introduced by Keshavan et al.(2009), based on a combination of spectral techniques and manifold optimization, that we call here OptSpace. We prove performance guarantees that are order-optimal in a number of circumstances.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 00:22:58 GMT" }, { "version": "v2", "created": "Mon, 9 Apr 2012 17:37:45 GMT" } ]
2012-04-10T00:00:00
[ [ "Keshavan", "Raghunandan H.", "" ], [ "Montanari", "Andrea", "" ], [ "Oh", "Sewoong", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0906.2032
Liming Wang
Liming Wang, Dan Schonfeld
Mapping Equivalence for Symbolic Sequences: Theory and Applications
null
null
10.1109/TSP.2009.2026544
null
cs.IT cs.NA math.FA math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Processing of symbolic sequences represented by mapping of symbolic data into numerical signals is commonly used in various applications. It is a particularly popular approach in genomic and proteomic sequence analysis. Numerous mappings of symbolic sequences have been proposed for various applications. It is unclear however whether the processing of symbolic data provides an artifact of the numerical mapping or is an inherent property of the symbolic data. This issue has been long ignored in the engineering and scientific literature. It is possible that many of the results obtained in symbolic signal processing could be a byproduct of the mapping and might not shed any light on the underlying properties embedded in the data. Moreover, in many applications, conflicting conclusions may arise due to the choice of the mapping used for numerical representation of symbolic data. In this paper, we present a novel framework for the analysis of the equivalence of the mappings used for numerical representation of symbolic data. We present strong and weak equivalence properties and rely on signal correlation to characterize equivalent mappings. We derive theoretical results which establish conditions for consistency among numerical mappings of symbolic data. Furthermore, we introduce an abstract mapping model for symbolic sequences and extend the notion of equivalence to an algebraic framework. Finally, we illustrate our theoretical results by application to DNA sequence analysis.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 01:10:34 GMT" } ]
2015-05-13T00:00:00
[ [ "Wang", "Liming", "" ], [ "Schonfeld", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2048
Sungjin Im
Chandra Chekuri, Sungjin Im and Benjamin Moseley
Minimizing Maximum Response Time and Delay Factor in Broadcast Scheduling
16 pages, 2 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider online algorithms for pull-based broadcast scheduling. In this setting there are n pages of information at a server and requests for pages arrive online. When the server serves (broadcasts) a page p, all outstanding requests for that page are satisfied. We study two related metrics, namely maximum response time (waiting time) and maximum delay-factor and their weighted versions. We obtain the following results in the worst-case online competitive model. - We show that FIFO (first-in first-out) is 2-competitive even when the page sizes are different. Previously this was known only for unit-sized pages [10] via a delicate argument. Our proof differs from [10] and is perhaps more intuitive. - We give an online algorithm for maximum delay-factor that is O(1/eps^2)-competitive with (1+\eps)-speed for unit-sized pages and with (2+\eps)-speed for different sized pages. This improves on the algorithm in [12] which required (2+\eps)-speed and (4+\eps)-speed respectively. In addition we show that the algorithm and analysis can be extended to obtain the same results for maximum weighted response time and delay factor. - We show that a natural greedy algorithm modeled after LWF (Longest-Wait-First) is not O(1)-competitive for maximum delay factor with any constant speed even in the setting of standard scheduling with unit-sized jobs. This complements our upper bound and demonstrates the importance of the tradeoff made in our algorithm.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 07:24:52 GMT" } ]
2009-06-12T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Im", "Sungjin", "" ], [ "Moseley", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2061
Rethnakaran Pulikkoonattu
Rethnakaran Pulikkoonattu
On the Minimum Distance of Non Binary LDPC Codes
Student project report LTHC, EPFL, Switzerland, Jun. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Minimum distance is an important parameter of a linear error correcting code. For improved performance of binary Low Density Parity Check (LDPC) codes, we need to have the minimum distance grow fast with n, the codelength. However, the best we can hope for is a linear growth in dmin with n. For binary LDPC codes, the necessary and sufficient conditions on the LDPC ensemble parameters, to ensure linear growth of minimum distance is well established. In the case of non-binary LDPC codes, the structure of logarithmic weight codewords is different from that of binary codes. We have carried out a preliminary study on the logarithmic bound on the the minimum distance of non-binary LDPC code ensembles. In particular, we have investigated certain configurations which would lead to low weight codewords. A set of simulations are performed to identify some of these configurations. Finally, we have provided a bound on the logarithmic minimum distance of nonbinary codes, using a strategy similar to the girth bound for binary codes. This bound has the same asymptotic behaviour as that of binary codes.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 09:32:11 GMT" } ]
2009-06-12T00:00:00
[ [ "Pulikkoonattu", "Rethnakaran", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2094
Panayotis Mertikopoulos
Panayotis Mertikopoulos, Aris L. Moustakas
The emergence of rational behavior in the presence of stochastic perturbations
Published in at http://dx.doi.org/10.1214/09-AAP651 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2010, Vol. 20, No. 4, 1359-1388
10.1214/09-AAP651
IMS-AAP-AAP651
math.PR cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study repeated games where players use an exponential learning scheme in order to adapt to an ever-changing environment. If the game's payoffs are subject to random perturbations, this scheme leads to a new stochastic version of the replicator dynamics that is quite different from the "aggregate shocks" approach of evolutionary game theory. Irrespective of the perturbations' magnitude, we find that strategies which are dominated (even iteratively) eventually become extinct and that the game's strict Nash equilibria are stochastically asymptotically stable. We complement our analysis by illustrating these results in the case of congestion games.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 13:04:48 GMT" }, { "version": "v2", "created": "Thu, 21 Oct 2010 11:40:15 GMT" } ]
2010-10-22T00:00:00
[ [ "Mertikopoulos", "Panayotis", "" ], [ "Moustakas", "Aris L.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.2135
Michael Nelson
Herbert Van de Sompel, Carl Lagoze, Michael L. Nelson, Simeon Warner, Robert Sanderson, Pete Johnston
Adding eScience Assets to the Data Web
10 pages, 7 figures. Proceedings of Linked Data on the Web (LDOW2009) Workshop
null
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aggregations of Web resources are increasingly important in scholarship as it adopts new methods that are data-centric, collaborative, and networked-based. The same notion of aggregations of resources is common to the mashed-up, socially networked information environment of Web 2.0. We present a mechanism to identify and describe aggregations of Web resources that has resulted from the Open Archives Initiative - Object Reuse and Exchange (OAI-ORE) project. The OAI-ORE specifications are based on the principles of the Architecture of the World Wide Web, the Semantic Web, and the Linked Data effort. Therefore, their incorporation into the cyberinfrastructure that supports eScholarship will ensure the integration of the products of scholarly research into the Data Web.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 15:33:37 GMT" } ]
2009-06-12T00:00:00
[ [ "Van de Sompel", "Herbert", "" ], [ "Lagoze", "Carl", "" ], [ "Nelson", "Michael L.", "" ], [ "Warner", "Simeon", "" ], [ "Sanderson", "Robert", "" ], [ "Johnston", "Pete", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0906.2143
Andrea Manara
J. T. Moscicki, A. Manara, M. Lamanna, P. Mendez, A. Muraru
Dependable Distributed Computing for the International Telecommunication Union Regional Radio Conference RRC06
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The International Telecommunication Union (ITU) Regional Radio Conference (RRC06) established in 2006 a new frequency plan for the introduction of digital broadcasting in European, African, Arab, CIS countries and Iran. The preparation of the plan involved complex calculations under short deadline and required dependable and efficient computing capability. The ITU designed and deployed in-situ a dedicated PC farm, in parallel to the European Organization for Nuclear Research (CERN) which provided and supported a system based on the EGEE Grid. The planning cycle at the RRC06 required a periodic execution in the order of 200,000 short jobs, using several hundreds of CPU hours, in a period of less than 12 hours. The nature of the problem required dynamic workload-balancing and low-latency access to the computing resources. We present the strategy and key technical choices that delivered a reliable service to the RRC06.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 16:04:12 GMT" } ]
2009-06-12T00:00:00
[ [ "Moscicki", "J. T.", "" ], [ "Manara", "A.", "" ], [ "Lamanna", "M.", "" ], [ "Mendez", "P.", "" ], [ "Muraru", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.2154
Giorgi Japaridze
Giorgi Japaridze (School of Computer Science and Technology, Shandong University, Department of Co)
From formulas to cirquents in computability logic
LMCS 7 (2:1) 2011
Logical Methods in Computer Science, Volume 7, Issue 2 (April 21, 2011) lmcs:1121
10.2168/LMCS-7(2:1)2011
null
cs.LO cs.AI cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computability logic (CoL) (see http://www.cis.upenn.edu/~giorgi/cl.html) is a recently introduced semantical platform and ambitious program for redeveloping logic as a formal theory of computability, as opposed to the formal theory of truth that logic has more traditionally been. Its expressions represent interactive computational tasks seen as games played by a machine against the environment, and "truth" is understood as existence of an algorithmic winning strategy. With logical operators standing for operations on games, the formalism of CoL is open-ended, and has already undergone series of extensions. This article extends the expressive power of CoL in a qualitatively new way, generalizing formulas (to which the earlier languages of CoL were limited) to circuit-style structures termed cirquents. The latter, unlike formulas, are able to account for subgame/subtask sharing between different parts of the overall game/task. Among the many advantages offered by this ability is that it allows us to capture, refine and generalize the well known independence-friendly logic which, after the present leap forward, naturally becomes a conservative fragment of CoL, just as classical logic had been known to be a conservative fragment of the formula-based version of CoL. Technically, this paper is self-contained, and can be read without any prior familiarity with CoL.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 16:34:51 GMT" }, { "version": "v2", "created": "Tue, 17 Aug 2010 10:16:42 GMT" }, { "version": "v3", "created": "Sat, 1 Jan 2011 22:31:55 GMT" }, { "version": "v4", "created": "Wed, 20 Apr 2011 16:44:25 GMT" }, { "version": "v5", "created": "Fri, 22 Apr 2011 07:31:58 GMT" }, { "version": "v6", "created": "Mon, 25 Apr 2011 21:46:55 GMT" }, { "version": "v7", "created": "Wed, 27 Apr 2011 16:46:20 GMT" } ]
2015-07-01T00:00:00
[ [ "Japaridze", "Giorgi", "", "School of Computer Science and Technology, Shandong\n University, Department of Co" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0906.2212
Rumi Ghosh
Rumi Ghosh, Kristina Lerman
Structure of Heterogeneous Networks
null
2009 IEEE International Conference on Social Computing (SocialCom-09)
10.1109/CSE.2009.142
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Heterogeneous networks play a key role in the evolution of communities and the decisions individuals make. These networks link different types of entities, for example, people and the events they attend. Network analysis algorithms usually project such networks unto simple graphs composed of entities of a single type. In the process, they conflate relations between entities of different types and loose important structural information. We develop a mathematical framework that can be used to compactly represent and analyze heterogeneous networks that combine multiple entity and link types. We generalize Bonacich centrality, which measures connectivity between nodes by the number of paths between them, to heterogeneous networks and use this measure to study network structure. Specifically, we extend the popular modularity-maximization method for community detection to use this centrality metric. We also rank nodes based on their connectivity to other nodes. One advantage of this centrality metric is that it has a tunable parameter we can use to set the length scale of interactions. By studying how rankings change with this parameter allows us to identify important nodes in the network. We apply the proposed method to analyze the structure of several heterogeneous networks. We show that exploiting additional sources of evidence corresponding to links between, as well as among, different entity types yields new insights into network structure.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 22:19:13 GMT" } ]
2016-11-17T00:00:00
[ [ "Ghosh", "Rumi", "" ], [ "Lerman", "Kristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0906.2228
Hans Tompits
David Pearce, Hans Tompits, Stefan Woltran
Characterising equilibrium logic and nested logic programs: Reductions and complexity
null
Theory and Practice of Logic Programming (2009), 9 : 565-616
10.1017/S147106840999010X
null
cs.LO cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Equilibrium logic is an approach to nonmonotonic reasoning that extends the stable-model and answer-set semantics for logic programs. In particular, it includes the general case of nested logic programs, where arbitrary Boolean combinations are permitted in heads and bodies of rules, as special kinds of theories. In this paper, we present polynomial reductions of the main reasoning tasks associated with equilibrium logic and nested logic programs into quantified propositional logic, an extension of classical propositional logic where quantifications over atomic formulas are permitted. We provide reductions not only for decision problems, but also for the central semantical concepts of equilibrium logic and nested logic programs. In particular, our encodings map a given decision problem into some formula such that the latter is valid precisely in case the former holds. The basic tasks we deal with here are the consistency problem, brave reasoning, and skeptical reasoning. Additionally, we also provide encodings for testing equivalence of theories or programs under different notions of equivalence, viz. ordinary, strong, and uniform equivalence. For all considered reasoning tasks, we analyse their computational complexity and give strict complexity bounds.
[ { "version": "v1", "created": "Thu, 11 Jun 2009 23:24:43 GMT" }, { "version": "v2", "created": "Sat, 13 Jun 2009 17:47:12 GMT" } ]
2009-12-30T00:00:00
[ [ "Pearce", "David", "" ], [ "Tompits", "Hans", "" ], [ "Woltran", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.2252
Chinmay Vaze
Chinmay S. Vaze and Mahesh K. Varanasi
Dirty Paper Coding for the MIMO Cognitive Radio Channel with Imperfect CSIT
To be presented at ISIT 2009, Seoul, S. Korea
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Dirty Paper Coding (DPC) based transmission scheme for the Gaussian multiple-input multiple-output (MIMO) cognitive radio channel (CRC) is studied when there is imperfect and perfect channel knowledge at the transmitters (CSIT) and the receivers, respectively. In particular, the problem of optimizing the sum-rate of the MIMO CRC over the transmit covariance matrices is dealt with. Such an optimization, under the DPC-based transmission strategy, needs to be performed jointly with an optimization over the inflation factor. To this end, first the problem of determination of inflation factor over the MIMO channel $Y=H_1 X + H_2 S + Z$ with imperfect CSIT is investigated. For this problem, two iterative algorithms, which generalize the corresponding algorithms proposed for the channel $Y=H(X+S)+Z$, are developed. Later, the necessary conditions for maximizing the sum-rate of the MIMO CRC over the transmit covariances for a given choice of inflation factor are derived. Using these necessary conditions and the algorithms for the determination of the inflation factor, an iterative, numerical algorithm for the joint optimization is proposed. Some interesting observations are made from the numerical results obtained from the algorithm. Furthermore, the high-SNR sum-rate scaling factor achievable over the CRC with imperfect CSIT is obtained.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 04:05:49 GMT" } ]
2009-06-15T00:00:00
[ [ "Vaze", "Chinmay S.", "" ], [ "Varanasi", "Mahesh K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2274
D\v{z}enan Zuki\'c
D\v{z}enan Zuki\'c, Christof Rezk-Salama, Andreas Kolb
A Neural Network Classifier of Volume Datasets
10 pages, 10 figures, 1 table, 3IA conference http://3ia.teiath.gr/
International Conference on Computer Graphics and Artificial Intelligence, Proceedings (2009) 53-62
null
null
cs.GR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many state-of-the art visualization techniques must be tailored to the specific type of dataset, its modality (CT, MRI, etc.), the recorded object or anatomical region (head, spine, abdomen, etc.) and other parameters related to the data acquisition process. While parts of the information (imaging modality and acquisition sequence) may be obtained from the meta-data stored with the volume scan, there is important information which is not stored explicitly (anatomical region, tracing compound). Also, meta-data might be incomplete, inappropriate or simply missing. This paper presents a novel and simple method of determining the type of dataset from previously defined categories. 2D histograms based on intensity and gradient magnitude of datasets are used as input to a neural network, which classifies it into one of several categories it was trained with. The proposed method is an important building block for visualization systems to be used autonomously by non-experts. The method has been tested on 80 datasets, divided into 3 classes and a "rest" class. A significant result is the ability of the system to classify datasets into a specific class after being trained with only one dataset of that class. Other advantages of the method are its easy implementation and its high computational performance.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 11:17:05 GMT" } ]
2009-06-15T00:00:00
[ [ "Zukić", "Dženan", "" ], [ "Rezk-Salama", "Christof", "" ], [ "Kolb", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.2291
Frank Breitling
F. Breitling
A standard transformation from XML to RDF via XSLT
4 pages, 1 figure, accepted for publication in Astronomical Notes (AN)
null
10.1002/asna.200811233
null
astro-ph.IM cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A generic transformation of XML data into the Resource Description Framework (RDF) and its implementation by XSLT transformations is presented. It was developed by the grid integration project for robotic telescopes of AstroGrid-D to provide network communication through the Remote Telescope Markup Language (RTML) to its RDF based information service. The transformation's generality is explained by this example. It automates the transformation of XML data into RDF and thus solves this problem of semantic computing. Its design also permits the inverse transformation but this is not yet implemented.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 14:12:34 GMT" }, { "version": "v2", "created": "Mon, 15 Jun 2009 09:03:15 GMT" } ]
2015-05-13T00:00:00
[ [ "Breitling", "F.", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0906.2307
Mauro Cherubini
Mauro Cherubini, Rodrigo de Oliveira, and Nuria Oliver
Shopping Uncertainties in a Mobile and Social Context
Presented in the Late Breaking Results category of Pervasive 2009. May 11-14, Nara, Japan. http://www.pervasive2009.org/
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We conducted a qualitative user study with 77 consumers to investigate what social aspects are relevant when supporting customers during their shopping activities and particularly in situations when they are undecided. Twenty-five respondents (32%) reported seeking extra information on web pages and forums, in addition to asking their peers for advice (related to the nature of the item to be bought). Moreover, from the remaining 52 subjects, only 6 (8%) were confident enough to make prompt comparisons between items and an immediate purchasing choice, while 17 respondents (22%) expressed the need for being away from persuasive elements. The remaining 29 respondents (38%) reported having a suboptimal strategy for making their shopping decisions (i.e. buying all items, not buying, or choosing randomly). Therefore, the majority of our participants (70% = 32% + 38%) had social and information needs when making purchasing decisions. This result motivates the development of applications that would allow consumers to ask shopping questions to their social network while on-the-go.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 13:47:46 GMT" } ]
2009-06-15T00:00:00
[ [ "Cherubini", "Mauro", "" ], [ "de Oliveira", "Rodrigo", "" ], [ "Oliver", "Nuria", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]