id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0906.2311
Francesco Pasquale
Chen Avin, Zvi Lotker, Francesco Pasquale, Yvonne-Anne Pignolet
A note on uniform power connectivity in the SINR model
13 pages
null
10.1007/978-3-642-05434-1_12
null
cs.DM cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the connectivity problem for wireless networks under the Signal to Interference plus Noise Ratio (SINR) model. Given a set of radio transmitters distributed in some area, we seek to build a directed strongly connected communication graph, and compute an edge coloring of this graph such that the transmitter-receiver pairs in each color class can communicate simultaneously. Depending on the interference model, more or less colors, corresponding to the number of frequencies or time slots, are necessary. We consider the SINR model that compares the received power of a signal at a receiver to the sum of the strength of other signals plus ambient noise . The strength of a signal is assumed to fade polynomially with the distance from the sender, depending on the so-called path-loss exponent $\alpha$. We show that, when all transmitters use the same power, the number of colors needed is constant in one-dimensional grids if $\alpha>1$ as well as in two-dimensional grids if $\alpha>2$. For smaller path-loss exponents and two-dimensional grids we prove upper and lower bounds in the order of $\mathcal{O}(\log n)$ and $\Omega(\log n/\log\log n)$ for $\alpha=2$ and $\Theta(n^{2/\alpha-1})$ for $\alpha<2$ respectively. If nodes are distributed uniformly at random on the interval $[0,1]$, a \emph{regular} coloring of $\mathcal{O}(\log n)$ colors guarantees connectivity, while $\Omega(\log \log n)$ colors are required for any coloring.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 12:20:37 GMT" }, { "version": "v2", "created": "Sun, 31 Jan 2010 11:57:41 GMT" } ]
2015-05-13T00:00:00
[ [ "Avin", "Chen", "" ], [ "Lotker", "Zvi", "" ], [ "Pasquale", "Francesco", "" ], [ "Pignolet", "Yvonne-Anne", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.2315
Raphael Jolly
Raphael Jolly, Heinz Kredel
Symbolic Script Programming for Java
null
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computer algebra in Java is a promising field of development. It has not yet reached an industrial strength, in part because of a lack of good user interfaces. Using a general purpose scripting language can bring a natural mathematical notation, akin to the one of specialized interfaces included in most computer algebra systems. We present such an interface for Java computer algebra libraries, using scripts available in the JSR 223 framework. We introduce the concept of `symbolic programming' and show its usefulness by prototypes of symbolic polynomials and polynomial rings.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 12:38:22 GMT" }, { "version": "v2", "created": "Sun, 14 Jun 2009 10:39:44 GMT" } ]
2009-06-15T00:00:00
[ [ "Jolly", "Raphael", "" ], [ "Kredel", "Heinz", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0906.2351
Jacques-Olivier Lachaud
F. De Vieilleville (LaBRI), Jacques-Olivier Lachaud (LaBRI)
Revisiting Digital Straight Segment Recognition
null
Proc. Int. Conf. Discrete Geometry for Computer Imagery (DGCI2006), Szeged : Hongrie (2006)
10.1007/11907350_30
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents new results about digital straight segments, their recognition and related properties. They come from the study of the arithmetically based recognition algorithm proposed by I. Debled-Rennesson and J.-P. Reveill\`es in 1995 [Debled95]. We indeed exhibit the relations describing the possible changes in the parameters of the digital straight segment under investigation. This description is achieved by considering new parameters on digital segments: instead of their arithmetic description, we examine the parameters related to their combinatoric description. As a result we have a better understanding of their evolution during recognition and analytical formulas to compute them. We also show how this evolution can be projected onto the Stern-Brocot tree. These new relations have interesting consequences on the geometry of digital curves. We show how they can for instance be used to bound the slope difference between consecutive maximal segments.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 14:46:02 GMT" } ]
2009-06-16T00:00:00
[ [ "De Vieilleville", "F.", "", "LaBRI" ], [ "Lachaud", "Jacques-Olivier", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.2369
C{\ba}t{\ba}lin Ionu\c{t} T\^irn{\ba}uc{\ba}
Andreas Maletti and Catalin Ionut Tirnauca
Properties of quasi-alphabetic tree bimorphisms
15 pages, 1 figure
null
null
null
cs.CL cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the class of quasi-alphabetic relations, i.e., tree transformations defined by tree bimorphisms with two quasi-alphabetic tree homomorphisms and a regular tree language. We present a canonical representation of these relations; as an immediate consequence, we get the closure under union. Also, we show that they are not closed under intersection and complement, and do not preserve most common operations on trees (branches, subtrees, v-product, v-quotient, f-top-catenation). Moreover, we prove that the translations defined by quasi-alphabetic tree bimorphism are exactly products of context-free string languages. We conclude by presenting the connections between quasi-alphabetic relations, alphabetic relations and classes of tree transformations defined by several types of top-down tree transducers. Furthermore, we get that quasi-alphabetic relations preserve the recognizable and algebraic tree languages.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 16:34:56 GMT" } ]
2010-05-13T00:00:00
[ [ "Maletti", "Andreas", "" ], [ "Tirnauca", "Catalin Ionut", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.2372
Ido Tal
Ido Tal, Ron M. Roth
Bounds on the Rate of 2-D Bit-Stuffing Encoders
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method for bounding the rate of bit-stuffing encoders for 2-D constraints is presented. Instead of considering the original encoder, we consider a related one which is quasi-stationary. We use the quasi-stationary property in order to formulate linear requirements that must hold on the probabilities of the constrained arrays that are generated by the encoder. These requirements are used as part of a linear program. The minimum and maximum of the linear program bound the rate of the encoder from below and from above, respectively. A lower bound on the rate of an encoder is also a lower bound on the capacity of the corresponding constraint. For some constraints, our results lead to tighter lower bounds than what was previously known.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 16:47:37 GMT" } ]
2009-06-15T00:00:00
[ [ "Tal", "Ido", "" ], [ "Roth", "Ron M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2395
Benjmain Moseley
Chandra Chekuri, Sungjin Im, Benjamin Moseley
Longest Wait First for Broadcast Scheduling
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider online algorithms for broadcast scheduling. In the pull-based broadcast model there are $n$ unit-sized pages of information at a server and requests arrive online for pages. When the server transmits a page $p$, all outstanding requests for that page are satisfied. The longest-wait-first} (LWF) algorithm is a natural algorithm that has been shown to have good empirical performance. In this paper we make two main contributions to the analysis of LWF and broadcast scheduling. \begin{itemize} \item We give an intuitive and easy to understand analysis of LWF which shows that it is $O(1/\eps^2)$-competitive for average flow-time with $(4+\eps)$ speed. Using a more involved analysis, we show that LWF is $O(1/\eps^3)$-competitive for average flow-time with $(3.4+\epsilon)$ speed. \item We show that a natural extension of LWF is O(1)-speed O(1)-competitive for more general objective functions such as average delay-factor and $L_k$ norms of delay-factor (for fixed $k$). \end{itemize}
[ { "version": "v1", "created": "Fri, 12 Jun 2009 18:27:07 GMT" } ]
2009-06-15T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Im", "Sungjin", "" ], [ "Moseley", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2415
Lillian Lee
Cristian Danescu-Niculescu-Mizil, Lillian Lee and Richard Ducott
Without a 'doubt'? Unsupervised discovery of downward-entailing operators
System output available at http://www.cs.cornell.edu/~cristian/Without_a_doubt_-_Data.html
Proceedings of NAACL HLT, pp. 137--145, 2009
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important part of textual inference is making deductions involving monotonicity, that is, determining whether a given assertion entails restrictions or relaxations of that assertion. For instance, the statement 'We know the epidemic spread quickly' does not entail 'We know the epidemic spread quickly via fleas', but 'We doubt the epidemic spread quickly' entails 'We doubt the epidemic spread quickly via fleas'. Here, we present the first algorithm for the challenging lexical-semantics problem of learning linguistic constructions that, like 'doubt', are downward entailing (DE). Our algorithm is unsupervised, resource-lean, and effective, accurately recovering many DE operators that are missing from the hand-constructed lists that textual-inference systems currently use.
[ { "version": "v1", "created": "Fri, 12 Jun 2009 23:50:06 GMT" } ]
2009-06-16T00:00:00
[ [ "Danescu-Niculescu-Mizil", "Cristian", "" ], [ "Lee", "Lillian", "" ], [ "Ducott", "Richard", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0906.2446
Serguei Mokhov
Marc-Andr\'e Laverdi\`ere, Serguei A. Mokhov, Suhasini Tsapa, and Djamel Benredjem
Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Software Requirements Specification Document
SRS project document of an open-source project; 25 pages; 4 figures; from April 2006; v2 adds missing .ind file for the index
null
null
null
cs.CR cs.SE
http://creativecommons.org/licenses/by/3.0/
The purpose behind this article is to describe the features of Ftklipse, an extendable platform for computer forensics. This document designed to provide a detailed specification for the developers of Ftklipse. Ftklipse is a thick-client solution for forensics investigation. It is designed to collect and preserve evidence, to analyze it and to report on it. It supports chain of custody management, access control policies, and batch operation of its included tools in order to facilitate and accelerate the investigation. The environment itself and its tools are configurable as well and is based on Eclipse.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 04:46:52 GMT" }, { "version": "v2", "created": "Mon, 27 Jul 2009 04:34:51 GMT" } ]
2009-07-27T00:00:00
[ [ "Laverdière", "Marc-André", "" ], [ "Mokhov", "Serguei A.", "" ], [ "Tsapa", "Suhasini", "" ], [ "Benredjem", "Djamel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.2447
Serguei Mokhov
Marc-Andr\'e Laverdi\`ere, Serguei A. Mokhov, Suhasini Tsapa, and Djamel Benredjem
Ftklipse - Design and Implementation of an Extendable Computer Forensics Environment: Specification Design Document
37 pages, 11 figures, 3 tables, index; April 24, 2006 project. This SDD document follows the SRS specification of the same project found at arXiv:0906.2446 ; v2 adds the missing .ind file for the index
null
null
null
cs.CR cs.SE
http://creativecommons.org/licenses/by/3.0/
The purpose of this work is to design and implement a plugin-based environment that allows to integrate forensic tools working together to support programming tasks and addition of new tools. Integration is done through GUI components. The end-system environment must have user friendly GUI, configuration capabilities, plug-in capabilities to insert/inject new tools, case management, and chain of custody capabilities, along with evidence gathering capabilities, evidence preservation capabilities, and, finally report generation capabilities. A subset of these requirements has been implemented in Ftklipse, an open-source project, which is detailed throughout the rest of this document.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 05:06:22 GMT" }, { "version": "v2", "created": "Mon, 27 Jul 2009 04:39:22 GMT" } ]
2009-07-27T00:00:00
[ [ "Laverdière", "Marc-André", "" ], [ "Mokhov", "Serguei A.", "" ], [ "Tsapa", "Suhasini", "" ], [ "Benredjem", "Djamel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.2448
Karthekeyan Chandrasekaran
Karthekeyan Chandrasekaran, Amit Deshpande, Santosh Vempala
The Limit of Convexity Based Isoperimetry: Sampling Harmonic-Concave Functions
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Logconcave functions represent the current frontier of efficient algorithms for sampling, optimization and integration in R^n. Efficient sampling algorithms to sample according to a probability density (to which the other two problems can be reduced) relies on good isoperimetry which is known to hold for arbitrary logconcave densities. In this paper, we extend this frontier in two ways: first, we characterize convexity-like conditions that imply good isoperimetry, i.e., what condition on function values along every line guarantees good isoperimetry? The answer turns out to be the set of (1/(n-1))-harmonic concave functions in R^n; we also prove that this is the best possible characterization along every line, of functions having good isoperimetry. Next, we give the first efficient algorithm for sampling according to such functions with complexity depending on a smoothness parameter. Further, noting that the multivariate Cauchy density is an important distribution in this class, we exploit certain properties of the Cauchy density to give an efficient sampling algorithm based on random walks with a mixing time that matches the current best bounds known for sampling logconcave functions.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 05:15:53 GMT" } ]
2009-06-16T00:00:00
[ [ "Chandrasekaran", "Karthekeyan", "" ], [ "Deshpande", "Amit", "" ], [ "Vempala", "Santosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2459
Vit Niennattrakul
Vit Niennattrakul, Pongsakorn Ruengronghirunya, Chotirat Ann Ratanamahatana
Exact Indexing for Massive Time Series Databases under Time Warping Distance
Submitted to Data Mining and Knowledge Discovery (DMKD). 33 pages, 19 figures, and 8 tables
null
null
null
cs.DB cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Among many existing distance measures for time series data, Dynamic Time Warping (DTW) distance has been recognized as one of the most accurate and suitable distance measures due to its flexibility in sequence alignment. However, DTW distance calculation is computationally intensive. Especially in very large time series databases, sequential scan through the entire database is definitely impractical, even with random access that exploits some index structures since high dimensionality of time series data incurs extremely high I/O cost. More specifically, a sequential structure consumes high CPU but low I/O costs, while an index structure requires low CPU but high I/O costs. In this work, we therefore propose a novel indexed sequential structure called TWIST (Time Warping in Indexed Sequential sTructure) which benefits from both sequential access and index structure. When a query sequence is issued, TWIST calculates lower bounding distances between a group of candidate sequences and the query sequence, and then identifies the data access order in advance, hence reducing a great number of both sequential and random accesses. Impressively, our indexed sequential structure achieves significant speedup in a querying process by a few orders of magnitude. In addition, our method shows superiority over existing rival methods in terms of query processing time, number of page accesses, and storage requirement with no false dismissal guaranteed.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 09:07:05 GMT" } ]
2009-06-16T00:00:00
[ [ "Niennattrakul", "Vit", "" ], [ "Ruengronghirunya", "Pongsakorn", "" ], [ "Ratanamahatana", "Chotirat Ann", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.2461
Erik Demaine
Erik D. Demaine, Martin L. Demaine, Vi Hart, John Iacono, Stefan Langerman, Joseph O'Rourke
Continuous Blooming of Convex Polyhedra
13 pages, 6 figures
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct the first two continuous bloomings of all convex polyhedra. First, the source unfolding can be continuously bloomed. Second, any unfolding of a convex polyhedron can be refined (further cut, by a linear number of cuts) to have a continuous blooming.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 09:27:18 GMT" } ]
2009-06-16T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Hart", "Vi", "" ], [ "Iacono", "John", "" ], [ "Langerman", "Stefan", "" ], [ "O'Rourke", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2466
Iftah Gamzu
Chandra Chekuri, Iftah Gamzu
Truthful Mechanisms via Greedy Iterative Packing
20 pages, 1 figure
null
10.1007/978-3-642-03685-9_5
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important research thread in algorithmic game theory studies the design of efficient truthful mechanisms that approximate the optimal social welfare. A fundamental question is whether an \alpha-approximation algorithm translates into an \alpha-approximate truthful mechanism. It is well-known that plugging an \alpha-approximation algorithm into the VCG technique may not yield a truthful mechanism. Thus, it is natural to investigate properties of approximation algorithms that enable their use in truthful mechanisms. The main contribution of this paper is to identify a useful and natural property of approximation algorithms, which we call loser-independence; this property is applicable in the single-minded and single-parameter settings. Intuitively, a loser-independent algorithm does not change its outcome when the bid of a losing agent increases, unless that agent becomes a winner. We demonstrate that loser-independent algorithms can be employed as sub-procedures in a greedy iterative packing approach while preserving monotonicity. A greedy iterative approach provides a good approximation in the context of maximizing a non-decreasing submodular function subject to independence constraints. Our framework gives rise to truthful approximation mechanisms for various problems. Notably, some problems arise in online mechanism design.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 10:39:42 GMT" } ]
2015-05-13T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Gamzu", "Iftah", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2470
Francesc Rossell\'o
Arnau Mir, Francesc Rossello
The mean value of the squared path-difference distance for rooted phylogenetic trees
16 pages
null
null
null
q-bio.PE cs.DM math.CA q-bio.QM
http://creativecommons.org/licenses/by-nc-sa/3.0/
The path-difference metric is one of the oldest distances for the comparison of fully resolved phylogenetic trees, but its statistical properties are still quite unknown. In this paper we compute the mean value of the square of the path-difference metric between two fully resolved rooted phylogenetic trees with $n$ leaves, under the uniform distribution. This complements previous work by Steel and Penny, who computed this mean value for fully resolved unrooted phylogenetic trees.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 11:33:28 GMT" } ]
2009-06-16T00:00:00
[ [ "Mir", "Arnau", "" ], [ "Rossello", "Francesc", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CA", "description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics", "span": "(Classical Analysis and ODEs)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0906.2477
Nelma Moreira
Rog\'erio Reis, Nelma Moreira and Marco Almeida
On the Representation of Finite Automata
DCFS 2005
null
null
DCC-2005-04
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give an unique string representation, up to isomorphism, for initially connected deterministic finite automata (ICDFAs) with n states over an alphabet of k symbols. We show how to generate all these strings for each n and k, and how its enumeration provides an alternative way to obtain the exact number of ICDFAs.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 14:31:00 GMT" } ]
2009-06-16T00:00:00
[ [ "Reis", "Rogério", "" ], [ "Moreira", "Nelma", "" ], [ "Almeida", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.2509
Ruihu Li
Ruihu Li, Zongben Xu
On $[[n,n-4,3]]_{q}$ Quantum MDS Codes for odd prime power $q$
7 pages, submitted to IEEE Trans. Inf. Theory
null
10.1103/PhysRevA.82.052316
CLN: 9-456
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
For each odd prime power $q$, let $4 \leq n\leq q^{2}+1$. Hermitian self-orthogonal $[n,2,n-1]$ codes over $GF(q^{2})$ with dual distance three are constructed by using finite field theory. Hence, $[[n,n-4,3]]_{q}$ quantum MDS codes for $4 \leq n\leq q^{2}+1$ are obtained.
[ { "version": "v1", "created": "Sun, 14 Jun 2009 04:11:25 GMT" } ]
2015-05-13T00:00:00
[ [ "Li", "Ruihu", "" ], [ "Xu", "Zongben", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2511
Philip Schniter
C. Emre Koksal and Philip Schniter
Robust Rate-Adaptive Wireless Communication Using ACK/NAK-Feedback
Relative to the original version, this version includes a revised introduction and a few minor technical changes
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To combat the detrimental effects of the variability in wireless channels, we consider cross-layer rate adaptation based on limited feedback. In particular, based on limited feedback in the form of link-layer acknowledgements (ACK) and negative acknowledgements (NAK), we maximize the physical-layer transmission rate subject to an upper bound on the expected packet error rate. \textr{We take a robust approach in that we do not assume} any particular prior distribution on the channel state. We first analyze the fundamental limitations of such systems and derive an upper bound on the achievable rate for signaling schemes based on uncoded QAM and random Gaussian ensembles. We show that, for channel estimation based on binary ACK/NAK feedback, it may be preferable to use a separate training sequence at high error rates, rather than to exploit low-error-rate data packets themselves. We also develop an adaptive recursive estimator, which is provably asymptotically optimal and asymptotically efficient.
[ { "version": "v1", "created": "Sun, 14 Jun 2009 04:52:03 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2009 17:03:07 GMT" }, { "version": "v3", "created": "Wed, 13 Apr 2011 00:25:32 GMT" }, { "version": "v4", "created": "Thu, 17 Nov 2011 21:02:28 GMT" } ]
2011-11-21T00:00:00
[ [ "Koksal", "C. Emre", "" ], [ "Schniter", "Philip", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2512
Serguei Mokhov
Marc-Andr\'e Laverdi\`ere, Serguei A. Mokhov, and Djamel Benredjem
On Implementation of a Safer C Library, ISO/IEC TR 24731
33 pages, 6 figures, 16 listings, index; a report document on the open source project. April 2006. v2 adds missing .ind file for the index
null
null
null
cs.SE cs.CR
http://creativecommons.org/licenses/by/3.0/
The functions standardized as part of ISO C 1999 and their addendums improved very little the security options from the previously available library. The largest flaw remained that no function asked for the buffer size of destination buffers for any function copying data into a user-supplied buffer. According to earlier research we performed, we know that error condition handling was the first solution to security vulnerabilities, followed by precondition validation. The standard C functions typically perform little precondition validation and error handling, allowing for a wide range of security issues to be introduced in their use. ISO/IEC TR 24731, titled as "TR 24731: Safer C library functions", defines 41 new library functions for memory copying, string handling (both for normal and wide character strings), time printing, sorting, searching etc. Another innovation it brings is a constraint handling architecture, forcing error handling when certain security-related preconditions are violated when the functions are called. It also specifies the null-termination of all strings manipulated through its function and introduces a new unsigned integer type that helps preventing integer overflows and underflows. It is currently implemented by Microsoft as part of their Visual Studio 2005 and above. We examine the architecture of our implementation of ISO/IEC TR 24731. We first introduce our architectural philosophy before informing the reader about the Siemens Four View Model, an architectural methodology for the conception of large-scale software systems. Afterwards, we examine each of the view, as architected for our library. Finally, we conclude with other software engineering matters that were of high importance in the development of our implementation.
[ { "version": "v1", "created": "Sun, 14 Jun 2009 17:00:24 GMT" }, { "version": "v2", "created": "Mon, 27 Jul 2009 04:44:56 GMT" } ]
2009-07-27T00:00:00
[ [ "Laverdière", "Marc-André", "" ], [ "Mokhov", "Serguei A.", "" ], [ "Benredjem", "Djamel", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.2521
Thomas Schwentick
Volker Weber
On the Complexity of Branching-Time Logics
The author of this paper, Volker Weber, died after submitting it to CSL 2009. The version published here incorporates a few small changes as suggested by reviewers of CSL. It was prepared by his Ph.D. advisor, Thomas Schwentick
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We classify the complexity of the satisfiability problem for extensions of CTL and UB. The extensions we consider are Boolean combinations of path formulas, fairness properties, past modalities, and forgettable past. Our main result shows that satisfiability for CTL with all these extensions is still in 2-EXPTIME, which strongly contrasts with the nonelementary complexity of CTL* with forgettable past. We give a complete classification of combinations of these extensions, yielding a dichotomy between extensions with 2-EXPTIME-complete and those with EXPTIME-complete complexity. In particular, we show that satisfiability for the extension of UB with forgettable past is complete for 2-EXPTIME, contradicting a claim for a stronger logic in the literature. The upper bounds are established with the help of a new kind of pebble automata.
[ { "version": "v1", "created": "Sun, 14 Jun 2009 09:20:10 GMT" } ]
2009-06-16T00:00:00
[ [ "Weber", "Volker", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.2530
Jared Tanner
David L. Donoho and Jared Tanner
Observed Universality of Phase Transitions in High-Dimensional Geometry, with Implications for Modern Data Analysis and Signal Processing
47 pages, 24 figures, 10 tables
null
10.1098/rsta.2009.0152
null
math.ST cs.IT math.IT physics.data-an stat.CO stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We review connections between phase transitions in high-dimensional combinatorial geometry and phase transitions occurring in modern high-dimensional data analysis and signal processing. In data analysis, such transitions arise as abrupt breakdown of linear model selection, robust data fitting or compressed sensing reconstructions, when the complexity of the model or the number of outliers increases beyond a threshold. In combinatorial geometry these transitions appear as abrupt changes in the properties of face counts of convex polytopes when the dimensions are varied. The thresholds in these very different problems appear in the same critical locations after appropriate calibration of variables. These thresholds are important in each subject area: for linear modelling, they place hard limits on the degree to which the now-ubiquitous high-throughput data analysis can be successful; for robustness, they place hard limits on the degree to which standard robust fitting methods can tolerate outliers before breaking down; for compressed sensing, they define the sharp boundary of the undersampling/sparsity tradeoff in undersampling theorems. Existing derivations of phase transitions in combinatorial geometry assume the underlying matrices have independent and identically distributed (iid) Gaussian elements. In applications, however, it often seems that Gaussianity is not required. We conducted an extensive computational experiment and formal inferential analysis to test the hypothesis that these phase transitions are {\it universal} across a range of underlying matrix ensembles. The experimental results are consistent with an asymptotic large-$n$ universality across matrix ensembles; finite-sample universality can be rejected.
[ { "version": "v1", "created": "Sun, 14 Jun 2009 12:01:22 GMT" } ]
2015-05-13T00:00:00
[ [ "Donoho", "David L.", "" ], [ "Tanner", "Jared", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0906.2541
Thomas Schwentick
Ahmet Kara, Martin Lange, Thomas Schwentick, Volker Weber
On the Hybrid Extension of CTL and CTL+
null
null
10.1007/978-3-642-03816-7_37
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper studies the expressivity, relative succinctness and complexity of satisfiability for hybrid extensions of the branching-time logics CTL and CTL+ by variables. Previous complexity results show that only fragments with one variable do have elementary complexity. It is shown that H1CTL+ and H1CTL, the hybrid extensions with one variable of CTL+ and CTL, respectively, are expressively equivalent but H1CTL+ is exponentially more succinct than H1CTL. On the other hand, HCTL+, the hybrid extension of CTL with arbitrarily many variables does not capture CTL*, as it even cannot express the simple CTL* property EGFp. The satisfiability problem for H1CTL+ is complete for triply exponential time, this remains true for quite weak fragments and quite strong extensions of the logic.
[ { "version": "v1", "created": "Sun, 14 Jun 2009 14:35:09 GMT" } ]
2015-05-13T00:00:00
[ [ "Kara", "Ahmet", "" ], [ "Lange", "Martin", "" ], [ "Schwentick", "Thomas", "" ], [ "Weber", "Volker", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.2547
Toby S. Cubitt
Toby S. Cubitt, Jianxin Chen, and Aram W. Harrow
Superactivation of the Asymptotic Zero-Error Classical Capacity of a Quantum Channel
24 pages. Despite the similar title, contains different results from arXiv:0906.2527. See "Note Added" at end of paper for details. V2: Includes significantly revised proof of Theorem 27. V3: Includes expanded explanation of some of the technical details
IEEE Trans. Inf. Th., vol. 57, no. 12, pp. 8114-8126, Dec 2011
10.1109/TIT.2011.2169109
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The zero-error classical capacity of a quantum channel is the asymptotic rate at which it can be used to send classical bits perfectly, so that they can be decoded with zero probability of error. We show that there exist pairs of quantum channels, neither of which individually have any zero-error capacity whatsoever (even if arbitrarily many uses of the channels are available), but such that access to even a single copy of both channels allows classical information to be sent perfectly reliably. In other words, we prove that the zero-error classical capacity can be superactivated. This result is the first example of superactivation of a classical capacity of a quantum channel.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 19:35:10 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2009 13:45:37 GMT" }, { "version": "v3", "created": "Mon, 12 Sep 2011 12:15:51 GMT" } ]
2012-01-31T00:00:00
[ [ "Cubitt", "Toby S.", "" ], [ "Chen", "Jianxin", "" ], [ "Harrow", "Aram W.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2549
Alberto Pepe
Alberto Pepe, Matthew Mayernik, Christine L. Borgman, Herbert Van de Sompel
From Artifacts to Aggregations: Modeling Scientific Life Cycles on the Semantic Web
28 pages. To appear in the Journal of the American Society for Information Science and Technology (JASIST)
Journal of the American Society for Information Science and Technology (JASIST). Volume 61, Issue 3. 2010
10.1002/asi.21263
null
cs.DL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the process of scientific research, many information objects are generated, all of which may remain valuable indefinitely. However, artifacts such as instrument data and associated calibration information may have little value in isolation; their meaning is derived from their relationships to each other. Individual artifacts are best represented as components of a life cycle that is specific to a scientific research domain or project. Current cataloging practices do not describe objects at a sufficient level of granularity nor do they offer the globally persistent identifiers necessary to discover and manage scholarly products with World Wide Web standards. The Open Archives Initiative's Object Reuse and Exchange data model (OAI-ORE) meets these requirements. We demonstrate a conceptual implementation of OAI-ORE to represent the scientific life cycles of embedded networked sensor applications in seismology and environmental sciences. By establishing relationships between publications, data, and contextual research information, we illustrate how to obtain a richer and more realistic view of scientific practices. That view can facilitate new forms of scientific research and learning. Our analysis is framed by studies of scientific practices in a large, multi-disciplinary, multi-university science and engineering research center, the Center for Embedded Networked Sensing (CENS).
[ { "version": "v1", "created": "Sun, 14 Jun 2009 15:23:10 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2009 18:26:33 GMT" }, { "version": "v3", "created": "Wed, 21 Oct 2009 00:53:31 GMT" } ]
2010-04-19T00:00:00
[ [ "Pepe", "Alberto", "" ], [ "Mayernik", "Matthew", "" ], [ "Borgman", "Christine L.", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0906.2582
Shun Watanabe
Shun Watanabe, Ryutaroh Matsumoto, and Tomohiko Uyematsu
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code
10 pages, no figure, A part of this paper will be presented at 2009 IEEE International Symposium on Information Theory in Seoul, Korea. Version 2 is a published version. The results are not changed from version 1. Explanations are polished and some references are added. In version 3, only style and DOI are edited
IEICE Trans. Fundamentals, vol. 93, no. 9, pp. 1650-1659, September 2010
10.1587/transfun.E93.A.1650
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The privacy amplification is a technique to distill a secret key from a random variable by a function so that the distilled key and eavesdropper's random variable are statistically independent. There are three kinds of security criteria for the key distilled by the privacy amplification: the normalized divergence criterion, which is also known as the weak security criterion, the variational distance criterion, and the divergence criterion, which is also known as the strong security criterion. As a technique to distill a secret key, it is known that the encoder of a Slepian-Wolf (the source coding with full side-information at the decoder) code can be used as a function for the privacy amplification if we employ the weak security criterion. In this paper, we show that the encoder of a Slepian-Wolf code cannot be used as a function for the privacy amplification if we employ the criteria other than the weak one.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 00:26:59 GMT" }, { "version": "v2", "created": "Sat, 5 Mar 2011 03:05:54 GMT" }, { "version": "v3", "created": "Tue, 8 Mar 2011 02:15:02 GMT" } ]
2011-03-09T00:00:00
[ [ "Watanabe", "Shun", "" ], [ "Matsumoto", "Ryutaroh", "" ], [ "Uyematsu", "Tomohiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2603
Rajiv Soundararajan Mr.
Rajiv Soundararajan and Sriram Vishwanath
Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources
5 pages, 1 figure, to be presented at ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers a degraded Gaussian broadcast channel over which Gaussian sources are to be communicated. When the sources are independent, this paper shows that hybrid coding achieves the optimal distortion region, the same as that of separate source and channel coding. It also shows that uncoded transmission is not optimal for this setting. For correlated sources, the paper shows that a hybrid coding strategy has a better distortion region than separate source-channel coding below a certain signal to noise ratio threshold. Thus, hybrid coding is a good choice for Gaussian broadcast channels with correlated Gaussian sources.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 04:29:15 GMT" } ]
2009-06-16T00:00:00
[ [ "Soundararajan", "Rajiv", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2609
Jong Chul Ye
O. K. Lee, J. C. Ye
Concatenate and Boost for Multiple Measurement Vector Problems
This paper has been withdrawn by the authors due to the insufficient novelty
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple measurement vector (MMV) problem addresses the recovery of a set of sparse signal vectors that share common non-zero support, and has emerged an important topics in compressed sensing. Even though the fundamental performance limit of recoverable sparsity level has been formally derived, conventional algorithms still exhibit significant performance gaps from the theoretical bound. The main contribution of this paper is a novel concatenate MMV and boost (CoMBo) algorithm that achieves the theoretical bound. More specifically, the algorithm concatenates MMV to a larger dimensional SMV problem and boosts it by multiplying random orthonormal matrices. Extensive simulation results demonstrate that CoMBo outperforms all existing methods and achieves the theoretical bound as the number of measurement vector increases.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 05:12:21 GMT" }, { "version": "v2", "created": "Mon, 19 Oct 2015 15:33:57 GMT" } ]
2015-10-20T00:00:00
[ [ "Lee", "O. K.", "" ], [ "Ye", "J. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2615
Philippe Robert
Carl Graham (CMAP), Philippe Robert (INRIA), Maaike Verloop (CWI)
Stability Properties of Networks with Interacting TCP Flows
null
null
10.1007/978-3-642-10406-0_1
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The equilibrium distributions of a Markovian model describing the interaction of several classes of permanent connections in a network are analyzed. It has been introduced by Graham and Robert. For this model each of the connections has a self-adaptive behavior in that its transmission rate along its route depends on the level of congestion of the nodes on its route. It has been shown that the invariant distributions are determined by the solutions of a fixed point equation in a finite dimensional space. In this paper, several examples of these fixed point equations are studied. The topologies investigated are rings, trees and a linear network, with various sets of routes through the nodes.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 06:22:20 GMT" } ]
2015-05-13T00:00:00
[ [ "Graham", "Carl", "", "CMAP" ], [ "Robert", "Philippe", "", "INRIA" ], [ "Verloop", "Maaike", "", "CWI" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.2635
Tom\'a\v{s} Vina\v{r}
Tom\'a\v{s} Vina\v{r}, Bro\v{n}a Brejov\'a, Giltae Song, Adam Siepel
Bayesian History Reconstruction of Complex Human Gene Clusters on a Phylogeny
null
Comparative Genomics, International Workshop (RECOMB-CG), 5817 volume of Lecture Notes in Bioinformatics, pp. 150-163, Budapest, September 2009. Springer
10.1007/978-3-642-04744-2_13
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clusters of genes that have evolved by repeated segmental duplication present difficult challenges throughout genomic analysis, from sequence assembly to functional analysis. Improved understanding of these clusters is of utmost importance, since they have been shown to be the source of evolutionary innovation, and have been linked to multiple diseases, including HIV and a variety of cancers. Previously, Zhang et al. (2008) developed an algorithm for reconstructing parsimonious evolutionary histories of such gene clusters, using only human genomic sequence data. In this paper, we propose a probabilistic model for the evolution of gene clusters on a phylogeny, and an MCMC algorithm for reconstruction of duplication histories from genomic sequences in multiple species. Several projects are underway to obtain high quality BAC-based assemblies of duplicated clusters in multiple species, and we anticipate that our method will be useful in analyzing these valuable new data sets.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 08:43:51 GMT" } ]
2010-01-25T00:00:00
[ [ "Vinař", "Tomáš", "" ], [ "Brejová", "Broňa", "" ], [ "Song", "Giltae", "" ], [ "Siepel", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.2667
Tobias Kretz
Tobias Kretz
The use of dynamic distance potential fields for pedestrian flow around corners
Prepared and Accepted for "First International Conference on Evacuation Modeling and Management" (ICEM 09)
null
null
null
cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This contribution investigates situations in pedestrian dynamics, where trying to walk the shortest path leads to largely different results than trying to walk the quickest path. A heuristic one-shot method to model the influence of the will to walk the quickest path is introduced.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 12:10:43 GMT" } ]
2010-01-20T00:00:00
[ [ "Kretz", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0906.2671
Christian David
Catherine Doss (LJLL), Mich\`ele Thieullen (PMA)
Oscillations and Random Perturbations of a FitzHugh-Nagumo System
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a stochastic perturbation of a FitzHugh-Nagumo system. We show that it is possible to generate oscillations for values of parameters which do not allow oscillations for the deterministic system. We also study the appearance of a new equilibrium point and new bifurcation parameters due to the noisy component.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 12:29:32 GMT" } ]
2009-06-16T00:00:00
[ [ "Doss", "Catherine", "", "LJLL" ], [ "Thieullen", "Michèle", "", "PMA" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2716
Jacques-Olivier Lachaud
F. De Vieilleville (LaBRI), Jacques-Olivier Lachaud (LaBRI), F. Feschet (LLAIC1)
Maximal digital straight segments and convergence of discrete geometric estimators
null
Proc. 14th Scandinavian Conference on Image Analysis (SCIA2005), Joensuu : Finlande (2005)
10.1007/11499145_100
null
cs.CV cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discrete geometric estimators approach geometric quantities on digitized shapes without any knowledge of the continuous shape. A classical yet difficult problem is to show that an estimator asymptotically converges toward the true geometric quantity as the resolution increases. We study here the convergence of local estimators based on Digital Straight Segment (DSS) recognition. It is closely linked to the asymptotic growth of maximal DSS, for which we show bounds both about their number and sizes. These results not only give better insights about digitized curves but indicate that curvature estimators based on local DSS recognition are not likely to converge. We indeed invalidate an hypothesis which was essential in the only known convergence theorem of a discrete curvature estimator. The proof involves results from arithmetic properties of digital lines, digital convexity, combinatorics, continued fractions and random polytopes.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 15:13:42 GMT" } ]
2009-06-16T00:00:00
[ [ "De Vieilleville", "F.", "", "LaBRI" ], [ "Lachaud", "Jacques-Olivier", "", "LaBRI" ], [ "Feschet", "F.", "", "LLAIC1" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.2727
Pietro Di Gianantonio
Pietro Di Gianantonio, Furio Honsell and Marina Lenisa
RPO, Second-order Contexts, and Lambda-calculus
35 pages, published in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 5, Issue 3 (August 6, 2009) lmcs:1120
10.2168/LMCS-5(3:6)2009
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
First, we extend Leifer-Milner RPO theory, by giving general conditions to obtain IPO labelled transition systems (and bisimilarities) with a reduced set of transitions, and possibly finitely branching. Moreover, we study the weak variant of Leifer-Milner theory, by giving general conditions under which the weak bisimilarity is a congruence. Then, we apply such extended RPO technique to the lambda-calculus, endowed with lazy and call by value reduction strategies. We show that, contrary to process calculi, one can deal directly with the lambda-calculus syntax and apply Leifer-Milner technique to a category of contexts, provided that we work in the framework of weak bisimilarities. However, even in the case of the transition system with minimal contexts, the resulting bisimilarity is infinitely branching, due to the fact that, in standard context categories, parametric rules such as the beta-rule can be represented only by infinitely many ground rules. To overcome this problem, we introduce the general notion of second-order context category. We show that, by carrying out the RPO construction in this setting, the lazy observational equivalence can be captured as a weak bisimilarity equivalence on a finitely branching transition system. This result is achieved by considering an encoding of lambda-calculus in Combinatory Logic.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 15:44:56 GMT" }, { "version": "v2", "created": "Thu, 6 Aug 2009 08:18:28 GMT" } ]
2015-07-01T00:00:00
[ [ "Di Gianantonio", "Pietro", "" ], [ "Honsell", "Furio", "" ], [ "Lenisa", "Marina", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.2738
Yakov Nekrich
Yakov Nekrich
Data Structures for Approximate Range Counting
13 pages, 1 figure
null
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present new data structures for approximately counting the number of points in orthogonal range. There is a deterministic linear space data structure that supports updates in O(1) time and approximates the number of elements in a 1-D range up to an additive term $k^{1/c}$ in $O(\log \log U\cdot\log \log n)$ time, where $k$ is the number of elements in the answer, $U$ is the size of the universe and $c$ is an arbitrary fixed constant. We can estimate the number of points in a two-dimensional orthogonal range up to an additive term $ k^{\rho}$ in $O(\log \log U+ (1/\rho)\log\log n)$ time for any $\rho>0$. We can estimate the number of points in a three-dimensional orthogonal range up to an additive term $k^{\rho}$ in $O(\log \log U + (\log\log n)^3+ (3^v)\log\log n)$ time for $v=\log \frac{1}{\rho}/\log {3/2}+2$.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 16:25:04 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 09:30:57 GMT" } ]
2009-10-05T00:00:00
[ [ "Nekrich", "Yakov", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.2742
Daniel Kharitonov
Luc Ceuppens, Alan Sardella, Daniel Kharitonov
Power Saving Strategies and Technologies in Network Equipment Opportunities and Challenges, Risk and Rewards
IEEE SAINT 2008 proceedings, July 28th - Aug 1st 2008, PCFNS workshop
null
10.1109/SAINT.2008.79
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Drawing from todays best-in-class solutions, we identify power-saving strategies that have succeeded in the past and look forward to new ideas and paradigms. We strongly believe that designing energy-efficient network equipment can be compared to building sports cars, task-oriented, focused and fast. However, unlike track-bound sports cars, ultra-fast and purpose-built silicon yields better energy efficiency when compared to more generic family sedan designs that mitigate go-to-market risks by being the masters of many tasks. Thus, we demonstrate that the best opportunities for power savings come via protocol simplification, best-of-breed technology, and silicon and software optimization, to achieve the least amount of processing necessary to move packets. We also look to the future of networking from a new angle, where energy efficiency and environmental concerns are viewed as fundamental design criteria and forces that need to be harnessed to continually create more powerful networking equipment.
[ { "version": "v1", "created": "Sat, 13 Jun 2009 10:49:20 GMT" } ]
2016-11-17T00:00:00
[ [ "Ceuppens", "Luc", "" ], [ "Sardella", "Alan", "" ], [ "Kharitonov", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.2756
Carl Hewitt
Carl Hewitt
Norms and Commitment for iOrgs(TM) Information Systems: Direct Logic(TM) and Participatory Grounding Checking
expanded article
null
null
null
cs.MA cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fundamental assumption of the Event Calculus is overly simplistic when it comes to organizations in which time-varying properties have to be actively maintained and managed in order to continue to hold and termination by another action is not required for a property to no longer hold. I.e., if active measures are not taken then things will go haywire by default. Similarly extension and revision is required for Grounding Checking properties of systems based on a set of ground inferences. Previously Model Checking as been performed using the model of nondeterministic automata based on states determined by time-points. These nondeterministic automata are not suitable for iOrgs, which are highly structured and operate asynchronously with only loosely bounded nondeterminism. iOrgs Information Systems have been developed as a technology in which organizations have people that are tightly integrated with information technology that enables them to function organizationally. iOrgs formalize existing practices to provide a framework for addressing issues of authority, accountability, scalability, and robustness using methods that are analogous to human organizations. In general -iOrgs are a natural extension Web Services, which are the standard for distributed computing and software application interoperability in large-scale Organizational Computing. -iOrgs are structured by Organizational Commitment that is a special case of Physical Commitment that is defined to be information pledged. iOrgs norms are used to illustrate the following: -Even a very simple microtheory for normative reasoning can engender inconsistency In practice, it is impossible to verify the consistency of a theory for a practical domain. -Improved Safety in Reasoning. It is not safe to use classical logic and probability theory in practical reasoning.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 18:38:17 GMT" }, { "version": "v2", "created": "Mon, 15 Jun 2009 21:28:48 GMT" }, { "version": "v3", "created": "Sat, 28 Nov 2009 20:03:54 GMT" }, { "version": "v4", "created": "Thu, 8 Apr 2010 10:31:57 GMT" }, { "version": "v5", "created": "Mon, 26 Apr 2010 13:22:51 GMT" }, { "version": "v6", "created": "Sat, 6 Nov 2010 21:47:00 GMT" } ]
2010-11-09T00:00:00
[ [ "Hewitt", "Carl", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.2760
Ophir Setter
Ophir Setter
Constructing Two-Dimensional Voronoi Diagrams via Divide-and-Conquer of Envelopes in Space
M.Sc. thesis. The work has been carried out at Tel-Aviv University under the supervision of Prof. Dan Halperin. 85 pages, 17 figures, 4 tables. For some reason the arXiv PDF version looks different than it should. PS is preferable
null
10.1007/978-3-642-16007-3_1
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general framework for computing two-dimensional Voronoi diagrams of different classes of sites under various distance functions. The framework is sufficiently general to support diagrams embedded on a family of two-dimensional parametric surfaces in $R^3$. The computation of the diagrams is carried out through the construction of envelopes of surfaces in 3-space provided by CGAL (the Computational Geometry Algorithm Library). The construction of the envelopes follows a divide-and-conquer approach. A straightforward application of the divide-and-conquer approach for computing Voronoi diagrams yields algorithms that are inefficient in the worst case. We prove that through randomization the expected running time becomes near-optimal in the worst case. We show how to employ our framework to realize various types of Voronoi diagrams with different properties by providing implementations for a vast collection of commonly used Voronoi diagrams. We also show how to apply the new framework and other existing tools from CGAL to compute minimum-width annuli of sets of disks, which requires the computation of two Voronoi diagrams of two different types, and of the overlay of the two diagrams. We do not assume general position. Namely, we handle degenerate input, and produce exact results.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 19:36:14 GMT" } ]
2015-05-13T00:00:00
[ [ "Setter", "Ophir", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.2767
Jacques-Olivier Lachaud
Jacques-Olivier Lachaud (LaBRI)
Coding cells of digital spaces: a framework to write generic digital topology algorithms
null
Proc. Int. Work. Combinatorial Image Analysis (IWCIA2003), Palermo : Italie (2003)
10.1016/S1571-0653(04)00497-4
null
cs.DM cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a concise coding of the cells of n-dimensional finite regular grids. It induces a simple, generic and efficient framework for implementing classical digital topology data structures and algorithms. Discrete subsets of multidimensional images (e.g. regions, digital surfaces, cubical cell complexes) have then a common and compact representation. Moreover, algorithms have a straightforward and efficient implementation, which is independent from the dimension or sizes of digital images. We illustrate that point with generic hypersurface boundary extraction algorithms by scanning or tracking. This framework has been implemented and basic operations as well as the presented applications have been benchmarked.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 19:32:48 GMT" } ]
2009-06-16T00:00:00
[ [ "Lachaud", "Jacques-Olivier", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.2770
Jacques-Olivier Lachaud
Martin Braure De Calignon (LaBRI), Luc Brun (GREYC), Jacques-Olivier Lachaud (LaBRI)
Combinatorial pyramids and discrete geometry for energy-minimizing segmentation
null
Proc. Int. Symposium on Visual Computing (ISVC2006), Lake Tahoe, Nevada : \'Etats-Unis d'Am\'erique (2006)
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper defines the basis of a new hierarchical framework for segmentation algorithms based on energy minimization schemes. This new framework is based on two formal tools. First, a combinatorial pyramid encode efficiently a hierarchy of partitions. Secondly, discrete geometric estimators measure precisely some important geometric parameters of the regions. These measures combined with photometrical and topological features of the partition allows to design energy terms based on discrete measures. Our segmentation framework exploits these energies to build a pyramid of image partitions with a minimization scheme. Some experiments illustrating our framework are shown and discussed.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 19:33:21 GMT" } ]
2009-06-16T00:00:00
[ [ "De Calignon", "Martin Braure", "", "LaBRI" ], [ "Brun", "Luc", "", "GREYC" ], [ "Lachaud", "Jacques-Olivier", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.2812
Kohtaro Tadaki
Kohtaro Tadaki
Partial randomness and dimension of recursively enumerable reals
12 pages, no figures, to appear in the Proceedings of the 34st International Symposium on Mathematical Foundations of Computer Science (MFCS 2009), Novy Smokovec, High Tatras, Slovakia, August 24 - 28, 2009
null
10.1007/978-3-642-03816-7_58
null
cs.CC cs.IT math.IT math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A real \alpha is called recursively enumerable ("r.e." for short) if there exists a computable, increasing sequence of rationals which converges to \alpha. It is known that the randomness of an r.e. real \alpha can be characterized in various ways using each of the notions; program-size complexity, Martin-L\"{o}f test, Chaitin \Omega number, the domination and \Omega-likeness of \alpha, the universality of a computable, increasing sequence of rationals which converges to \alpha, and universal probability. In this paper, we generalize these characterizations of randomness over the notion of partial randomness by parameterizing each of the notions above by a real T in (0,1], where the notion of partial randomness is a stronger representation of the compression rate by means of program-size complexity. As a result, we present ten equivalent characterizations of the partial randomness of an r.e. real. The resultant characterizations of partial randomness are powerful and have many important applications. One of them is to present equivalent characterizations of the dimension of an individual r.e. real. The equivalence between the notion of Hausdorff dimension and compression rate by program-size complexity (or partial randomness) has been established at present by a series of works of many researchers over the last two decades. We present ten equivalent characterizations of the dimension of an individual r.e. real.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 21:40:00 GMT" } ]
2015-05-13T00:00:00
[ [ "Tadaki", "Kohtaro", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0906.2819
Mahdi Ramezani
Mahdi Ramezani, Masoud Ardakani
Disjoint LDPC Coding for Gaussian Broadcast Channels
5 pages, 1 figure, 3 tables, To appear in Proc. IEEE International Symposium on Information Theory (ISIT 2009), Seoul, Korea, June-July 2009
null
10.1109/ISIT.2009.5205588
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Low-density parity-check (LDPC) codes have been used for communication over a two-user Gaussian broadcast channel. It has been shown in the literature that the optimal decoding of such system requires joint decoding of both user messages at each user. Also, a joint code design procedure should be performed. We propose a method which uses a novel labeling strategy and is based on the idea behind the bit-interleaved coded modulation. This method does not require joint decoding and/or joint code optimization. Thus, it reduces the overall complexity of near-capacity coding in broadcast channels. For different rate pairs on the boundary of the capacity region, pairs of LDPC codes are designed to demonstrate the success of this technique.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 23:09:04 GMT" } ]
2016-11-18T00:00:00
[ [ "Ramezani", "Mahdi", "" ], [ "Ardakani", "Masoud", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2820
Xudong Ma
Xudong Ma
Equalization for Non-Coherent UWB Systems with Approximate Semi-Definite Programming
7 pages, 5 figures, submitted to the 3rd International Conference on Signal Processing and Communication Systems, 28 - 30 September 2009, Omaha, Nebraska
Proceeding of the 3rd International Conference on Signal Processing and Communication Systems, 28 - 30 September 2009, Omaha, Nebraska
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an approximate semi-definite programming framework for demodulation and equalization of non-coherent ultra-wide-band communication systems with inter-symbol-interference. It is assumed that the communication systems follow non-linear second-order Volterra models. We formulate the demodulation and equalization problems as semi-definite programming problems. We propose an approximate algorithm for solving the formulated semi-definite programming problems. Compared with the existing non-linear equalization approaches, the proposed semi-definite programming formulation and approximate solving algorithm have low computational complexity and storage requirements. We show that the proposed algorithm has satisfactory error probability performance by simulation results. The proposed non-linear equalization approach can be adopted for a wide spectrum of non-coherent ultra-wide-band systems, due to the fact that most non-coherent ultra-wide-band systems with inter-symbol-interference follow non-linear second-order Volterra signal models.
[ { "version": "v1", "created": "Mon, 15 Jun 2009 23:14:37 GMT" } ]
2009-08-13T00:00:00
[ [ "Ma", "Xudong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2824
Carlos Gershenson
Carlos Gershenson
What Does Artificial Life Tell Us About Death?
5 pages
International Journal of Artificial Life Research 2(3):1-5. 2011
null
null
cs.AI cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Short philosophical essay
[ { "version": "v1", "created": "Mon, 15 Jun 2009 23:47:28 GMT" } ]
2011-09-06T00:00:00
[ [ "Gershenson", "Carlos", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.2835
Mikhail (Mike) Basilyan
Mikhail Basilyan
Employing Wikipedia's Natural Intelligence For Cross Language Information Retrieval
9 pages
null
null
null
cs.IR cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a novel method for retrieving information in languages other than that of the query. We use this technique in combination with existing traditional Cross Language Information Retrieval (CLIR) techniques to improve their results. This method has a number of advantages over traditional techniques that rely on machine translation to translate the query and then search the target document space using a machine translation. This method is not limited to the availability of a machine translation algorithm for the desired language and uses already existing sources of readily available translated information on the internet as a "middle-man" approach. In this paper we use Wikipedia; however, any similar multilingual, cross referenced body of documents can be used. For evaluation and comparison purposes we also implemented a traditional machine translation approach separately as well as the Wikipedia approach separately.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 02:09:27 GMT" } ]
2009-06-17T00:00:00
[ [ "Basilyan", "Mikhail", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0906.2864
Barco You
Barco You
Discussion of Twenty Questions Problem
2 pages, 5figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discuss several tricks for solving twenty question problems which in this paper is depicted as a guessing game. Player tries to find a ball in twenty boxes by asking as few questions as possible, and these questions are answered by only "Yes" or "No". With the discussion, demonstration of source coding methods is the main concern.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 08:22:52 GMT" } ]
2009-06-17T00:00:00
[ [ "You", "Barco", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2866
Pierre Hyvernat
Pierre Hyvernat (LAMA, Iml)
Predicate Transformers, (co)Monads and Resolutions
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short note contains random thoughts about a factorization theorem for closure/interior operators on a powerset which is reminiscent to the notion of resolution for a monad/comonad. The question originated from formal topology but is interesting in itself. The result holds constructively (even if it classically has several variations); but usually not predicatively (in the sense that the interpolant will no be given by a set). For those not familiar with predicativity issues, we look at a ``classical'' version where we bound the size of the interpolant.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 08:33:18 GMT" } ]
2009-06-17T00:00:00
[ [ "Hyvernat", "Pierre", "", "LAMA, Iml" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.2888
Bruno Salvy
Alexandre Benoit (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt)
Chebyshev Expansions for Solutions of Linear Differential Equations
null
ISSAC'09 (2009)
10.1145/1576702.1576709
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Chebyshev expansion is a series in the basis of Chebyshev polynomials of the first kind. When such a series solves a linear differential equation, its coefficients satisfy a linear recurrence equation. We interpret this equation as the numerator of a fraction of linear recurrence operators. This interpretation lets us give a simple view of previous algorithms, analyze their complexity, and design a faster one for large orders.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 10:21:01 GMT" } ]
2013-06-19T00:00:00
[ [ "Benoit", "Alexandre", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0906.2895
Velimir Ilic
Velimir M. Ilic, Miomir S. Stankovic, Branimir T. Todorovic
Entropy Message Passing
5 pages, 1 figure, to appear in IEEE Transactions on Information Theory
null
10.1109/TIT.2010.2090235
null
cs.LG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper proposes a new message passing algorithm for cycle-free factor graphs. The proposed "entropy message passing" (EMP) algorithm may be viewed as sum-product message passing over the entropy semiring, which has previously appeared in automata theory. The primary use of EMP is to compute the entropy of a model. However, EMP can also be used to compute expressions that appear in expectation maximization and in gradient descent algorithms.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 10:58:50 GMT" }, { "version": "v2", "created": "Tue, 16 Jun 2009 23:03:13 GMT" }, { "version": "v3", "created": "Mon, 12 Oct 2009 12:48:20 GMT" }, { "version": "v4", "created": "Thu, 13 May 2010 16:40:01 GMT" }, { "version": "v5", "created": "Sat, 15 May 2010 22:23:39 GMT" }, { "version": "v6", "created": "Mon, 8 Nov 2010 01:37:37 GMT" } ]
2016-11-18T00:00:00
[ [ "Ilic", "Velimir M.", "" ], [ "Stankovic", "Miomir S.", "" ], [ "Todorovic", "Branimir T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2914
Michal Zerola
Michal Zerola, J\'er\^ome Lauret, Roman Bart\'ak and Michal \v{S}umbera
Efficient Multi-site Data Movement Using Constraint Programming for Data Hungry Science
To appear in proceedings of Computing in High Energy and Nuclear Physics 2009
null
10.1088/1742-6596/219/6/062069
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the past decade, HENP experiments have been heading towards a distributed computing model in an effort to concurrently process tasks over enormous data sets that have been increasing in size as a function of time. In order to optimize all available resources (geographically spread) and minimize the processing time, it is necessary to face also the question of efficient data transfers and placements. A key question is whether the time penalty for moving the data to the computational resources is worth the presumed gain. Onward to the truly distributed task scheduling we present the technique using a Constraint Programming (CP) approach. The CP technique schedules data transfers from multiple resources considering all available paths of diverse characteristic (capacity, sharing and storage) having minimum user's waiting time as an objective. We introduce a model for planning data transfers to a single destination (data transfer) as well as its extension for an optimal data set spreading strategy (data placement). Several enhancements for a solver of the CP model will be shown, leading to a faster schedule computation time using symmetry breaking, branch cutting, well studied principles from job-shop scheduling field and several heuristics. Finally, we will present the design and implementation of a corner-stone application aimed at moving datasets according to the schedule. Results will include comparison of performance and trade-off between CP techniques and a Peer-2-Peer model from simulation framework as well as the real case scenario taken from a practical usage of a CP scheduler.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 12:33:25 GMT" }, { "version": "v2", "created": "Thu, 18 Jun 2009 19:20:05 GMT" } ]
2015-05-13T00:00:00
[ [ "Zerola", "Michal", "" ], [ "Lauret", "Jérôme", "" ], [ "Barták", "Roman", "" ], [ "Šumbera", "Michal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.2924
Xavier Goaoc
Otfried Cheong (KAIST), Xavier Goaoc (INRIA Lorraine - LORIA), Andreas Holmsen (KAIST)
Lower Bounds for Pinning Lines by Balls
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A line L is a transversal to a family F of convex objects in R^d if it intersects every member of F. In this paper we show that for every integer d>2 there exists a family of 2d-1 pairwise disjoint unit balls in R^d with the property that every subfamily of size 2d-2 admits a transversal, yet any line misses at least one member of the family. This answers a question of Danzer from 1957.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 13:09:14 GMT" } ]
2009-06-17T00:00:00
[ [ "Cheong", "Otfried", "", "KAIST" ], [ "Goaoc", "Xavier", "", "INRIA Lorraine - LORIA" ], [ "Holmsen", "Andreas", "", "KAIST" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.2925
Laurent Buse
Laurent Bus\'e (INRIA Sophia Antipolis), Guillaume Ch\`eze (IMT), Salah Najib (MPI-MIS)
Noether's forms for the study of non-composite rational functions and their spectrum
null
null
null
null
math.NT cs.SC math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the spectrum and the decomposability of a multivariate rational function are studied by means of the effective Noether's irreducibility theorem given by Ruppert. With this approach, some new effective results are obtained. In particular, we show that the reduction modulo p of the spectrum of a given integer multivariate rational function r coincides with the spectrum of the reduction of r modulo p for p a prime integer greater or equal to an explicit bound. This bound is given in terms of the degree, the height and the number of variables of r. With the same strategy, we also study the decomposability of r modulo p. Some similar explicit results are also provided for the case of polynomials with coefficients in a polynomial ring.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 13:10:18 GMT" } ]
2009-06-17T00:00:00
[ [ "Busé", "Laurent", "", "INRIA Sophia Antipolis" ], [ "Chèze", "Guillaume", "", "IMT" ], [ "Najib", "Salah", "", "MPI-MIS" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0906.2935
Massimo Giulietti
Stefania Fanali, Massimo Giulietti
AG codes on certain maximal curves
null
null
null
null
math.AG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Algebraic Geometric codes associated to a recently discovered class of maximal curves are investigated. As a result, some linear codes with better parameters with respect to the previously known ones are discovered, and 70 improvements on MinT's tables are obtained.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 13:44:59 GMT" } ]
2011-02-19T00:00:00
[ [ "Fanali", "Stefania", "" ], [ "Giulietti", "Massimo", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.2947
Stylianos Basagiannis
Stylianos Basagiannis, Panagiotis Katsaros and Andrew Pombortsis
Attacking an OT-Based Blind Signature Scheme
3 pages, 2 figures, sumbitted for evaluation, under the title "Security Analysis of an OT-based blind signature scheme"
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe an attack against one of the Oblivious-Transfer-based blind signatures scheme, proposed in [1]. An attacker with a primitive capability of producing specific-range random numbers, while exhibiting a partial MITM behavior, is able to corrupt the communication between the protocol participants. The attack is quite efficient as it leads to a protocol communication corruption and has a sound-minimal computational cost. We propose a solution to fix the security flaw.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 14:23:19 GMT" }, { "version": "v2", "created": "Wed, 24 Jun 2009 12:02:35 GMT" }, { "version": "v3", "created": "Wed, 1 Jul 2009 11:33:05 GMT" }, { "version": "v4", "created": "Tue, 10 Nov 2009 14:24:14 GMT" } ]
2009-11-10T00:00:00
[ [ "Basagiannis", "Stylianos", "" ], [ "Katsaros", "Panagiotis", "" ], [ "Pombortsis", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.2960
Daniel Karapetyan
Daniel Karapetyan and Gregory Gutin and Boris Goldengorin
Empirical evaluation of construction heuristics for the multidimensional assignment problem
15 pages
Text in Algorithmics 11 (2009) 107-122
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The multidimensional assignment problem (MAP) (abbreviated s-AP in the case of s dimensions) is an extension of the well-known assignment problem. The most studied case of MAP is 3-AP, though the problems with larger values of s have also a number of applications. In this paper we consider four fast construction heuristics for MAP. One of the heuristics is new. A modification of the heuristics is proposed to optimize the access to slow computer memory. The results of computational experiments for several instance families are provided and discussed.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 15:47:17 GMT" } ]
2012-05-17T00:00:00
[ [ "Karapetyan", "Daniel", "" ], [ "Gutin", "Gregory", "" ], [ "Goldengorin", "Boris", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.2995
Manfred Kufleitner
Volker Diekert, Manfred Kufleitner
Fragments of first-order logic over infinite words
Conference version presented at 26th International Symposium on Theoretical Aspects of Computer Science, STACS 2009
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give topological and algebraic characterizations as well as language theoretic descriptions of the following subclasses of first-order logic FO[<] for omega-languages: Sigma_2, FO^2, the intersection of FO^2 and Sigma_2, and Delta_2 (and by duality Pi_2 and the intersection of FO^2 and Pi_2). These descriptions extend the respective results for finite words. In particular, we relate the above fragments to language classes of certain (unambiguous) polynomials. An immediate consequence is the decidability of the membership problem of these classes, but this was shown before by Wilke and Bojanczyk and is therefore not our main focus. The paper is about the interplay of algebraic, topological, and language theoretic properties.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 18:43:43 GMT" }, { "version": "v2", "created": "Fri, 2 Oct 2009 20:52:31 GMT" } ]
2009-10-02T00:00:00
[ [ "Diekert", "Volker", "" ], [ "Kufleitner", "Manfred", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.2997
Ian Palmer
Ian Palmer and Jean Bellissard
The Jewett-Krieger Construction for Tilings
This paper has been withdrawn in order to address conceptual problems. It will be rewritten and resubmitted at a later date
null
null
null
math.DS cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a random distribution of impurities on a periodic crystal, an equivalent uniquely ergodic tiling space is built, made of aperiodic, repetitive tilings with finite local complexity, and with configurational entropy close to the entropy of the impurity distribution. The construction is the tiling analog of the Jewett-Kreger theorem.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 18:49:20 GMT" }, { "version": "v2", "created": "Tue, 7 Jul 2009 15:41:20 GMT" }, { "version": "v3", "created": "Fri, 30 Oct 2009 22:39:05 GMT" }, { "version": "v4", "created": "Wed, 4 Aug 2010 17:10:36 GMT" }, { "version": "v5", "created": "Wed, 3 Nov 2010 15:08:00 GMT" } ]
2010-11-04T00:00:00
[ [ "Palmer", "Ian", "" ], [ "Bellissard", "Jean", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0906.3036
Gilles Champenois
Gilles Champenois
Mnesors for automatic control
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mnesors are defined as elements of a semimodule over the min-plus integers. This two-sorted structure is able to merge graduation properties of vectors and idempotent properties of boolean numbers, which makes it appropriate for hybrid systems. We apply it to the control of an inverted pendulum and design a full logical controller, that is, without the usual algebra of real numbers.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 22:05:57 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2009 21:19:23 GMT" } ]
2009-10-09T00:00:00
[ [ "Champenois", "Gilles", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.3038
Konstantinos Pelechrinis
Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy, Christos Gkantsidis
A measurement driven, 802.11 anti-jamming system
16 pages, full version of a submitted work to CoNext 2009 conference
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit intermittently at low power in order to conserve energy. In this paper, we first conduct extensive experiments on an indoor 802.11 network to assess the ability of two physical layer functions, rate adaptation and power control, in mitigating jamming. In the presence of a jammer we find that: (a) the use of popular rate adaptation algorithms can significantly degrade network performance and, (b) appropriate tuning of the carrier sensing threshold allows a transmitter to send packets even when being jammed and enables a receiver capture the desired signal. Based on our findings, we build ARES, an Anti-jamming REinforcement System, which tunes the parameters of rate adaptation and power control to improve the performance in the presence of jammers. ARES ensures that operations under benign conditions are unaffected. To demonstrate the effectiveness and generality of ARES, we evaluate it in three wireless testbeds: (a) an 802.11n WLAN with MIMO nodes, (b) an 802.11a/g mesh network with mobile jammers and (c) an 802.11a WLAN. We observe that ARES improves the network throughput across all testbeds by up to 150%.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 23:27:36 GMT" } ]
2009-06-18T00:00:00
[ [ "Pelechrinis", "Konstantinos", "" ], [ "Broustis", "Ioannis", "" ], [ "Krishnamurthy", "Srikanth V.", "" ], [ "Gkantsidis", "Christos", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.3051
EPTCS
Markus Holzer, Martin Kutrib, Andreas Malcher
Multi-Head Finite Automata: Characterizations, Concepts and Open Problems
null
EPTCS 1, 2009, pp. 93-107
10.4204/EPTCS.1.9
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-head finite automata were introduced in (Rabin, 1964) and (Rosenberg, 1966). Since that time, a vast literature on computational and descriptional complexity issues on multi-head finite automata documenting the importance of these devices has been developed. Although multi-head finite automata are a simple concept, their computational behavior can be already very complex and leads to undecidable or even non-semi-decidable problems on these devices such as, for example, emptiness, finiteness, universality, equivalence, etc. These strong negative results trigger the study of subclasses and alternative characterizations of multi-head finite automata for a better understanding of the nature of non-recursive trade-offs and, thus, the borderline between decidable and undecidable problems. In the present paper, we tour a fragment of this literature.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:58:16 GMT" } ]
2009-06-19T00:00:00
[ [ "Holzer", "Markus", "" ], [ "Kutrib", "Martin", "" ], [ "Malcher", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3056
Chi Zhang
Chi Zhang, Gang Wang, Xiaoguang Liu, Jing Liu
Approximating Scheduling Machines with Capacity Constraints
this is a correction of paper to appear at FAW2009
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Scheduling Machines with Capacity Constraints problem, we are given k identical machines, each of which can process at most m_i jobs. M jobs are also given, where job j has a non-negative processing time length t_j >= 0. The task is to find a schedule such that the makespan is minimized and the capacity constraints are met. In this paper, we present a 3-approximation algorithm using an extension of Iterative Rounding Method introduced by Jain. To the best of the authors' knowledge, this is the first attempt to apply Iterative Rounding Method to scheduling problem with capacity constraints.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 02:01:26 GMT" } ]
2009-06-18T00:00:00
[ [ "Zhang", "Chi", "" ], [ "Wang", "Gang", "" ], [ "Liu", "Xiaoguang", "" ], [ "Liu", "Jing", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.3065
Zhihai Zhang
Zhihai Zhang, Tian Fang, Bican Xia
Real Solution Isolation with Multiplicity of Zero-Dimensional Triangular Systems
12 pages, no figures
null
null
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Existing algorithms for isolating real solutions of zero-dimensional polynomial systems do not compute the multiplicities of the solutions. In this paper, we define in a natural way the multiplicity of solutions of zero-dimensional triangular polynomial systems and prove that our definition is equivalent to the classical definition of local (intersection) multiplicity. Then we present an effective and complete algorithm for isolating real solutions with multiplicities of zero-dimensional triangular polynomial systems using our definition. The algorithm is based on interval arithmetic and square-free factorization of polynomials with real algebraic coefficients. The computational results on some examples from the literature are presented.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 03:29:37 GMT" } ]
2009-06-18T00:00:00
[ [ "Zhang", "Zhihai", "" ], [ "Fang", "Tian", "" ], [ "Xia", "Bican", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0906.3068
Jacques-Olivier Lachaud
Jacques-Olivier Lachaud (LaBRI), Benjamin Taton (LaBRI)
Deformable Model with a Complexity Independent from Image Resolution
null
Computer Vision and Image Understanding 99 (2005) 453-475
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a parametric deformable model which recovers image components with a complexity independent from the resolution of input images. The proposed model also automatically changes its topology and remains fully compatible with the general framework of deformable models. More precisely, the image space is equipped with a metric that expands salient image details according to their strength and their curvature. During the whole evolution of the model, the sampling of the contour is kept regular with respect to this metric. By this way, the vertex density is reduced along most parts of the curve while a high quality of shape representation is preserved. The complexity of the deformable model is thus improved and is no longer influenced by feature-preserving changes in the resolution of input images. Building the metric requires a prior estimation of contour curvature. It is obtained using a robust estimator which investigates the local variations in the orientation of image gradient. Experimental results on both computer generated and biomedical images are presented to illustrate the advantages of our approach.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 04:42:39 GMT" } ]
2009-06-18T00:00:00
[ [ "Lachaud", "Jacques-Olivier", "", "LaBRI" ], [ "Taton", "Benjamin", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.3074
Miao Song
Miao Song
Feynman Algorithm Implementation for Comparison with Euler in a Uniform Elastic Two-Layer 2D and 3D Object Dynamic Deformation Framework in OpenGL with GUI
28 pages, 15 figures; from June 2008; portions of this work have been subsequently published in conferences
null
null
null
cs.GR cs.DS cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We implement for comparative purposes the Feynman algorithm within a C++-based framework for two-layer uniform facet elastic object for real-time softbody simulation based on physics modeling methods. To facilitate the comparison, we implement initial timing measurements on the same hardware against that of Euler integrator in the softbody framework by varying different algorithm parameters. Due to a relatively large number of such variations we implement a GLUI-based user-interface to allow for much more finer control over the simulation process at real-time, which was lacking completely in the previous versions of the framework. We show our currents results based on the enhanced framework. The two-layered elastic object consists of inner and outer elastic mass-spring surfaces and compressible internal pressure. The density of the inner layer can be set differently from the density of the outer layer; the motion of the inner layer can be opposite to the motion of the outer layer. These special features, which cannot be achieved by a single layered object, result in improved imitation of a soft body, such as tissue's liquid non-uniform deformation. The inertial behavior of the elastic object is well illustrated in environments with gravity and collisions with walls, ceiling, and floor. The collision detection is defined by elastic collision penalty method and the motion of the object is guided by the Ordinary Differential Equation computation. Users can interact with the modeled objects, deform them, and observe the response to their action in real-time and we provide an extensible framework and its implementation for comparative studies of different physical-based modeling and integration algorithm implementations.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 05:39:28 GMT" } ]
2009-06-18T00:00:00
[ [ "Song", "Miao", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0906.3083
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Instruction sequence notations with probabilistic instructions
15 pages, revised because arxiv:1409.6873v1 [cs.LO] has come out
null
null
PRG0906
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper concerns instruction sequences that contain probabilistic instructions, i.e. instructions that are themselves probabilistic by nature. We propose several kinds of probabilistic instructions, provide an informal operational meaning for each of them, and discuss related work. On purpose, we refrain from providing an ad hoc formal meaning for the proposed kinds of instructions. We also discuss the approach of projection semantics, which was introduced in earlier work on instruction sequences, in the light of probabilistic instruction sequences.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 07:03:17 GMT" }, { "version": "v2", "created": "Wed, 1 Oct 2014 14:26:01 GMT" } ]
2014-10-02T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.3084
Christine Michel
Christine Michel (LIESP, Ictt), Sebastien George (LIESP, Ictt), Elise Garrot (LIESP, Ictt)
Activit\'es collectives et instrumentation. \'Etude de pratiques dans l'enseignement sup\'erieur
null
Distances et savoirs 5, 4 (2007) pp.527-546
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents the results of a study which concerns Instrumented Collective Learning Situations (ICLS) used in higher education and according to different actors's point of view (instructional designer and tutor). Considered actors have been involved in ICLS conception or in their use with students. We determine several forms of ICLS (in terms of scenario, tools, kind of activity) and what educational approaches are adopted by educational actors in their practices. We detail the results of our study, mainly by highlighting the "home-made" approach of the actors, that is based on an opportunist and pragmatic use of available tools in order to fit into the educational contexts.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 07:04:16 GMT" } ]
2009-06-18T00:00:00
[ [ "Michel", "Christine", "", "LIESP, Ictt" ], [ "George", "Sebastien", "", "LIESP, Ictt" ], [ "Garrot", "Elise", "", "LIESP, Ictt" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0906.3085
Christine Michel
Christine Michel (LIESP, Ictt)
Poset representation and similarity comparisons os systems in IR
null
26eme conf\'erence ACM SIGIR, Toronto - Ontario : Canada (2003)
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we are using the poset representation to describe the complex answers given by IR systems after a clustering and ranking processes. The answers considered may be given by cartographical representations or by thematic sub-lists of documents. The poset representation, with the graph theory and the relational representation opens many perspectives in the definition of new similarity measures capable of taking into account both the clustering and ranking processes. We present a general method for constructing new similarity measures and give several examples. These measures can be used for semi-ordered partitions; moreover, in the comparison of two sets of answers, the corresponding similarity indicator is an increasing function of the ranks of presentation of common answers.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 07:04:44 GMT" } ]
2009-06-18T00:00:00
[ [ "Michel", "Christine", "", "LIESP, Ictt" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.3089
Jacques-Olivier Lachaud
Jacques-Olivier Lachaud (LaBRI), Fran\c{c}ois De Vieilleville (LaBRI)
Convex shapes and convergence speed of discrete tangent estimators
null
Proc. Int. Symposium on Visual Computing (ISVC2006), Lake Tahoe, Nevada : \'Etats-Unis d'Am\'erique (2006)
10.1007/11919629
null
cs.DM cs.CG cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Discrete geometric estimators aim at estimating geometric characteristics of a shape with only its digitization as input data. Such an estimator is multigrid convergent when its estimates tend toward the geometric characteristics of the shape as the digitization step h tends toward 0. This paper studies the multigrid convergence of tangent estimators based on maximal digital straight segment recognition. We show that such estimators are multigrid convergent for some family of convex shapes and that their speed of convergence is on average O(h^(2/3)). Experiments confirm this result and suggest that the bound is tight.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 07:25:56 GMT" } ]
2009-06-18T00:00:00
[ [ "Lachaud", "Jacques-Olivier", "", "LaBRI" ], [ "De Vieilleville", "François", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0906.3101
Christine Michel
Christine Michel (LIESP, ICTT), Marc-Eric Bobillier-Chaumon (ICTT), Franck Tarpin-Bernard (LIESP, ICTT)
Fracture num\'erique chez les seniors du 4eme age. Observation d'une acculturation technique
null
Les Cahiers du num\'erique 5, 1 (2009) 147-168
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Very old people accumulate the "handicaps": social, physical, psychological or cognitive. Various research thus developed to determine there waiting and needs and also to see the benefit possibly produced by technologies (called ?gerontechnology?) on their living conditions. The object of this article is to present the numerical service offer to very old perople and to see how it takes part in a social justice according to the definition of Rawls (principle of equal freedom, principle of equal opportunity in the access). The adoption, the use and the benefit of technology are analyzed in a theoretical way through a state of the art and in an experimental way through a qualitative and quantitative investigation carried out with a population of very old people. We propose to identify dynamic technological acceptance of old people according to the TAM'S (Technology Acceptance Model) of Davis adapted by (Hamner and Qazi, 2008).
[ { "version": "v1", "created": "Wed, 17 Jun 2009 08:14:03 GMT" } ]
2009-06-18T00:00:00
[ [ "Michel", "Christine", "", "LIESP, ICTT" ], [ "Bobillier-Chaumon", "Marc-Eric", "", "ICTT" ], [ "Tarpin-Bernard", "Franck", "", "LIESP, ICTT" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0906.3112
Panagiotis Papadakos
Panagiotis Papadakos, Yannis Theoharis, Yannis Marketakis, Nikos Armenatzoglou and Yannis Tzitzikas
Object-Relational Database Representations for Text Indexing
null
null
null
null
cs.IR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the distinctive features of Information Retrieval systems comparing to Database Management systems, is that they offer better compression for posting lists, resulting in better I/O performance and thus faster query evaluation. In this paper, we introduce database representations of the index that reduce the size (and thus the disk I/Os) of the posting lists. This is not achieved by redesigning the DBMS, but by exploiting the non 1NF features that existing Object-Relational DBM systems (ORDBMS) already offer. Specifically, four different database representations are described and detailed experimental results for one million pages are reported. Three of these representations are one order of magnitude more space efficient and faster (in query evaluation) than the plain relational representation.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 13:32:09 GMT" } ]
2009-06-18T00:00:00
[ [ "Papadakos", "Panagiotis", "" ], [ "Theoharis", "Yannis", "" ], [ "Marketakis", "Yannis", "" ], [ "Armenatzoglou", "Nikos", "" ], [ "Tzitzikas", "Yannis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0906.3119
EPTCS
Alexander Krassovitskiy, Yurii Rogozhin, Sergey Verlan
Computational Power of P Systems with Small Size Insertion and Deletion Rules
null
EPTCS 1, 2009, pp. 108-117
10.4204/EPTCS.1.10
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent investigations show insertion-deletion systems of small size that are not complete and cannot generate all recursively enumerable languages. However, if additional computational distribution mechanisms like P systems are added, then the computational completeness is achieved in some cases. In this article we take two insertion-deletion systems that are not computationally complete, consider them in the framework of P systems and show that the computational power is strictly increased by proving that any recursively enumerable language can be generated. At the end some open problems are presented.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:44:01 GMT" } ]
2009-06-18T00:00:00
[ [ "Krassovitskiy", "Alexander", "" ], [ "Rogozhin", "Yurii", "" ], [ "Verlan", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3149
David Tolpin
David Tolpin, Solomon Eyal Shimony
Semi-Myopic Sensing Plans for Value Optimization
9 pages, 4 figures, presented at BISFAI 2009
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following sequential decision problem. Given a set of items of unknown utility, we need to select one of as high a utility as possible (``the selection problem''). Measurements (possibly noisy) of item values prior to selection are allowed, at a known cost. The goal is to optimize the overall sequential decision process of measurements and selection. Value of information (VOI) is a well-known scheme for selecting measurements, but the intractability of the problem typically leads to using myopic VOI estimates. In the selection problem, myopic VOI frequently badly underestimates the value of information, leading to inferior sensing plans. We relax the strict myopic assumption into a scheme we term semi-myopic, providing a spectrum of methods that can improve the performance of sensing plans. In particular, we propose the efficiently computable method of ``blinkered'' VOI, and examine theoretical bounds for special cases. Empirical evaluation of ``blinkered'' VOI in the selection problem with normally distributed item values shows that is performs much better than pure myopic VOI.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 11:45:40 GMT" } ]
2009-06-18T00:00:00
[ [ "Tolpin", "David", "" ], [ "Shimony", "Solomon Eyal", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.3155
Takayuki Tsuchida
Takayuki Tsuchida
A systematic method for constructing time discretizations of integrable lattice systems: local equations of motion
61 pages; (v2)(v3) many minor corrections
An abridged half-length version was published as J. Phys. A: Math. Theor. 43 (2010) 415202
10.1088/1751-8113/43/41/415202
OIQP-09-01
nlin.SI cs.NA math-ph math.MP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new method for discretizing the time variable in integrable lattice systems while maintaining the locality of the equations of motion. The method is based on the zero-curvature (Lax pair) representation and the lowest-order "conservation laws". In contrast to the pioneering work of Ablowitz and Ladik, our method allows the auxiliary dependent variables appearing in the stage of time discretization to be expressed locally in terms of the original dependent variables. The time-discretized lattice systems have the same set of conserved quantities and the same structures of the solutions as the continuous-time lattice systems; only the time evolution of the parameters in the solutions that correspond to the angle variables is discretized. The effectiveness of our method is illustrated using examples such as the Toda lattice, the Volterra lattice, the modified Volterra lattice, the Ablowitz-Ladik lattice (an integrable semi-discrete nonlinear Schroedinger system), and the lattice Heisenberg ferromagnet model. For the Volterra lattice and modified Volterra lattice, we also present their ultradiscrete analogues.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 13:02:50 GMT" }, { "version": "v2", "created": "Mon, 20 Jul 2009 16:58:45 GMT" }, { "version": "v3", "created": "Tue, 28 Sep 2010 16:19:27 GMT" } ]
2010-09-29T00:00:00
[ [ "Tsuchida", "Takayuki", "" ] ]
[ { "class": "Physics", "code": "nlin.SI", "description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems", "span": "(Exactly Solvable and Integrable Systems)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0906.3162
Yonatan Bilu
Yonatan Bilu, Nathan Linial
Are stable instances easy?
14 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of a stable instance for a discrete optimization problem, and argue that in many practical situations only sufficiently stable instances are of interest. The question then arises whether stable instances of NP--hard problems are easier to solve. In particular, whether there exist algorithms that solve correctly and in polynomial time all sufficiently stable instances of some NP--hard problem. The paper focuses on the Max--Cut problem, for which we show that this is indeed the case.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 12:43:41 GMT" } ]
2009-06-18T00:00:00
[ [ "Bilu", "Yonatan", "" ], [ "Linial", "Nathan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3173
Yonina C. Eldar
Yonina C. Eldar, Patrick Kuppinger and Helmut B\"olcskei
Compressed Sensing of Block-Sparse Signals: Uncertainty Relations and Efficient Recovery
Submitted to the IEEE Trans. on Signal Processing, version 2 has updated figures
null
10.1109/TSP.2010.2044837
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider compressed sensing of block-sparse signals, i.e., sparse signals that have nonzero coefficients occurring in clusters. An uncertainty relation for block-sparse signals is derived, based on a block-coherence measure, which we introduce. We then show that a block-version of the orthogonal matching pursuit algorithm recovers block $k$-sparse signals in no more than $k$ steps if the block-coherence is sufficiently small. The same condition on block-coherence is shown to guarantee successful recovery through a mixed $\ell_2/\ell_1$-optimization approach. This complements previous recovery results for the block-sparse case which relied on small block-restricted isometry constants. The significance of the results presented in this paper lies in the fact that making explicit use of block-sparsity can provably yield better reconstruction properties than treating the signal as being sparse in the conventional sense, thereby ignoring the additional structure in the problem.
[ { "version": "v1", "created": "Tue, 16 Jun 2009 21:02:28 GMT" }, { "version": "v2", "created": "Thu, 18 Jun 2009 13:11:24 GMT" } ]
2015-05-13T00:00:00
[ [ "Eldar", "Yonina C.", "" ], [ "Kuppinger", "Patrick", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3183
Chao Tian
Chao Tian, Suhas Diggavi, and Shlomo Shamai (Shitz)
Approximate Characterizations for the Gaussian Source Broadcast Distortion Region
revised version. to appear in Trans. IT
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the joint source-channel coding problem of sending a Gaussian source on a K-user Gaussian broadcast channel with bandwidth mismatch. A new outer bound to the achievable distortion region is derived using the technique of introducing more than one additional auxiliary random variable, which was previously used to derive sum-rate lower bound for the symmetric Gaussian multiple description problem. By combining this outer bound with the achievability result based on source-channel separation, we provide approximate characterizations of the achievable distortion region within constant multiplicative factors. Furthermore, we show that the results can be extended to general broadcast channels, and the performance of the source-channel separation based approach is also within the same constant multiplicative factors of the optimum.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 13:42:58 GMT" }, { "version": "v2", "created": "Fri, 19 Nov 2010 17:07:07 GMT" } ]
2010-11-22T00:00:00
[ [ "Tian", "Chao", "", "Shitz" ], [ "Diggavi", "Suhas", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3186
EPTCS
Philippe Moser
A General Notion of Useful Information
null
EPTCS 1, 2009, pp. 164-171
10.4204/EPTCS.1.16
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a general framework for defining the depth of a sequence with respect to a class of observers. We show that our general framework captures all depth notions introduced in complexity theory so far. We review most such notions, show how they are particular cases of our general depth framework, and review some classical results about the different depth notions.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:09:03 GMT" } ]
2009-06-18T00:00:00
[ [ "Moser", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3192
Mari Kobayashi
Mari Kobayashi, Merouane Debbah, Shlomo Shamai (Shitz)
Secured Communication over Frequency-Selective Fading Channels: a practical Vandermonde precoding
To appear in EURASIP journal on Wireless Communications and Networking, special issue on Wireless Physical Security, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the frequency-selective broadcast channel with confidential messages (BCC) in which the transmitter sends a confidential message to receiver 1 and a common message to receivers 1 and 2. In the case of a block transmission of N symbols followed by a guard interval of L symbols, the frequency-selective channel can be modeled as a N * (N+L) Toeplitz matrix. For this special type of multiple-input multiple-output (MIMO) channels, we propose a practical Vandermonde precoding that consists of projecting the confidential messages in the null space of the channel seen by receiver 2 while superposing the common message. For this scheme, we provide the achievable rate region, i.e. the rate-tuple of the common and confidential messages, and characterize the optimal covariance inputs for some special cases of interest. It is proved that the proposed scheme achieves the optimal degree of freedom (d.o.f) region. More specifically, it enables to send l <= L confidential messages and N-l common messages simultaneously over a block of N+L symbols. Interestingly, the proposed scheme can be applied to secured multiuser scenarios such as the K+1-user frequency-selective BCC with K confidential messages and the two-user frequency-selective BCC with two confidential messages. For each scenario, we provide the achievable secrecy degree of freedom (s.d.o.f.) region of the corresponding frequency-selective BCC and prove the optimality of the Vandermonde precoding. One of the appealing features of the proposed scheme is that it does not require any specific secrecy encoding technique but can be applied on top of any existing powerful encoding schemes.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:28:30 GMT" } ]
2009-06-18T00:00:00
[ [ "Kobayashi", "Mari", "", "Shitz" ], [ "Debbah", "Merouane", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3194
Konstantinos Nikitopoulos
Konstantinos Nikitopoulos, Dan Zhang, I-Wei Lai and Gerd Ascheid
Complexity-Efficient Enumeration Techniques for Soft-Input, Soft-Output Sphere Decoding
The final version of this work appears in IEEE Communications Letters
Nikitopoulos, K., Dan Zhang, I-wei Lai;, Ascheid, G. "Complexity-efficient enumeration techniques for soft-input, soft-output sphere decoding," IEEE Communications Letters, vol.14, no.4, pp.312-314, Apr. 2010
10.1109/LCOMM.2010.04.092230
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper two complexity efficient soft sphere-decoder modifications are proposed for computing the max-log LLR values in iterative MIMO systems, which avoid the costly, typically needed, full enumeration and sorting (FES) procedure during the tree traversal without compromising the max-log performance. It is shown that despite the resulting increase in the number of expanded nodes, they can be more computationally efficient than the typical soft sphere decoders by avoiding the unnecessary complexity of FES.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:31:13 GMT" }, { "version": "v2", "created": "Wed, 17 Feb 2010 10:08:03 GMT" }, { "version": "v3", "created": "Thu, 4 Oct 2012 11:29:45 GMT" } ]
2012-10-05T00:00:00
[ [ "Nikitopoulos", "Konstantinos", "" ], [ "Zhang", "Dan", "" ], [ "Lai", "I-Wei", "" ], [ "Ascheid", "Gerd", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.3197
EPTCS
Maurice Margenstern
On the injectivity of the global function of a cellular automaton in the hyperbolic plane (extended abstract)
null
EPTCS 1, 2009, pp. 153-163
10.4204/EPTCS.1.15
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we look at the following question. We consider cellular automata in the hyperbolic plane, (see Margenstern, 2000, 2007 and Margenstern, Morita, 2001) and we consider the global function defined on all possible configurations. Is the injectivity of this function undecidable? The problem was answered positively in the case of the Euclidean plane by Jarkko Kari, in 1994. In the present paper, we show that the answer is also positive for the hyperbolic plane: the problem is undecidable.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:33:32 GMT" } ]
2009-06-18T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3199
EPTCS
Manfred Kudlek
Some Considerations on Universality
null
EPTCS 1, 2009, pp. 118-122
10.4204/EPTCS.1.11
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper puts into discussion the concept of universality, in particular for structures not of the power of Turing computability. The question arises if for such structures a universal structure of the same kind exists or not. For that the construction of universal Turing machines and those with some constraints are presented in some detail.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:39:20 GMT" } ]
2009-06-23T00:00:00
[ [ "Kudlek", "Manfred", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3200
Mari Kobayashi
Mari Kobayashi, Yingbin Liang, Shlomo Shamai, Merouane Debbah
On the Compound MIMO Broadcast Channels with Confidential Messages
To appear in Proc. IEEE Symposium on Information Theory (ISIT 2009) June 28 - July 3, 2009, Seoul, Korea
null
10.1109/ISIT.2009.5205953
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the compound multi-input multi-output (MIMO) broadcast channel with confidential messages (BCC), where one transmitter sends a common message to two receivers and two confidential messages respectively to each receiver. The channel state may take one of a finite set of states, and the transmitter knows the state set but does not know the realization of the state. We study achievable rates with perfect secrecy in the high SNR regime by characterizing an achievable secrecy degree of freedom (s.d.o.f.) region for two models, the Gaussian MIMO-BCC and the ergodic fading multi-input single-output (MISO)-BCC without a common message. We show that by exploiting an additional temporal dimension due to state variation in the ergodic fading model, the achievable s.d.o.f. region can be significantly improved compared to the Gaussian model with a constant state, although at the price of a larger delay.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:40:32 GMT" } ]
2016-11-18T00:00:00
[ [ "Kobayashi", "Mari", "" ], [ "Liang", "Yingbin", "" ], [ "Shamai", "Shlomo", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3202
Moshe Levy
Jacob Goldenberg and Moshe Levy
Distance Is Not Dead: Social Interaction and Geographical Distance in the Internet Era
null
null
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Internet revolution has made long-distance communication dramatically faster, easier, and cheaper than ever before. This, it has been argued, has decreased the importance of geographic proximity in social interactions, transforming our world into a global village with a borderless society. We argue for the opposite: while technology has undoubtedly increased the overall level of communication, this increase has been most pronounced for local social ties. We show that the volume of electronic communications is inversely proportional to geographic distance, following a Power Law. We directly study the importance of physical proximity in social interactions by analyzing the spatial dissemination of new baby names. Counter-intuitively, and in line with the above argument, the importance of geographic proximity has dramatically increased with the internet revolution.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 14:42:13 GMT" }, { "version": "v2", "created": "Mon, 19 Oct 2009 06:40:00 GMT" } ]
2009-10-19T00:00:00
[ [ "Goldenberg", "Jacob", "" ], [ "Levy", "Moshe", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0906.3208
EPTCS
Alexander Okhotin
Representing a P-complete problem by small trellis automata
null
EPTCS 1, 2009, pp. 185-198
10.4204/EPTCS.1.18
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A restricted case of the Circuit Value Problem known as the Sequential NOR Circuit Value Problem was recently used to obtain very succinct examples of conjunctive grammars, Boolean grammars and language equations representing P-complete languages (Okhotin, http://dx.doi.org/10.1007/978-3-540-74593-8_23 "A simple P-complete problem and its representations by language equations", MCU 2007). In this paper, a new encoding of the same problem is proposed, and a trellis automaton (one-way real-time cellular automaton) with 11 states solving this problem is constructed.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 15:21:41 GMT" } ]
2009-06-18T00:00:00
[ [ "Okhotin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3213
EPTCS
Nicolas Ollinger
Intrinsically Universal Cellular Automata
null
EPTCS 1, 2009, pp. 199-204
10.4204/EPTCS.1.19
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This talk advocates intrinsic universality as a notion to identify simple cellular automata with complex computational behavior. After an historical introduction and proper definitions of intrinsic universality, which is discussed with respect to Turing and circuit universality, we discuss construction methods for small intrinsically universal cellular automata before discussing techniques for proving non universality.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 15:24:44 GMT" } ]
2009-06-18T00:00:00
[ [ "Ollinger", "Nicolas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3220
Narad Rampersad
Narad Rampersad and Jeffrey Shallit
Detecting patterns in finite regular and context-free languages
9 pages
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider variations on the following problem: given an NFA M and a pattern p, does there exist an x in L(M) such that p matches x? We consider the restricted problem where M only accepts a finite language. We also consider the variation where the pattern p is required only to match a factor of x. We show that both of these problems are NP-complete. We also consider the same problems for context-free grammars; in this case the problems become PSPACE-complete.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 15:53:06 GMT" } ]
2009-06-18T00:00:00
[ [ "Rampersad", "Narad", "" ], [ "Shallit", "Jeffrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3224
Sergey Andreyev
Sergey Andreyev
Personal applications, based on moveable / resizable elements
14 pages, 12 figures
null
null
null
cs.HC cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
All the modern day applications have the interface, absolutely defined by the developers. The use of adaptive interface or dynamic layout allows some variations, but even all of them are predetermined on the design stage, because the best reaction (from designer's view) on any possible users' movement was hardcoded. But there is a different world of applications, totally constructed on moveable / resizable elements; such applications turn the full control to the users. The crucial thing in such programs is that not something but everything must become moveable and resizable. This article describes the features of such applications and the algorithm behind their design.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:07:01 GMT" } ]
2009-06-18T00:00:00
[ [ "Andreyev", "Sergey", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0906.3225
EPTCS
J\'er\^ome Durand-Lose
Small Turing universal signal machines
null
EPTCS 1, 2009, pp. 70-80
10.4204/EPTCS.1.7
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article aims at providing signal machines as small as possible able to perform any computation (in the classical understanding). After presenting signal machines, it is shown how to get universal ones from Turing machines, cellular-automata and cyclic tag systems. Finally a halting universal signal machine with 13 meta-signals and 21 collision rules is presented.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:08:47 GMT" } ]
2009-06-22T00:00:00
[ [ "Durand-Lose", "Jérôme", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3227
EPTCS
Nicolas Ollinger, Ga\'etan Richard
A Particular Universal Cellular Automaton
null
EPTCS 1, 2009, pp. 205-214
10.4204/EPTCS.1.20
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Signals are a classical tool used in cellular automata constructions that proved to be useful for language recognition or firing-squad synchronisation. Particles and collisions formalize this idea one step further, describing regular nets of colliding signals. In the present paper, we investigate the use of particles and collisions for constructions involving an infinite number of interacting particles. We obtain a high-level construction for a new smallest intrinsically universal cellular automaton with 4 states.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:11:12 GMT" } ]
2009-06-22T00:00:00
[ [ "Ollinger", "Nicolas", "" ], [ "Richard", "Gaétan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3228
EPTCS
Klaus Sutner
Computational Processes and Incompleteness
null
EPTCS 1, 2009, pp. 226-234
10.4204/EPTCS.1.22
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a formal definition of Wolfram's notion of computational process based on cellular automata, a physics-like model of computation. There is a natural classification of these processes into decidable, intermediate and complete. It is shown that in the context of standard finite injury priority arguments one cannot establish the existence of an intermediate computational process.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:13:53 GMT" } ]
2009-06-18T00:00:00
[ [ "Sutner", "Klaus", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.3231
EPTCS
Sergey Verlan, Yurii Rogozhin
New Choice for Small Universal Devices: Symport/Antiport P Systems
null
EPTCS 1, 2009, pp. 235-242
10.4204/EPTCS.1.23
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Symport/antiport P systems provide a very simple machinery inspired by corresponding operations in the living cell. It turns out that systems of small descriptional complexity are needed to achieve the universality by these systems. This makes them a good candidate for small universal devices replacing register machines for different simulations, especially when a simulating parallel machinery is involved. This article contains survey of these systems and presents different trade-offs between parameters.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:14:54 GMT" } ]
2009-06-18T00:00:00
[ [ "Verlan", "Sergey", "" ], [ "Rogozhin", "Yurii", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3234
Vivek Goyal
Sundeep Rangan, Alyson K. Fletcher, and Vivek K Goyal
Asymptotic Analysis of MAP Estimation via the Replica Method and Applications to Compressed Sensing
22 pages; added details on the replica symmetry assumption
IEEE Trans. on Information Theory, vol. 58, no. 3, pp. 1903-1923, March 2012
10.1109/TIT.2011.2177575
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The replica method is a non-rigorous but well-known technique from statistical physics used in the asymptotic analysis of large, random, nonlinear problems. This paper applies the replica method, under the assumption of replica symmetry, to study estimators that are maximum a posteriori (MAP) under a postulated prior distribution. It is shown that with random linear measurements and Gaussian noise, the replica-symmetric prediction of the asymptotic behavior of the postulated MAP estimate of an n-dimensional vector "decouples" as n scalar postulated MAP estimators. The result is based on applying a hardening argument to the replica analysis of postulated posterior mean estimators of Tanaka and of Guo and Verdu. The replica-symmetric postulated MAP analysis can be readily applied to many estimators used in compressed sensing, including basis pursuit, lasso, linear estimation with thresholding, and zero norm-regularized estimation. In the case of lasso estimation the scalar estimator reduces to a soft-thresholding operator, and for zero norm-regularized estimation it reduces to a hard-threshold. Among other benefits, the replica method provides a computationally-tractable method for precisely predicting various performance metrics including mean-squared error and sparsity pattern recovery probability.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:24:23 GMT" }, { "version": "v2", "created": "Wed, 26 Aug 2009 17:31:22 GMT" }, { "version": "v3", "created": "Sat, 8 Oct 2011 21:39:53 GMT" } ]
2015-01-20T00:00:00
[ [ "Rangan", "Sundeep", "" ], [ "Fletcher", "Alyson K.", "" ], [ "Goyal", "Vivek K", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3235
EPTCS
Cristian S. Calude
Simplicity via Provability for Universal Prefix-free Turing Machines
null
EPTCS 1, 2009, pp. 16-21
10.4204/EPTCS.1.2
null
cs.IT cs.LO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Universality is one of the most important ideas in computability theory. There are various criteria of simplicity for universal Turing machines. Probably the most popular one is to count the number of states/symbols. This criterion is more complex than it may appear at a first glance. In this note we review recent results in Algorithmic Information Theory and propose three new criteria of simplicity for universal prefix-free Turing machines. These criteria refer to the possibility of proving various natural properties of such a machine (its universality, for example) in a formal theory, PA or ZFC. In all cases some, but not all, machines are simple.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:25:45 GMT" } ]
2009-06-18T00:00:00
[ [ "Calude", "Cristian S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3240
Efi Fogel
Efi Fogel
Minkowski Sum Construction and other Applications of Arrangements of Geodesic Arcs on the Sphere
A Ph.D. thesis carried out at the Tel-Aviv university. 134 pages long. The advisor was Prof. Dan Halperin
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two exact implementations of efficient output-sensitive algorithms that compute Minkowski sums of two convex polyhedra in 3D. We do not assume general position. Namely, we handle degenerate input, and produce exact results. We provide a tight bound on the exact maximum complexity of Minkowski sums of polytopes in 3D in terms of the number of facets of the summand polytopes. The algorithms employ variants of a data structure that represents arrangements embedded on two-dimensional parametric surfaces in 3D, and they make use of many operations applied to arrangements in these representations. We have developed software components that support the arrangement data-structure variants and the operations applied to them. These software components are generic, as they can be instantiated with any number type. However, our algorithms require only (exact) rational arithmetic. These software components together with exact rational-arithmetic enable a robust, efficient, and elegant implementation of the Minkowski-sum constructions and the related applications. These software components are provided through a package of the Computational Geometry Algorithm Library (CGAL) called Arrangement_on_surface_2. We also present exact implementations of other applications that exploit arrangements of arcs of great circles embedded on the sphere. We use them as basic blocks in an exact implementation of an efficient algorithm that partitions an assembly of polyhedra in 3D with two hands using infinite translations. This application distinctly shows the importance of exact computation, as imprecise computation might result with dismissal of valid partitioning-motions.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 15:51:04 GMT" } ]
2009-12-07T00:00:00
[ [ "Fogel", "Efi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.3245
Jes\'us Pardillo
Cristina Cachero, Jes\'us Pardillo
Goal-oriented Data Warehouse Quality Measurement
11 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Requirements engineering is known to be a key factor for the success of software projects. Inside this discipline, goal-oriented requirements engineering approaches have shown specially suitable to deal with projects where it is necessary to capture the alignment between system requirements and stakeholders' needs, as is the case of data-warehousing projects. However, the mere alignment of data-warehouse system requirements with business goals is not enough to assure better data-warehousing products; measures and techniques are also needed to assure the data-warehouse quality. In this paper, we provide a modelling framework for data-warehouse quality measurement (i*DWQM). This framework, conceived as an i* extension, provides support for the definition of data-warehouse requirements analysis models that include quantifiable quality scenarios, defined in terms of well-formed measures. This extension has been defined by means of a UML profiling architecture. The resulting framework has been implemented in the Eclipse development platform.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 16:49:03 GMT" } ]
2009-06-18T00:00:00
[ [ "Cachero", "Cristina", "" ], [ "Pardillo", "Jesús", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.3248
EPTCS
Matthew Cook
A Concrete View of Rule 110 Computation
null
EPTCS 1, 2009, pp. 31-55
10.4204/EPTCS.1.4
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rule 110 is a cellular automaton that performs repeated simultaneous updates of an infinite row of binary values. The values are updated in the following way: 0s are changed to 1s at all positions where the value to the right is a 1, while 1s are changed to 0s at all positions where the values to the left and right are both 1. Though trivial to define, the behavior exhibited by Rule 110 is surprisingly intricate, and in (Cook, 2004) we showed that it is capable of emulating the activity of a Turing machine by encoding the Turing machine and its tape into a repeating left pattern, a central pattern, and a repeating right pattern, which Rule 110 then acts on. In this paper we provide an explicit compiler for converting a Turing machine into a Rule 110 initial state, and we present a general approach for proving that such constructions will work as intended. The simulation was originally assumed to require exponential time, but surprising results of Neary and Woods (2006) have shown that in fact, only polynomial time is required. We use the methods of Neary and Woods to exhibit a direct simulation of a Turing machine by a tag system in polynomial time.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 17:01:54 GMT" } ]
2009-06-18T00:00:00
[ [ "Cook", "Matthew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3251
EPTCS
David Doty, Matthew J. Patitz, Scott M. Summers
Limitations of Self-Assembly at Temperature One (extended abstract)
null
EPTCS 1, 2009, pp. 67-69
10.4204/EPTCS.1.6
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that if a subset X of the integer Cartesian plane weakly self-assembles at temperature 1 in a deterministic (Winfree) tile assembly system satisfying a natural condition known as *pumpability*, then X is a finite union of doubly periodic sets. This shows that only the most simple of infinite shapes and patterns can be constructed using pumpable temperature 1 tile assembly systems, and gives strong evidence for the thesis that temperature 2 or higher is required to carry out general-purpose computation in a tile assembly system. Finally, we show that general-purpose computation is possible at temperature 1 if negative glue strengths are allowed in the tile assembly model.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 17:06:51 GMT" } ]
2009-06-18T00:00:00
[ [ "Doty", "David", "" ], [ "Patitz", "Matthew J.", "" ], [ "Summers", "Scott M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3256
EPTCS
Olivier Bournez, J\'er\'emie Chalopin, Johanne Cohen, Xavier Koegler
Playing With Population Protocols
null
EPTCS 1, 2009, pp. 3-15
10.4204/EPTCS.1.1
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement: A collection of anonymous agents, modeled by finite automata, interact in pairs according to some rules. Predicates on the initial configurations that can be computed by such protocols have been characterized under several hypotheses. We discuss here whether and when the rules of interactions between agents can be seen as a game from game theory. We do so by discussing several basic protocols.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 17:16:01 GMT" } ]
2009-06-18T00:00:00
[ [ "Bournez", "Olivier", "" ], [ "Chalopin", "Jérémie", "" ], [ "Cohen", "Johanne", "" ], [ "Koegler", "Xavier", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.3257
EPTCS
Gr\'egory Lafitte
Busy beavers gone wild
null
EPTCS 1, 2009, pp. 123-129
10.4204/EPTCS.1.12
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show some incompleteness results a la Chaitin using the busy beaver functions. Then, with the help of ordinal logics, we show how to obtain a theory in which the values of the busy beaver functions can be provably established and use this to reveal a structure on the provability of the values of these functions.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 17:19:05 GMT" } ]
2009-06-22T00:00:00
[ [ "Lafitte", "Grégory", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.3282
Karthikeyan Lingasubramanian
Karthikeyan Lingasubramanian, Syed M. Alam and Sanjukta Bhanja
Maximum Error Modeling for Fault-Tolerant Computation using Maximum a posteriori (MAP) Hypothesis
null
Microelectronics Reliability, 2010
10.1016/j.microrel.2010.07.156
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The application of current generation computing machines in safety-centric applications like implantable biomedical chips and automobile safety has immensely increased the need for reviewing the worst-case error behavior of computing devices for fault-tolerant computation. In this work, we propose an exact probabilistic error model that can compute the maximum error over all possible input space in a circuit specific manner and can handle various types of structural dependencies in the circuit. We also provide the worst-case input vector, which has the highest probability to generate an erroneous output, for any given logic circuit. We also present a study of circuit-specific error bounds for fault-tolerant computation in heterogeneous circuits using the maximum error computed for each circuit. We model the error estimation problem as a maximum a posteriori (MAP) estimate, over the joint error probability function of the entire circuit, calculated efficiently through an intelligent search of the entire input space using probabilistic traversal of a binary join tree using Shenoy-Shafer algorithm. We demonstrate this model using MCNC and ISCAS benchmark circuits and validate it using an equivalent HSpice model. Both results yield the same worst-case input vectors and the highest % difference of our error model over HSpice is just 1.23%. We observe that the maximum error probabilities are significantly larger than the average error probabilities, and provides a much tighter error bounds for fault-tolerant computation. We also find that the error estimates depend on the specific circuit structure and the maximum error probabilities are sensitive to the individual gate failure probabilities.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 19:23:28 GMT" }, { "version": "v2", "created": "Thu, 15 Oct 2009 16:04:33 GMT" }, { "version": "v3", "created": "Tue, 27 Oct 2009 13:57:19 GMT" } ]
2021-08-23T00:00:00
[ [ "Lingasubramanian", "Karthikeyan", "" ], [ "Alam", "Syed M.", "" ], [ "Bhanja", "Sanjukta", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3284
Niall Murphy
Eric Goles, Pierre-Etienne Meunier, Ivan Rapaport and Guillaume Theyssier
Communications in cellular automata
null
EPTCS 1, 2009, pp. 81-92
10.4204/EPTCS.1.8
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of this paper is to show why the framework of communication complexity seems suitable for the study of cellular automata. Researchers have tackled different algorithmic problems ranging from the complexity of predicting to the decidability of different dynamical properties of cellular automata. But the difference here is that we look for communication protocols arising in the dynamics itself. Our work is guided by the following idea: if we are able to give a protocol describing a cellular automaton, then we can understand its behavior.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 19:52:34 GMT" } ]
2009-06-22T00:00:00
[ [ "Goles", "Eric", "" ], [ "Meunier", "Pierre-Etienne", "" ], [ "Rapaport", "Ivan", "" ], [ "Theyssier", "Guillaume", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3286
Niall Murphy
Fred Lunnon
The Pagoda Sequence: a Ramble through Linear Complexity, Number Walls, D0L Sequences, Finite State Automata, and Aperiodic Tilings
null
EPTCS 1, 2009, pp. 130-148
10.4204/EPTCS.1.13
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We review the concept of the number wall as an alternative to the traditional linear complexity profile (LCP), and sketch the relationship to other topics such as linear feedback shift-register (LFSR) and context-free Lindenmayer (D0L) sequences. A remarkable ternary analogue of the Thue-Morse sequence is introduced having deficiency 2 modulo 3, and this property verified via the re-interpretation of the number wall as an aperiodic plane tiling.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 19:47:52 GMT" } ]
2009-06-18T00:00:00
[ [ "Lunnon", "Fred", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]