id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0906.2311 | Francesco Pasquale | Chen Avin, Zvi Lotker, Francesco Pasquale, Yvonne-Anne Pignolet | A note on uniform power connectivity in the SINR model | 13 pages | null | 10.1007/978-3-642-05434-1_12 | null | cs.DM cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we study the connectivity problem for wireless networks under
the Signal to Interference plus Noise Ratio (SINR) model. Given a set of radio
transmitters distributed in some area, we seek to build a directed strongly
connected communication graph, and compute an edge coloring of this graph such
that the transmitter-receiver pairs in each color class can communicate
simultaneously. Depending on the interference model, more or less colors,
corresponding to the number of frequencies or time slots, are necessary. We
consider the SINR model that compares the received power of a signal at a
receiver to the sum of the strength of other signals plus ambient noise . The
strength of a signal is assumed to fade polynomially with the distance from the
sender, depending on the so-called path-loss exponent $\alpha$.
We show that, when all transmitters use the same power, the number of colors
needed is constant in one-dimensional grids if $\alpha>1$ as well as in
two-dimensional grids if $\alpha>2$. For smaller path-loss exponents and
two-dimensional grids we prove upper and lower bounds in the order of
$\mathcal{O}(\log n)$ and $\Omega(\log n/\log\log n)$ for $\alpha=2$ and
$\Theta(n^{2/\alpha-1})$ for $\alpha<2$ respectively. If nodes are distributed
uniformly at random on the interval $[0,1]$, a \emph{regular} coloring of
$\mathcal{O}(\log n)$ colors guarantees connectivity, while $\Omega(\log \log
n)$ colors are required for any coloring.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 12:20:37 GMT"
},
{
"version": "v2",
"created": "Sun, 31 Jan 2010 11:57:41 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Avin",
"Chen",
""
],
[
"Lotker",
"Zvi",
""
],
[
"Pasquale",
"Francesco",
""
],
[
"Pignolet",
"Yvonne-Anne",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.2315 | Raphael Jolly | Raphael Jolly, Heinz Kredel | Symbolic Script Programming for Java | null | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Computer algebra in Java is a promising field of development. It has not yet
reached an industrial strength, in part because of a lack of good user
interfaces. Using a general purpose scripting language can bring a natural
mathematical notation, akin to the one of specialized interfaces included in
most computer algebra systems. We present such an interface for Java computer
algebra libraries, using scripts available in the JSR 223 framework. We
introduce the concept of `symbolic programming' and show its usefulness by
prototypes of symbolic polynomials and polynomial rings.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 12:38:22 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Jun 2009 10:39:44 GMT"
}
]
| 2009-06-15T00:00:00 | [
[
"Jolly",
"Raphael",
""
],
[
"Kredel",
"Heinz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0906.2351 | Jacques-Olivier Lachaud | F. De Vieilleville (LaBRI), Jacques-Olivier Lachaud (LaBRI) | Revisiting Digital Straight Segment Recognition | null | Proc. Int. Conf. Discrete Geometry for Computer Imagery
(DGCI2006), Szeged : Hongrie (2006) | 10.1007/11907350_30 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents new results about digital straight segments, their
recognition and related properties. They come from the study of the
arithmetically based recognition algorithm proposed by I. Debled-Rennesson and
J.-P. Reveill\`es in 1995 [Debled95]. We indeed exhibit the relations
describing the possible changes in the parameters of the digital straight
segment under investigation. This description is achieved by considering new
parameters on digital segments: instead of their arithmetic description, we
examine the parameters related to their combinatoric description. As a result
we have a better understanding of their evolution during recognition and
analytical formulas to compute them. We also show how this evolution can be
projected onto the Stern-Brocot tree. These new relations have interesting
consequences on the geometry of digital curves. We show how they can for
instance be used to bound the slope difference between consecutive maximal
segments.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 14:46:02 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"De Vieilleville",
"F.",
"",
"LaBRI"
],
[
"Lachaud",
"Jacques-Olivier",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.2369 | C{\ba}t{\ba}lin Ionu\c{t} T\^irn{\ba}uc{\ba} | Andreas Maletti and Catalin Ionut Tirnauca | Properties of quasi-alphabetic tree bimorphisms | 15 pages, 1 figure | null | null | null | cs.CL cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the class of quasi-alphabetic relations, i.e., tree transformations
defined by tree bimorphisms with two quasi-alphabetic tree homomorphisms and a
regular tree language. We present a canonical representation of these
relations; as an immediate consequence, we get the closure under union. Also,
we show that they are not closed under intersection and complement, and do not
preserve most common operations on trees (branches, subtrees, v-product,
v-quotient, f-top-catenation). Moreover, we prove that the translations defined
by quasi-alphabetic tree bimorphism are exactly products of context-free string
languages. We conclude by presenting the connections between quasi-alphabetic
relations, alphabetic relations and classes of tree transformations defined by
several types of top-down tree transducers. Furthermore, we get that
quasi-alphabetic relations preserve the recognizable and algebraic tree
languages.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 16:34:56 GMT"
}
]
| 2010-05-13T00:00:00 | [
[
"Maletti",
"Andreas",
""
],
[
"Tirnauca",
"Catalin Ionut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.2372 | Ido Tal | Ido Tal, Ron M. Roth | Bounds on the Rate of 2-D Bit-Stuffing Encoders | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A method for bounding the rate of bit-stuffing encoders for 2-D constraints
is presented. Instead of considering the original encoder, we consider a
related one which is quasi-stationary. We use the quasi-stationary property in
order to formulate linear requirements that must hold on the probabilities of
the constrained arrays that are generated by the encoder. These requirements
are used as part of a linear program. The minimum and maximum of the linear
program bound the rate of the encoder from below and from above, respectively.
A lower bound on the rate of an encoder is also a lower bound on the capacity
of the corresponding constraint. For some constraints, our results lead to
tighter lower bounds than what was previously known.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 16:47:37 GMT"
}
]
| 2009-06-15T00:00:00 | [
[
"Tal",
"Ido",
""
],
[
"Roth",
"Ron M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2395 | Benjmain Moseley | Chandra Chekuri, Sungjin Im, Benjamin Moseley | Longest Wait First for Broadcast Scheduling | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider online algorithms for broadcast scheduling. In the pull-based
broadcast model there are $n$ unit-sized pages of information at a server and
requests arrive online for pages. When the server transmits a page $p$, all
outstanding requests for that page are satisfied. The longest-wait-first} (LWF)
algorithm is a natural algorithm that has been shown to have good empirical
performance. In this paper we make two main contributions to the analysis of
LWF and broadcast scheduling. \begin{itemize} \item We give an intuitive and
easy to understand analysis of LWF which shows that it is
$O(1/\eps^2)$-competitive for average flow-time with $(4+\eps)$ speed. Using a
more involved analysis, we show that LWF is $O(1/\eps^3)$-competitive for
average flow-time with $(3.4+\epsilon)$ speed. \item We show that a natural
extension of LWF is O(1)-speed O(1)-competitive for more general objective
functions such as average delay-factor and $L_k$ norms of delay-factor (for
fixed $k$). \end{itemize}
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 18:27:07 GMT"
}
]
| 2009-06-15T00:00:00 | [
[
"Chekuri",
"Chandra",
""
],
[
"Im",
"Sungjin",
""
],
[
"Moseley",
"Benjamin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2415 | Lillian Lee | Cristian Danescu-Niculescu-Mizil, Lillian Lee and Richard Ducott | Without a 'doubt'? Unsupervised discovery of downward-entailing
operators | System output available at
http://www.cs.cornell.edu/~cristian/Without_a_doubt_-_Data.html | Proceedings of NAACL HLT, pp. 137--145, 2009 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important part of textual inference is making deductions involving
monotonicity, that is, determining whether a given assertion entails
restrictions or relaxations of that assertion. For instance, the statement 'We
know the epidemic spread quickly' does not entail 'We know the epidemic spread
quickly via fleas', but 'We doubt the epidemic spread quickly' entails 'We
doubt the epidemic spread quickly via fleas'. Here, we present the first
algorithm for the challenging lexical-semantics problem of learning linguistic
constructions that, like 'doubt', are downward entailing (DE). Our algorithm is
unsupervised, resource-lean, and effective, accurately recovering many DE
operators that are missing from the hand-constructed lists that
textual-inference systems currently use.
| [
{
"version": "v1",
"created": "Fri, 12 Jun 2009 23:50:06 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Danescu-Niculescu-Mizil",
"Cristian",
""
],
[
"Lee",
"Lillian",
""
],
[
"Ducott",
"Richard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0906.2446 | Serguei Mokhov | Marc-Andr\'e Laverdi\`ere, Serguei A. Mokhov, Suhasini Tsapa, and
Djamel Benredjem | Ftklipse - Design and Implementation of an Extendable Computer Forensics
Environment: Software Requirements Specification Document | SRS project document of an open-source project; 25 pages; 4 figures;
from April 2006; v2 adds missing .ind file for the index | null | null | null | cs.CR cs.SE | http://creativecommons.org/licenses/by/3.0/ | The purpose behind this article is to describe the features of Ftklipse, an
extendable platform for computer forensics. This document designed to provide a
detailed specification for the developers of Ftklipse. Ftklipse is a
thick-client solution for forensics investigation. It is designed to collect
and preserve evidence, to analyze it and to report on it. It supports chain of
custody management, access control policies, and batch operation of its
included tools in order to facilitate and accelerate the investigation. The
environment itself and its tools are configurable as well and is based on
Eclipse.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 04:46:52 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jul 2009 04:34:51 GMT"
}
]
| 2009-07-27T00:00:00 | [
[
"Laverdière",
"Marc-André",
""
],
[
"Mokhov",
"Serguei A.",
""
],
[
"Tsapa",
"Suhasini",
""
],
[
"Benredjem",
"Djamel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.2447 | Serguei Mokhov | Marc-Andr\'e Laverdi\`ere, Serguei A. Mokhov, Suhasini Tsapa, and
Djamel Benredjem | Ftklipse - Design and Implementation of an Extendable Computer Forensics
Environment: Specification Design Document | 37 pages, 11 figures, 3 tables, index; April 24, 2006 project. This
SDD document follows the SRS specification of the same project found at
arXiv:0906.2446 ; v2 adds the missing .ind file for the index | null | null | null | cs.CR cs.SE | http://creativecommons.org/licenses/by/3.0/ | The purpose of this work is to design and implement a plugin-based
environment that allows to integrate forensic tools working together to support
programming tasks and addition of new tools. Integration is done through GUI
components. The end-system environment must have user friendly GUI,
configuration capabilities, plug-in capabilities to insert/inject new tools,
case management, and chain of custody capabilities, along with evidence
gathering capabilities, evidence preservation capabilities, and, finally report
generation capabilities. A subset of these requirements has been implemented in
Ftklipse, an open-source project, which is detailed throughout the rest of this
document.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 05:06:22 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jul 2009 04:39:22 GMT"
}
]
| 2009-07-27T00:00:00 | [
[
"Laverdière",
"Marc-André",
""
],
[
"Mokhov",
"Serguei A.",
""
],
[
"Tsapa",
"Suhasini",
""
],
[
"Benredjem",
"Djamel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.2448 | Karthekeyan Chandrasekaran | Karthekeyan Chandrasekaran, Amit Deshpande, Santosh Vempala | The Limit of Convexity Based Isoperimetry: Sampling Harmonic-Concave
Functions | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Logconcave functions represent the current frontier of efficient algorithms
for sampling, optimization and integration in R^n. Efficient sampling
algorithms to sample according to a probability density (to which the other two
problems can be reduced) relies on good isoperimetry which is known to hold for
arbitrary logconcave densities. In this paper, we extend this frontier in two
ways: first, we characterize convexity-like conditions that imply good
isoperimetry, i.e., what condition on function values along every line
guarantees good isoperimetry? The answer turns out to be the set of
(1/(n-1))-harmonic concave functions in R^n; we also prove that this is the
best possible characterization along every line, of functions having good
isoperimetry. Next, we give the first efficient algorithm for sampling
according to such functions with complexity depending on a smoothness
parameter. Further, noting that the multivariate Cauchy density is an important
distribution in this class, we exploit certain properties of the Cauchy density
to give an efficient sampling algorithm based on random walks with a mixing
time that matches the current best bounds known for sampling logconcave
functions.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 05:15:53 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Chandrasekaran",
"Karthekeyan",
""
],
[
"Deshpande",
"Amit",
""
],
[
"Vempala",
"Santosh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2459 | Vit Niennattrakul | Vit Niennattrakul, Pongsakorn Ruengronghirunya, Chotirat Ann
Ratanamahatana | Exact Indexing for Massive Time Series Databases under Time Warping
Distance | Submitted to Data Mining and Knowledge Discovery (DMKD). 33 pages, 19
figures, and 8 tables | null | null | null | cs.DB cs.AI cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Among many existing distance measures for time series data, Dynamic Time
Warping (DTW) distance has been recognized as one of the most accurate and
suitable distance measures due to its flexibility in sequence alignment.
However, DTW distance calculation is computationally intensive. Especially in
very large time series databases, sequential scan through the entire database
is definitely impractical, even with random access that exploits some index
structures since high dimensionality of time series data incurs extremely high
I/O cost. More specifically, a sequential structure consumes high CPU but low
I/O costs, while an index structure requires low CPU but high I/O costs. In
this work, we therefore propose a novel indexed sequential structure called
TWIST (Time Warping in Indexed Sequential sTructure) which benefits from both
sequential access and index structure. When a query sequence is issued, TWIST
calculates lower bounding distances between a group of candidate sequences and
the query sequence, and then identifies the data access order in advance, hence
reducing a great number of both sequential and random accesses. Impressively,
our indexed sequential structure achieves significant speedup in a querying
process by a few orders of magnitude. In addition, our method shows superiority
over existing rival methods in terms of query processing time, number of page
accesses, and storage requirement with no false dismissal guaranteed.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 09:07:05 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Niennattrakul",
"Vit",
""
],
[
"Ruengronghirunya",
"Pongsakorn",
""
],
[
"Ratanamahatana",
"Chotirat Ann",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.2461 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, Vi Hart, John Iacono, Stefan
Langerman, Joseph O'Rourke | Continuous Blooming of Convex Polyhedra | 13 pages, 6 figures | null | null | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We construct the first two continuous bloomings of all convex polyhedra.
First, the source unfolding can be continuously bloomed. Second, any unfolding
of a convex polyhedron can be refined (further cut, by a linear number of cuts)
to have a continuous blooming.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 09:27:18 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Hart",
"Vi",
""
],
[
"Iacono",
"John",
""
],
[
"Langerman",
"Stefan",
""
],
[
"O'Rourke",
"Joseph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2466 | Iftah Gamzu | Chandra Chekuri, Iftah Gamzu | Truthful Mechanisms via Greedy Iterative Packing | 20 pages, 1 figure | null | 10.1007/978-3-642-03685-9_5 | null | cs.GT cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An important research thread in algorithmic game theory studies the design of
efficient truthful mechanisms that approximate the optimal social welfare. A
fundamental question is whether an \alpha-approximation algorithm translates
into an \alpha-approximate truthful mechanism. It is well-known that plugging
an \alpha-approximation algorithm into the VCG technique may not yield a
truthful mechanism. Thus, it is natural to investigate properties of
approximation algorithms that enable their use in truthful mechanisms.
The main contribution of this paper is to identify a useful and natural
property of approximation algorithms, which we call loser-independence; this
property is applicable in the single-minded and single-parameter settings.
Intuitively, a loser-independent algorithm does not change its outcome when the
bid of a losing agent increases, unless that agent becomes a winner. We
demonstrate that loser-independent algorithms can be employed as sub-procedures
in a greedy iterative packing approach while preserving monotonicity. A greedy
iterative approach provides a good approximation in the context of maximizing a
non-decreasing submodular function subject to independence constraints. Our
framework gives rise to truthful approximation mechanisms for various problems.
Notably, some problems arise in online mechanism design.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 10:39:42 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Chekuri",
"Chandra",
""
],
[
"Gamzu",
"Iftah",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2470 | Francesc Rossell\'o | Arnau Mir, Francesc Rossello | The mean value of the squared path-difference distance for rooted
phylogenetic trees | 16 pages | null | null | null | q-bio.PE cs.DM math.CA q-bio.QM | http://creativecommons.org/licenses/by-nc-sa/3.0/ | The path-difference metric is one of the oldest distances for the comparison
of fully resolved phylogenetic trees, but its statistical properties are still
quite unknown. In this paper we compute the mean value of the square of the
path-difference metric between two fully resolved rooted phylogenetic trees
with $n$ leaves, under the uniform distribution. This complements previous work
by Steel and Penny, who computed this mean value for fully resolved unrooted
phylogenetic trees.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 11:33:28 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Mir",
"Arnau",
""
],
[
"Rossello",
"Francesc",
""
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CA",
"description": "Special functions, orthogonal polynomials, harmonic analysis, ODE's, differential relations, calculus of variations, approximations, expansions, asymptotics",
"span": "(Classical Analysis and ODEs)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
]
|
0906.2477 | Nelma Moreira | Rog\'erio Reis, Nelma Moreira and Marco Almeida | On the Representation of Finite Automata | DCFS 2005 | null | null | DCC-2005-04 | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give an unique string representation, up to isomorphism, for initially
connected deterministic finite automata (ICDFAs) with n states over an alphabet
of k symbols. We show how to generate all these strings for each n and k, and
how its enumeration provides an alternative way to obtain the exact number of
ICDFAs.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 14:31:00 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Reis",
"Rogério",
""
],
[
"Moreira",
"Nelma",
""
],
[
"Almeida",
"Marco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.2509 | Ruihu Li | Ruihu Li, Zongben Xu | On $[[n,n-4,3]]_{q}$ Quantum MDS Codes for odd prime power $q$ | 7 pages, submitted to IEEE Trans. Inf. Theory | null | 10.1103/PhysRevA.82.052316 | CLN: 9-456 | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | For each odd prime power $q$, let $4 \leq n\leq q^{2}+1$. Hermitian
self-orthogonal $[n,2,n-1]$ codes over $GF(q^{2})$ with dual distance three are
constructed by using finite field theory. Hence, $[[n,n-4,3]]_{q}$ quantum MDS
codes for $4 \leq n\leq q^{2}+1$ are obtained.
| [
{
"version": "v1",
"created": "Sun, 14 Jun 2009 04:11:25 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Li",
"Ruihu",
""
],
[
"Xu",
"Zongben",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2511 | Philip Schniter | C. Emre Koksal and Philip Schniter | Robust Rate-Adaptive Wireless Communication Using ACK/NAK-Feedback | Relative to the original version, this version includes a revised
introduction and a few minor technical changes | null | null | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To combat the detrimental effects of the variability in wireless channels, we
consider cross-layer rate adaptation based on limited feedback. In particular,
based on limited feedback in the form of link-layer acknowledgements (ACK) and
negative acknowledgements (NAK), we maximize the physical-layer transmission
rate subject to an upper bound on the expected packet error rate. \textr{We
take a robust approach in that we do not assume} any particular prior
distribution on the channel state. We first analyze the fundamental limitations
of such systems and derive an upper bound on the achievable rate for signaling
schemes based on uncoded QAM and random Gaussian ensembles. We show that, for
channel estimation based on binary ACK/NAK feedback, it may be preferable to
use a separate training sequence at high error rates, rather than to exploit
low-error-rate data packets themselves. We also develop an adaptive recursive
estimator, which is provably asymptotically optimal and asymptotically
efficient.
| [
{
"version": "v1",
"created": "Sun, 14 Jun 2009 04:52:03 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Dec 2009 17:03:07 GMT"
},
{
"version": "v3",
"created": "Wed, 13 Apr 2011 00:25:32 GMT"
},
{
"version": "v4",
"created": "Thu, 17 Nov 2011 21:02:28 GMT"
}
]
| 2011-11-21T00:00:00 | [
[
"Koksal",
"C. Emre",
""
],
[
"Schniter",
"Philip",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2512 | Serguei Mokhov | Marc-Andr\'e Laverdi\`ere, Serguei A. Mokhov, and Djamel Benredjem | On Implementation of a Safer C Library, ISO/IEC TR 24731 | 33 pages, 6 figures, 16 listings, index; a report document on the
open source project. April 2006. v2 adds missing .ind file for the index | null | null | null | cs.SE cs.CR | http://creativecommons.org/licenses/by/3.0/ | The functions standardized as part of ISO C 1999 and their addendums improved
very little the security options from the previously available library. The
largest flaw remained that no function asked for the buffer size of destination
buffers for any function copying data into a user-supplied buffer. According to
earlier research we performed, we know that error condition handling was the
first solution to security vulnerabilities, followed by precondition
validation. The standard C functions typically perform little precondition
validation and error handling, allowing for a wide range of security issues to
be introduced in their use. ISO/IEC TR 24731, titled as "TR 24731: Safer C
library functions", defines 41 new library functions for memory copying, string
handling (both for normal and wide character strings), time printing, sorting,
searching etc. Another innovation it brings is a constraint handling
architecture, forcing error handling when certain security-related
preconditions are violated when the functions are called. It also specifies the
null-termination of all strings manipulated through its function and introduces
a new unsigned integer type that helps preventing integer overflows and
underflows. It is currently implemented by Microsoft as part of their Visual
Studio 2005 and above. We examine the architecture of our implementation of
ISO/IEC TR 24731. We first introduce our architectural philosophy before
informing the reader about the Siemens Four View Model, an architectural
methodology for the conception of large-scale software systems. Afterwards, we
examine each of the view, as architected for our library. Finally, we conclude
with other software engineering matters that were of high importance in the
development of our implementation.
| [
{
"version": "v1",
"created": "Sun, 14 Jun 2009 17:00:24 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jul 2009 04:44:56 GMT"
}
]
| 2009-07-27T00:00:00 | [
[
"Laverdière",
"Marc-André",
""
],
[
"Mokhov",
"Serguei A.",
""
],
[
"Benredjem",
"Djamel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.2521 | Thomas Schwentick | Volker Weber | On the Complexity of Branching-Time Logics | The author of this paper, Volker Weber, died after submitting it to
CSL 2009. The version published here incorporates a few small changes as
suggested by reviewers of CSL. It was prepared by his Ph.D. advisor, Thomas
Schwentick | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We classify the complexity of the satisfiability problem for extensions of
CTL and UB. The extensions we consider are Boolean combinations of path
formulas, fairness properties, past modalities, and forgettable past. Our main
result shows that satisfiability for CTL with all these extensions is still in
2-EXPTIME, which strongly contrasts with the nonelementary complexity of CTL*
with forgettable past. We give a complete classification of combinations of
these extensions, yielding a dichotomy between extensions with
2-EXPTIME-complete and those with EXPTIME-complete complexity. In particular,
we show that satisfiability for the extension of UB with forgettable past is
complete for 2-EXPTIME, contradicting a claim for a stronger logic in the
literature. The upper bounds are established with the help of a new kind of
pebble automata.
| [
{
"version": "v1",
"created": "Sun, 14 Jun 2009 09:20:10 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Weber",
"Volker",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.2530 | Jared Tanner | David L. Donoho and Jared Tanner | Observed Universality of Phase Transitions in High-Dimensional Geometry,
with Implications for Modern Data Analysis and Signal Processing | 47 pages, 24 figures, 10 tables | null | 10.1098/rsta.2009.0152 | null | math.ST cs.IT math.IT physics.data-an stat.CO stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We review connections between phase transitions in high-dimensional
combinatorial geometry and phase transitions occurring in modern
high-dimensional data analysis and signal processing. In data analysis, such
transitions arise as abrupt breakdown of linear model selection, robust data
fitting or compressed sensing reconstructions, when the complexity of the model
or the number of outliers increases beyond a threshold. In combinatorial
geometry these transitions appear as abrupt changes in the properties of face
counts of convex polytopes when the dimensions are varied. The thresholds in
these very different problems appear in the same critical locations after
appropriate calibration of variables.
These thresholds are important in each subject area: for linear modelling,
they place hard limits on the degree to which the now-ubiquitous
high-throughput data analysis can be successful; for robustness, they place
hard limits on the degree to which standard robust fitting methods can tolerate
outliers before breaking down; for compressed sensing, they define the sharp
boundary of the undersampling/sparsity tradeoff in undersampling theorems.
Existing derivations of phase transitions in combinatorial geometry assume
the underlying matrices have independent and identically distributed (iid)
Gaussian elements. In applications, however, it often seems that Gaussianity is
not required. We conducted an extensive computational experiment and formal
inferential analysis to test the hypothesis that these phase transitions are
{\it universal} across a range of underlying matrix ensembles. The experimental
results are consistent with an asymptotic large-$n$ universality across matrix
ensembles; finite-sample universality can be rejected.
| [
{
"version": "v1",
"created": "Sun, 14 Jun 2009 12:01:22 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Donoho",
"David L.",
""
],
[
"Tanner",
"Jared",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0906.2541 | Thomas Schwentick | Ahmet Kara, Martin Lange, Thomas Schwentick, Volker Weber | On the Hybrid Extension of CTL and CTL+ | null | null | 10.1007/978-3-642-03816-7_37 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper studies the expressivity, relative succinctness and complexity of
satisfiability for hybrid extensions of the branching-time logics CTL and CTL+
by variables. Previous complexity results show that only fragments with one
variable do have elementary complexity. It is shown that H1CTL+ and H1CTL, the
hybrid extensions with one variable of CTL+ and CTL, respectively, are
expressively equivalent but H1CTL+ is exponentially more succinct than H1CTL.
On the other hand, HCTL+, the hybrid extension of CTL with arbitrarily many
variables does not capture CTL*, as it even cannot express the simple CTL*
property EGFp. The satisfiability problem for H1CTL+ is complete for triply
exponential time, this remains true for quite weak fragments and quite strong
extensions of the logic.
| [
{
"version": "v1",
"created": "Sun, 14 Jun 2009 14:35:09 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Kara",
"Ahmet",
""
],
[
"Lange",
"Martin",
""
],
[
"Schwentick",
"Thomas",
""
],
[
"Weber",
"Volker",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.2547 | Toby S. Cubitt | Toby S. Cubitt, Jianxin Chen, and Aram W. Harrow | Superactivation of the Asymptotic Zero-Error Classical Capacity of a
Quantum Channel | 24 pages. Despite the similar title, contains different results from
arXiv:0906.2527. See "Note Added" at end of paper for details. V2: Includes
significantly revised proof of Theorem 27. V3: Includes expanded explanation
of some of the technical details | IEEE Trans. Inf. Th., vol. 57, no. 12, pp. 8114-8126, Dec 2011 | 10.1109/TIT.2011.2169109 | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The zero-error classical capacity of a quantum channel is the asymptotic rate
at which it can be used to send classical bits perfectly, so that they can be
decoded with zero probability of error. We show that there exist pairs of
quantum channels, neither of which individually have any zero-error capacity
whatsoever (even if arbitrarily many uses of the channels are available), but
such that access to even a single copy of both channels allows classical
information to be sent perfectly reliably. In other words, we prove that the
zero-error classical capacity can be superactivated. This result is the first
example of superactivation of a classical capacity of a quantum channel.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 19:35:10 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 2009 13:45:37 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Sep 2011 12:15:51 GMT"
}
]
| 2012-01-31T00:00:00 | [
[
"Cubitt",
"Toby S.",
""
],
[
"Chen",
"Jianxin",
""
],
[
"Harrow",
"Aram W.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2549 | Alberto Pepe | Alberto Pepe, Matthew Mayernik, Christine L. Borgman, Herbert Van de
Sompel | From Artifacts to Aggregations: Modeling Scientific Life Cycles on the
Semantic Web | 28 pages. To appear in the Journal of the American Society for
Information Science and Technology (JASIST) | Journal of the American Society for Information Science and
Technology (JASIST). Volume 61, Issue 3. 2010 | 10.1002/asi.21263 | null | cs.DL cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the process of scientific research, many information objects are
generated, all of which may remain valuable indefinitely. However, artifacts
such as instrument data and associated calibration information may have little
value in isolation; their meaning is derived from their relationships to each
other. Individual artifacts are best represented as components of a life cycle
that is specific to a scientific research domain or project. Current cataloging
practices do not describe objects at a sufficient level of granularity nor do
they offer the globally persistent identifiers necessary to discover and manage
scholarly products with World Wide Web standards. The Open Archives
Initiative's Object Reuse and Exchange data model (OAI-ORE) meets these
requirements. We demonstrate a conceptual implementation of OAI-ORE to
represent the scientific life cycles of embedded networked sensor applications
in seismology and environmental sciences. By establishing relationships between
publications, data, and contextual research information, we illustrate how to
obtain a richer and more realistic view of scientific practices. That view can
facilitate new forms of scientific research and learning. Our analysis is
framed by studies of scientific practices in a large, multi-disciplinary,
multi-university science and engineering research center, the Center for
Embedded Networked Sensing (CENS).
| [
{
"version": "v1",
"created": "Sun, 14 Jun 2009 15:23:10 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Sep 2009 18:26:33 GMT"
},
{
"version": "v3",
"created": "Wed, 21 Oct 2009 00:53:31 GMT"
}
]
| 2010-04-19T00:00:00 | [
[
"Pepe",
"Alberto",
""
],
[
"Mayernik",
"Matthew",
""
],
[
"Borgman",
"Christine L.",
""
],
[
"Van de Sompel",
"Herbert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0906.2582 | Shun Watanabe | Shun Watanabe, Ryutaroh Matsumoto, and Tomohiko Uyematsu | Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of
Slepian-Wolf Code | 10 pages, no figure, A part of this paper will be presented at 2009
IEEE International Symposium on Information Theory in Seoul, Korea. Version 2
is a published version. The results are not changed from version 1.
Explanations are polished and some references are added. In version 3, only
style and DOI are edited | IEICE Trans. Fundamentals, vol. 93, no. 9, pp. 1650-1659,
September 2010 | 10.1587/transfun.E93.A.1650 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The privacy amplification is a technique to distill a secret key from a
random variable by a function so that the distilled key and eavesdropper's
random variable are statistically independent. There are three kinds of
security criteria for the key distilled by the privacy amplification: the
normalized divergence criterion, which is also known as the weak security
criterion, the variational distance criterion, and the divergence criterion,
which is also known as the strong security criterion. As a technique to distill
a secret key, it is known that the encoder of a Slepian-Wolf (the source coding
with full side-information at the decoder) code can be used as a function for
the privacy amplification if we employ the weak security criterion. In this
paper, we show that the encoder of a Slepian-Wolf code cannot be used as a
function for the privacy amplification if we employ the criteria other than the
weak one.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 00:26:59 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Mar 2011 03:05:54 GMT"
},
{
"version": "v3",
"created": "Tue, 8 Mar 2011 02:15:02 GMT"
}
]
| 2011-03-09T00:00:00 | [
[
"Watanabe",
"Shun",
""
],
[
"Matsumoto",
"Ryutaroh",
""
],
[
"Uyematsu",
"Tomohiko",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2603 | Rajiv Soundararajan Mr. | Rajiv Soundararajan and Sriram Vishwanath | Hybrid Coding for Gaussian Broadcast Channels with Gaussian Sources | 5 pages, 1 figure, to be presented at ISIT 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers a degraded Gaussian broadcast channel over which
Gaussian sources are to be communicated. When the sources are independent, this
paper shows that hybrid coding achieves the optimal distortion region, the same
as that of separate source and channel coding. It also shows that uncoded
transmission is not optimal for this setting. For correlated sources, the paper
shows that a hybrid coding strategy has a better distortion region than
separate source-channel coding below a certain signal to noise ratio threshold.
Thus, hybrid coding is a good choice for Gaussian broadcast channels with
correlated Gaussian sources.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 04:29:15 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Soundararajan",
"Rajiv",
""
],
[
"Vishwanath",
"Sriram",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2609 | Jong Chul Ye | O. K. Lee, J. C. Ye | Concatenate and Boost for Multiple Measurement Vector Problems | This paper has been withdrawn by the authors due to the insufficient
novelty | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multiple measurement vector (MMV) problem addresses the recovery of a set of
sparse signal vectors that share common non-zero support, and has emerged an
important topics in compressed sensing. Even though the fundamental performance
limit of recoverable sparsity level has been formally derived, conventional
algorithms still exhibit significant performance gaps from the theoretical
bound. The main contribution of this paper is a novel concatenate MMV and boost
(CoMBo) algorithm that achieves the theoretical bound. More specifically, the
algorithm concatenates MMV to a larger dimensional SMV problem and boosts it by
multiplying random orthonormal matrices. Extensive simulation results
demonstrate that CoMBo outperforms all existing methods and achieves the
theoretical bound as the number of measurement vector increases.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 05:12:21 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Oct 2015 15:33:57 GMT"
}
]
| 2015-10-20T00:00:00 | [
[
"Lee",
"O. K.",
""
],
[
"Ye",
"J. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2615 | Philippe Robert | Carl Graham (CMAP), Philippe Robert (INRIA), Maaike Verloop (CWI) | Stability Properties of Networks with Interacting TCP Flows | null | null | 10.1007/978-3-642-10406-0_1 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The equilibrium distributions of a Markovian model describing the interaction
of several classes of permanent connections in a network are analyzed. It has
been introduced by Graham and Robert. For this model each of the connections
has a self-adaptive behavior in that its transmission rate along its route
depends on the level of congestion of the nodes on its route. It has been shown
that the invariant distributions are determined by the solutions of a fixed
point equation in a finite dimensional space. In this paper, several examples
of these fixed point equations are studied. The topologies investigated are
rings, trees and a linear network, with various sets of routes through the
nodes.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 06:22:20 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Graham",
"Carl",
"",
"CMAP"
],
[
"Robert",
"Philippe",
"",
"INRIA"
],
[
"Verloop",
"Maaike",
"",
"CWI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.2635 | Tom\'a\v{s} Vina\v{r} | Tom\'a\v{s} Vina\v{r}, Bro\v{n}a Brejov\'a, Giltae Song, Adam Siepel | Bayesian History Reconstruction of Complex Human Gene Clusters on a
Phylogeny | null | Comparative Genomics, International Workshop (RECOMB-CG), 5817
volume of Lecture Notes in Bioinformatics, pp. 150-163, Budapest, September
2009. Springer | 10.1007/978-3-642-04744-2_13 | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clusters of genes that have evolved by repeated segmental duplication present
difficult challenges throughout genomic analysis, from sequence assembly to
functional analysis. Improved understanding of these clusters is of utmost
importance, since they have been shown to be the source of evolutionary
innovation, and have been linked to multiple diseases, including HIV and a
variety of cancers. Previously, Zhang et al. (2008) developed an algorithm for
reconstructing parsimonious evolutionary histories of such gene clusters, using
only human genomic sequence data. In this paper, we propose a probabilistic
model for the evolution of gene clusters on a phylogeny, and an MCMC algorithm
for reconstruction of duplication histories from genomic sequences in multiple
species. Several projects are underway to obtain high quality BAC-based
assemblies of duplicated clusters in multiple species, and we anticipate that
our method will be useful in analyzing these valuable new data sets.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 08:43:51 GMT"
}
]
| 2010-01-25T00:00:00 | [
[
"Vinař",
"Tomáš",
""
],
[
"Brejová",
"Broňa",
""
],
[
"Song",
"Giltae",
""
],
[
"Siepel",
"Adam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.2667 | Tobias Kretz | Tobias Kretz | The use of dynamic distance potential fields for pedestrian flow around
corners | Prepared and Accepted for "First International Conference on
Evacuation Modeling and Management" (ICEM 09) | null | null | null | cs.MA physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This contribution investigates situations in pedestrian dynamics, where
trying to walk the shortest path leads to largely different results than trying
to walk the quickest path. A heuristic one-shot method to model the influence
of the will to walk the quickest path is introduced.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 12:10:43 GMT"
}
]
| 2010-01-20T00:00:00 | [
[
"Kretz",
"Tobias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0906.2671 | Christian David | Catherine Doss (LJLL), Mich\`ele Thieullen (PMA) | Oscillations and Random Perturbations of a FitzHugh-Nagumo System | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a stochastic perturbation of a FitzHugh-Nagumo system. We show
that it is possible to generate oscillations for values of parameters which do
not allow oscillations for the deterministic system. We also study the
appearance of a new equilibrium point and new bifurcation parameters due to the
noisy component.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 12:29:32 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Doss",
"Catherine",
"",
"LJLL"
],
[
"Thieullen",
"Michèle",
"",
"PMA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2716 | Jacques-Olivier Lachaud | F. De Vieilleville (LaBRI), Jacques-Olivier Lachaud (LaBRI), F.
Feschet (LLAIC1) | Maximal digital straight segments and convergence of discrete geometric
estimators | null | Proc. 14th Scandinavian Conference on Image Analysis (SCIA2005),
Joensuu : Finlande (2005) | 10.1007/11499145_100 | null | cs.CV cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discrete geometric estimators approach geometric quantities on digitized
shapes without any knowledge of the continuous shape. A classical yet difficult
problem is to show that an estimator asymptotically converges toward the true
geometric quantity as the resolution increases. We study here the convergence
of local estimators based on Digital Straight Segment (DSS) recognition. It is
closely linked to the asymptotic growth of maximal DSS, for which we show
bounds both about their number and sizes. These results not only give better
insights about digitized curves but indicate that curvature estimators based on
local DSS recognition are not likely to converge. We indeed invalidate an
hypothesis which was essential in the only known convergence theorem of a
discrete curvature estimator. The proof involves results from arithmetic
properties of digital lines, digital convexity, combinatorics, continued
fractions and random polytopes.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 15:13:42 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"De Vieilleville",
"F.",
"",
"LaBRI"
],
[
"Lachaud",
"Jacques-Olivier",
"",
"LaBRI"
],
[
"Feschet",
"F.",
"",
"LLAIC1"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.2727 | Pietro Di Gianantonio | Pietro Di Gianantonio, Furio Honsell and Marina Lenisa | RPO, Second-order Contexts, and Lambda-calculus | 35 pages, published in Logical Methods in Computer Science | Logical Methods in Computer Science, Volume 5, Issue 3 (August 6,
2009) lmcs:1120 | 10.2168/LMCS-5(3:6)2009 | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | First, we extend Leifer-Milner RPO theory, by giving general conditions to
obtain IPO labelled transition systems (and bisimilarities) with a reduced set
of transitions, and possibly finitely branching. Moreover, we study the weak
variant of Leifer-Milner theory, by giving general conditions under which the
weak bisimilarity is a congruence. Then, we apply such extended RPO technique
to the lambda-calculus, endowed with lazy and call by value reduction
strategies.
We show that, contrary to process calculi, one can deal directly with the
lambda-calculus syntax and apply Leifer-Milner technique to a category of
contexts, provided that we work in the framework of weak bisimilarities.
However, even in the case of the transition system with minimal contexts, the
resulting bisimilarity is infinitely branching, due to the fact that, in
standard context categories, parametric rules such as the beta-rule can be
represented only by infinitely many ground rules.
To overcome this problem, we introduce the general notion of second-order
context category. We show that, by carrying out the RPO construction in this
setting, the lazy observational equivalence can be captured as a weak
bisimilarity equivalence on a finitely branching transition system. This result
is achieved by considering an encoding of lambda-calculus in Combinatory Logic.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 15:44:56 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Aug 2009 08:18:28 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Di Gianantonio",
"Pietro",
""
],
[
"Honsell",
"Furio",
""
],
[
"Lenisa",
"Marina",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.2738 | Yakov Nekrich | Yakov Nekrich | Data Structures for Approximate Range Counting | 13 pages, 1 figure | null | null | null | cs.DS cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present new data structures for approximately counting the number of
points in orthogonal range.
There is a deterministic linear space data structure that supports updates in
O(1) time and approximates the number of elements in a 1-D range up to an
additive term $k^{1/c}$ in $O(\log \log U\cdot\log \log n)$ time, where $k$ is
the number of elements in the answer, $U$ is the size of the universe and $c$
is an arbitrary fixed constant. We can estimate the number of points in a
two-dimensional orthogonal range up to an additive term $ k^{\rho}$ in $O(\log
\log U+ (1/\rho)\log\log n)$ time for any $\rho>0$. We can estimate the number
of points in a three-dimensional orthogonal range up to an additive term
$k^{\rho}$ in $O(\log \log U + (\log\log n)^3+ (3^v)\log\log n)$ time for
$v=\log \frac{1}{\rho}/\log {3/2}+2$.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 16:25:04 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 09:30:57 GMT"
}
]
| 2009-10-05T00:00:00 | [
[
"Nekrich",
"Yakov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.2742 | Daniel Kharitonov | Luc Ceuppens, Alan Sardella, Daniel Kharitonov | Power Saving Strategies and Technologies in Network Equipment
Opportunities and Challenges, Risk and Rewards | IEEE SAINT 2008 proceedings, July 28th - Aug 1st 2008, PCFNS workshop | null | 10.1109/SAINT.2008.79 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Drawing from todays best-in-class solutions, we identify power-saving
strategies that have succeeded in the past and look forward to new ideas and
paradigms. We strongly believe that designing energy-efficient network
equipment can be compared to building sports cars, task-oriented, focused and
fast. However, unlike track-bound sports cars, ultra-fast and purpose-built
silicon yields better energy efficiency when compared to more generic family
sedan designs that mitigate go-to-market risks by being the masters of many
tasks. Thus, we demonstrate that the best opportunities for power savings come
via protocol simplification, best-of-breed technology, and silicon and software
optimization, to achieve the least amount of processing necessary to move
packets. We also look to the future of networking from a new angle, where
energy efficiency and environmental concerns are viewed as fundamental design
criteria and forces that need to be harnessed to continually create more
powerful networking equipment.
| [
{
"version": "v1",
"created": "Sat, 13 Jun 2009 10:49:20 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Ceuppens",
"Luc",
""
],
[
"Sardella",
"Alan",
""
],
[
"Kharitonov",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.2756 | Carl Hewitt | Carl Hewitt | Norms and Commitment for iOrgs(TM) Information Systems: Direct Logic(TM)
and Participatory Grounding Checking | expanded article | null | null | null | cs.MA cs.LO cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The fundamental assumption of the Event Calculus is overly simplistic when it
comes to organizations in which time-varying properties have to be actively
maintained and managed in order to continue to hold and termination by another
action is not required for a property to no longer hold. I.e., if active
measures are not taken then things will go haywire by default. Similarly
extension and revision is required for Grounding Checking properties of systems
based on a set of ground inferences. Previously Model Checking as been
performed using the model of nondeterministic automata based on states
determined by time-points. These nondeterministic automata are not suitable for
iOrgs, which are highly structured and operate asynchronously with only loosely
bounded nondeterminism. iOrgs Information Systems have been developed as a
technology in which organizations have people that are tightly integrated with
information technology that enables them to function organizationally. iOrgs
formalize existing practices to provide a framework for addressing issues of
authority, accountability, scalability, and robustness using methods that are
analogous to human organizations. In general -iOrgs are a natural extension Web
Services, which are the standard for distributed computing and software
application interoperability in large-scale Organizational Computing. -iOrgs
are structured by Organizational Commitment that is a special case of Physical
Commitment that is defined to be information pledged. iOrgs norms are used to
illustrate the following: -Even a very simple microtheory for normative
reasoning can engender inconsistency In practice, it is impossible to verify
the consistency of a theory for a practical domain. -Improved Safety in
Reasoning. It is not safe to use classical logic and probability theory in
practical reasoning.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 18:38:17 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Jun 2009 21:28:48 GMT"
},
{
"version": "v3",
"created": "Sat, 28 Nov 2009 20:03:54 GMT"
},
{
"version": "v4",
"created": "Thu, 8 Apr 2010 10:31:57 GMT"
},
{
"version": "v5",
"created": "Mon, 26 Apr 2010 13:22:51 GMT"
},
{
"version": "v6",
"created": "Sat, 6 Nov 2010 21:47:00 GMT"
}
]
| 2010-11-09T00:00:00 | [
[
"Hewitt",
"Carl",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.2760 | Ophir Setter | Ophir Setter | Constructing Two-Dimensional Voronoi Diagrams via Divide-and-Conquer of
Envelopes in Space | M.Sc. thesis. The work has been carried out at Tel-Aviv University
under the supervision of Prof. Dan Halperin. 85 pages, 17 figures, 4 tables.
For some reason the arXiv PDF version looks different than it should. PS is
preferable | null | 10.1007/978-3-642-16007-3_1 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a general framework for computing two-dimensional Voronoi diagrams
of different classes of sites under various distance functions. The framework
is sufficiently general to support diagrams embedded on a family of
two-dimensional parametric surfaces in $R^3$. The computation of the diagrams
is carried out through the construction of envelopes of surfaces in 3-space
provided by CGAL (the Computational Geometry Algorithm Library). The
construction of the envelopes follows a divide-and-conquer approach. A
straightforward application of the divide-and-conquer approach for computing
Voronoi diagrams yields algorithms that are inefficient in the worst case. We
prove that through randomization the expected running time becomes near-optimal
in the worst case. We show how to employ our framework to realize various types
of Voronoi diagrams with different properties by providing implementations for
a vast collection of commonly used Voronoi diagrams. We also show how to apply
the new framework and other existing tools from CGAL to compute minimum-width
annuli of sets of disks, which requires the computation of two Voronoi diagrams
of two different types, and of the overlay of the two diagrams. We do not
assume general position. Namely, we handle degenerate input, and produce exact
results.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 19:36:14 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Setter",
"Ophir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.2767 | Jacques-Olivier Lachaud | Jacques-Olivier Lachaud (LaBRI) | Coding cells of digital spaces: a framework to write generic digital
topology algorithms | null | Proc. Int. Work. Combinatorial Image Analysis (IWCIA2003), Palermo
: Italie (2003) | 10.1016/S1571-0653(04)00497-4 | null | cs.DM cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a concise coding of the cells of n-dimensional finite
regular grids. It induces a simple, generic and efficient framework for
implementing classical digital topology data structures and algorithms.
Discrete subsets of multidimensional images (e.g. regions, digital surfaces,
cubical cell complexes) have then a common and compact representation.
Moreover, algorithms have a straightforward and efficient implementation, which
is independent from the dimension or sizes of digital images. We illustrate
that point with generic hypersurface boundary extraction algorithms by scanning
or tracking. This framework has been implemented and basic operations as well
as the presented applications have been benchmarked.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 19:32:48 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"Lachaud",
"Jacques-Olivier",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.2770 | Jacques-Olivier Lachaud | Martin Braure De Calignon (LaBRI), Luc Brun (GREYC), Jacques-Olivier
Lachaud (LaBRI) | Combinatorial pyramids and discrete geometry for energy-minimizing
segmentation | null | Proc. Int. Symposium on Visual Computing (ISVC2006), Lake Tahoe,
Nevada : \'Etats-Unis d'Am\'erique (2006) | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper defines the basis of a new hierarchical framework for segmentation
algorithms based on energy minimization schemes. This new framework is based on
two formal tools. First, a combinatorial pyramid encode efficiently a hierarchy
of partitions. Secondly, discrete geometric estimators measure precisely some
important geometric parameters of the regions. These measures combined with
photometrical and topological features of the partition allows to design energy
terms based on discrete measures. Our segmentation framework exploits these
energies to build a pyramid of image partitions with a minimization scheme.
Some experiments illustrating our framework are shown and discussed.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 19:33:21 GMT"
}
]
| 2009-06-16T00:00:00 | [
[
"De Calignon",
"Martin Braure",
"",
"LaBRI"
],
[
"Brun",
"Luc",
"",
"GREYC"
],
[
"Lachaud",
"Jacques-Olivier",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.2812 | Kohtaro Tadaki | Kohtaro Tadaki | Partial randomness and dimension of recursively enumerable reals | 12 pages, no figures, to appear in the Proceedings of the 34st
International Symposium on Mathematical Foundations of Computer Science (MFCS
2009), Novy Smokovec, High Tatras, Slovakia, August 24 - 28, 2009 | null | 10.1007/978-3-642-03816-7_58 | null | cs.CC cs.IT math.IT math.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A real \alpha is called recursively enumerable ("r.e." for short) if there
exists a computable, increasing sequence of rationals which converges to
\alpha. It is known that the randomness of an r.e. real \alpha can be
characterized in various ways using each of the notions; program-size
complexity, Martin-L\"{o}f test, Chaitin \Omega number, the domination and
\Omega-likeness of \alpha, the universality of a computable, increasing
sequence of rationals which converges to \alpha, and universal probability. In
this paper, we generalize these characterizations of randomness over the notion
of partial randomness by parameterizing each of the notions above by a real T
in (0,1], where the notion of partial randomness is a stronger representation
of the compression rate by means of program-size complexity. As a result, we
present ten equivalent characterizations of the partial randomness of an r.e.
real. The resultant characterizations of partial randomness are powerful and
have many important applications. One of them is to present equivalent
characterizations of the dimension of an individual r.e. real. The equivalence
between the notion of Hausdorff dimension and compression rate by program-size
complexity (or partial randomness) has been established at present by a series
of works of many researchers over the last two decades. We present ten
equivalent characterizations of the dimension of an individual r.e. real.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 21:40:00 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Tadaki",
"Kohtaro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
]
|
0906.2819 | Mahdi Ramezani | Mahdi Ramezani, Masoud Ardakani | Disjoint LDPC Coding for Gaussian Broadcast Channels | 5 pages, 1 figure, 3 tables, To appear in Proc. IEEE International
Symposium on Information Theory (ISIT 2009), Seoul, Korea, June-July 2009 | null | 10.1109/ISIT.2009.5205588 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Low-density parity-check (LDPC) codes have been used for communication over a
two-user Gaussian broadcast channel. It has been shown in the literature that
the optimal decoding of such system requires joint decoding of both user
messages at each user. Also, a joint code design procedure should be performed.
We propose a method which uses a novel labeling strategy and is based on the
idea behind the bit-interleaved coded modulation. This method does not require
joint decoding and/or joint code optimization. Thus, it reduces the overall
complexity of near-capacity coding in broadcast channels. For different rate
pairs on the boundary of the capacity region, pairs of LDPC codes are designed
to demonstrate the success of this technique.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 23:09:04 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Ramezani",
"Mahdi",
""
],
[
"Ardakani",
"Masoud",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2820 | Xudong Ma | Xudong Ma | Equalization for Non-Coherent UWB Systems with Approximate Semi-Definite
Programming | 7 pages, 5 figures, submitted to the 3rd International Conference on
Signal Processing and Communication Systems, 28 - 30 September 2009, Omaha,
Nebraska | Proceeding of the 3rd International Conference on Signal
Processing and Communication Systems, 28 - 30 September 2009, Omaha, Nebraska | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an approximate semi-definite programming framework
for demodulation and equalization of non-coherent ultra-wide-band communication
systems with inter-symbol-interference. It is assumed that the communication
systems follow non-linear second-order Volterra models. We formulate the
demodulation and equalization problems as semi-definite programming problems.
We propose an approximate algorithm for solving the formulated semi-definite
programming problems. Compared with the existing non-linear equalization
approaches, the proposed semi-definite programming formulation and approximate
solving algorithm have low computational complexity and storage requirements.
We show that the proposed algorithm has satisfactory error probability
performance by simulation results. The proposed non-linear equalization
approach can be adopted for a wide spectrum of non-coherent ultra-wide-band
systems, due to the fact that most non-coherent ultra-wide-band systems with
inter-symbol-interference follow non-linear second-order Volterra signal
models.
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 23:14:37 GMT"
}
]
| 2009-08-13T00:00:00 | [
[
"Ma",
"Xudong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2824 | Carlos Gershenson | Carlos Gershenson | What Does Artificial Life Tell Us About Death? | 5 pages | International Journal of Artificial Life Research 2(3):1-5. 2011 | null | null | cs.AI cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Short philosophical essay
| [
{
"version": "v1",
"created": "Mon, 15 Jun 2009 23:47:28 GMT"
}
]
| 2011-09-06T00:00:00 | [
[
"Gershenson",
"Carlos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.2835 | Mikhail (Mike) Basilyan | Mikhail Basilyan | Employing Wikipedia's Natural Intelligence For Cross Language
Information Retrieval | 9 pages | null | null | null | cs.IR cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a novel method for retrieving information in
languages other than that of the query. We use this technique in combination
with existing traditional Cross Language Information Retrieval (CLIR)
techniques to improve their results. This method has a number of advantages
over traditional techniques that rely on machine translation to translate the
query and then search the target document space using a machine translation.
This method is not limited to the availability of a machine translation
algorithm for the desired language and uses already existing sources of readily
available translated information on the internet as a "middle-man" approach. In
this paper we use Wikipedia; however, any similar multilingual, cross
referenced body of documents can be used. For evaluation and comparison
purposes we also implemented a traditional machine translation approach
separately as well as the Wikipedia approach separately.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 02:09:27 GMT"
}
]
| 2009-06-17T00:00:00 | [
[
"Basilyan",
"Mikhail",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0906.2864 | Barco You | Barco You | Discussion of Twenty Questions Problem | 2 pages, 5figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discuss several tricks for solving twenty question problems which in this
paper is depicted as a guessing game. Player tries to find a ball in twenty
boxes by asking as few questions as possible, and these questions are answered
by only "Yes" or "No". With the discussion, demonstration of source coding
methods is the main concern.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 08:22:52 GMT"
}
]
| 2009-06-17T00:00:00 | [
[
"You",
"Barco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2866 | Pierre Hyvernat | Pierre Hyvernat (LAMA, Iml) | Predicate Transformers, (co)Monads and Resolutions | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This short note contains random thoughts about a factorization theorem for
closure/interior operators on a powerset which is reminiscent to the notion of
resolution for a monad/comonad. The question originated from formal topology
but is interesting in itself. The result holds constructively (even if it
classically has several variations); but usually not predicatively (in the
sense that the interpolant will no be given by a set). For those not familiar
with predicativity issues, we look at a ``classical'' version where we bound
the size of the interpolant.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 08:33:18 GMT"
}
]
| 2009-06-17T00:00:00 | [
[
"Hyvernat",
"Pierre",
"",
"LAMA, Iml"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.2888 | Bruno Salvy | Alexandre Benoit (INRIA Rocquencourt), Bruno Salvy (INRIA
Rocquencourt) | Chebyshev Expansions for Solutions of Linear Differential Equations | null | ISSAC'09 (2009) | 10.1145/1576702.1576709 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A Chebyshev expansion is a series in the basis of Chebyshev polynomials of
the first kind. When such a series solves a linear differential equation, its
coefficients satisfy a linear recurrence equation. We interpret this equation
as the numerator of a fraction of linear recurrence operators. This
interpretation lets us give a simple view of previous algorithms, analyze their
complexity, and design a faster one for large orders.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 10:21:01 GMT"
}
]
| 2013-06-19T00:00:00 | [
[
"Benoit",
"Alexandre",
"",
"INRIA Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA\n Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0906.2895 | Velimir Ilic | Velimir M. Ilic, Miomir S. Stankovic, Branimir T. Todorovic | Entropy Message Passing | 5 pages, 1 figure, to appear in IEEE Transactions on Information
Theory | null | 10.1109/TIT.2010.2090235 | null | cs.LG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper proposes a new message passing algorithm for cycle-free factor
graphs. The proposed "entropy message passing" (EMP) algorithm may be viewed as
sum-product message passing over the entropy semiring, which has previously
appeared in automata theory. The primary use of EMP is to compute the entropy
of a model. However, EMP can also be used to compute expressions that appear in
expectation maximization and in gradient descent algorithms.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 10:58:50 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Jun 2009 23:03:13 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Oct 2009 12:48:20 GMT"
},
{
"version": "v4",
"created": "Thu, 13 May 2010 16:40:01 GMT"
},
{
"version": "v5",
"created": "Sat, 15 May 2010 22:23:39 GMT"
},
{
"version": "v6",
"created": "Mon, 8 Nov 2010 01:37:37 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Ilic",
"Velimir M.",
""
],
[
"Stankovic",
"Miomir S.",
""
],
[
"Todorovic",
"Branimir T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2914 | Michal Zerola | Michal Zerola, J\'er\^ome Lauret, Roman Bart\'ak and Michal
\v{S}umbera | Efficient Multi-site Data Movement Using Constraint Programming for Data
Hungry Science | To appear in proceedings of Computing in High Energy and Nuclear
Physics 2009 | null | 10.1088/1742-6596/219/6/062069 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For the past decade, HENP experiments have been heading towards a distributed
computing model in an effort to concurrently process tasks over enormous data
sets that have been increasing in size as a function of time. In order to
optimize all available resources (geographically spread) and minimize the
processing time, it is necessary to face also the question of efficient data
transfers and placements. A key question is whether the time penalty for moving
the data to the computational resources is worth the presumed gain. Onward to
the truly distributed task scheduling we present the technique using a
Constraint Programming (CP) approach. The CP technique schedules data transfers
from multiple resources considering all available paths of diverse
characteristic (capacity, sharing and storage) having minimum user's waiting
time as an objective. We introduce a model for planning data transfers to a
single destination (data transfer) as well as its extension for an optimal data
set spreading strategy (data placement). Several enhancements for a solver of
the CP model will be shown, leading to a faster schedule computation time using
symmetry breaking, branch cutting, well studied principles from job-shop
scheduling field and several heuristics. Finally, we will present the design
and implementation of a corner-stone application aimed at moving datasets
according to the schedule. Results will include comparison of performance and
trade-off between CP techniques and a Peer-2-Peer model from simulation
framework as well as the real case scenario taken from a practical usage of a
CP scheduler.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 12:33:25 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jun 2009 19:20:05 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Zerola",
"Michal",
""
],
[
"Lauret",
"Jérôme",
""
],
[
"Barták",
"Roman",
""
],
[
"Šumbera",
"Michal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.2924 | Xavier Goaoc | Otfried Cheong (KAIST), Xavier Goaoc (INRIA Lorraine - LORIA), Andreas
Holmsen (KAIST) | Lower Bounds for Pinning Lines by Balls | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A line L is a transversal to a family F of convex objects in R^d if it
intersects every member of F. In this paper we show that for every integer d>2
there exists a family of 2d-1 pairwise disjoint unit balls in R^d with the
property that every subfamily of size 2d-2 admits a transversal, yet any line
misses at least one member of the family. This answers a question of Danzer
from 1957.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 13:09:14 GMT"
}
]
| 2009-06-17T00:00:00 | [
[
"Cheong",
"Otfried",
"",
"KAIST"
],
[
"Goaoc",
"Xavier",
"",
"INRIA Lorraine - LORIA"
],
[
"Holmsen",
"Andreas",
"",
"KAIST"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.2925 | Laurent Buse | Laurent Bus\'e (INRIA Sophia Antipolis), Guillaume Ch\`eze (IMT),
Salah Najib (MPI-MIS) | Noether's forms for the study of non-composite rational functions and
their spectrum | null | null | null | null | math.NT cs.SC math.AC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the spectrum and the decomposability of a multivariate
rational function are studied by means of the effective Noether's
irreducibility theorem given by Ruppert. With this approach, some new effective
results are obtained. In particular, we show that the reduction modulo p of the
spectrum of a given integer multivariate rational function r coincides with the
spectrum of the reduction of r modulo p for p a prime integer greater or equal
to an explicit bound. This bound is given in terms of the degree, the height
and the number of variables of r. With the same strategy, we also study the
decomposability of r modulo p. Some similar explicit results are also provided
for the case of polynomials with coefficients in a polynomial ring.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 13:10:18 GMT"
}
]
| 2009-06-17T00:00:00 | [
[
"Busé",
"Laurent",
"",
"INRIA Sophia Antipolis"
],
[
"Chèze",
"Guillaume",
"",
"IMT"
],
[
"Najib",
"Salah",
"",
"MPI-MIS"
]
]
| [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
]
|
0906.2935 | Massimo Giulietti | Stefania Fanali, Massimo Giulietti | AG codes on certain maximal curves | null | null | null | null | math.AG cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Algebraic Geometric codes associated to a recently discovered class of
maximal curves are investigated. As a result, some linear codes with better
parameters with respect to the previously known ones are discovered, and 70
improvements on MinT's tables are obtained.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 13:44:59 GMT"
}
]
| 2011-02-19T00:00:00 | [
[
"Fanali",
"Stefania",
""
],
[
"Giulietti",
"Massimo",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.2947 | Stylianos Basagiannis | Stylianos Basagiannis, Panagiotis Katsaros and Andrew Pombortsis | Attacking an OT-Based Blind Signature Scheme | 3 pages, 2 figures, sumbitted for evaluation, under the title
"Security Analysis of an OT-based blind signature scheme" | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we describe an attack against one of the
Oblivious-Transfer-based blind signatures scheme, proposed in [1]. An attacker
with a primitive capability of producing specific-range random numbers, while
exhibiting a partial MITM behavior, is able to corrupt the communication
between the protocol participants. The attack is quite efficient as it leads to
a protocol communication corruption and has a sound-minimal computational cost.
We propose a solution to fix the security flaw.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 14:23:19 GMT"
},
{
"version": "v2",
"created": "Wed, 24 Jun 2009 12:02:35 GMT"
},
{
"version": "v3",
"created": "Wed, 1 Jul 2009 11:33:05 GMT"
},
{
"version": "v4",
"created": "Tue, 10 Nov 2009 14:24:14 GMT"
}
]
| 2009-11-10T00:00:00 | [
[
"Basagiannis",
"Stylianos",
""
],
[
"Katsaros",
"Panagiotis",
""
],
[
"Pombortsis",
"Andrew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.2960 | Daniel Karapetyan | Daniel Karapetyan and Gregory Gutin and Boris Goldengorin | Empirical evaluation of construction heuristics for the multidimensional
assignment problem | 15 pages | Text in Algorithmics 11 (2009) 107-122 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The multidimensional assignment problem (MAP) (abbreviated s-AP in the case
of s dimensions) is an extension of the well-known assignment problem. The most
studied case of MAP is 3-AP, though the problems with larger values of s have
also a number of applications. In this paper we consider four fast construction
heuristics for MAP. One of the heuristics is new. A modification of the
heuristics is proposed to optimize the access to slow computer memory. The
results of computational experiments for several instance families are provided
and discussed.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 15:47:17 GMT"
}
]
| 2012-05-17T00:00:00 | [
[
"Karapetyan",
"Daniel",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Goldengorin",
"Boris",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.2995 | Manfred Kufleitner | Volker Diekert, Manfred Kufleitner | Fragments of first-order logic over infinite words | Conference version presented at 26th International Symposium on
Theoretical Aspects of Computer Science, STACS 2009 | null | null | null | cs.FL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give topological and algebraic characterizations as well as language
theoretic descriptions of the following subclasses of first-order logic FO[<]
for omega-languages: Sigma_2, FO^2, the intersection of FO^2 and Sigma_2, and
Delta_2 (and by duality Pi_2 and the intersection of FO^2 and Pi_2). These
descriptions extend the respective results for finite words. In particular, we
relate the above fragments to language classes of certain (unambiguous)
polynomials. An immediate consequence is the decidability of the membership
problem of these classes, but this was shown before by Wilke and Bojanczyk and
is therefore not our main focus. The paper is about the interplay of algebraic,
topological, and language theoretic properties.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 18:43:43 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Oct 2009 20:52:31 GMT"
}
]
| 2009-10-02T00:00:00 | [
[
"Diekert",
"Volker",
""
],
[
"Kufleitner",
"Manfred",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.2997 | Ian Palmer | Ian Palmer and Jean Bellissard | The Jewett-Krieger Construction for Tilings | This paper has been withdrawn in order to address conceptual
problems. It will be rewritten and resubmitted at a later date | null | null | null | math.DS cs.IT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a random distribution of impurities on a periodic crystal, an
equivalent uniquely ergodic tiling space is built, made of aperiodic,
repetitive tilings with finite local complexity, and with configurational
entropy close to the entropy of the impurity distribution. The construction is
the tiling analog of the Jewett-Kreger theorem.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 18:49:20 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Jul 2009 15:41:20 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Oct 2009 22:39:05 GMT"
},
{
"version": "v4",
"created": "Wed, 4 Aug 2010 17:10:36 GMT"
},
{
"version": "v5",
"created": "Wed, 3 Nov 2010 15:08:00 GMT"
}
]
| 2010-11-04T00:00:00 | [
[
"Palmer",
"Ian",
""
],
[
"Bellissard",
"Jean",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0906.3036 | Gilles Champenois | Gilles Champenois | Mnesors for automatic control | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mnesors are defined as elements of a semimodule over the min-plus integers.
This two-sorted structure is able to merge graduation properties of vectors and
idempotent properties of boolean numbers, which makes it appropriate for hybrid
systems. We apply it to the control of an inverted pendulum and design a full
logical controller, that is, without the usual algebra of real numbers.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 22:05:57 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 21:19:23 GMT"
}
]
| 2009-10-09T00:00:00 | [
[
"Champenois",
"Gilles",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.3038 | Konstantinos Pelechrinis | Konstantinos Pelechrinis, Ioannis Broustis, Srikanth V. Krishnamurthy,
Christos Gkantsidis | A measurement driven, 802.11 anti-jamming system | 16 pages, full version of a submitted work to CoNext 2009 conference | null | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming
attacks by injecting malicious interference. Nowadays, jammers can be portable
devices that transmit intermittently at low power in order to conserve energy.
In this paper, we first conduct extensive experiments on an indoor 802.11
network to assess the ability of two physical layer functions, rate adaptation
and power control, in mitigating jamming. In the presence of a jammer we find
that: (a) the use of popular rate adaptation algorithms can significantly
degrade network performance and, (b) appropriate tuning of the carrier sensing
threshold allows a transmitter to send packets even when being jammed and
enables a receiver capture the desired signal. Based on our findings, we build
ARES, an Anti-jamming REinforcement System, which tunes the parameters of rate
adaptation and power control to improve the performance in the presence of
jammers. ARES ensures that operations under benign conditions are unaffected.
To demonstrate the effectiveness and generality of ARES, we evaluate it in
three wireless testbeds: (a) an 802.11n WLAN with MIMO nodes, (b) an 802.11a/g
mesh network with mobile jammers and (c) an 802.11a WLAN. We observe that ARES
improves the network throughput across all testbeds by up to 150%.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 23:27:36 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Pelechrinis",
"Konstantinos",
""
],
[
"Broustis",
"Ioannis",
""
],
[
"Krishnamurthy",
"Srikanth V.",
""
],
[
"Gkantsidis",
"Christos",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.3051 | EPTCS | Markus Holzer, Martin Kutrib, Andreas Malcher | Multi-Head Finite Automata: Characterizations, Concepts and Open
Problems | null | EPTCS 1, 2009, pp. 93-107 | 10.4204/EPTCS.1.9 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Multi-head finite automata were introduced in (Rabin, 1964) and (Rosenberg,
1966). Since that time, a vast literature on computational and descriptional
complexity issues on multi-head finite automata documenting the importance of
these devices has been developed. Although multi-head finite automata are a
simple concept, their computational behavior can be already very complex and
leads to undecidable or even non-semi-decidable problems on these devices such
as, for example, emptiness, finiteness, universality, equivalence, etc. These
strong negative results trigger the study of subclasses and alternative
characterizations of multi-head finite automata for a better understanding of
the nature of non-recursive trade-offs and, thus, the borderline between
decidable and undecidable problems. In the present paper, we tour a fragment of
this literature.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:58:16 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Holzer",
"Markus",
""
],
[
"Kutrib",
"Martin",
""
],
[
"Malcher",
"Andreas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3056 | Chi Zhang | Chi Zhang, Gang Wang, Xiaoguang Liu, Jing Liu | Approximating Scheduling Machines with Capacity Constraints | this is a correction of paper to appear at FAW2009 | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the Scheduling Machines with Capacity Constraints problem, we are given k
identical machines, each of which can process at most m_i jobs. M jobs are also
given, where job j has a non-negative processing time length t_j >= 0. The task
is to find a schedule such that the makespan is minimized and the capacity
constraints are met. In this paper, we present a 3-approximation algorithm
using an extension of Iterative Rounding Method introduced by Jain. To the best
of the authors' knowledge, this is the first attempt to apply Iterative
Rounding Method to scheduling problem with capacity constraints.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 02:01:26 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Zhang",
"Chi",
""
],
[
"Wang",
"Gang",
""
],
[
"Liu",
"Xiaoguang",
""
],
[
"Liu",
"Jing",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.3065 | Zhihai Zhang | Zhihai Zhang, Tian Fang, Bican Xia | Real Solution Isolation with Multiplicity of Zero-Dimensional Triangular
Systems | 12 pages, no figures | null | null | null | cs.SC cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Existing algorithms for isolating real solutions of zero-dimensional
polynomial systems do not compute the multiplicities of the solutions. In this
paper, we define in a natural way the multiplicity of solutions of
zero-dimensional triangular polynomial systems and prove that our definition is
equivalent to the classical definition of local (intersection) multiplicity.
Then we present an effective and complete algorithm for isolating real
solutions with multiplicities of zero-dimensional triangular polynomial systems
using our definition. The algorithm is based on interval arithmetic and
square-free factorization of polynomials with real algebraic coefficients. The
computational results on some examples from the literature are presented.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 03:29:37 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Zhang",
"Zhihai",
""
],
[
"Fang",
"Tian",
""
],
[
"Xia",
"Bican",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0906.3068 | Jacques-Olivier Lachaud | Jacques-Olivier Lachaud (LaBRI), Benjamin Taton (LaBRI) | Deformable Model with a Complexity Independent from Image Resolution | null | Computer Vision and Image Understanding 99 (2005) 453-475 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a parametric deformable model which recovers image components with
a complexity independent from the resolution of input images. The proposed
model also automatically changes its topology and remains fully compatible with
the general framework of deformable models. More precisely, the image space is
equipped with a metric that expands salient image details according to their
strength and their curvature. During the whole evolution of the model, the
sampling of the contour is kept regular with respect to this metric. By this
way, the vertex density is reduced along most parts of the curve while a high
quality of shape representation is preserved. The complexity of the deformable
model is thus improved and is no longer influenced by feature-preserving
changes in the resolution of input images. Building the metric requires a prior
estimation of contour curvature. It is obtained using a robust estimator which
investigates the local variations in the orientation of image gradient.
Experimental results on both computer generated and biomedical images are
presented to illustrate the advantages of our approach.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 04:42:39 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Lachaud",
"Jacques-Olivier",
"",
"LaBRI"
],
[
"Taton",
"Benjamin",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.3074 | Miao Song | Miao Song | Feynman Algorithm Implementation for Comparison with Euler in a Uniform
Elastic Two-Layer 2D and 3D Object Dynamic Deformation Framework in OpenGL
with GUI | 28 pages, 15 figures; from June 2008; portions of this work have been
subsequently published in conferences | null | null | null | cs.GR cs.DS cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We implement for comparative purposes the Feynman algorithm within a
C++-based framework for two-layer uniform facet elastic object for real-time
softbody simulation based on physics modeling methods. To facilitate the
comparison, we implement initial timing measurements on the same hardware
against that of Euler integrator in the softbody framework by varying different
algorithm parameters. Due to a relatively large number of such variations we
implement a GLUI-based user-interface to allow for much more finer control over
the simulation process at real-time, which was lacking completely in the
previous versions of the framework. We show our currents results based on the
enhanced framework. The two-layered elastic object consists of inner and outer
elastic mass-spring surfaces and compressible internal pressure. The density of
the inner layer can be set differently from the density of the outer layer; the
motion of the inner layer can be opposite to the motion of the outer layer.
These special features, which cannot be achieved by a single layered object,
result in improved imitation of a soft body, such as tissue's liquid
non-uniform deformation. The inertial behavior of the elastic object is well
illustrated in environments with gravity and collisions with walls, ceiling,
and floor. The collision detection is defined by elastic collision penalty
method and the motion of the object is guided by the Ordinary Differential
Equation computation. Users can interact with the modeled objects, deform them,
and observe the response to their action in real-time and we provide an
extensible framework and its implementation for comparative studies of
different physical-based modeling and integration algorithm implementations.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 05:39:28 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Song",
"Miao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0906.3083 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Instruction sequence notations with probabilistic instructions | 15 pages, revised because arxiv:1409.6873v1 [cs.LO] has come out | null | null | PRG0906 | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper concerns instruction sequences that contain probabilistic
instructions, i.e. instructions that are themselves probabilistic by nature. We
propose several kinds of probabilistic instructions, provide an informal
operational meaning for each of them, and discuss related work. On purpose, we
refrain from providing an ad hoc formal meaning for the proposed kinds of
instructions. We also discuss the approach of projection semantics, which was
introduced in earlier work on instruction sequences, in the light of
probabilistic instruction sequences.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 07:03:17 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Oct 2014 14:26:01 GMT"
}
]
| 2014-10-02T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.3084 | Christine Michel | Christine Michel (LIESP, Ictt), Sebastien George (LIESP, Ictt), Elise
Garrot (LIESP, Ictt) | Activit\'es collectives et instrumentation. \'Etude de pratiques dans
l'enseignement sup\'erieur | null | Distances et savoirs 5, 4 (2007) pp.527-546 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents the results of a study which concerns Instrumented
Collective Learning Situations (ICLS) used in higher education and according to
different actors's point of view (instructional designer and tutor). Considered
actors have been involved in ICLS conception or in their use with students. We
determine several forms of ICLS (in terms of scenario, tools, kind of activity)
and what educational approaches are adopted by educational actors in their
practices. We detail the results of our study, mainly by highlighting the
"home-made" approach of the actors, that is based on an opportunist and
pragmatic use of available tools in order to fit into the educational contexts.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 07:04:16 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Michel",
"Christine",
"",
"LIESP, Ictt"
],
[
"George",
"Sebastien",
"",
"LIESP, Ictt"
],
[
"Garrot",
"Elise",
"",
"LIESP, Ictt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0906.3085 | Christine Michel | Christine Michel (LIESP, Ictt) | Poset representation and similarity comparisons os systems in IR | null | 26eme conf\'erence ACM SIGIR, Toronto - Ontario : Canada (2003) | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we are using the poset representation to describe the complex
answers given by IR systems after a clustering and ranking processes. The
answers considered may be given by cartographical representations or by
thematic sub-lists of documents. The poset representation, with the graph
theory and the relational representation opens many perspectives in the
definition of new similarity measures capable of taking into account both the
clustering and ranking processes. We present a general method for constructing
new similarity measures and give several examples. These measures can be used
for semi-ordered partitions; moreover, in the comparison of two sets of
answers, the corresponding similarity indicator is an increasing function of
the ranks of presentation of common answers.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 07:04:44 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Michel",
"Christine",
"",
"LIESP, Ictt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.3089 | Jacques-Olivier Lachaud | Jacques-Olivier Lachaud (LaBRI), Fran\c{c}ois De Vieilleville (LaBRI) | Convex shapes and convergence speed of discrete tangent estimators | null | Proc. Int. Symposium on Visual Computing (ISVC2006), Lake Tahoe,
Nevada : \'Etats-Unis d'Am\'erique (2006) | 10.1007/11919629 | null | cs.DM cs.CG cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Discrete geometric estimators aim at estimating geometric characteristics of
a shape with only its digitization as input data. Such an estimator is
multigrid convergent when its estimates tend toward the geometric
characteristics of the shape as the digitization step h tends toward 0. This
paper studies the multigrid convergence of tangent estimators based on maximal
digital straight segment recognition. We show that such estimators are
multigrid convergent for some family of convex shapes and that their speed of
convergence is on average O(h^(2/3)). Experiments confirm this result and
suggest that the bound is tight.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 07:25:56 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Lachaud",
"Jacques-Olivier",
"",
"LaBRI"
],
[
"De Vieilleville",
"François",
"",
"LaBRI"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0906.3101 | Christine Michel | Christine Michel (LIESP, ICTT), Marc-Eric Bobillier-Chaumon (ICTT),
Franck Tarpin-Bernard (LIESP, ICTT) | Fracture num\'erique chez les seniors du 4eme age. Observation d'une
acculturation technique | null | Les Cahiers du num\'erique 5, 1 (2009) 147-168 | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Very old people accumulate the "handicaps": social, physical, psychological
or cognitive. Various research thus developed to determine there waiting and
needs and also to see the benefit possibly produced by technologies (called
?gerontechnology?) on their living conditions. The object of this article is to
present the numerical service offer to very old perople and to see how it takes
part in a social justice according to the definition of Rawls (principle of
equal freedom, principle of equal opportunity in the access). The adoption, the
use and the benefit of technology are analyzed in a theoretical way through a
state of the art and in an experimental way through a qualitative and
quantitative investigation carried out with a population of very old people. We
propose to identify dynamic technological acceptance of old people according to
the TAM'S (Technology Acceptance Model) of Davis adapted by (Hamner and Qazi,
2008).
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 08:14:03 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Michel",
"Christine",
"",
"LIESP, ICTT"
],
[
"Bobillier-Chaumon",
"Marc-Eric",
"",
"ICTT"
],
[
"Tarpin-Bernard",
"Franck",
"",
"LIESP, ICTT"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0906.3112 | Panagiotis Papadakos | Panagiotis Papadakos, Yannis Theoharis, Yannis Marketakis, Nikos
Armenatzoglou and Yannis Tzitzikas | Object-Relational Database Representations for Text Indexing | null | null | null | null | cs.IR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | One of the distinctive features of Information Retrieval systems comparing to
Database Management systems, is that they offer better compression for posting
lists, resulting in better I/O performance and thus faster query evaluation. In
this paper, we introduce database representations of the index that reduce the
size (and thus the disk I/Os) of the posting lists. This is not achieved by
redesigning the DBMS, but by exploiting the non 1NF features that existing
Object-Relational DBM systems (ORDBMS) already offer. Specifically, four
different database representations are described and detailed experimental
results for one million pages are reported. Three of these representations are
one order of magnitude more space efficient and faster (in query evaluation)
than the plain relational representation.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 13:32:09 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Papadakos",
"Panagiotis",
""
],
[
"Theoharis",
"Yannis",
""
],
[
"Marketakis",
"Yannis",
""
],
[
"Armenatzoglou",
"Nikos",
""
],
[
"Tzitzikas",
"Yannis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0906.3119 | EPTCS | Alexander Krassovitskiy, Yurii Rogozhin, Sergey Verlan | Computational Power of P Systems with Small Size Insertion and Deletion
Rules | null | EPTCS 1, 2009, pp. 108-117 | 10.4204/EPTCS.1.10 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent investigations show insertion-deletion systems of small size that are
not complete and cannot generate all recursively enumerable languages. However,
if additional computational distribution mechanisms like P systems are added,
then the computational completeness is achieved in some cases. In this article
we take two insertion-deletion systems that are not computationally complete,
consider them in the framework of P systems and show that the computational
power is strictly increased by proving that any recursively enumerable language
can be generated. At the end some open problems are presented.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:44:01 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Krassovitskiy",
"Alexander",
""
],
[
"Rogozhin",
"Yurii",
""
],
[
"Verlan",
"Sergey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3149 | David Tolpin | David Tolpin, Solomon Eyal Shimony | Semi-Myopic Sensing Plans for Value Optimization | 9 pages, 4 figures, presented at BISFAI 2009 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following sequential decision problem. Given a set of items
of unknown utility, we need to select one of as high a utility as possible
(``the selection problem''). Measurements (possibly noisy) of item values prior
to selection are allowed, at a known cost. The goal is to optimize the overall
sequential decision process of measurements and selection.
Value of information (VOI) is a well-known scheme for selecting measurements,
but the intractability of the problem typically leads to using myopic VOI
estimates. In the selection problem, myopic VOI frequently badly underestimates
the value of information, leading to inferior sensing plans. We relax the
strict myopic assumption into a scheme we term semi-myopic, providing a
spectrum of methods that can improve the performance of sensing plans. In
particular, we propose the efficiently computable method of ``blinkered'' VOI,
and examine theoretical bounds for special cases. Empirical evaluation of
``blinkered'' VOI in the selection problem with normally distributed item
values shows that is performs much better than pure myopic VOI.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 11:45:40 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Tolpin",
"David",
""
],
[
"Shimony",
"Solomon Eyal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.3155 | Takayuki Tsuchida | Takayuki Tsuchida | A systematic method for constructing time discretizations of integrable
lattice systems: local equations of motion | 61 pages; (v2)(v3) many minor corrections | An abridged half-length version was published as J. Phys. A: Math.
Theor. 43 (2010) 415202 | 10.1088/1751-8113/43/41/415202 | OIQP-09-01 | nlin.SI cs.NA math-ph math.MP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new method for discretizing the time variable in integrable
lattice systems while maintaining the locality of the equations of motion. The
method is based on the zero-curvature (Lax pair) representation and the
lowest-order "conservation laws". In contrast to the pioneering work of
Ablowitz and Ladik, our method allows the auxiliary dependent variables
appearing in the stage of time discretization to be expressed locally in terms
of the original dependent variables. The time-discretized lattice systems have
the same set of conserved quantities and the same structures of the solutions
as the continuous-time lattice systems; only the time evolution of the
parameters in the solutions that correspond to the angle variables is
discretized. The effectiveness of our method is illustrated using examples such
as the Toda lattice, the Volterra lattice, the modified Volterra lattice, the
Ablowitz-Ladik lattice (an integrable semi-discrete nonlinear Schroedinger
system), and the lattice Heisenberg ferromagnet model. For the Volterra lattice
and modified Volterra lattice, we also present their ultradiscrete analogues.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 13:02:50 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jul 2009 16:58:45 GMT"
},
{
"version": "v3",
"created": "Tue, 28 Sep 2010 16:19:27 GMT"
}
]
| 2010-09-29T00:00:00 | [
[
"Tsuchida",
"Takayuki",
""
]
]
| [
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
]
|
0906.3162 | Yonatan Bilu | Yonatan Bilu, Nathan Linial | Are stable instances easy? | 14 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the notion of a stable instance for a discrete optimization
problem, and argue that in many practical situations only sufficiently stable
instances are of interest. The question then arises whether stable instances of
NP--hard problems are easier to solve. In particular, whether there exist
algorithms that solve correctly and in polynomial time all sufficiently stable
instances of some NP--hard problem. The paper focuses on the Max--Cut problem,
for which we show that this is indeed the case.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 12:43:41 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Bilu",
"Yonatan",
""
],
[
"Linial",
"Nathan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3173 | Yonina C. Eldar | Yonina C. Eldar, Patrick Kuppinger and Helmut B\"olcskei | Compressed Sensing of Block-Sparse Signals: Uncertainty Relations and
Efficient Recovery | Submitted to the IEEE Trans. on Signal Processing, version 2 has
updated figures | null | 10.1109/TSP.2010.2044837 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider compressed sensing of block-sparse signals, i.e., sparse signals
that have nonzero coefficients occurring in clusters. An uncertainty relation
for block-sparse signals is derived, based on a block-coherence measure, which
we introduce. We then show that a block-version of the orthogonal matching
pursuit algorithm recovers block $k$-sparse signals in no more than $k$ steps
if the block-coherence is sufficiently small. The same condition on
block-coherence is shown to guarantee successful recovery through a mixed
$\ell_2/\ell_1$-optimization approach. This complements previous recovery
results for the block-sparse case which relied on small block-restricted
isometry constants. The significance of the results presented in this paper
lies in the fact that making explicit use of block-sparsity can provably yield
better reconstruction properties than treating the signal as being sparse in
the conventional sense, thereby ignoring the additional structure in the
problem.
| [
{
"version": "v1",
"created": "Tue, 16 Jun 2009 21:02:28 GMT"
},
{
"version": "v2",
"created": "Thu, 18 Jun 2009 13:11:24 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Eldar",
"Yonina C.",
""
],
[
"Kuppinger",
"Patrick",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3183 | Chao Tian | Chao Tian, Suhas Diggavi, and Shlomo Shamai (Shitz) | Approximate Characterizations for the Gaussian Source Broadcast
Distortion Region | revised version. to appear in Trans. IT | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the joint source-channel coding problem of sending a Gaussian
source on a K-user Gaussian broadcast channel with bandwidth mismatch. A new
outer bound to the achievable distortion region is derived using the technique
of introducing more than one additional auxiliary random variable, which was
previously used to derive sum-rate lower bound for the symmetric Gaussian
multiple description problem. By combining this outer bound with the
achievability result based on source-channel separation, we provide approximate
characterizations of the achievable distortion region within constant
multiplicative factors. Furthermore, we show that the results can be extended
to general broadcast channels, and the performance of the source-channel
separation based approach is also within the same constant multiplicative
factors of the optimum.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 13:42:58 GMT"
},
{
"version": "v2",
"created": "Fri, 19 Nov 2010 17:07:07 GMT"
}
]
| 2010-11-22T00:00:00 | [
[
"Tian",
"Chao",
"",
"Shitz"
],
[
"Diggavi",
"Suhas",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3186 | EPTCS | Philippe Moser | A General Notion of Useful Information | null | EPTCS 1, 2009, pp. 164-171 | 10.4204/EPTCS.1.16 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce a general framework for defining the depth of a
sequence with respect to a class of observers. We show that our general
framework captures all depth notions introduced in complexity theory so far. We
review most such notions, show how they are particular cases of our general
depth framework, and review some classical results about the different depth
notions.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:09:03 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Moser",
"Philippe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3192 | Mari Kobayashi | Mari Kobayashi, Merouane Debbah, Shlomo Shamai (Shitz) | Secured Communication over Frequency-Selective Fading Channels: a
practical Vandermonde precoding | To appear in EURASIP journal on Wireless Communications and
Networking, special issue on Wireless Physical Security, 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the frequency-selective broadcast channel with
confidential messages (BCC) in which the transmitter sends a confidential
message to receiver 1 and a common message to receivers 1 and 2. In the case of
a block transmission of N symbols followed by a guard interval of L symbols,
the frequency-selective channel can be modeled as a N * (N+L) Toeplitz matrix.
For this special type of multiple-input multiple-output (MIMO) channels, we
propose a practical Vandermonde precoding that consists of projecting the
confidential messages in the null space of the channel seen by receiver 2 while
superposing the common message. For this scheme, we provide the achievable rate
region, i.e. the rate-tuple of the common and confidential messages, and
characterize the optimal covariance inputs for some special cases of interest.
It is proved that the proposed scheme achieves the optimal degree of freedom
(d.o.f) region. More specifically, it enables to send l <= L confidential
messages and N-l common messages simultaneously over a block of N+L symbols.
Interestingly, the proposed scheme can be applied to secured multiuser
scenarios such as the K+1-user frequency-selective BCC with K confidential
messages and the two-user frequency-selective BCC with two confidential
messages. For each scenario, we provide the achievable secrecy degree of
freedom (s.d.o.f.) region of the corresponding frequency-selective BCC and
prove the optimality of the Vandermonde precoding. One of the appealing
features of the proposed scheme is that it does not require any specific
secrecy encoding technique but can be applied on top of any existing powerful
encoding schemes.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:28:30 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Kobayashi",
"Mari",
"",
"Shitz"
],
[
"Debbah",
"Merouane",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3194 | Konstantinos Nikitopoulos | Konstantinos Nikitopoulos, Dan Zhang, I-Wei Lai and Gerd Ascheid | Complexity-Efficient Enumeration Techniques for Soft-Input, Soft-Output
Sphere Decoding | The final version of this work appears in IEEE Communications Letters | Nikitopoulos, K., Dan Zhang, I-wei Lai;, Ascheid, G.
"Complexity-efficient enumeration techniques for soft-input, soft-output
sphere decoding," IEEE Communications Letters, vol.14, no.4, pp.312-314, Apr.
2010 | 10.1109/LCOMM.2010.04.092230 | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper two complexity efficient soft sphere-decoder modifications are
proposed for computing the max-log LLR values in iterative MIMO systems, which
avoid the costly, typically needed, full enumeration and sorting (FES)
procedure during the tree traversal without compromising the max-log
performance. It is shown that despite the resulting increase in the number of
expanded nodes, they can be more computationally efficient than the typical
soft sphere decoders by avoiding the unnecessary complexity of FES.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:31:13 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Feb 2010 10:08:03 GMT"
},
{
"version": "v3",
"created": "Thu, 4 Oct 2012 11:29:45 GMT"
}
]
| 2012-10-05T00:00:00 | [
[
"Nikitopoulos",
"Konstantinos",
""
],
[
"Zhang",
"Dan",
""
],
[
"Lai",
"I-Wei",
""
],
[
"Ascheid",
"Gerd",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.3197 | EPTCS | Maurice Margenstern | On the injectivity of the global function of a cellular automaton in the
hyperbolic plane (extended abstract) | null | EPTCS 1, 2009, pp. 153-163 | 10.4204/EPTCS.1.15 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we look at the following question. We consider cellular
automata in the hyperbolic plane, (see Margenstern, 2000, 2007 and Margenstern,
Morita, 2001) and we consider the global function defined on all possible
configurations. Is the injectivity of this function undecidable? The problem
was answered positively in the case of the Euclidean plane by Jarkko Kari, in
1994. In the present paper, we show that the answer is also positive for the
hyperbolic plane: the problem is undecidable.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:33:32 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Margenstern",
"Maurice",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3199 | EPTCS | Manfred Kudlek | Some Considerations on Universality | null | EPTCS 1, 2009, pp. 118-122 | 10.4204/EPTCS.1.11 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper puts into discussion the concept of universality, in particular for
structures not of the power of Turing computability. The question arises if for
such structures a universal structure of the same kind exists or not. For that
the construction of universal Turing machines and those with some constraints
are presented in some detail.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:39:20 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Kudlek",
"Manfred",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3200 | Mari Kobayashi | Mari Kobayashi, Yingbin Liang, Shlomo Shamai, Merouane Debbah | On the Compound MIMO Broadcast Channels with Confidential Messages | To appear in Proc. IEEE Symposium on Information Theory (ISIT 2009)
June 28 - July 3, 2009, Seoul, Korea | null | 10.1109/ISIT.2009.5205953 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the compound multi-input multi-output (MIMO) broadcast channel with
confidential messages (BCC), where one transmitter sends a common message to
two receivers and two confidential messages respectively to each receiver. The
channel state may take one of a finite set of states, and the transmitter knows
the state set but does not know the realization of the state. We study
achievable rates with perfect secrecy in the high SNR regime by characterizing
an achievable secrecy degree of freedom (s.d.o.f.) region for two models, the
Gaussian MIMO-BCC and the ergodic fading multi-input single-output (MISO)-BCC
without a common message. We show that by exploiting an additional temporal
dimension due to state variation in the ergodic fading model, the achievable
s.d.o.f. region can be significantly improved compared to the Gaussian model
with a constant state, although at the price of a larger delay.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:40:32 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Kobayashi",
"Mari",
""
],
[
"Liang",
"Yingbin",
""
],
[
"Shamai",
"Shlomo",
""
],
[
"Debbah",
"Merouane",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3202 | Moshe Levy | Jacob Goldenberg and Moshe Levy | Distance Is Not Dead: Social Interaction and Geographical Distance in
the Internet Era | null | null | null | null | cs.CY physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Internet revolution has made long-distance communication dramatically
faster, easier, and cheaper than ever before. This, it has been argued, has
decreased the importance of geographic proximity in social interactions,
transforming our world into a global village with a borderless society. We
argue for the opposite: while technology has undoubtedly increased the overall
level of communication, this increase has been most pronounced for local social
ties. We show that the volume of electronic communications is inversely
proportional to geographic distance, following a Power Law. We directly study
the importance of physical proximity in social interactions by analyzing the
spatial dissemination of new baby names. Counter-intuitively, and in line with
the above argument, the importance of geographic proximity has dramatically
increased with the internet revolution.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 14:42:13 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Oct 2009 06:40:00 GMT"
}
]
| 2009-10-19T00:00:00 | [
[
"Goldenberg",
"Jacob",
""
],
[
"Levy",
"Moshe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0906.3208 | EPTCS | Alexander Okhotin | Representing a P-complete problem by small trellis automata | null | EPTCS 1, 2009, pp. 185-198 | 10.4204/EPTCS.1.18 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A restricted case of the Circuit Value Problem known as the Sequential NOR
Circuit Value Problem was recently used to obtain very succinct examples of
conjunctive grammars, Boolean grammars and language equations representing
P-complete languages (Okhotin, http://dx.doi.org/10.1007/978-3-540-74593-8_23
"A simple P-complete problem and its representations by language equations",
MCU 2007). In this paper, a new encoding of the same problem is proposed, and a
trellis automaton (one-way real-time cellular automaton) with 11 states solving
this problem is constructed.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 15:21:41 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Okhotin",
"Alexander",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3213 | EPTCS | Nicolas Ollinger | Intrinsically Universal Cellular Automata | null | EPTCS 1, 2009, pp. 199-204 | 10.4204/EPTCS.1.19 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This talk advocates intrinsic universality as a notion to identify simple
cellular automata with complex computational behavior. After an historical
introduction and proper definitions of intrinsic universality, which is
discussed with respect to Turing and circuit universality, we discuss
construction methods for small intrinsically universal cellular automata before
discussing techniques for proving non universality.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 15:24:44 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Ollinger",
"Nicolas",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3220 | Narad Rampersad | Narad Rampersad and Jeffrey Shallit | Detecting patterns in finite regular and context-free languages | 9 pages | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider variations on the following problem: given an NFA M and a pattern
p, does there exist an x in L(M) such that p matches x? We consider the
restricted problem where M only accepts a finite language. We also consider the
variation where the pattern p is required only to match a factor of x. We show
that both of these problems are NP-complete. We also consider the same problems
for context-free grammars; in this case the problems become PSPACE-complete.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 15:53:06 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Rampersad",
"Narad",
""
],
[
"Shallit",
"Jeffrey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3224 | Sergey Andreyev | Sergey Andreyev | Personal applications, based on moveable / resizable elements | 14 pages, 12 figures | null | null | null | cs.HC cs.GR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | All the modern day applications have the interface, absolutely defined by the
developers. The use of adaptive interface or dynamic layout allows some
variations, but even all of them are predetermined on the design stage, because
the best reaction (from designer's view) on any possible users' movement was
hardcoded. But there is a different world of applications, totally constructed
on moveable / resizable elements; such applications turn the full control to
the users. The crucial thing in such programs is that not something but
everything must become moveable and resizable. This article describes the
features of such applications and the algorithm behind their design.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:07:01 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Andreyev",
"Sergey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0906.3225 | EPTCS | J\'er\^ome Durand-Lose | Small Turing universal signal machines | null | EPTCS 1, 2009, pp. 70-80 | 10.4204/EPTCS.1.7 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article aims at providing signal machines as small as possible able to
perform any computation (in the classical understanding). After presenting
signal machines, it is shown how to get universal ones from Turing machines,
cellular-automata and cyclic tag systems. Finally a halting universal signal
machine with 13 meta-signals and 21 collision rules is presented.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:08:47 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Durand-Lose",
"Jérôme",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3227 | EPTCS | Nicolas Ollinger, Ga\'etan Richard | A Particular Universal Cellular Automaton | null | EPTCS 1, 2009, pp. 205-214 | 10.4204/EPTCS.1.20 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Signals are a classical tool used in cellular automata constructions that
proved to be useful for language recognition or firing-squad synchronisation.
Particles and collisions formalize this idea one step further, describing
regular nets of colliding signals. In the present paper, we investigate the use
of particles and collisions for constructions involving an infinite number of
interacting particles. We obtain a high-level construction for a new smallest
intrinsically universal cellular automaton with 4 states.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:11:12 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Ollinger",
"Nicolas",
""
],
[
"Richard",
"Gaétan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3228 | EPTCS | Klaus Sutner | Computational Processes and Incompleteness | null | EPTCS 1, 2009, pp. 226-234 | 10.4204/EPTCS.1.22 | null | cs.CC cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a formal definition of Wolfram's notion of computational process
based on cellular automata, a physics-like model of computation. There is a
natural classification of these processes into decidable, intermediate and
complete. It is shown that in the context of standard finite injury priority
arguments one cannot establish the existence of an intermediate computational
process.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:13:53 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Sutner",
"Klaus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.3231 | EPTCS | Sergey Verlan, Yurii Rogozhin | New Choice for Small Universal Devices: Symport/Antiport P Systems | null | EPTCS 1, 2009, pp. 235-242 | 10.4204/EPTCS.1.23 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Symport/antiport P systems provide a very simple machinery inspired by
corresponding operations in the living cell. It turns out that systems of small
descriptional complexity are needed to achieve the universality by these
systems. This makes them a good candidate for small universal devices replacing
register machines for different simulations, especially when a simulating
parallel machinery is involved. This article contains survey of these systems
and presents different trade-offs between parameters.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:14:54 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Verlan",
"Sergey",
""
],
[
"Rogozhin",
"Yurii",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3234 | Vivek Goyal | Sundeep Rangan, Alyson K. Fletcher, and Vivek K Goyal | Asymptotic Analysis of MAP Estimation via the Replica Method and
Applications to Compressed Sensing | 22 pages; added details on the replica symmetry assumption | IEEE Trans. on Information Theory, vol. 58, no. 3, pp. 1903-1923,
March 2012 | 10.1109/TIT.2011.2177575 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The replica method is a non-rigorous but well-known technique from
statistical physics used in the asymptotic analysis of large, random, nonlinear
problems. This paper applies the replica method, under the assumption of
replica symmetry, to study estimators that are maximum a posteriori (MAP) under
a postulated prior distribution. It is shown that with random linear
measurements and Gaussian noise, the replica-symmetric prediction of the
asymptotic behavior of the postulated MAP estimate of an n-dimensional vector
"decouples" as n scalar postulated MAP estimators. The result is based on
applying a hardening argument to the replica analysis of postulated posterior
mean estimators of Tanaka and of Guo and Verdu.
The replica-symmetric postulated MAP analysis can be readily applied to many
estimators used in compressed sensing, including basis pursuit, lasso, linear
estimation with thresholding, and zero norm-regularized estimation. In the case
of lasso estimation the scalar estimator reduces to a soft-thresholding
operator, and for zero norm-regularized estimation it reduces to a
hard-threshold. Among other benefits, the replica method provides a
computationally-tractable method for precisely predicting various performance
metrics including mean-squared error and sparsity pattern recovery probability.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:24:23 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Aug 2009 17:31:22 GMT"
},
{
"version": "v3",
"created": "Sat, 8 Oct 2011 21:39:53 GMT"
}
]
| 2015-01-20T00:00:00 | [
[
"Rangan",
"Sundeep",
""
],
[
"Fletcher",
"Alyson K.",
""
],
[
"Goyal",
"Vivek K",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3235 | EPTCS | Cristian S. Calude | Simplicity via Provability for Universal Prefix-free Turing Machines | null | EPTCS 1, 2009, pp. 16-21 | 10.4204/EPTCS.1.2 | null | cs.IT cs.LO math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Universality is one of the most important ideas in computability theory.
There are various criteria of simplicity for universal Turing machines.
Probably the most popular one is to count the number of states/symbols. This
criterion is more complex than it may appear at a first glance. In this note we
review recent results in Algorithmic Information Theory and propose three new
criteria of simplicity for universal prefix-free Turing machines. These
criteria refer to the possibility of proving various natural properties of such
a machine (its universality, for example) in a formal theory, PA or ZFC. In all
cases some, but not all, machines are simple.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:25:45 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Calude",
"Cristian S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3240 | Efi Fogel | Efi Fogel | Minkowski Sum Construction and other Applications of Arrangements of
Geodesic Arcs on the Sphere | A Ph.D. thesis carried out at the Tel-Aviv university. 134 pages
long. The advisor was Prof. Dan Halperin | null | null | null | cs.CG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present two exact implementations of efficient output-sensitive algorithms
that compute Minkowski sums of two convex polyhedra in 3D. We do not assume
general position. Namely, we handle degenerate input, and produce exact
results. We provide a tight bound on the exact maximum complexity of Minkowski
sums of polytopes in 3D in terms of the number of facets of the summand
polytopes. The algorithms employ variants of a data structure that represents
arrangements embedded on two-dimensional parametric surfaces in 3D, and they
make use of many operations applied to arrangements in these representations.
We have developed software components that support the arrangement
data-structure variants and the operations applied to them. These software
components are generic, as they can be instantiated with any number type.
However, our algorithms require only (exact) rational arithmetic. These
software components together with exact rational-arithmetic enable a robust,
efficient, and elegant implementation of the Minkowski-sum constructions and
the related applications. These software components are provided through a
package of the Computational Geometry Algorithm Library (CGAL) called
Arrangement_on_surface_2. We also present exact implementations of other
applications that exploit arrangements of arcs of great circles embedded on the
sphere. We use them as basic blocks in an exact implementation of an efficient
algorithm that partitions an assembly of polyhedra in 3D with two hands using
infinite translations. This application distinctly shows the importance of
exact computation, as imprecise computation might result with dismissal of
valid partitioning-motions.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 15:51:04 GMT"
}
]
| 2009-12-07T00:00:00 | [
[
"Fogel",
"Efi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.3245 | Jes\'us Pardillo | Cristina Cachero, Jes\'us Pardillo | Goal-oriented Data Warehouse Quality Measurement | 11 pages | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Requirements engineering is known to be a key factor for the success of
software projects. Inside this discipline, goal-oriented requirements
engineering approaches have shown specially suitable to deal with projects
where it is necessary to capture the alignment between system requirements and
stakeholders' needs, as is the case of data-warehousing projects. However, the
mere alignment of data-warehouse system requirements with business goals is not
enough to assure better data-warehousing products; measures and techniques are
also needed to assure the data-warehouse quality. In this paper, we provide a
modelling framework for data-warehouse quality measurement (i*DWQM). This
framework, conceived as an i* extension, provides support for the definition of
data-warehouse requirements analysis models that include quantifiable quality
scenarios, defined in terms of well-formed measures. This extension has been
defined by means of a UML profiling architecture. The resulting framework has
been implemented in the Eclipse development platform.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 16:49:03 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Cachero",
"Cristina",
""
],
[
"Pardillo",
"Jesús",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.3248 | EPTCS | Matthew Cook | A Concrete View of Rule 110 Computation | null | EPTCS 1, 2009, pp. 31-55 | 10.4204/EPTCS.1.4 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Rule 110 is a cellular automaton that performs repeated simultaneous updates
of an infinite row of binary values. The values are updated in the following
way: 0s are changed to 1s at all positions where the value to the right is a 1,
while 1s are changed to 0s at all positions where the values to the left and
right are both 1. Though trivial to define, the behavior exhibited by Rule 110
is surprisingly intricate, and in (Cook, 2004) we showed that it is capable of
emulating the activity of a Turing machine by encoding the Turing machine and
its tape into a repeating left pattern, a central pattern, and a repeating
right pattern, which Rule 110 then acts on. In this paper we provide an
explicit compiler for converting a Turing machine into a Rule 110 initial
state, and we present a general approach for proving that such constructions
will work as intended. The simulation was originally assumed to require
exponential time, but surprising results of Neary and Woods (2006) have shown
that in fact, only polynomial time is required. We use the methods of Neary and
Woods to exhibit a direct simulation of a Turing machine by a tag system in
polynomial time.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 17:01:54 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Cook",
"Matthew",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3251 | EPTCS | David Doty, Matthew J. Patitz, Scott M. Summers | Limitations of Self-Assembly at Temperature One (extended abstract) | null | EPTCS 1, 2009, pp. 67-69 | 10.4204/EPTCS.1.6 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that if a subset X of the integer Cartesian plane weakly
self-assembles at temperature 1 in a deterministic (Winfree) tile assembly
system satisfying a natural condition known as *pumpability*, then X is a
finite union of doubly periodic sets. This shows that only the most simple of
infinite shapes and patterns can be constructed using pumpable temperature 1
tile assembly systems, and gives strong evidence for the thesis that
temperature 2 or higher is required to carry out general-purpose computation in
a tile assembly system. Finally, we show that general-purpose computation is
possible at temperature 1 if negative glue strengths are allowed in the tile
assembly model.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 17:06:51 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Doty",
"David",
""
],
[
"Patitz",
"Matthew J.",
""
],
[
"Summers",
"Scott M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3256 | EPTCS | Olivier Bournez, J\'er\'emie Chalopin, Johanne Cohen, Xavier Koegler | Playing With Population Protocols | null | EPTCS 1, 2009, pp. 3-15 | 10.4204/EPTCS.1.1 | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Population protocols have been introduced as a model of sensor networks
consisting of very limited mobile agents with no control over their own
movement: A collection of anonymous agents, modeled by finite automata,
interact in pairs according to some rules.
Predicates on the initial configurations that can be computed by such
protocols have been characterized under several hypotheses.
We discuss here whether and when the rules of interactions between agents can
be seen as a game from game theory. We do so by discussing several basic
protocols.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 17:16:01 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Bournez",
"Olivier",
""
],
[
"Chalopin",
"Jérémie",
""
],
[
"Cohen",
"Johanne",
""
],
[
"Koegler",
"Xavier",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.3257 | EPTCS | Gr\'egory Lafitte | Busy beavers gone wild | null | EPTCS 1, 2009, pp. 123-129 | 10.4204/EPTCS.1.12 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show some incompleteness results a la Chaitin using the busy beaver
functions. Then, with the help of ordinal logics, we show how to obtain a
theory in which the values of the busy beaver functions can be provably
established and use this to reveal a structure on the provability of the values
of these functions.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 17:19:05 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Lafitte",
"Grégory",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.3282 | Karthikeyan Lingasubramanian | Karthikeyan Lingasubramanian, Syed M. Alam and Sanjukta Bhanja | Maximum Error Modeling for Fault-Tolerant Computation using Maximum a
posteriori (MAP) Hypothesis | null | Microelectronics Reliability, 2010 | 10.1016/j.microrel.2010.07.156 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The application of current generation computing machines in safety-centric
applications like implantable biomedical chips and automobile safety has
immensely increased the need for reviewing the worst-case error behavior of
computing devices for fault-tolerant computation. In this work, we propose an
exact probabilistic error model that can compute the maximum error over all
possible input space in a circuit specific manner and can handle various types
of structural dependencies in the circuit. We also provide the worst-case input
vector, which has the highest probability to generate an erroneous output, for
any given logic circuit. We also present a study of circuit-specific error
bounds for fault-tolerant computation in heterogeneous circuits using the
maximum error computed for each circuit. We model the error estimation problem
as a maximum a posteriori (MAP) estimate, over the joint error probability
function of the entire circuit, calculated efficiently through an intelligent
search of the entire input space using probabilistic traversal of a binary join
tree using Shenoy-Shafer algorithm. We demonstrate this model using MCNC and
ISCAS benchmark circuits and validate it using an equivalent HSpice model. Both
results yield the same worst-case input vectors and the highest % difference of
our error model over HSpice is just 1.23%. We observe that the maximum error
probabilities are significantly larger than the average error probabilities,
and provides a much tighter error bounds for fault-tolerant computation. We
also find that the error estimates depend on the specific circuit structure and
the maximum error probabilities are sensitive to the individual gate failure
probabilities.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 19:23:28 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Oct 2009 16:04:33 GMT"
},
{
"version": "v3",
"created": "Tue, 27 Oct 2009 13:57:19 GMT"
}
]
| 2021-08-23T00:00:00 | [
[
"Lingasubramanian",
"Karthikeyan",
""
],
[
"Alam",
"Syed M.",
""
],
[
"Bhanja",
"Sanjukta",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3284 | Niall Murphy | Eric Goles, Pierre-Etienne Meunier, Ivan Rapaport and Guillaume
Theyssier | Communications in cellular automata | null | EPTCS 1, 2009, pp. 81-92 | 10.4204/EPTCS.1.8 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The goal of this paper is to show why the framework of communication
complexity seems suitable for the study of cellular automata. Researchers have
tackled different algorithmic problems ranging from the complexity of
predicting to the decidability of different dynamical properties of cellular
automata. But the difference here is that we look for communication protocols
arising in the dynamics itself. Our work is guided by the following idea: if we
are able to give a protocol describing a cellular automaton, then we can
understand its behavior.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 19:52:34 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Goles",
"Eric",
""
],
[
"Meunier",
"Pierre-Etienne",
""
],
[
"Rapaport",
"Ivan",
""
],
[
"Theyssier",
"Guillaume",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3286 | Niall Murphy | Fred Lunnon | The Pagoda Sequence: a Ramble through Linear Complexity, Number Walls,
D0L Sequences, Finite State Automata, and Aperiodic Tilings | null | EPTCS 1, 2009, pp. 130-148 | 10.4204/EPTCS.1.13 | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We review the concept of the number wall as an alternative to the traditional
linear complexity profile (LCP), and sketch the relationship to other topics
such as linear feedback shift-register (LFSR) and context-free Lindenmayer
(D0L) sequences. A remarkable ternary analogue of the Thue-Morse sequence is
introduced having deficiency 2 modulo 3, and this property verified via the
re-interpretation of the number wall as an aperiodic plane tiling.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 19:47:52 GMT"
}
]
| 2009-06-18T00:00:00 | [
[
"Lunnon",
"Fred",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.