id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0906.0845 | Florentina Pintea | Mohd Nazri Ismail | Analyzing of MOS and Codec Selection for Voice over IP Technology | 14 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),263-276 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this research, we propose an architectural solution to implement the voice
over IP (VoIP) service in campus environment network. Voice over IP (VoIP)
technology has become a discussion issue for this time being. Today, the
deployment of this technology on an organization truly can give a great
financial benefit over traditional telephony. Therefore, this study is to
analyze the VoIP Codec selection and investigate the Mean Opinion Score (MOS)
performance areas evolved with the quality of service delivered by soft phone
and IP phone. This study focuses on quality of voice prediction such as i)
accuracy of MOS between automated system and human perception and ii) different
types of codec performance measurement via human perception using MOS
technique. In this study, network management system (NMS) is used to monitor
and capture the performance of VoIP in campus environment. In addition, the
most apparent of implementing soft phone and IP phone in campus environment is
to define the best codec selection that can be used in operational environment.
Based on the finding result, the MOS measurement through automated and manual
system is able to predict and evaluate VoIP performance. In addition, based on
manual MOS measurement, VoIP conversations over LAN contribute more reliability
and availability performance compare to WAN.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 07:14:39 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Ismail",
"Mohd Nazri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.0851 | Florentina Pintea | Vasiliy Saiko | Specific Characteristics of Applying the Paired Comparison Method for
Parameterization of Consumer Wants | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),305-314 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The article describes the main problems concerned with using expert
assessment method in consumer preference researches. The author proved the
expediency of using a 3-point measurement scale. The author suggested an
algorithm for controlling the judgments' consistency that includes analyzing
and correcting the input estimates in real-time mode.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 08:20:50 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Saiko",
"Vasiliy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.0857 | Michael Weiss | Enrico Formenti, Alberto Dennunzio and Michael Weiss | 2D cellular automata: dynamics and undecidability | 24 pages, 12 figures. paper submitted to an international conference | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce the notion of quasi-expansivity for 2D CA and we
show that it shares many properties with expansivity (that holds only for 1D
CA). Similarly, we introduce the notions of quasi-sensitivity and prove that
the classical dichotomy theorem holds in this new setting. Moreover, we show a
tight relation between closingness and openness for 2D CA. Finally, the
undecidability of closingness property for 2D CA is proved.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 10:14:01 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 2009 15:58:08 GMT"
}
]
| 2009-09-29T00:00:00 | [
[
"Formenti",
"Enrico",
""
],
[
"Dennunzio",
"Alberto",
""
],
[
"Weiss",
"Michael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.0859 | Florentina Pintea | Emil Daniel Schwab | A Partial Order on Bipartite Graphs with n Vertices | 10 pages,exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),315-324 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper examines a partial order on bipartite graphs (X1, X2, E) with n
vertices, X1UX2={1,2,...,n}. This partial order is a natural partial order of
subobjects of an object in a triangular category with bipartite graphs as
morphisms.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 09:25:43 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Schwab",
"Emil Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.0861 | Florentina Pintea | A. A. Shumeyko, S. L. Sotnik | Using Genetic Algorithms for Texts Classification Problems | 16 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),325-340 | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The avalanche quantity of the information developed by mankind has led to
concept of automation of knowledge extraction - Data Mining ([1]). This
direction is connected with a wide spectrum of problems - from recognition of
the fuzzy set to creation of search machines. Important component of Data
Mining is processing of the text information. Such problems lean on concept of
classification and clustering ([2]). Classification consists in definition of
an accessory of some element (text) to one of in advance created classes.
Clustering means splitting a set of elements (texts) on clusters which quantity
are defined by localization of elements of the given set in vicinities of these
some natural centers of these clusters. Realization of a problem of
classification initially should lean on the given postulates, basic of which -
the aprioristic information on primary set of texts and a measure of affinity
of elements and classes.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 09:41:47 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Shumeyko",
"A. A.",
""
],
[
"Sotnik",
"S. L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0906.0862 | Daniel Karapetyan | Gregory Gutin and Daniel Karapetyan | A Memetic Algorithm for the Multidimensional Assignment Problem | 14 pages | Lecture Notes in Computer Science 5752 (2009) 125-129 | 10.1007/978-3-642-03751-1_12 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Multidimensional Assignment Problem (MAP or s-AP in the case of s
dimensions) is an extension of the well-known assignment problem. The most
studied case of MAP is 3-AP, though the problems with larger values of s have
also a number of applications. In this paper we propose a memetic algorithm for
MAP that is a combination of a genetic algorithm with a local search procedure.
The main contribution of the paper is an idea of dynamically adjusted
generation size, that yields an outstanding flexibility of the algorithm to
perform well for both small and large fixed running times. The results of
computational experiments for several instance families show that the proposed
algorithm produces solutions of very high quality in a reasonable time and
outperforms the state-of-the art 3-AP memetic algorithm.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 09:44:59 GMT"
}
]
| 2010-03-30T00:00:00 | [
[
"Gutin",
"Gregory",
""
],
[
"Karapetyan",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.0863 | Florentina Pintea | Cristina Ofelia Stanciu | Decision Support Systems Architectures | 8 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),341-348 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents the main components of the decision assisting systems.
Further on three types of architectures of these systems are described,
analyzed, and respectively compared, namely: the network architecture, the
centralized architecture and the hierarchical architecture.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 09:46:45 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Stanciu",
"Cristina Ofelia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.0866 | Florentina Pintea | Virgiliu Streian, Adela Ionescu | Web Publishing of the Files Obtained by Flash | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),349-358 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The aim of this article is to familiarize the user with the Web publishing of
the files obtained by Flash. The article contains an overview of Macromedia
Flash 5, as well as the running of a Playing Flash movie, information on Flash
and Generator, the publishing of Flash movies, a HTLM publishing for Flash
Player files and publishing by Generator templates.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 09:52:22 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Streian",
"Virgiliu",
""
],
[
"Ionescu",
"Adela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0906.0867 | Florentina Pintea | Ramona Vasilescu | PDF/A standard for long term archiving | 8 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),359-366 | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | PDF/A is defined by ISO 19005-1 as a file format based on PDF format. The
standard provides a mechanism for representing electronic documents in a way
that preserves their visual appearance over time, independent of the tools and
systems used for creating or storing the files.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 09:56:14 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Vasilescu",
"Ramona",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0906.0869 | Florentina Pintea | Valentin Vieriu, Catalin Tuican | Adobe AIR, Bringing Rich Internet Applications to the Desktop | 14 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),367-380 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rich Internet Applications are the new trend in software development today.
Adobe AIR offers the possibility to create cross-platform desktop applications
using popular Web technologies like HTML, JavaScript, Flash and Flex. This
article is focused on presenting the advantages that this new environment has
to offer for the web development community and how quickly you can develop a
desktop application using Adobe AIR.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 10:00:21 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Vieriu",
"Valentin",
""
],
[
"Tuican",
"Catalin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.0871 | Florentina Pintea | Tiberiu Marius Karnyanszky, Mihai Titu | Upon the Modeling and the Optimization of the Debiting Process through
Computer Aided Non-Conventional Technologies | 10 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),189-198 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The debiting process of the remarkable properties materials can be managed
through unconventional technologies as the complex electrical erosion. We
present the modeling of the previous experimental results to obtain a
mathematical dependence of the output parameters (processing time, surface
quality) on the input parameters (voltage or current). All the experimental
data are memorized on a database and for each particular debiting process a new
dependence is built. Because all the experiments applied in the Romanian
laboratories or practical applications of the nonconventional technological
processes in the factories were based on the particular conditions of one
activity, this papers presents the technical implementation of a computer-aided
solution that keeps all previous experimental data, optimizes the processing
conditions and eventual manage the driving gear. The flow-chart we present in
this paper offers a solution for practitioners to reduce the electrical
consumption while a technological processing of special materials is necessary.
The computer program and the database can be easily adapted to any
technological processes (conventional or not).
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 10:06:06 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Karnyanszky",
"Tiberiu Marius",
""
],
[
"Titu",
"Mihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.0872 | Boris Yangel | Boris Yangel | Fast Weak Learner Based on Genetic Algorithm | 4 pages, acmsiggraph latex style packed with the latex source in the
single archive | null | null | null | cs.LG cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An approach to the acceleration of parametric weak classifier boosting is
proposed. Weak classifier is called parametric if it has fixed number of
parameters and, so, can be represented as a point into multidimensional space.
Genetic algorithm is used instead of exhaustive search to learn parameters of
such classifier. Proposed approach also takes cases when effective algorithm
for learning some of the classifier parameters exists into account. Experiments
confirm that such an approach can dramatically decrease classifier training
time while keeping both training and test errors small.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 10:25:08 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Yangel",
"Boris",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0906.0877 | Florentina Pintea | Florentina Anica Pintea, Georgiana Petruta Fintineanu, Bogdan Ioan
Selariu | PayPal in Romania | 8 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),277-284 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The present paper refers to the usefulness of online payment through PayPal
and to the development of this payment manner in Romania. PayPal is an example
of a payment intermediary service that facilitates worldwide e-commerce.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 10:31:19 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Pintea",
"Florentina Anica",
""
],
[
"Fintineanu",
"Georgiana Petruta",
""
],
[
"Selariu",
"Bogdan Ioan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.0885 | Yongxin Tong | Yongxin Tong, Li Zhao, Dan Yu, Shilong Ma, Ke Xu | Mining Compressed Repetitive Gapped Sequential Patterns Efficiently | 19 pages, 7 figures | The 5th International Conference on Advanced Data Mining and
Applications (ADMA2009) | null | null | cs.DB cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mining frequent sequential patterns from sequence databases has been a
central research topic in data mining and various efficient mining sequential
patterns algorithms have been proposed and studied. Recently, in many problem
domains (e.g, program execution traces), a novel sequential pattern mining
research, called mining repetitive gapped sequential patterns, has attracted
the attention of many researchers, considering not only the repetition of
sequential pattern in different sequences but also the repetition within a
sequence is more meaningful than the general sequential pattern mining which
only captures occurrences in different sequences. However, the number of
repetitive gapped sequential patterns generated by even these closed mining
algorithms may be too large to understand for users, especially when support
threshold is low. In this paper, we propose and study the problem of
compressing repetitive gapped sequential patterns. Inspired by the ideas of
summarizing frequent itemsets, RPglobal, we develop an algorithm, CRGSgrow
(Compressing Repetitive Gapped Sequential pattern grow), including an efficient
pruning strategy, SyncScan, and an efficient representative pattern checking
scheme, -dominate sequential pattern checking. The CRGSgrow is a two-step
approach: in the first step, we obtain all closed repetitive sequential
patterns as the candidate set of representative repetitive sequential patterns,
and at the same time get the most of representative repetitive sequential
patterns; in the second step, we only spend a little time in finding the
remaining the representative patterns from the candidate set. An empirical
study with both real and synthetic data sets clearly shows that the CRGSgrow
has good performance.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 11:17:34 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Tong",
"Yongxin",
""
],
[
"Zhao",
"Li",
""
],
[
"Yu",
"Dan",
""
],
[
"Ma",
"Shilong",
""
],
[
"Xu",
"Ke",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.0910 | Daniel Lemire | Sylvie Noel, Daniel Lemire | On the Challenges of Collaborative Data Processing | to appear as a chapter in an upcoming book (Collaborative Information
Behavior) | null | null | null | cs.DB cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The last 30 years have seen the creation of a variety of electronic
collaboration tools for science and business. Some of the best-known
collaboration tools support text editing (e.g., wikis). Wikipedia's success
shows that large-scale collaboration can produce highly valuable content.
Meanwhile much structured data is being collected and made publicly available.
We have never had access to more powerful databases and statistical packages.
Is large-scale collaborative data analysis now possible? Using a quantitative
analysis of Web 2.0 data visualization sites, we find evidence that at least
moderate open collaboration occurs. We then explore some of the limiting
factors of collaboration over data.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 13:28:51 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Noel",
"Sylvie",
""
],
[
"Lemire",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0906.0921 | Matthew Marriotti | Matthew Marriotti | Course Material Selection Rubric for Creating Network Security Courses | null | null | null | null | cs.CY cs.CR | http://creativecommons.org/licenses/by/3.0/ | Teaching network security can be a difficult task for university teachers,
especially for teachers at smaller universities where the course loads are more
diverse. Creating a new course in network security requires investigation into
multiple subject areas within the field and from multiple sources. This task
can be daunting and overwhelming for teachers from smaller universities because
of their requirement to teach multiple subjects, not just network security.
Along with the requirement of teachers to understand the material that they
wish to teach, the factors of obsolescence and the ability to build material
off of core topics need to be addressed. These three factors are difficult for
a smaller university teacher to address without a set of standards to analyze
these areas. A rubric addressing these topic areas of timelessness,
associability, and simplicity has been created to assist in the selection of
materials based on the three criteria. The use of this rubric provides an
effective means to choose material for a new course and help teachers to
present the material they determine most appropriate to teach.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 14:46:11 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Marriotti",
"Matthew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.0937 | Junwei Shao | Xiaorong Hou, Junwei Shao | Spherical Distribution of 5 Points with Maximal Distance Sum | 45 pages, 3 figures | null | null | null | cs.DM cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we mainly consider the problem of spherical distribution of 5
points, that is, how to configure 5 points on a sphere such that the mutual
distance sum attains the maximum. It is conjectured that the sum of distances
is maximal if 5 points form a bipyramid configuration in which case two points
are positioned at two poles of the sphere and the other three are positioned
uniformly on the equator. We study this problem using interval methods and
related technics, and give a proof for the conjecture through computers in
finite time.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 15:48:05 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Hou",
"Xiaorong",
""
],
[
"Shao",
"Junwei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0906.0958 | Sayee Kompalli | Sayee C. Kompalli and Ravi R. Mazumdar | On a Generalized Foster-Lyapunov Type Criterion for the Stability of
Multidimensional Markov chains with Applications to the Slotted-Aloha
Protocol with Finite Number of Queues | null | null | null | null | cs.IT cs.NI math.IT | http://creativecommons.org/licenses/publicdomain/ | In this paper, we generalize a positive recurrence criterion for
multidimensional discrete-time Markov chains over countable state spaces due to
Rosberg (JAP, Vol. 17, No. 3, 1980). We revisit the stability analysis of well
known slotted-Aloha protocol with finite number of queues. Under standard
modeling assumptions, we derive a sufficient condition for the stability by
applying our positive recurrence criterion. Our sufficiency condition for
stability is linear in arrival rates and does not require knowledge of the
stationary joint statistics of queue lengths. We believe that the technique
reported here could be useful in analyzing other stability problems in
countable space Markovian settings. Toward the end, we derive some sufficient
conditions for instability of the protocol.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 18:47:24 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Kompalli",
"Sayee C.",
""
],
[
"Mazumdar",
"Ravi R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0964 | Brian Carroll | Brian Carroll | On Sparse Channel Estimation | M.S. Thesis (106 pages, 35 figures) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Channel Estimation is an essential component in applications such as radar
and data communication. In multi path time varying environments, it is
necessary to estimate time-shifts, scale-shifts (the wideband equivalent of
Doppler-shifts), and the gains/phases of each of the multiple paths. With
recent advances in sparse estimation (or "compressive sensing"), new estimation
techniques have emerged which yield more accurate estimates of these channel
parameters than traditional strategies. These estimation strategies, however,
restrict potential estimates of time-shifts and scale-shifts to a finite set of
values separated by a choice of grid spacing. A small grid spacing increases
the number of potential estimates, thus lowering the quantization error, but
also increases complexity and estimation time. Conversely, a large grid spacing
lowers the number of potential estimates, thus lowering the complexity and
estimation time, but increases the quantization error. In this thesis, we
derive an expression which relates the choice of grid spacing to the
mean-squared quantization error. Furthermore, we consider the case when
scale-shifts are approximated by Doppler-shifts, and derive a similar
expression relating the choice of the grid spacing and the quantization error.
Using insights gained from these expressions, we further explore the effects of
the choice and grid spacing, and examine when a wideband model can be well
approximated by a narrowband model.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 19:45:40 GMT"
}
]
| 2009-06-05T00:00:00 | [
[
"Carroll",
"Brian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.0997 | B. A. Sethuraman | B.A. Sethuraman | Division Algebras and Wireless Communication | Survey paper, 12 pages; minor edits in second version | null | null | null | math.RA cs.IT math.IT math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We survey the recent use of division algebras in wireless communication.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 20:42:38 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jun 2009 19:47:03 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Sethuraman",
"B. A.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0906.1018 | Christoph Koutschan | Christoph Koutschan | Eliminating Human Insight: An Algorithmic Proof of Stembridge's TSPP
Theorem | 12 pages, 4 figures, submitted to Contemporary Mathematics | null | null | null | cs.SC cs.DM math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new proof of Stembridge's theorem about the enumeration of
totally symmetric plane partitions using the methodology suggested in the
recent Koutschan-Kauers-Zeilberger semi-rigorous proof of the Andrews-Robbins
q-TSPP conjecture. Our proof makes heavy use of computer algebra and is
completely automatic. We describe new methods that make the computations
feasible in the first place. The tantalizing aspect of this work is that the
same methods can be applied to prove the q-TSPP conjecture (that is a
q-analogue of Stembridge's theorem and open for more than 25 years); the only
hurdle here is still the computational complexity.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 22:56:08 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Koutschan",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0906.1019 | Aranyak Mehta | Gagan Aggarwal, Gagan Goel, Aranyak Mehta | Efficiency of (Revenue-)Optimal Mechanisms | ACM conference on Electronic Commerce, 2009 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We compare the expected efficiency of revenue maximizing (or {\em optimal})
mechanisms with that of efficiency maximizing ones. We show that the efficiency
of the revenue maximizing mechanism for selling a single item with k +
log_{e/(e-1)} k + 1 bidders is at least as much as the efficiency of the
efficiency maximizing mechanism with k bidders, when bidder valuations are
drawn i.i.d. from a Monotone Hazard Rate distribution. Surprisingly, we also
show that this bound is tight within a small additive constant of 5.7. In other
words, Theta(log k) extra bidders suffice for the revenue maximizing mechanism
to match the efficiency of the efficiency maximizing mechanism, while o(log k)
do not. This is in contrast to the result of Bulow and Klemperer comparing the
revenue of the two mechanisms, where only one extra bidder suffices. More
precisely, they show that the revenue of the efficiency maximizing mechanism
with k+1 bidders is no less than the revenue of the revenue maximizing
mechanism with k bidders.
We extend our result for the case of selling t identical items and show that
2.2 log k + t Theta(log log k) extra bidders suffice for the revenue maximizing
mechanism to match the efficiency of the efficiency maximizing mechanism.
In order to prove our results, we do a classification of Monotone Hazard Rate
(MHR) distributions and identify a family of MHR distributions, such that for
each class in our classification, there is a member of this family that is
pointwise lower than every distribution in that class. This lets us prove
interesting structural theorems about distributions with Monotone Hazard Rate.
| [
{
"version": "v1",
"created": "Thu, 4 Jun 2009 23:21:40 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Aggarwal",
"Gagan",
""
],
[
"Goel",
"Gagan",
""
],
[
"Mehta",
"Aranyak",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.1030 | Stephanie Wehner | Robert Koenig, Stephanie Wehner, Juerg Wullschleger | Unconditional security from noisy quantum storage | 25 pages (IEEE two column), 13 figures, v4: published version (to
appear in IEEE Transactions on Information Theory), including bit wise
min-entropy sampling. however, for experimental purposes block sampling can
be much more convenient, please see v3 arxiv version if needed. See
arXiv:0911.2302 for a companion paper addressing aspects of a practical
implementation using block sampling | IEEE Trans. Inf. Th., vol. 58, no. 3, p. 1962-1984 (2012) | 10.1109/TIT.2011.2177772 | null | quant-ph cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the implementation of two-party cryptographic primitives based on
the sole assumption that no large-scale reliable quantum storage is available
to the cheating party. We construct novel protocols for oblivious transfer and
bit commitment, and prove that realistic noise levels provide security even
against the most general attack. Such unconditional results were previously
only known in the so-called bounded-storage model which is a special case of
our setting. Our protocols can be implemented with present-day hardware used
for quantum key distribution. In particular, no quantum storage is required for
the honest parties.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 03:47:20 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jun 2009 23:47:05 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Jul 2010 04:11:20 GMT"
},
{
"version": "v4",
"created": "Thu, 8 Sep 2011 09:09:02 GMT"
}
]
| 2013-12-06T00:00:00 | [
[
"Koenig",
"Robert",
""
],
[
"Wehner",
"Stephanie",
""
],
[
"Wullschleger",
"Juerg",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.1053 | Thierry Bouche | Thierry Bouche (IF, CCDNM) | Report on the current state of the French DMLs | null | DML 2009 ? Towards a Digital Mathematics Library, Grand Bend,
Ontario : Canada (2009) | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is a survey of the existing digital collections of French mathematical
literature, run by non-profit organizations. This includes research monographs,
serials, proceedings, Ph. D. theses, collected works, books and personal
websites.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 08:10:30 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Bouche",
"Thierry",
"",
"IF, CCDNM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0906.1079 | Graeme Pope | Graeme Pope | Modified Frame Reconstruction Algorithm for Compressive Sensing | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Compressive sensing is a technique to sample signals well below the Nyquist
rate using linear measurement operators. In this paper we present an algorithm
for signal reconstruction given such a set of measurements. This algorithm
generalises and extends previous iterative hard thresholding algorithms and we
give sufficient conditions for successful reconstruction of the original data
signal. In addition we show that by underestimating the sparsity of the data
signal we can increase the success rate of the algorithm.
We also present a number of modifications to this algorithm: the
incorporation of a least squares step, polynomial acceleration and an adaptive
method for choosing the step-length. These modified algorithms converge to the
correct solution under similar conditions to the original un-modified
algorithm. Empirical evidence show that these modifications dramatically
increase both the success rate and the rate of convergence, and can outperform
other algorithms previously used for signal reconstruction in compressive
sensing.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 10:01:42 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Pope",
"Graeme",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1084 | Arto Annila | Arto Annila | Physical portrayal of computational complexity | 16, pages, 7 figures | ISRN Computational Mathematics 2012 ID: 321372, 1-15 | 10.5402/2012/321372 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computational complexity is examined using the principle of increasing
entropy. To consider computation as a physical process from an initial instance
to the final acceptance is motivated because many natural processes have been
recognized to complete in non-polynomial time (NP). The irreversible process
with three or more degrees of freedom is found intractable because, in terms of
physics, flows of energy are inseparable from their driving forces. In
computational terms, when solving problems in the class NP, decisions will
affect subsequently available sets of decisions. The state space of a
non-deterministic finite automaton is evolving due to the computation itself
hence it cannot be efficiently contracted using a deterministic finite
automaton that will arrive at a solution in super-polynomial time. The solution
of the NP problem itself is verifiable in polynomial time (P) because the
corresponding state is stationary. Likewise the class P set of states does not
depend on computational history hence it can be efficiently contracted to the
accepting state by a deterministic sequence of dissipative transformations.
Thus it is concluded that the class P set of states is inherently smaller than
the set of class NP. Since the computational time to contract a given set is
proportional to dissipation, the computational complexity class P is a subset
of NP.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 10:56:00 GMT"
}
]
| 2012-03-20T00:00:00 | [
[
"Annila",
"Arto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.1086 | Jean-Marie Vanherpe | Jean-Luc Fouquet (LIFO), Jean-Marie Vanherpe (LIFO) | On Fulkerson conjecture | Accepted for publication in Discussiones Mathematicae Graph Theory;
Discussiones Mathematicae Graph Theory (2010) xxx-yyy | Discussiones Mathematicae Graph Theory 31, 2 (2011) 253-272 | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If $G$ is a bridgeless cubic graph, Fulkerson conjectured that we can find 6
perfect matchings (a{\em Fulkerson covering}) with the property that every edge
of $G$ is contained in exactly two of them. A consequence of the Fulkerson
conjecture would be that every bridgeless cubic graph has 3 perfect matchings
with empty intersection (this problem is known as the Fan Raspaud Conjecture).
A {\em FR-triple} is a set of 3 such perfect matchings. We show here how to
derive a Fulkerson covering from two FR-triples. Moreover, we give a simple
proof that the Fulkerson conjecture holds true for some classes of well known
snarks.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 10:54:55 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 09:12:31 GMT"
}
]
| 2011-04-01T00:00:00 | [
[
"Fouquet",
"Jean-Luc",
"",
"LIFO"
],
[
"Vanherpe",
"Jean-Marie",
"",
"LIFO"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.1126 | Eric Sopena | Eric Sopena (LaBRI), Jiaojiao Wu (LaBRI) | Coloring the square of the Cartesian product of two cycles | null | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The square $G^2$ of a graph $G$ is defined on the vertex set of $G$ in such a
way that distinct vertices with distance at most two in $G$ are joined by an
edge. We study the chromatic number of the square of the Cartesian product
$C_m\Box C_n$ of two cycles and show that the value of this parameter is at
most 7 except when $m=n=3$, in which case the value is 9, and when $m=n=4$ or
$m=3$ and $n=5$, in which case the value is 8. Moreover, we conjecture that
whenever $G=C_m\Box C_n$, the chromatic number of $G^2$ equals $\lceil
mn/\alpha(G^2) \rceil$, where $\alpha(G^2)$ denotes the size of a maximal
independent set in $G^2$.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 19:59:42 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jun 2009 09:01:51 GMT"
},
{
"version": "v3",
"created": "Mon, 31 May 2010 08:10:47 GMT"
}
]
| 2010-07-28T00:00:00 | [
[
"Sopena",
"Eric",
"",
"LaBRI"
],
[
"Wu",
"Jiaojiao",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.1147 | Omer Khalid Mr | Omer Khalid, Richard Anthony, Paul Nillson, Kate Keahey, Markus
Schulz, Miltos Petridis, Kevin Parrott | Enabling and Optimizing Pilot Jobs using Xen based Virtual Machines for
the HPC Grid Applications | 8 pages; Published in VTDC09 workshop which is part of IEEE ICAC09
Conference | Khalid O. et al, Enabling and Optimizing Pilot Jobs using Xen
Virtual Machines for HPC Grid Applications,. International Workshop on
Virtualiztion Technologies and Distributed Computing, ICAC 09, 2009 | 10.1145/1555336.1555338 | null | cs.DC cs.PF cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The primary motivation for uptake of virtualization have been resource
isolation, capacity management and resource customization: isolation and
capacity management allow providers to isolate users from the site and control
their resources usage while customization allows end-users to easily project
the required environment onto a variety of sites. Various approaches have been
taken to integrate virtualization with Grid technologies. In this paper, we
propose an approach that combines virtualization on the existing software
infrastructure such as Pilot Jobs with minimum change on the part of resource
providers.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 15:26:14 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Khalid",
"Omer",
""
],
[
"Anthony",
"Richard",
""
],
[
"Nillson",
"Paul",
""
],
[
"Keahey",
"Kate",
""
],
[
"Schulz",
"Markus",
""
],
[
"Petridis",
"Miltos",
""
],
[
"Parrott",
"Kevin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.1148 | Tao Zhou | Ming-Sheng Shang, Ci-Hang Jin, Tao Zhou, Yi-Cheng Zhang | Collaborative filtering based on multi-channel diffusion | 9 pages, 3 figures | Physica A 388 (2009) 4867-4871 | 10.1016/j.physa.2009.08.011 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, by applying a diffusion process, we propose a new index to
quantify the similarity between two users in a user-object bipartite graph. To
deal with the discrete ratings on objects, we use a multi-channel
representation where each object is mapped to several channels with the number
of channels being equal to the number of different ratings. Each channel
represents a certain rating and a user having voted an object will be connected
to the channel corresponding to the rating. Diffusion process taking place on
such a user-channel bipartite graph gives a new similarity measure of user
pairs, which is further demonstrated to be more accurate than the classical
Pearson correlation coefficient under the standard collaborative filtering
framework.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 15:32:47 GMT"
}
]
| 2009-09-05T00:00:00 | [
[
"Shang",
"Ming-Sheng",
""
],
[
"Jin",
"Ci-Hang",
""
],
[
"Zhou",
"Tao",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.1166 | Francesc Rossell\'o | Gabriel Cardona, Merce Llabres, Francesc Rossello, Gabriel Valiente | Comparison of Galled Trees | 36 pages | null | null | null | q-bio.PE cs.CE cs.DM q-bio.QM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Galled trees, directed acyclic graphs that model evolutionary histories with
isolated hybridization events, have become very popular due to both their
biological significance and the existence of polynomial time algorithms for
their reconstruction. In this paper we establish to which extent several
distance measures for the comparison of evolutionary networks are metrics for
galled trees, and hence when they can be safely used to evaluate galled tree
reconstruction methods.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 16:55:47 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Cardona",
"Gabriel",
""
],
[
"Llabres",
"Merce",
""
],
[
"Rossello",
"Francesc",
""
],
[
"Valiente",
"Gabriel",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0906.1182 | Paolo Mancarella | P. Mancarella, G. Terreni, F. Sadri, F. Toni, U. Endriss | The CIFF Proof Procedure for Abductive Logic Programming with
Constraints: Theory, Implementation and Experiments | null | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present the CIFF proof procedure for abductive logic programming with
constraints, and we prove its correctness. CIFF is an extension of the IFF
proof procedure for abductive logic programming, relaxing the original
restrictions over variable quantification (allowedness conditions) and
incorporating a constraint solver to deal with numerical constraints as in
constraint logic programming. Finally, we describe the CIFF system, comparing
it with state of the art abductive systems and answer set solvers and showing
how to use it to program some applications. (To appear in Theory and Practice
of Logic Programming - TPLP).
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 16:13:23 GMT"
}
]
| 2009-06-08T00:00:00 | [
[
"Mancarella",
"P.",
""
],
[
"Terreni",
"G.",
""
],
[
"Sadri",
"F.",
""
],
[
"Toni",
"F.",
""
],
[
"Endriss",
"U.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.1189 | Georg B\"ocherer | Georg B\"ocherer | On the Throughput/Bit-Cost Tradeoff in CSMA Based Cooperative Networks | 6 pages. To be presented at SCC 2010 | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless local area networks (WLAN) still suffer from a severe performance
discrepancy between different users in the uplink. This is because of the
spatially varying channel conditions provided by the wireless medium.
Cooperative medium access control (MAC) protocols as for example CoopMAC were
proposed to mitigate this problem. In this work, it is shown that cooperation
implies for cooperating nodes a tradeoff between throughput and bit-cost, which
is the energy needed to transmit one bit. The tradeoff depends on the degree of
cooperation. For carrier sense multiple access (CSMA) based networks, the
throughput/bit-cost tradeoff curve is theoretically derived. A new distributed
CSMA protocol called fairMAC is proposed and it is theoretically shown that
fairMAC can asymptotically achieve any operating point on the tradeoff curve
when the packet lengths go to infinity. The theoretical results are validated
through Monte Carlo simulations.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 19:42:40 GMT"
},
{
"version": "v2",
"created": "Wed, 4 Nov 2009 08:27:12 GMT"
}
]
| 2009-11-04T00:00:00 | [
[
"Böcherer",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1199 | Yannick Chevalier | Yannick Chevalier (LORIA), Kourjieh Mounira (IRIT) | On the Decidability of (ground) Reachability Problems for Cryptographic
Protocols (extended version) | null | null | null | null | cs.LO cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Analysis of cryptographic protocols in a symbolic model is relative to a
deduction system that models the possible actions of an attacker regarding an
execution of this protocol. We present in this paper a transformation algorithm
for such deduction systems provided the equational theory has the finite
variant property. the termination of this transformation entails the
decidability of the ground reachability problems. We prove that it is necessary
to add one other condition to obtain the decidability of non-ground problems,
and provide one new such criterion.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 20:00:15 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Chevalier",
"Yannick",
"",
"LORIA"
],
[
"Mounira",
"Kourjieh",
"",
"IRIT"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.1225 | Michael Goodrich | Michael T. Goodrich | Pipelined Algorithms to Detect Cheating in Long-Term Grid Computations | Expanded version with an additional figure; ISSN 0304-3975 | Theoretical Computer Science, Volume 408, Issues 2-3, Excursions
in Algorithmics: A Collection of Papers in Honor of Franco P. Preparata, 28
November 2008, Pages 199-207 | 10.1016/j.tcs.2008.08.008 | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies pipelined algorithms for protecting distributed grid
computations from cheating participants, who wish to be rewarded for tasks they
receive but don't perform. We present improved cheater detection algorithms
that utilize natural delays that exist in long-term grid computations. In
particular, we partition the sequence of grid tasks into two interleaved
sequences of task rounds, and we show how to use those rounds to devise the
first general-purpose scheme that can catch all cheaters, even when cheaters
collude. The main idea of this algorithm might at first seem
counter-intuitive--we have the participants check each other's work. A naive
implementation of this approach would, of course, be susceptible to collusion
attacks, but we show that by, adapting efficient solutions to the parallel
processor diagnosis problem, we can tolerate collusions of lazy cheaters, even
if the number of such cheaters is a fraction of the total number of
participants. We also include a simple economic analysis of cheaters in grid
computations and a parameterization of the main deterrent that can be used
against them--the probability of being caught.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 22:29:34 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Goodrich",
"Michael T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.1226 | Jianhua Fan | Jorg Peters and Jianhua Fan | On the Complexity of Smooth Spline Surfaces from Quad Meshes | null | null | null | null | cs.GR cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper derives strong relations that boundary curves of a smooth complex
of patches have to obey when the patches are computed by local averaging. These
relations restrict the choice of reparameterizations for geometric continuity.
In particular, when one bicubic tensor-product B-spline patch is associated
with each facet of a quadrilateral mesh with n-valent vertices and we do not
want segments of the boundary curves forced to be linear, then the relations
dictate the minimal number and multiplicity of knots: For general data, the
tensor-product spline patches must have at least two internal double knots per
edge to be able to model a G^1-conneced complex of C^1 splines. This lower
bound on the complexity of any construction is proven to be sharp by suitably
interpreting an existing surface construction. That is, we have a tight bound
on the complexity of smoothing quad meshes with bicubic tensor-product B-spline
patches.
| [
{
"version": "v1",
"created": "Fri, 5 Jun 2009 22:57:04 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Peters",
"Jorg",
""
],
[
"Fan",
"Jianhua",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.1244 | Mark Reid | Mark D. Reid and Robert C. Williamson | Generalised Pinsker Inequalities | 21 pages, 3 figures, accepted to COLT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We generalise the classical Pinsker inequality which relates variational
divergence to Kullback-Liebler divergence in two ways: we consider arbitrary
f-divergences in place of KL divergence, and we assume knowledge of a sequence
of values of generalised variational divergences. We then develop a best
possible inequality for this doubly generalised situation. Specialising our
result to the classical case provides a new and tight explicit bound relating
KL to variational divergence (solving a problem posed by Vajda some 40 years
ago). The solution relies on exploiting a connection between divergences and
the Bayes risk of a learning problem via an integral representation.
| [
{
"version": "v1",
"created": "Sat, 6 Jun 2009 03:32:43 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Reid",
"Mark D.",
""
],
[
"Williamson",
"Robert C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1245 | R Doomun | Marianne Azer, Sherif El-Kassas, Magdy El-Soudani | A Full Image of the Wormhole Attacks - Towards Introducing Complex
Wormhole Attacks in wireless Ad Hoc Networks | 14 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper analyzes wormhole attack modes and classes and point to its threat
impacts on ad hoc networks. New improvements are suggested to these types of
attacks.
| [
{
"version": "v1",
"created": "Sat, 6 Jun 2009 03:43:59 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Azer",
"Marianne",
""
],
[
"El-Kassas",
"Sherif",
""
],
[
"El-Soudani",
"Magdy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.1272 | Pasha Zusmanovich | Askar Dzhumadil'daev and Pasha Zusmanovich | The alternative operad is not Koszul | v3: added corrigendum | Experiment. Math. 20 (2011), 138-144; Corrigendum: 21 (2012), 418 | 10.1080/10586458.2011.544558 10.1080/10586458.2012.738538 | null | math.RA cs.MS cs.SC math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Using computer calculations, we prove the statement in the title.
| [
{
"version": "v1",
"created": "Sat, 6 Jun 2009 12:44:23 GMT"
},
{
"version": "v2",
"created": "Sat, 21 May 2011 20:34:27 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Mar 2013 18:13:53 GMT"
}
]
| 2013-03-15T00:00:00 | [
[
"Dzhumadil'daev",
"Askar",
""
],
[
"Zusmanovich",
"Pasha",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0906.1326 | Jianfeng Zhan | Xu Liu, Jianfeng Zhan, Bibo Tu, Ming Zou, Dan Meng | Similarity Analysis in Automatic Performance Debugging of SPMD Parallel
Programs | http://iss.ices.utexas.edu/sc08nlplss/program.html | Supercomputing 2008 Workshop on Node Level Parallelism for Large
Scale Supercomputers | null | null | cs.DC cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Different from sequential programs, parallel programs possess their own
characteristics which are difficult to analyze in the multi-process or
multi-thread environment. This paper presents an innovative method to
automatically analyze the SPMD programs. Firstly, with the help of clustering
method focusing on similarity analysis, an algorithm is designed to locate
performance problems in parallel programs automatically. Secondly a Rough Set
method is used to uncover the performance problem and provide the insight into
the micro-level causes. Lastly, we have analyzed a production parallel
application to verify the effectiveness of our method and system.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 05:45:57 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Liu",
"Xu",
""
],
[
"Zhan",
"Jianfeng",
""
],
[
"Tu",
"Bibo",
""
],
[
"Zou",
"Ming",
""
],
[
"Meng",
"Dan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.1328 | Jianfeng Zhan | Wei Zhou, Jianfeng Zhan, Dan Meng | Multidimensional Analysis of System Logs in Large-scale Cluster Systems | null | The Proceeding of 38th Annual IEEE/IFIP International Conference
on Dependable Systems and Networks (DSN 2008), Fast abstract | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is effective to improve the reliability and availability of large-scale
cluster systems through the analysis of failures. Existed failure analysis
methods understand and analyze failures from one or few dimension. The analysis
results are partial and with less precision because of the limitation of data
source. This paper presents multidimensional analysis based on graph mining to
analyze multi-source system logs, which is a promising failure analysis method
to get more complete and precise failure knowledge.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 06:03:14 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Zhou",
"Wei",
""
],
[
"Zhan",
"Jianfeng",
""
],
[
"Meng",
"Dan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.1339 | Yonatan Kaspi | Yonatan Kaspi and Neri Merhav | Error Exponents for Broadcast Channels with Degraded Message Sets | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a broadcast channel with a degraded message set, in which a
single transmitter sends a common message to two receivers and a private
message to one of the receivers only. The main goal of this work is to find new
lower bounds to the error exponents of the strong user, the one that should
decode both messages, and of the weak user, that should decode only the common
message. Unlike previous works, where suboptimal decoders where used, the
exponents we derive in this work pertain to optimal decoding and depend on both
rates. We take two different approaches.
The first approach is based, in part, on variations of Gallager-type bounding
techniques that were presented in a much earlier work on error exponents for
erasure/list decoding. The resulting lower bounds are quite simple to
understand and to compute.
The second approach is based on a technique that is rooted in statistical
physics, and it is exponentially tight from the initial step and onward. This
technique is based on analyzing the statistics of certain enumerators.
Numerical results show that the bounds obtained by this technique are tighter
than those obtained by the first approach and previous results. The derivation,
however, is more complex than the first approach and the retrieved exponents
are harder to compute.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 08:13:45 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Kaspi",
"Yonatan",
""
],
[
"Merhav",
"Neri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1341 | Mugurel Ionut Andreica | Madalina Ecaterina Andreica, Mugurel Ionut Andreica, Angela Andreica | Efficient Algorithms for Several Constrained Activity Scheduling
Problems in the Time and Space Domains | null | Proceedings of the 33rd American Romanian Academy of Arts and
Sciences' International Congress, vol. 1, pp. 59-63, Sibiu, Romania, 2-5
June, 2009. (ISBN: 978-2-553-01433-8) | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider several constrained activity scheduling problems in
the time and space domains, like finding activity orderings which optimize the
values of several objective functions (time scheduling) or finding optimal
locations where certain types of activities will take place (space scheduling).
We present novel, efficient algorithmic solutions for all the considered
problems, based on the dynamic programming and greedy techniques. In each case
we compute exact, optimal solutions.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 09:35:01 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Andreica",
"Madalina Ecaterina",
""
],
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Andreica",
"Angela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.1343 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Madalina Ecaterina Andreica, Daniel Ardelean | Efficient Algorithms for Several Constrained Resource Allocation,
Management and Discovery Problems | null | Proceedings of the 33rd American Romanian Academy of Arts and
Sciences' International Congress, vol. 1, pp. 64-68, Sibiu, Romania, 2-5
June, 2009. (ISBN: 978-2-553-01433-8) | null | null | cs.DS cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present efficient algorithmic solutions for several
constrained resource allocation, management and discovery problems. We consider
new types of resource allocation models and constraints, and we present new
geometric techniques which are useful when the resources are mapped to points
into a multidimensional feature space. We also consider a resource discovery
problem for which we present a guessing game theoretical model.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 09:48:40 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Andreica",
"Madalina Ecaterina",
""
],
[
"Ardelean",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.1346 | Jianfeng Zhan | Jianfeng Zhan, Lei Wang, Bibo Tu, Yong Li, Peng Wang, Wei Zhou, Dan
Meng | Phoenix Cloud: Consolidating Different Computing Loads on Shared Cluster
System for Large Organization | 5 page, 8 figures, The First Workshop of Cloud Computing and its
Application, The modified version. The original version is on the web site of
http://www.cca08.org/, which is dated from August 13, 2008 | The first workshop of cloud computing and its application (CCA
08), Chicago, 2008 | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Different departments of a large organization often run dedicated cluster
systems for different computing loads, like HPC (high performance computing)
jobs or Web service applications. In this paper, we have designed and
implemented a cloud management system software Phoenix Cloud to consolidate
heterogeneous workloads from different departments affiliated to the same
organization on the shared cluster system. We have also proposed cooperative
resource provisioning and management policies for a large organization and its
affiliated departments, running HPC jobs and Web service applications, to share
the consolidated cluster system. The experiments show that in comparison with
the case that each department operates its dedicated cluster system, Phoenix
Cloud significantly decreases the scale of the required cluster system for a
large organization, improves the benefit of the scientific computing
department, and at the same time provisions enough resources to the other
department running Web services with varying loads.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 10:15:28 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Feb 2010 07:59:05 GMT"
},
{
"version": "v3",
"created": "Wed, 24 Mar 2010 06:01:45 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Apr 2010 23:03:03 GMT"
},
{
"version": "v5",
"created": "Thu, 15 Jul 2010 00:13:39 GMT"
},
{
"version": "v6",
"created": "Sat, 17 Jul 2010 00:03:21 GMT"
}
]
| 2010-07-20T00:00:00 | [
[
"Zhan",
"Jianfeng",
""
],
[
"Wang",
"Lei",
""
],
[
"Tu",
"Bibo",
""
],
[
"Li",
"Yong",
""
],
[
"Wang",
"Peng",
""
],
[
"Zhou",
"Wei",
""
],
[
"Meng",
"Dan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.1350 | Jan Schwinghammer | Catalin Hritcu and Jan Schwinghammer | A Step-indexed Semantics of Imperative Objects | null | Logical Methods in Computer Science, Volume 5, Issue 4 (December
18, 2009) lmcs:744 | 10.2168/LMCS-5(4:2)2009 | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Step-indexed semantic interpretations of types were proposed as an
alternative to purely syntactic proofs of type safety using subject reduction.
The types are interpreted as sets of values indexed by the number of
computation steps for which these values are guaranteed to behave like proper
elements of the type. Building on work by Ahmed, Appel and others, we introduce
a step-indexed semantics for the imperative object calculus of Abadi and
Cardelli. Providing a semantic account of this calculus using more
`traditional', domain-theoretic approaches has proved challenging due to the
combination of dynamically allocated objects, higher-order store, and an
expressive type system. Here we show that, using step-indexing, one can
interpret a rich type discipline with object types, subtyping, recursive and
bounded quantified types in the presence of state.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 11:42:45 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Dec 2009 14:58:00 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Hritcu",
"Catalin",
""
],
[
"Schwinghammer",
"Jan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.1356 | Gregory Gutin | G. Gutin, E.J. Kim, S. Szeider, A. Yeo | A Probabilistic Approach to Problems Parameterized Above or Below Tight
Bounds | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a new approach for establishing fixed-parameter tractability of
problems parameterized above tight lower bounds. To illustrate the approach we
consider three problems of this type of unknown complexity that were introduced
by Mahajan, Raman and Sikdar (J. Comput. Syst. Sci. 75, 2009). We show that a
generalization of one of the problems and non-trivial special cases of the
other two are fixed-parameter tractable.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 13:17:51 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2009 18:46:03 GMT"
},
{
"version": "v3",
"created": "Tue, 18 Aug 2009 14:05:19 GMT"
}
]
| 2009-08-18T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Kim",
"E. J.",
""
],
[
"Szeider",
"S.",
""
],
[
"Yeo",
"A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.1359 | Gregory Gutin | G. Gutin, D. Karapetyan, and I. Razgon | Fixed-Parameter Algorithms in Analysis of Heuristics for Extracting
Networks in Linear Programs | null | Lecture Notes in Computer Science 5917 (2009) 222-233 | 10.1007/978-3-642-11269-0 | null | cs.DS cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of extracting a maximum-size reflected network in a
linear program. This problem has been studied before and a state-of-the-art SGA
heuristic with two variations have been proposed.
In this paper we apply a new approach to evaluate the quality of SGA\@. In
particular, we solve majority of the instances in the testbed to optimality
using a new fixed-parameter algorithm, i.e., an algorithm whose runtime is
polynomial in the input size but exponential in terms of an additional
parameter associated with the given problem.
This analysis allows us to conclude that the the existing SGA heuristic, in
fact, produces solutions of a very high quality and often reaches the optimal
objective values. However, SGA contain two components which leave some space
for improvement: building of a spanning tree and searching for an independent
set in a graph. In the hope of obtaining even better heuristic, we tried to
replace both of these components with some equivalent algorithms.
We tried to use a fixed-parameter algorithm instead of a greedy one for
searching of an independent set. But even the exact solution of this subproblem
improved the whole heuristic insignificantly. Hence, the crucial part of SGA is
building of a spanning tree. We tried three different algorithms, and it
appears that the Depth-First search is clearly superior to the other ones in
building of the spanning tree for SGA.
Thereby, by application of fixed-parameter algorithms, we managed to check
that the existing SGA heuristic is of a high quality and selected the component
which required an improvement. This allowed us to intensify the research in a
proper direction which yielded a superior variation of SGA.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 13:59:43 GMT"
},
{
"version": "v2",
"created": "Sat, 31 Oct 2009 15:28:15 GMT"
}
]
| 2010-03-30T00:00:00 | [
[
"Gutin",
"G.",
""
],
[
"Karapetyan",
"D.",
""
],
[
"Razgon",
"I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.1360 | S\'ilvio Duarte Queir\'os M. | Silvio M. Duarte Queiros | On the effectiveness of a binless entropy estimator for generalised
entropic forms | 10 pages. 5 Figures. 2 Appendices with 2 figures | Phys. Rev. E 80, 062101 (2009) | 10.1103/PhysRevE.80.062101 | null | cs.IT cs.DS math.IT math.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this manuscript we discuss the effectiveness of the Kozachenko-Leonenko
entropy estimator when generalised to cope with entropic forms customarily
applied to study systems evincing asymptotic scale invariance and dependence
(either linear or non-linear type). We show that when the variables are
independently and identically distributed the estimator is only valuable along
the whole domain if the data follow the uniform distribution, whereas for other
distributions the estimator is only effectual in the limit of the
Boltzmann-Gibbs-Shanon entropic form. We also analyse the influence of the
dependence (linear and non-linear) between variables on the accuracy of the
estimator between variables. As expected in the last case the estimator looses
efficiency for the Boltzmann-Gibbs-Shanon entropic form as well.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 14:37:40 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Sep 2009 12:29:12 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Jan 2010 00:01:19 GMT"
}
]
| 2010-01-04T00:00:00 | [
[
"Queiros",
"Silvio M. Duarte",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
]
|
0906.1370 | Emanuele Viola | Emanuele Viola | Cell-Probe Lower Bounds for Prefix Sums | null | null | null | null | cs.CC cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that to store n bits x so that each prefix-sum query Sum(i) :=
sum_{k < i} x_k can be answered by non-adaptively probing q cells of log n
bits, one needs memory > n + n/log^{O(q)} n. Our bound matches a recent upper
bound of n + n/log^{Omega(q)} n by Patrascu (FOCS 2008), also non-adaptive. We
also obtain a n + n/log^{2^{O(q)}} n lower bound for storing a string of
balanced brackets so that each Match(i) query can be answered by non-adaptively
probing q cells. To obtain these bounds we show that a too efficient data
structure allows us to break the correlations between query answers.
| [
{
"version": "v1",
"created": "Sun, 7 Jun 2009 17:25:27 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Viola",
"Emanuele",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.1399 | Alexander A. Sherstov | Alexander A. Sherstov | On Quantum-Classical Equivalence for Composed Communication Problems | Journal version | Quantum Information & Computation, 10(5-6):435-455, 2010 | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An open problem in communication complexity proposed by several authors is to
prove that for every Boolean function f, the task of computing f(x AND y) has
polynomially related classical and quantum bounded-error complexities. We solve
a variant of this question. For every f, we prove that the task of computing,
on input x and y, both of the quantities f(x AND y) and f(x OR y) has
polynomially related classical and quantum bounded-error complexities. We
further show that the quantum bounded-error complexity is polynomially related
to the classical deterministic complexity and the block sensitivity of f. This
result holds regardless of prior entanglement.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 01:00:23 GMT"
},
{
"version": "v2",
"created": "Sat, 22 Aug 2009 01:58:29 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Feb 2010 14:15:33 GMT"
}
]
| 2010-02-03T00:00:00 | [
[
"Sherstov",
"Alexander A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0906.1429 | Benjamin Chevallereau | Benjamin Chevallereau (IRCCyN), Alain Bernard (IRCCyN), Pierre
M\'evellec (LEMNA) | Am\'eliorer les performances de l'industrie logicielle par une meilleure
compr\'ehension des besoins | null | Conf\'erence Internationale de G\'enie Industriel, Bagn\`eres de
Bigorre : France (2009) | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Actual organization are structured and act with the help of their information
systems. In spite of considerable progresses made by computer technology, we
note that actors are very often critical on their information systems.
Difficulties to product specifications enough detailed for functional profile
and interpretable by information system expert is one of reason of this gap
between hopes and reality. Our proposition wants to get over this obstacle by
organizing user requirements in a common language of operational profile and
technical expert.-- Les organisations actuelles se structurent et agissent en
s'appuyant sur leurs syst\`emes d'information. Malgr\'e les progr\`es
consid\'erables r\'ealis\'es par la technologie informatique, on constate que
les acteurs restent tr\`es souvent critiques par rapport \`a leur syst\`emes
d'information. Une des causes de cet \'ecart entre les espoirs et la
r\'ealit\'e trouve sa source dans la difficult\'e \`a produire un cahier des
charges suffisamment d\'etaill\'e pour les op\'erationnels et interpr\'etable
par les sp\'ecialistes des syst\`emes d'information. Notre proposition vise \`a
surmonter cet obstacle en organisant l'expression des besoins dans un langage
commun aux op\'erationnels et aux experts techniques. Pour cela, le langage
propos\'e pour exprimer les besoins est bas\'e sur la notion de but.
L'ing\'enierie dirig\'ee par les mod\`eles est pr\'esente \`a toute les
\'etapes, c'est-\`a-dire au moment de la capture et de l'interpr\'etation.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 08:03:23 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Chevallereau",
"Benjamin",
"",
"IRCCyN"
],
[
"Bernard",
"Alain",
"",
"IRCCyN"
],
[
"Mévellec",
"Pierre",
"",
"LEMNA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.1437 | Antonios Varvitsiotis | Ioannis Z. Emiris, Elias P. Tsigaridas, Antonios Varvitsiotis | Algebraic methods for counting Euclidean embeddings of rigid graphs | 8 pages, 7 figures, 2 tables. To appear in Graph Drawing 2009 | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The study of (minimally) rigid graphs is motivated by numerous applications,
mostly in robotics and bioinformatics. A major open problem concerns the number
of embeddings of such graphs, up to rigid motions, in Euclidean space. We
capture embeddability by polynomial systems with suitable structure, so that
their mixed volume, which bounds the number of common roots, to yield
interesting upper bounds on the number of embeddings. We focus on $\RR^2$ and
$\RR^3$, where Laman graphs and 1-skeleta of convex simplicial polyhedra,
respectively, admit inductive Henneberg constructions. We establish the first
lower bound in $\RR^3$ of about $2.52^n$, where $n$ denotes the number of
vertices. Moreover, our implementation yields upper bounds for $n \le 10$ in
$\RR^2$ and $\RR^3$, which reduce the existing gaps, and tight bounds up to
$n=7$ in $\RR^3$.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 08:39:14 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Aug 2009 10:55:53 GMT"
}
]
| 2009-08-27T00:00:00 | [
[
"Emiris",
"Ioannis Z.",
""
],
[
"Tsigaridas",
"Elias P.",
""
],
[
"Varvitsiotis",
"Antonios",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.1467 | Animesh Mukherjee | Chris Biemann, Monojit Choudhury and Animesh Mukherjee | Syntax is from Mars while Semantics from Venus! Insights from Spectral
Analysis of Distributional Similarity Networks | In the proceedings of ACL 2009 (short paper) | null | null | null | physics.data-an cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the global topology of the syntactic and semantic distributional
similarity networks for English through the technique of spectral analysis. We
observe that while the syntactic network has a hierarchical structure with
strong communities and their mixtures, the semantic network has several tightly
knit communities along with a large core without any such well-defined
community structure.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 11:20:30 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Biemann",
"Chris",
""
],
[
"Choudhury",
"Monojit",
""
],
[
"Mukherjee",
"Animesh",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0906.1487 | Wei Sha | Qi Dai and Wei Sha | The Physics of Compressive Sensing and the Gradient-Based Recovery
Algorithms | 7 pages, 11 Figures. It is a research report which has not been
published in any Journal or Conference | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The physics of compressive sensing (CS) and the gradient-based recovery
algorithms are presented. First, the different forms for CS are summarized.
Second, the physical meanings of coherence and measurement are given. Third,
the gradient-based recovery algorithms and their geometry explanations are
provided. Finally, we conclude the report and give some suggestion for future
work.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 13:10:34 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Dai",
"Qi",
""
],
[
"Sha",
"Wei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1489 | Martin Mundhenk | Arne Meier, Martin Mundhenk, Thomas Schneider, Michael Thomas, Volker
Weber, Felix Weiss | The Complexity of Satisfiability for Fragments of Hybrid Logic -- Part I | null | null | 10.1016/j.jal.2010.08.001 | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The satisfiability problem of hybrid logics with the downarrow binder is
known to be undecidable. This initiated a research program on decidable and
tractable fragments. In this paper, we investigate the effect of restricting
the propositional part of the language on decidability and on the complexity of
the satisfiability problem over arbitrary, transitive, total frames, and frames
based on equivalence relations. We also consider different sets of modal and
hybrid operators. We trace the border of decidability and give the precise
complexity of most fragments, in particular for all fragments including
negation. For the monotone fragments, we are able to distinguish the easy from
the hard cases, depending on the allowed set of operators.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 13:17:35 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Meier",
"Arne",
""
],
[
"Mundhenk",
"Martin",
""
],
[
"Schneider",
"Thomas",
""
],
[
"Thomas",
"Michael",
""
],
[
"Weber",
"Volker",
""
],
[
"Weiss",
"Felix",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.1538 | Ender Ayanoglu | Ender Ayanoglu | On "A Novel Maximum Likelihood Decoding Algorithm for Orthogonal
Space-Time Block Codes" | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The computational complexity of the Maximum Likelihood decoding algorithm in
[1], [2] for orthogonal space-time block codes is smaller than specified.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 16:55:22 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2009 17:42:23 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Jul 2009 01:48:50 GMT"
},
{
"version": "v4",
"created": "Sat, 8 Aug 2009 00:55:45 GMT"
}
]
| 2009-08-08T00:00:00 | [
[
"Ayanoglu",
"Ender",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1557 | Uri Yovel | Asaf Levin, Uri Yovel | Uniform unweighted set cover: The power of non-oblivious local search | 31 pages, includes figures | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We are given n base elements and a finite collection of subsets of them. The
size of any subset varies between p to k (p < k). In addition, we assume that
the input contains all possible subsets of size p. Our objective is to find a
subcollection of minimum-cardinality which covers all the elements. This
problem is known to be NP-hard. We provide two approximation algorithms for it,
one for the generic case, and an improved one for the special case of (p,k) =
(2,4). The algorithm for the generic case is a greedy one, based on packing
phases: at each phase we pick a collection of disjoint subsets covering i new
elements, starting from i = k down to i = p+1. At a final step we cover the
remaining base elements by the subsets of size p. We derive the exact
performance guarantee of this algorithm for all values of k and p, which is
less than Hk, where Hk is the k'th harmonic number. However, the algorithm
exhibits the known improvement methods over the greedy one for the unweighted
k-set cover problem (in which subset sizes are only restricted not to exceed
k), and hence it serves as a benchmark for our improved algorithm. The improved
algorithm for the special case of (p,k) = (2,4) is based on non-oblivious local
search: it starts with a feasible cover, and then repeatedly tries to replace
sets of size 3 and 4 so as to maximize an objective function which prefers big
sets over small ones. For this case, our generic algorithm achieves an
asymptotic approximation ratio of 1.5 + epsilon, and the local search algorithm
achieves a better ratio, which is bounded by 1.458333... + epsilon.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 18:26:42 GMT"
}
]
| 2009-06-09T00:00:00 | [
[
"Levin",
"Asaf",
""
],
[
"Yovel",
"Uri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.1565 | Vitaly Skachek | Vitaly Skachek | Correcting a Fraction of Errors in Nonbinary Expander Codes with Linear
Programming | Part of this work was presented at the IEEE International Symposium
on Information Theory 2009, Seoul, Korea | null | 10.1109/TIT.2011.2137030 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A linear-programming decoder for \emph{nonbinary} expander codes is
presented. It is shown that the proposed decoder has the maximum-likelihood
certificate properties. It is also shown that this decoder corrects any pattern
of errors of a relative weight up to approximately 1/4 \delta_A \delta_B (where
\delta_A and \delta_B are the relative minimum distances of the constituent
codes).
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 19:20:39 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Oct 2010 10:05:34 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Skachek",
"Vitaly",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1593 | Didehvar Farzaad | Farzad Didehvar | On Defining 'I' "I logy" | 7 pages | null | null | null | cs.AI cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Could we define I? Throughout this article we give a negative answer to this
question. More exactly, we show that there is no definition for I in a certain
way. But this negative answer depends on our definition of definability. Here,
we try to consider sufficient generalized definition of definability. In the
middle of paper a paradox will arise which makes us to modify the way we use
the concept of property and definability.
| [
{
"version": "v1",
"created": "Sat, 6 Jun 2009 04:34:54 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Didehvar",
"Farzad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.1599 | Tobias Lutz | Tobias Lutz, Christoph Hausl, Ralf K\"otter | Bits Through Deterministic Relay Cascades with Half-Duplex Constraint | accepted for publication in IEEE Transactions on Information Theory | null | 10.1109/TIT.2011.2169542 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a relay cascade, i.e. a network where a source node, a sink node and
a certain number of intermediate source/relay nodes are arranged on a line and
where adjacent node pairs are connected by error-free (q+1)-ary pipes. Suppose
the source and a subset of the relays wish to communicate independent
information to the sink under the condition that each relay in the cascade is
half-duplex constrained. A coding scheme is developed which transfers
information by an information-dependent allocation of the transmission and
reception slots of the relays. The coding scheme requires synchronization on
the symbol level through a shared clock. The coding strategy achieves capacity
for a single source. Numerical values for the capacity of cascades of various
lengths are provided, and the capacities are significantly higher than the
rates which are achievable with a predetermined time-sharing approach. If the
cascade includes a source and a certain number of relays with their own
information, the strategy achieves the cut-set bound when the rates of the
relay sources fall below certain thresholds. For cascades composed of an
infinite number of half-duplex constrained relays and a single source, we
derive an explicit capacity expression. Remarkably, the capacity in bits/use
for q=1 is equal to the logarithm of the golden ratio, and the capacity for q=2
is 1 bit/use.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 21:39:44 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jul 2009 13:15:18 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Aug 2011 18:39:51 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Lutz",
"Tobias",
""
],
[
"Hausl",
"Christoph",
""
],
[
"Kötter",
"Ralf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1603 | Abdellatif Zaidi | Abdellatif Zaidi, Shiva Prasad Kotagiri, J. Nicholas Laneman, Luc
Vandendorpe | Multiaccess Channels with State Known to One Encoder: Another Case of
Degraded Message Sets | 5 pages, Proc. of IEEE International Symposium on Information theory,
ISIT 2009, Seoul, Korea | null | 10.1109/ISIT.2009.5205986 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a two-user state-dependent multiaccess channel in which only one
of the encoders is informed, non-causally, of the channel states. Two
independent messages are transmitted: a common message transmitted by both the
informed and uninformed encoders, and an individual message transmitted by only
the uninformed encoder. We derive inner and outer bounds on the capacity region
of this model in the discrete memoryless case as well as the Gaussian case.
Further, we show that the bounds for the Gaussian case are tight in some
special cases.
| [
{
"version": "v1",
"created": "Mon, 8 Jun 2009 21:42:08 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Zaidi",
"Abdellatif",
""
],
[
"Kotagiri",
"Shiva Prasad",
""
],
[
"Laneman",
"J. Nicholas",
""
],
[
"Vandendorpe",
"Luc",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1618 | Fainan Hanif | Muhammad Fainan Hanif and Peter J. Smith | On the Statistics of Cognitive Radio Capacity in Shadowing and Fast
Fading Environments (Journal Version) | Submitted to the IEEE Transactions on Wireless Commun. The conference
version of this paper appears in Proc. IEEE CrownCom, 2009 | IEEE Transactions on Wireless Communications, vol.9, no.2,
pp.844-852, 2010 | 10.1109/TWC.2010.02.090864 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the capacity of the cognitive radio channel in
different fading environments under a low interference regime. First we derive
the probability that the low interference regime holds under shadow fading as
well as Rayleigh and Rician fast fading conditions. We demonstrate that this is
the dominant case, especially in practical cognitive radio deployment
scenarios. The capacity of the cognitive radio channel depends critically on a
power loss parameter, $\alpha$, which governs how much transmit power the
cognitive radio dedicates to relaying the primary message. We derive a simple,
accurate approximation to $\alpha$ in Rayleigh and Rician fading environments
which gives considerable insight into system capacity. We also investigate the
effects of system parameters and propagation environment on $\alpha$ and the
cognitive radio capacity. In all cases, the use of the approximation is shown
to be extremely accurate.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 00:25:38 GMT"
}
]
| 2013-01-03T00:00:00 | [
[
"Hanif",
"Muhammad Fainan",
""
],
[
"Smith",
"Peter J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1644 | Florentina Pintea | Dorel Micle, Marcel Torok-Oance, Liviu Maruia | The morpho-topographic and cartographic analysis of the archaeological
site Cornesti "Iarcuri", Timis County, Romania, using computer sciences
methods (GIS and Remote Sensing techniques) | 14 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),249-262 | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The archaeological site Cornesti "Iarcuri" is the largest earth fortification
in Romania, made out of four concentric compounds, spreading over 1780
hectares. It is known since 1700, but it had only a few small attempts of
systematic research, the fortress gained interest only after the publishing of
some satellite images by Google Earth. It is located in an area of high fields
and it occupies three interfluves and contains two streams. Our paper contains
a geomorphologic, topographic and cartographic analysis of the site in order to
determine the limits, the structure, the morphology, the construction technique
and the functionality of such a fortification.Our research is based on
satellite image analysis, on archaeological topography, on soil, climate and
vegetation analysis as a way to offer a complex image, through this
interdisciplinary study of landscape archaeology. Through our work we try not
to date the site as this objective will be achieved only after completing the
systematic excavations which started in 2007, but only to analyze the
co-relationship with the environment.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 07:02:11 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Micle",
"Dorel",
""
],
[
"Torok-Oance",
"Marcel",
""
],
[
"Maruia",
"Liviu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.1667 | Florentina Pintea | Rolf Andreas Rasenack | Analyser Framework to verify Software Component | 20 pages, exposed on 5th International Conference "Actualities and
Perspectives on Hardware and Software" - APHS2009, Timisoara, Romania | Ann. Univ. Tibiscus Comp. Sci. Series VII(2009),285-304 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Today, it is important for software companies to build software systems in a
short time-interval, to reduce costs and to have a good market position.
Therefore well organized and systematic development approaches are required.
Reusing software components, which are well tested, can be a good solution to
develop software applications in effective manner. The reuse of software
components is less expensive and less time consuming than a development from
scratch. But it is dangerous to think that software components can be match
together without any problems. Software components itself are well tested, of
course, but even if they composed together problems occur. Most problems are
based on interaction respectively communication. Avoiding such errors a
framework has to be developed for analysing software components. That framework
determines the compatibility of corresponding software components.The promising
approach discussed here, presents a novel technique for analysing software
components by applying an Abstract Syntax Language Tree (ASLT). A supportive
environment will be designed that checks the compatibility of black-box
software components. This article is concerned to the question how can be
coupled software components verified by using an analyzer framework and
determines the usage of the ASLT. Black-box Software Components and Abstract
Syntax Language Tree are the basis for developing the proposed framework and
are discussed here to provide the background knowledge. The practical
implementation of this framework is discussed and shows the result by using a
test environment.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 09:14:25 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Rasenack",
"Rolf Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.1673 | Victor Odumuyiwa | Bolanle Oladejo (LORIA), Adenike Osofisan (LORIA), Victor Odumuyiwa
(LORIA) | Knowledge Management in Economic Intelligence with Reasoning on Temporal
Attributes | null | VSST 2009, S\'eminaire on Veille Strat\'egique Scientifique et
Technologique (2009) | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | People have to make important decisions within a time frame. Hence, it is
imperative to employ means or strategy to aid effective decision making.
Consequently, Economic Intelligence (EI) has emerged as a field to aid
strategic and timely decision making in an organization. In the course of
attaining this goal: it is indispensable to be more optimistic towards
provision for conservation of intellectual resource invested into the process
of decision making. This intellectual resource is nothing else but the
knowledge of the actors as well as that of the various processes for effecting
decision making. Knowledge has been recognized as a strategic economic resource
for enhancing productivity and a key for innovation in any organization or
community. Thus, its adequate management with cognizance of its temporal
properties is highly indispensable. Temporal properties of knowledge refer to
the date and time (known as timestamp) such knowledge is created as well as the
duration or interval between related knowledge. This paper focuses on the needs
for a user-centered knowledge management approach as well as exploitation of
associated temporal properties. Our perspective of knowledge is with respect to
decision-problems projects in EI. Our hypothesis is that the possibility of
reasoning about temporal properties in exploitation of knowledge in EI projects
should foster timely decision making through generation of useful inferences
from available and reusable knowledge for a new project.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 09:33:16 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Oladejo",
"Bolanle",
"",
"LORIA"
],
[
"Osofisan",
"Adenike",
"",
"LORIA"
],
[
"Odumuyiwa",
"Victor",
"",
"LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.1677 | Pablo Piantanida | Pablo Piantanida, Gerald Matz and Pierre Duhamel | Outage Behavior of Discrete Memoryless Channels (DMCs) Under Channel
Estimation Errors | To appear in IEEE Transactions on Information Theory, Sep. 2009 | null | null | null | cs.IT cs.DM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Communication systems are usually designed by assuming perfect channel state
information (CSI). However, in many practical scenarios, only a noisy estimate
of the channel is available, which may strongly differ from the true channel.
This imperfect CSI scenario is addressed by introducing the notion of
estimation-induced outage (EIO) capacity. We derive a single-letter
characterization of the maximal EIO rate and prove an associated coding theorem
and its strong converse for discrete memoryless channels (DMCs). The
transmitter and the receiver rely on the channel estimate and the statistics of
the estimate to construct codes that guarantee reliable communication with a
certain outage probability. This ensures that in the non-outage case the
transmission meets the target rate with small error probability, irrespective
of the quality of the channel estimate. Applications of the EIO capacity to a
single-antenna (non-ergodic) Ricean fading channel are considered. The EIO
capacity for this case is compared to the EIO rates of a communication system
in which the receiver decodes by using a mismatched ML decoder. The effects of
rate-limited feedback to provide the transmitter with quantized CSI are also
investigated.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 09:51:55 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Piantanida",
"Pablo",
""
],
[
"Matz",
"Gerald",
""
],
[
"Duhamel",
"Pierre",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1680 | Pierre Cocheteux | Pierre Cocheteux (CRAN), Alexandre Voisin (CRAN), Eric Levrat (CRAN),
Beno\^it Iung (CRAN) | Methodology for assessing system performance loss within a proactive
maintenance framework | null | 13th IFAC Symposium on Information Control Problems in
Manufacturing, INCOM'09, Moscow : Russie (2009) | null | null | cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Maintenance plays now a critical role in manufacturing for achieving
important cost savings and competitive advantage while preserving product
conditions. It suggests moving from conventional maintenance practices to
predictive strategy. Indeed the maintenance action has to be done at the right
time based on the system performance and component Remaining Useful Life (RUL)
assessed by a prognostic process. In that way, this paper proposes a
methodology in order to evaluate the performance loss of the system according
to the degradation of component and the deviations of system input flows. This
methodology is supported by the neuro-fuzzy tool ANFIS (Adaptive Neuro-Fuzzy
Inference Systems) that allows to integrate knowledge from two different
sources: expertise and real data. The feasibility and added value of such
methodology is then highlighted through an application case extracted from the
TELMA platform used for education and research.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 09:54:49 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Cocheteux",
"Pierre",
"",
"CRAN"
],
[
"Voisin",
"Alexandre",
"",
"CRAN"
],
[
"Levrat",
"Eric",
"",
"CRAN"
],
[
"Iung",
"Benoît",
"",
"CRAN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.1694 | Nikolaj Glazunov | Nikolaj Glazunov | Toward a Category Theory Design of Ontological Knowledge Bases | 10 pages, Preliminary results to International Joint Conference on
Knowledge Discovery, Knowledge Engineering and Knowledge Management (IC3K
2009) | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I discuss (ontologies_and_ontological_knowledge_bases /
formal_methods_and_theories) duality and its category theory extensions as a
step toward a solution to Knowledge-Based Systems Theory. In particular I focus
on the example of the design of elements of ontologies and ontological
knowledge bases of next three electronic courses: Foundations of Research
Activities, Virtual Modeling of Complex Systems and Introduction to String
Theory.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 11:03:41 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Glazunov",
"Nikolaj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.1702 | Alexander Russell | Cristopher Moore and Alexander Russell | Approximating the Permanent via Nonabelian Determinants | null | null | null | null | cs.CC cs.DM math.CO quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Celebrated work of Jerrum, Sinclair, and Vigoda has established that the
permanent of a {0,1} matrix can be approximated in randomized polynomial time
by using a rapidly mixing Markov chain. A separate strand of the literature has
pursued the possibility of an alternate, purely algebraic, polynomial-time
approximation scheme. These schemes work by replacing each 1 with a random
element of an algebra A, and considering the determinant of the resulting
matrix. When A is noncommutative, this determinant can be defined in several
ways. We show that for estimators based on the conventional determinant, the
critical ratio of the second moment to the square of the first--and therefore
the number of trials we need to obtain a good estimate of the permanent--is (1
+ O(1/d))^n when A is the algebra of d by d matrices. These results can be
extended to group algebras, and semi-simple algebras in general. We also study
the symmetrized determinant of Barvinok, showing that the resulting estimator
has small variance when d is large enough. However, for constant d--the only
case in which an efficient algorithm is known--we show that the critical ratio
exceeds 2^{n} / n^{O(d)}. Thus our results do not provide a new polynomial-time
approximation scheme for the permanent. Indeed, they suggest that the algebraic
approach to approximating the permanent faces significant obstacles.
We obtain these results using diagrammatic techniques in which we express
matrix products as contractions of tensor products. When these matrices are
random, in either the Haar measure or the Gaussian measure, we can evaluate the
trace of these products in terms of the cycle structure of a suitably random
permutation. In the symmetrized case, our estimates are then derived by a
connection with the character theory of the symmetric group.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 11:55:41 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Moore",
"Cristopher",
""
],
[
"Russell",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0906.1713 | Marcus Hutter | Marcus Hutter | Feature Reinforcement Learning: Part I: Unstructured MDPs | 24 LaTeX pages, 5 diagrams | Journal of Artificial General Intelligence, 1 (2009) pages 3-24 | null | null | cs.LG cs.AI cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | General-purpose, intelligent, learning agents cycle through sequences of
observations, actions, and rewards that are complex, uncertain, unknown, and
non-Markovian. On the other hand, reinforcement learning is well-developed for
small finite state Markov decision processes (MDPs). Up to now, extracting the
right state representations out of bare observations, that is, reducing the
general agent setup to the MDP framework, is an art that involves significant
effort by designers. The primary goal of this work is to automate the reduction
process and thereby significantly expand the scope of many existing
reinforcement learning algorithms and the agents that employ them. Before we
can think of mechanizing this search for suitable MDPs, we need a formal
objective criterion. The main contribution of this article is to develop such a
criterion. I also integrate the various parts into one learning algorithm.
Extensions to more realistic dynamic Bayesian networks are developed in Part
II. The role of POMDPs is also considered there.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 12:50:29 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1726 | Robin Adams | Robin Adams, Zhaohui Luo | Classical Predicative Logic-Enriched Type Theories | 49 pages. Accepted for publication in special edition of Annals of
Pure and Applied Logic on Computation in Classical Logic. v2: Minor mistakes
corrected | null | 10.1016/j.apal.2010.04.005 | null | cs.LO math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A logic-enriched type theory (LTT) is a type theory extended with a primitive
mechanism for forming and proving propositions. We construct two LTTs, named
LTTO and LTTO*, which we claim correspond closely to the classical predicative
systems of second order arithmetic ACAO and ACA. We justify this claim by
translating each second-order system into the corresponding LTT, and proving
that these translations are conservative. This is part of an ongoing research
project to investigate how LTTs may be used to formalise different approaches
to the foundations of mathematics.
The two LTTs we construct are subsystems of the logic-enriched type theory
LTTW, which is intended to formalise the classical predicative foundation
presented by Herman Weyl in his monograph Das Kontinuum. The system ACAO has
also been claimed to correspond to Weyl's foundation. By casting ACAO and ACA
as LTTs, we are able to compare them with LTTW. It is a consequence of the work
in this paper that LTTW is strictly stronger than ACAO.
The conservativity proof makes use of a novel technique for proving one LTT
conservative over another, involving defining an interpretation of the stronger
system out of the expressions of the weaker. This technique should be
applicable in a wide variety of different cases outside the present work.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 13:44:28 GMT"
},
{
"version": "v2",
"created": "Wed, 18 Aug 2010 10:23:52 GMT"
}
]
| 2010-08-19T00:00:00 | [
[
"Adams",
"Robin",
""
],
[
"Luo",
"Zhaohui",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0906.1763 | Behnood Gholami | Behnood Gholami (1), Allen R. Tannenbaum (2 and 3) and Wassim M.
Haddad (1) ((1) School of Aerospace Engineering, Georgia Institute of
Technology (2) School of Electrical & Computer Engineering, Georgia Institute
of Technology, (3) Department of Biomedical Engineering, Georgia Institute of
Technology) | Segmentation of Facial Expressions Using Semi-Definite Programming and
Generalized Principal Component Analysis | Corrected for typos and spacing errors | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we use semi-definite programming and generalized principal
component analysis (GPCA) to distinguish between two or more different facial
expressions. In the first step, semi-definite programming is used to reduce the
dimension of the image data and "unfold" the manifold which the data points
(corresponding to facial expressions) reside on. Next, GPCA is used to fit a
series of subspaces to the data points and associate each data point with a
subspace. Data points that belong to the same subspace are claimed to belong to
the same facial expression category. An example is provided.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 19:50:10 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jun 2009 20:53:21 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Gholami",
"Behnood",
"",
"2 and 3"
],
[
"Tannenbaum",
"Allen R.",
"",
"2 and 3"
],
[
"Haddad",
"Wassim M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.1777 | Andrey Breslav | Andrey Breslav | Creating Textual Language Dialects Using Aspect-like Techniques | extended abstract for GTTSE'09 | null | null | null | cs.PL cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Here we present a work aimed on efficiently creating textual language
dialects and supporting tools for them (e.g. compiler front-ends, IDE support,
pretty-printers, etc.). A dialect is a language which may be described with a
(relatively small) set of changes to some other language (a parent language).
For example we can consider SQL dialects used in DB-management systems.
We propose to use aspects for grammars to define different features of the
anguage and to transform grammars. A dialect is created by defining a
syntactical spect which modifies the parent language. This technique is not
dependent on any particular language design, AST structure or parsing
technology and provides a uniform way for creating dialects, which extend or
restrict languages.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 16:30:01 GMT"
}
]
| 2009-06-10T00:00:00 | [
[
"Breslav",
"Andrey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.1814 | Renqiang Min | Martin Renqiang Min, David A. Stanley, Zineng Yuan, Anthony Bonner,
and Zhaolei Zhang | Large-Margin kNN Classification Using a Deep Encoder Network | 13 pages (preliminary version) | null | null | null | cs.LG cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | KNN is one of the most popular classification methods, but it often fails to
work well with inappropriate choice of distance metric or due to the presence
of numerous class-irrelevant features. Linear feature transformation methods
have been widely applied to extract class-relevant information to improve kNN
classification, which is very limited in many applications. Kernels have been
used to learn powerful non-linear feature transformations, but these methods
fail to scale to large datasets. In this paper, we present a scalable
non-linear feature mapping method based on a deep neural network pretrained
with restricted boltzmann machines for improving kNN classification in a
large-margin framework, which we call DNet-kNN. DNet-kNN can be used for both
classification and for supervised dimensionality reduction. The experimental
results on two benchmark handwritten digit datasets show that DNet-kNN has much
better performance than large-margin kNN using a linear mapping and kNN based
on a deep autoencoder pretrained with retricted boltzmann machines.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 20:06:45 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Min",
"Martin Renqiang",
""
],
[
"Stanley",
"David A.",
""
],
[
"Yuan",
"Zineng",
""
],
[
"Bonner",
"Anthony",
""
],
[
"Zhang",
"Zhaolei",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.1835 | Ashish Khisti | Ashish Khisti, Suhas Diggavi, Gregory Wornell | Secret-Key Generation using Correlated Sources and Channels | 29 Pages, Submitted IEEE Trans. Information Theory | null | 10.1109/TIT.2011.2173629 | null | cs.IT cs.CR math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of generating a shared secret key between two terminals
in a joint source-channel setup -- the sender communicates to the receiver over
a discrete memoryless wiretap channel and additionally the terminals have
access to correlated discrete memoryless source sequences. We establish lower
and upper bounds on the secret-key capacity. These bounds coincide,
establishing the capacity, when the underlying channel consists of independent,
parallel and reversely degraded wiretap channels. In the lower bound, the
equivocation terms of the source and channel components are functionally
additive. The secret-key rate is maximized by optimally balancing the the
source and channel contributions. This tradeoff is illustrated in detail for
the Gaussian case where it is also shown that Gaussian codebooks achieve the
capacity. When the eavesdropper also observes a source sequence, the secret-key
capacity is established when the sources and channels of the eavesdropper are a
degraded version of the legitimate receiver. Finally the case when the
terminals also have access to a public discussion channel is studied. We
propose generating separate keys from the source and channel components and
establish the optimality of this approach when the when the channel outputs of
the receiver and the eavesdropper are conditionally independent given the
input.
| [
{
"version": "v1",
"created": "Tue, 9 Jun 2009 22:36:33 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Khisti",
"Ashish",
""
],
[
"Diggavi",
"Suhas",
""
],
[
"Wornell",
"Gregory",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.1842 | Arash Shaban-Nejad | Arash Shaban-Nejad, Olga Ormandjieva, Mohamad Kassab, Volker Haarslev | Managing Requirement Volatility in an Ontology-Driven Clinical LIMS
Using Category Theory. International Journal of Telemedicine and Applications | 36 Pages, 16 Figures | International Journal of Telemedicine and Applications, Volume
2009, Article ID 917826, 14 pages, PubMed ID: 19343191 | 10.1155/2009/917826 | null | cs.AI cs.MA | http://creativecommons.org/licenses/by/3.0/ | Requirement volatility is an issue in software engineering in general, and in
Web-based clinical applications in particular, which often originates from an
incomplete knowledge of the domain of interest. With advances in the health
science, many features and functionalities need to be added to, or removed
from, existing software applications in the biomedical domain. At the same
time, the increasing complexity of biomedical systems makes them more difficult
to understand, and consequently it is more difficult to define their
requirements, which contributes considerably to their volatility. In this
paper, we present a novel agent-based approach for analyzing and managing
volatile and dynamic requirements in an ontology-driven laboratory information
management system (LIMS) designed for Web-based case reporting in medical
mycology. The proposed framework is empowered with ontologies and formalized
using category theory to provide a deep and common understanding of the
functional and nonfunctional requirement hierarchies and their interrelations,
and to trace the effects of a change on the conceptual framework.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 00:44:20 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Shaban-Nejad",
"Arash",
""
],
[
"Ormandjieva",
"Olga",
""
],
[
"Kassab",
"Mohamad",
""
],
[
"Haarslev",
"Volker",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0906.1845 | Serguei Mokhov | Serguei A. Mokhov | Towards Improving Validation, Verification, Crash Investigations, and
Event Reconstruction of Flight-Critical Systems with Self-Forensics | 10 pages; a white discussion paper submitted in response to NASA's
RFI NNH09ZEA001L at
http://prod.nais.nasa.gov/cgi-bin/eps/synopsis.cgi?acqid=134490 | null | null | null | cs.SE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper introduces a novel concept of self-forensics to complement the
standard autonomic self-CHOP properties of the self-managed systems, to be
specified in the Forensic Lucid language. We argue that self-forensics, with
the forensics taken out of the cybercrime domain, is applicable to
"self-dissection" for the purpose of verification of autonomous software and
hardware systems of flight-critical systems for automated incident and anomaly
analysis and event reconstruction by the engineering teams in a variety of
incident scenarios during design and testing as well as actual flight data.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 06:30:48 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.1849 | Subhas Ghosh | Subhas Kumar Ghosh (Honeywell Technology Solutions) and Janardan Misra
(Honeywell Technology Solutions) | A Randomized Algorithm for 3-SAT | null | null | 10.1007/s11786-010-0036-3 | null | cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we propose and analyze a simple randomized algorithm to find a
satisfiable assignment for a Boolean formula in conjunctive normal form (CNF)
having at most 3 literals in every clause. Given a k-CNF formula phi on n
variables, and alpha in{0,1}^n that satisfies phi, a clause of phi is critical
if exactly one literal of that clause is satisfied under assignment alpha.
Paturi et. al. (Chicago Journal of Theoretical Computer Science 1999) proposed
a simple randomized algorithm (PPZ) for k-SAT for which success probability
increases with the number of critical clauses (with respect to a fixed
satisfiable solution of the input formula). Here, we first describe another
simple randomized algorithm DEL which performs better if the number of critical
clauses are less (with respect to a fixed satisfiable solution of the input
formula). Subsequently, we combine these two simple algorithms such that the
success probability of the combined algorithm is maximum of the success
probabilities of PPZ and DEL on every input instance. We show that when the
average number of clauses per variable that appear as unique true literal in
one or more critical clauses in phi is between 1 and 1.9317, combined algorithm
performs better than the PPZ algorithm.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 04:41:52 GMT"
}
]
| 2020-08-11T00:00:00 | [
[
"Ghosh",
"Subhas Kumar",
"",
"Honeywell Technology Solutions"
],
[
"Misra",
"Janardan",
"",
"Honeywell Technology Solutions"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0906.1900 | Philippe Thomas | Philippe Thomas (CRAN), Andr\'e Thomas (CRAN) | How deals with discrete data for the reduction of simulation models
using neural network | null | 13th IFAC Symp. On Information Control Problems in Manufacturing
INCOM'09, Moscou : Russie (2009) | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Simulation is useful for the evaluation of a Master Production/distribution
Schedule (MPS). Also, the goal of this paper is the study of the design of a
simulation model by reducing its complexity. According to theory of
constraints, we want to build reduced models composed exclusively by
bottlenecks and a neural network. Particularly a multilayer perceptron, is
used. The structure of the network is determined by using a pruning procedure.
This work focuses on the impact of discrete data on the results and compares
different approaches to deal with these data. This approach is applied to
sawmill internal supply chain
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 09:56:29 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Thomas",
"Philippe",
"",
"CRAN"
],
[
"Thomas",
"André",
"",
"CRAN"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0906.1905 | Patrick Guio | P. Guio and N. Achilleos | The VOISE Algorithm: a Versatile Tool for Automatic Segmentation of
Astronomical Images | 9 pages, 7 figures; accepted for publication in MNRAS | Mon. Not. R. Astron. Soc. 398 (2009) 1254-1262 | 10.1111/j.1365-2966.2009.15218.x | null | astro-ph.IM astro-ph.EP cs.CV physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The auroras on Jupiter and Saturn can be studied with a high sensitivity and
resolution by the Hubble Space Telescope (HST) ultraviolet (UV) and
far-ultraviolet (FUV) Space Telescope spectrograph (STIS) and Advanced Camera
for Surveys (ACS) instruments. We present results of automatic detection and
segmentation of Jupiter's auroral emissions as observed by HST ACS instrument
with VOronoi Image SEgmentation (VOISE). VOISE is a dynamic algorithm for
partitioning the underlying pixel grid of an image into regions according to a
prescribed homogeneity criterion. The algorithm consists of an iterative
procedure that dynamically constructs a tessellation of the image plane based
on a Voronoi Diagram, until the intensity of the underlying image within each
region is classified as homogeneous. The computed tessellations allow the
extraction of quantitative information about the auroral features such as mean
intensity, latitudinal and longitudinal extents and length scales. These
outputs thus represent a more automated and objective method of characterising
auroral emissions than manual inspection.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 10:48:33 GMT"
}
]
| 2009-09-11T00:00:00 | [
[
"Guio",
"P.",
""
],
[
"Achilleos",
"N.",
""
]
]
| [
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.EP",
"description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system",
"span": "(Earth and Planetary Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0906.1947 | Sebastien Tixeuil | Mikhail Nesterenko, S\'ebastien Tixeuil (LIP6) | Ideal Stabilization | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define and explore the concept of ideal stabilization. The program is
ideally stabilizing if its every state is legitimate. Ideal stabilization
allows the specification designer to prescribe with arbitrary degree of
precision not only the fault-free program behavior but also its recovery
operation. Specifications may or may not mention all possible states. We
identify approaches to designing ideal stabilization to both kinds of
specifications. For the first kind, we state the necessary condition for an
ideally stabilizing solution. On the basis of this condition we prove that
there is no ideally stabilizing solution to the leader election problem. We
illustrate the utility of the concept by providing examples of well-known
programs and proving them ideally stabilizing. Specifically, we prove ideal
stabilization of the conflict manager, the alternator, the propagation of
information with feedback and the alternating bit protocol.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 14:31:18 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Nesterenko",
"Mikhail",
"",
"LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.1953 | Serge Gaspers | Martin F\"urer, Serge Gaspers, Shiva Prasad Kasiviswanathan | An Exponential Time 2-Approximation Algorithm for Bandwidth | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The bandwidth of a graph G on n vertices is the minimum b such that the
vertices of G can be labeled from 1 to n such that the labels of every pair of
adjacent vertices differ by at most b.
In this paper, we present a 2-approximation algorithm for the bandwidth
problem that takes worst-case O(1.9797^n) time and uses polynomial space. This
improves both the previous best 2- and 3-approximation algorithms of Cygan et
al. which have an O(3^n) and O(2^n) worst-case time bounds, respectively. Our
algorithm is based on constructing bucket decompositions of the input graph. A
bucket decomposition partitions the vertex set of a graph into ordered sets
(called buckets) of (almost) equal sizes such that all edges are either
incident to vertices in the same bucket or to vertices in two consecutive
buckets. The idea is to find the smallest bucket size for which there exists a
bucket decomposition. The algorithm uses a simple divide-and-conquer strategy
along with dynamic programming to achieve this improved time bound.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 15:22:57 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Nov 2011 20:52:28 GMT"
},
{
"version": "v3",
"created": "Sun, 29 Apr 2012 21:13:34 GMT"
}
]
| 2012-05-01T00:00:00 | [
[
"Fürer",
"Martin",
""
],
[
"Gaspers",
"Serge",
""
],
[
"Kasiviswanathan",
"Shiva Prasad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.1963 | Piotr Bania | Piotr Bania | Evading network-level emulation | 7 pages | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently more and more attention has been paid to the intrusion detection
systems (IDS) which don't rely on signature based detection approach. Such
solutions try to increase their defense level by using heuristics detection
methods like network-level emulation. This technique allows the intrusion
detection systems to stop unknown threats, which normally couldn't be stopped
by standard signature detection techniques.
In this article author will describe general concepts of network-level
emulation technique including its advantages and disadvantages (weak sides)
together with providing potential countermeasures against this type of
detection method.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 16:02:28 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Bania",
"Piotr",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.1980 | Aram Galstyan | Armen Allahverdyan, Aram Galstyan | On Maximum a Posteriori Estimation of Hidden Markov Processes | 9 pages, to appear in the Proceedings of the 25th Conference on
Uncertainty in Artificial Intelligence (UAI-2009) | null | null | null | cs.AI cond-mat.stat-mech cs.IT math.IT physics.data-an stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a theoretical analysis of Maximum a Posteriori (MAP) sequence
estimation for binary symmetric hidden Markov processes. We reduce the MAP
estimation to the energy minimization of an appropriately defined Ising spin
model, and focus on the performance of MAP as characterized by its accuracy and
the number of solutions corresponding to a typical observed sequence. It is
shown that for a finite range of sufficiently low noise levels, the solution is
uniquely related to the observed sequence, while the accuracy degrades linearly
with increasing the noise strength. For intermediate noise values, the accuracy
is nearly noise-independent, but now there are exponentially many solutions to
the estimation problem, which is reflected in non-zero ground-state entropy for
the Ising model. Finally, for even larger noise intensities, the number of
solutions reduces again, but the accuracy is poor. It is shown that these
regimes are different thermodynamic phases of the Ising model that are related
to each other via first-order phase transitions.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 17:23:12 GMT"
}
]
| 2009-06-11T00:00:00 | [
[
"Allahverdyan",
"Armen",
""
],
[
"Galstyan",
"Aram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0906.2020 | Ravishankar Krishnaswamy | Anupam Gupta, Ravishankar Krishnaswamy, Amit Kumar, Danny Segev | Scheduling with Outliers | 23 pages, 3 figures | null | 10.1007/978-3-642-03685-9_12 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In classical scheduling problems, we are given jobs and machines, and have to
schedule all the jobs to minimize some objective function. What if each job has
a specified profit, and we are no longer required to process all jobs -- we can
schedule any subset of jobs whose total profit is at least a (hard) target
profit requirement, while still approximately minimizing the objective
function?
We refer to this class of problems as scheduling with outliers. This model
was initiated by Charikar and Khuller (SODA'06) on the minimum max-response
time in broadcast scheduling. We consider three other well-studied scheduling
objectives: the generalized assignment problem, average weighted completion
time, and average flow time, and provide LP-based approximation algorithms for
them. For the minimum average flow time problem on identical machines, we give
a logarithmic approximation algorithm for the case of unit profits based on
rounding an LP relaxation; we also show a matching integrality gap. For the
average weighted completion time problem on unrelated machines, we give a
constant factor approximation. The algorithm is based on randomized rounding of
the time-indexed LP relaxation strengthened by the knapsack-cover inequalities.
For the generalized assignment problem with outliers, we give a simple
reduction to GAP without outliers to obtain an algorithm whose makespan is
within 3 times the optimum makespan, and whose cost is at most (1 + \epsilon)
times the optimal cost.
| [
{
"version": "v1",
"created": "Wed, 10 Jun 2009 21:22:22 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Gupta",
"Anupam",
""
],
[
"Krishnaswamy",
"Ravishankar",
""
],
[
"Kumar",
"Amit",
""
],
[
"Segev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2027 | Sewoong Oh | Raghunandan H. Keshavan, Andrea Montanari and Sewoong Oh | Matrix Completion from Noisy Entries | 22 pages, 3 figures | null | null | null | cs.LG stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a matrix M of low-rank, we consider the problem of reconstructing it
from noisy observations of a small, random subset of its entries. The problem
arises in a variety of applications, from collaborative filtering (the `Netflix
problem') to structure-from-motion and positioning. We study a low complexity
algorithm introduced by Keshavan et al.(2009), based on a combination of
spectral techniques and manifold optimization, that we call here OptSpace. We
prove performance guarantees that are order-optimal in a number of
circumstances.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 00:22:58 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Apr 2012 17:37:45 GMT"
}
]
| 2012-04-10T00:00:00 | [
[
"Keshavan",
"Raghunandan H.",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Oh",
"Sewoong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0906.2032 | Liming Wang | Liming Wang, Dan Schonfeld | Mapping Equivalence for Symbolic Sequences: Theory and Applications | null | null | 10.1109/TSP.2009.2026544 | null | cs.IT cs.NA math.FA math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Processing of symbolic sequences represented by mapping of symbolic data into
numerical signals is commonly used in various applications. It is a
particularly popular approach in genomic and proteomic sequence analysis.
Numerous mappings of symbolic sequences have been proposed for various
applications. It is unclear however whether the processing of symbolic data
provides an artifact of the numerical mapping or is an inherent property of the
symbolic data. This issue has been long ignored in the engineering and
scientific literature. It is possible that many of the results obtained in
symbolic signal processing could be a byproduct of the mapping and might not
shed any light on the underlying properties embedded in the data. Moreover, in
many applications, conflicting conclusions may arise due to the choice of the
mapping used for numerical representation of symbolic data. In this paper, we
present a novel framework for the analysis of the equivalence of the mappings
used for numerical representation of symbolic data. We present strong and weak
equivalence properties and rely on signal correlation to characterize
equivalent mappings. We derive theoretical results which establish conditions
for consistency among numerical mappings of symbolic data. Furthermore, we
introduce an abstract mapping model for symbolic sequences and extend the
notion of equivalence to an algebraic framework. Finally, we illustrate our
theoretical results by application to DNA sequence analysis.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 01:10:34 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Wang",
"Liming",
""
],
[
"Schonfeld",
"Dan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2048 | Sungjin Im | Chandra Chekuri, Sungjin Im and Benjamin Moseley | Minimizing Maximum Response Time and Delay Factor in Broadcast
Scheduling | 16 pages, 2 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider online algorithms for pull-based broadcast scheduling. In this
setting there are n pages of information at a server and requests for pages
arrive online. When the server serves (broadcasts) a page p, all outstanding
requests for that page are satisfied. We study two related metrics, namely
maximum response time (waiting time) and maximum delay-factor and their
weighted versions. We obtain the following results in the worst-case online
competitive model.
- We show that FIFO (first-in first-out) is 2-competitive even when the page
sizes are different. Previously this was known only for unit-sized pages [10]
via a delicate argument. Our proof differs from [10] and is perhaps more
intuitive.
- We give an online algorithm for maximum delay-factor that is
O(1/eps^2)-competitive with (1+\eps)-speed for unit-sized pages and with
(2+\eps)-speed for different sized pages. This improves on the algorithm in
[12] which required (2+\eps)-speed and (4+\eps)-speed respectively. In addition
we show that the algorithm and analysis can be extended to obtain the same
results for maximum weighted response time and delay factor.
- We show that a natural greedy algorithm modeled after LWF
(Longest-Wait-First) is not O(1)-competitive for maximum delay factor with any
constant speed even in the setting of standard scheduling with unit-sized jobs.
This complements our upper bound and demonstrates the importance of the
tradeoff made in our algorithm.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 07:24:52 GMT"
}
]
| 2009-06-12T00:00:00 | [
[
"Chekuri",
"Chandra",
""
],
[
"Im",
"Sungjin",
""
],
[
"Moseley",
"Benjamin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2061 | Rethnakaran Pulikkoonattu | Rethnakaran Pulikkoonattu | On the Minimum Distance of Non Binary LDPC Codes | Student project report LTHC, EPFL, Switzerland, Jun. 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Minimum distance is an important parameter of a linear error correcting code.
For improved performance of binary Low Density Parity Check (LDPC) codes, we
need to have the minimum distance grow fast with n, the codelength. However,
the best we can hope for is a linear growth in dmin with n. For binary LDPC
codes, the necessary and sufficient conditions on the LDPC ensemble parameters,
to ensure linear growth of minimum distance is well established. In the case of
non-binary LDPC codes, the structure of logarithmic weight codewords is
different from that of binary codes. We have carried out a preliminary study on
the logarithmic bound on the the minimum distance of non-binary LDPC code
ensembles. In particular, we have investigated certain configurations which
would lead to low weight codewords. A set of simulations are performed to
identify some of these configurations. Finally, we have provided a bound on the
logarithmic minimum distance of nonbinary codes, using a strategy similar to
the girth bound for binary codes. This bound has the same asymptotic behaviour
as that of binary codes.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 09:32:11 GMT"
}
]
| 2009-06-12T00:00:00 | [
[
"Pulikkoonattu",
"Rethnakaran",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2094 | Panayotis Mertikopoulos | Panayotis Mertikopoulos, Aris L. Moustakas | The emergence of rational behavior in the presence of stochastic
perturbations | Published in at http://dx.doi.org/10.1214/09-AAP651 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2010, Vol. 20, No. 4, 1359-1388 | 10.1214/09-AAP651 | IMS-AAP-AAP651 | math.PR cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study repeated games where players use an exponential learning scheme in
order to adapt to an ever-changing environment. If the game's payoffs are
subject to random perturbations, this scheme leads to a new stochastic version
of the replicator dynamics that is quite different from the "aggregate shocks"
approach of evolutionary game theory. Irrespective of the perturbations'
magnitude, we find that strategies which are dominated (even iteratively)
eventually become extinct and that the game's strict Nash equilibria are
stochastically asymptotically stable. We complement our analysis by
illustrating these results in the case of congestion games.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 13:04:48 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Oct 2010 11:40:15 GMT"
}
]
| 2010-10-22T00:00:00 | [
[
"Mertikopoulos",
"Panayotis",
""
],
[
"Moustakas",
"Aris L.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.2135 | Michael Nelson | Herbert Van de Sompel, Carl Lagoze, Michael L. Nelson, Simeon Warner,
Robert Sanderson, Pete Johnston | Adding eScience Assets to the Data Web | 10 pages, 7 figures. Proceedings of Linked Data on the Web (LDOW2009)
Workshop | null | null | null | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aggregations of Web resources are increasingly important in scholarship as it
adopts new methods that are data-centric, collaborative, and networked-based.
The same notion of aggregations of resources is common to the mashed-up,
socially networked information environment of Web 2.0. We present a mechanism
to identify and describe aggregations of Web resources that has resulted from
the Open Archives Initiative - Object Reuse and Exchange (OAI-ORE) project. The
OAI-ORE specifications are based on the principles of the Architecture of the
World Wide Web, the Semantic Web, and the Linked Data effort. Therefore, their
incorporation into the cyberinfrastructure that supports eScholarship will
ensure the integration of the products of scholarly research into the Data Web.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 15:33:37 GMT"
}
]
| 2009-06-12T00:00:00 | [
[
"Van de Sompel",
"Herbert",
""
],
[
"Lagoze",
"Carl",
""
],
[
"Nelson",
"Michael L.",
""
],
[
"Warner",
"Simeon",
""
],
[
"Sanderson",
"Robert",
""
],
[
"Johnston",
"Pete",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0906.2143 | Andrea Manara | J. T. Moscicki, A. Manara, M. Lamanna, P. Mendez, A. Muraru | Dependable Distributed Computing for the International Telecommunication
Union Regional Radio Conference RRC06 | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The International Telecommunication Union (ITU) Regional Radio Conference
(RRC06) established in 2006 a new frequency plan for the introduction of
digital broadcasting in European, African, Arab, CIS countries and Iran. The
preparation of the plan involved complex calculations under short deadline and
required dependable and efficient computing capability. The ITU designed and
deployed in-situ a dedicated PC farm, in parallel to the European Organization
for Nuclear Research (CERN) which provided and supported a system based on the
EGEE Grid. The planning cycle at the RRC06 required a periodic execution in the
order of 200,000 short jobs, using several hundreds of CPU hours, in a period
of less than 12 hours. The nature of the problem required dynamic
workload-balancing and low-latency access to the computing resources. We
present the strategy and key technical choices that delivered a reliable
service to the RRC06.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 16:04:12 GMT"
}
]
| 2009-06-12T00:00:00 | [
[
"Moscicki",
"J. T.",
""
],
[
"Manara",
"A.",
""
],
[
"Lamanna",
"M.",
""
],
[
"Mendez",
"P.",
""
],
[
"Muraru",
"A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.2154 | Giorgi Japaridze | Giorgi Japaridze (School of Computer Science and Technology, Shandong
University, Department of Co) | From formulas to cirquents in computability logic | LMCS 7 (2:1) 2011 | Logical Methods in Computer Science, Volume 7, Issue 2 (April 21,
2011) lmcs:1121 | 10.2168/LMCS-7(2:1)2011 | null | cs.LO cs.AI cs.CC math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computability logic (CoL) (see http://www.cis.upenn.edu/~giorgi/cl.html) is a
recently introduced semantical platform and ambitious program for redeveloping
logic as a formal theory of computability, as opposed to the formal theory of
truth that logic has more traditionally been. Its expressions represent
interactive computational tasks seen as games played by a machine against the
environment, and "truth" is understood as existence of an algorithmic winning
strategy. With logical operators standing for operations on games, the
formalism of CoL is open-ended, and has already undergone series of extensions.
This article extends the expressive power of CoL in a qualitatively new way,
generalizing formulas (to which the earlier languages of CoL were limited) to
circuit-style structures termed cirquents. The latter, unlike formulas, are
able to account for subgame/subtask sharing between different parts of the
overall game/task. Among the many advantages offered by this ability is that it
allows us to capture, refine and generalize the well known
independence-friendly logic which, after the present leap forward, naturally
becomes a conservative fragment of CoL, just as classical logic had been known
to be a conservative fragment of the formula-based version of CoL. Technically,
this paper is self-contained, and can be read without any prior familiarity
with CoL.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 16:34:51 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Aug 2010 10:16:42 GMT"
},
{
"version": "v3",
"created": "Sat, 1 Jan 2011 22:31:55 GMT"
},
{
"version": "v4",
"created": "Wed, 20 Apr 2011 16:44:25 GMT"
},
{
"version": "v5",
"created": "Fri, 22 Apr 2011 07:31:58 GMT"
},
{
"version": "v6",
"created": "Mon, 25 Apr 2011 21:46:55 GMT"
},
{
"version": "v7",
"created": "Wed, 27 Apr 2011 16:46:20 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Japaridze",
"Giorgi",
"",
"School of Computer Science and Technology, Shandong\n University, Department of Co"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0906.2212 | Rumi Ghosh | Rumi Ghosh, Kristina Lerman | Structure of Heterogeneous Networks | null | 2009 IEEE International Conference on Social Computing
(SocialCom-09) | 10.1109/CSE.2009.142 | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Heterogeneous networks play a key role in the evolution of communities and
the decisions individuals make. These networks link different types of
entities, for example, people and the events they attend. Network analysis
algorithms usually project such networks unto simple graphs composed of
entities of a single type. In the process, they conflate relations between
entities of different types and loose important structural information. We
develop a mathematical framework that can be used to compactly represent and
analyze heterogeneous networks that combine multiple entity and link types. We
generalize Bonacich centrality, which measures connectivity between nodes by
the number of paths between them, to heterogeneous networks and use this
measure to study network structure. Specifically, we extend the popular
modularity-maximization method for community detection to use this centrality
metric. We also rank nodes based on their connectivity to other nodes. One
advantage of this centrality metric is that it has a tunable parameter we can
use to set the length scale of interactions. By studying how rankings change
with this parameter allows us to identify important nodes in the network. We
apply the proposed method to analyze the structure of several heterogeneous
networks. We show that exploiting additional sources of evidence corresponding
to links between, as well as among, different entity types yields new insights
into network structure.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 22:19:13 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Ghosh",
"Rumi",
""
],
[
"Lerman",
"Kristina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0906.2228 | Hans Tompits | David Pearce, Hans Tompits, Stefan Woltran | Characterising equilibrium logic and nested logic programs: Reductions
and complexity | null | Theory and Practice of Logic Programming (2009), 9 : 565-616 | 10.1017/S147106840999010X | null | cs.LO cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Equilibrium logic is an approach to nonmonotonic reasoning that extends the
stable-model and answer-set semantics for logic programs. In particular, it
includes the general case of nested logic programs, where arbitrary Boolean
combinations are permitted in heads and bodies of rules, as special kinds of
theories. In this paper, we present polynomial reductions of the main reasoning
tasks associated with equilibrium logic and nested logic programs into
quantified propositional logic, an extension of classical propositional logic
where quantifications over atomic formulas are permitted. We provide reductions
not only for decision problems, but also for the central semantical concepts of
equilibrium logic and nested logic programs. In particular, our encodings map a
given decision problem into some formula such that the latter is valid
precisely in case the former holds. The basic tasks we deal with here are the
consistency problem, brave reasoning, and skeptical reasoning. Additionally, we
also provide encodings for testing equivalence of theories or programs under
different notions of equivalence, viz. ordinary, strong, and uniform
equivalence. For all considered reasoning tasks, we analyse their computational
complexity and give strict complexity bounds.
| [
{
"version": "v1",
"created": "Thu, 11 Jun 2009 23:24:43 GMT"
},
{
"version": "v2",
"created": "Sat, 13 Jun 2009 17:47:12 GMT"
}
]
| 2009-12-30T00:00:00 | [
[
"Pearce",
"David",
""
],
[
"Tompits",
"Hans",
""
],
[
"Woltran",
"Stefan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.2252 | Chinmay Vaze | Chinmay S. Vaze and Mahesh K. Varanasi | Dirty Paper Coding for the MIMO Cognitive Radio Channel with Imperfect
CSIT | To be presented at ISIT 2009, Seoul, S. Korea | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Dirty Paper Coding (DPC) based transmission scheme for the Gaussian
multiple-input multiple-output (MIMO) cognitive radio channel (CRC) is studied
when there is imperfect and perfect channel knowledge at the transmitters
(CSIT) and the receivers, respectively. In particular, the problem of
optimizing the sum-rate of the MIMO CRC over the transmit covariance matrices
is dealt with. Such an optimization, under the DPC-based transmission strategy,
needs to be performed jointly with an optimization over the inflation factor.
To this end, first the problem of determination of inflation factor over the
MIMO channel $Y=H_1 X + H_2 S + Z$ with imperfect CSIT is investigated. For
this problem, two iterative algorithms, which generalize the corresponding
algorithms proposed for the channel $Y=H(X+S)+Z$, are developed. Later, the
necessary conditions for maximizing the sum-rate of the MIMO CRC over the
transmit covariances for a given choice of inflation factor are derived. Using
these necessary conditions and the algorithms for the determination of the
inflation factor, an iterative, numerical algorithm for the joint optimization
is proposed. Some interesting observations are made from the numerical results
obtained from the algorithm. Furthermore, the high-SNR sum-rate scaling factor
achievable over the CRC with imperfect CSIT is obtained.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 04:05:49 GMT"
}
]
| 2009-06-15T00:00:00 | [
[
"Vaze",
"Chinmay S.",
""
],
[
"Varanasi",
"Mahesh K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2274 | D\v{z}enan Zuki\'c | D\v{z}enan Zuki\'c, Christof Rezk-Salama, Andreas Kolb | A Neural Network Classifier of Volume Datasets | 10 pages, 10 figures, 1 table, 3IA conference http://3ia.teiath.gr/ | International Conference on Computer Graphics and Artificial
Intelligence, Proceedings (2009) 53-62 | null | null | cs.GR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many state-of-the art visualization techniques must be tailored to the
specific type of dataset, its modality (CT, MRI, etc.), the recorded object or
anatomical region (head, spine, abdomen, etc.) and other parameters related to
the data acquisition process. While parts of the information (imaging modality
and acquisition sequence) may be obtained from the meta-data stored with the
volume scan, there is important information which is not stored explicitly
(anatomical region, tracing compound). Also, meta-data might be incomplete,
inappropriate or simply missing.
This paper presents a novel and simple method of determining the type of
dataset from previously defined categories. 2D histograms based on intensity
and gradient magnitude of datasets are used as input to a neural network, which
classifies it into one of several categories it was trained with. The proposed
method is an important building block for visualization systems to be used
autonomously by non-experts. The method has been tested on 80 datasets, divided
into 3 classes and a "rest" class.
A significant result is the ability of the system to classify datasets into a
specific class after being trained with only one dataset of that class. Other
advantages of the method are its easy implementation and its high computational
performance.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 11:17:05 GMT"
}
]
| 2009-06-15T00:00:00 | [
[
"Zukić",
"Dženan",
""
],
[
"Rezk-Salama",
"Christof",
""
],
[
"Kolb",
"Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.2291 | Frank Breitling | F. Breitling | A standard transformation from XML to RDF via XSLT | 4 pages, 1 figure, accepted for publication in Astronomical Notes
(AN) | null | 10.1002/asna.200811233 | null | astro-ph.IM cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A generic transformation of XML data into the Resource Description Framework
(RDF) and its implementation by XSLT transformations is presented. It was
developed by the grid integration project for robotic telescopes of AstroGrid-D
to provide network communication through the Remote Telescope Markup Language
(RTML) to its RDF based information service. The transformation's generality is
explained by this example. It automates the transformation of XML data into RDF
and thus solves this problem of semantic computing. Its design also permits the
inverse transformation but this is not yet implemented.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 14:12:34 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jun 2009 09:03:15 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Breitling",
"F.",
""
]
]
| [
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0906.2307 | Mauro Cherubini | Mauro Cherubini, Rodrigo de Oliveira, and Nuria Oliver | Shopping Uncertainties in a Mobile and Social Context | Presented in the Late Breaking Results category of Pervasive 2009.
May 11-14, Nara, Japan. http://www.pervasive2009.org/ | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We conducted a qualitative user study with 77 consumers to investigate what
social aspects are relevant when supporting customers during their shopping
activities and particularly in situations when they are undecided. Twenty-five
respondents (32%) reported seeking extra information on web pages and forums,
in addition to asking their peers for advice (related to the nature of the item
to be bought). Moreover, from the remaining 52 subjects, only 6 (8%) were
confident enough to make prompt comparisons between items and an immediate
purchasing choice, while 17 respondents (22%) expressed the need for being away
from persuasive elements. The remaining 29 respondents (38%) reported having a
suboptimal strategy for making their shopping decisions (i.e. buying all items,
not buying, or choosing randomly). Therefore, the majority of our participants
(70% = 32% + 38%) had social and information needs when making purchasing
decisions. This result motivates the development of applications that would
allow consumers to ask shopping questions to their social network while
on-the-go.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 13:47:46 GMT"
}
]
| 2009-06-15T00:00:00 | [
[
"Cherubini",
"Mauro",
""
],
[
"de Oliveira",
"Rodrigo",
""
],
[
"Oliver",
"Nuria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.