id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0906.3306
Niall Murphy
Matthew J. Patitz and Scott M. Summers
Self-Assembly of Infinite Structures
null
EPTCS 1, 2009, pp. 215-225
10.4204/EPTCS.1.21
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We review some recent results related to the self-assembly of infinite structures in the Tile Assembly Model. These results include impossibility results, as well as novel tile assembly systems in which shapes and patterns that represent various notions of computation self-assemble. Several open questions are also presented and motivated.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 20:33:07 GMT" } ]
2009-06-19T00:00:00
[ [ "Patitz", "Matthew J.", "" ], [ "Summers", "Scott M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3313
Venkatesh Ramakrishnan
Venkatesh Ramakrishnan (1), Ernst M. Witte (1), Torsten Kempf (1), David Kammler (1), Gerd Ascheid (1), Heinrich Meyr (1), Marc Adrat (2), Markus Antweiler (2) ((1) Institute for Integrated Signal Processing Systems, RWTH Aachen University, Germany (2) Research Establishment for Applied Science (FGAN), Dept. FKIE/KOM, Wachtberg, Germany)
Efficient And Portable SDR Waveform Development: The Nucleus Concept
To Appear in 2009 IEEE Military Communications Conference (MILCOM 2009)
null
10.1109/MILCOM.2009.5379897
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Future wireless communication systems should be flexible to support different waveforms (WFs) and be cognitive to sense the environment and tune themselves. This has lead to tremendous interest in software defined radios (SDRs). Constraints like throughput, latency and low energy demand high implementation efficiency. The tradeoff of going for a highly efficient implementation is the increase of porting effort to a new hardware (HW) platform. In this paper, we propose a novel concept for WF development, the Nucleus concept, that exploits the common structure in various wireless signal processing algorithms and provides a way for efficient and portable implementation. Tool assisted WF mapping and exploration is done efficiently by propagating the implementation and interface properties of Nuclei. The Nucleus concept aims at providing software flexibility with high level programmability, but at the same time limiting HW flexibility to maximize area and energy efficiency.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 07:40:51 GMT" }, { "version": "v2", "created": "Thu, 23 Jul 2009 12:39:26 GMT" } ]
2010-12-21T00:00:00
[ [ "Ramakrishnan", "Venkatesh", "" ], [ "Witte", "Ernst M.", "" ], [ "Kempf", "Torsten", "" ], [ "Kammler", "David", "" ], [ "Ascheid", "Gerd", "" ], [ "Meyr", "Heinrich", "" ], [ "Adrat", "Marc", "" ], [ "Antweiler", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3323
Andriy Myronenko
Andriy Myronenko, Xubo Song
Adaptive Regularization of Ill-Posed Problems: Application to Non-rigid Image Registration
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an adaptive regularization approach. In contrast to conventional Tikhonov regularization, which specifies a fixed regularization operator, we estimate it simultaneously with parameters. From a Bayesian perspective we estimate the prior distribution on parameters assuming that it is close to some given model distribution. We constrain the prior distribution to be a Gauss-Markov random field (GMRF), which allows us to solve for the prior distribution analytically and provides a fast optimization algorithm. We apply our approach to non-rigid image registration to estimate the spatial transformation between two images. Our evaluation shows that the adaptive regularization approach significantly outperforms standard variational methods.
[ { "version": "v1", "created": "Wed, 17 Jun 2009 23:24:38 GMT" } ]
2009-06-19T00:00:00
[ [ "Myronenko", "Andriy", "" ], [ "Song", "Xubo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.3327
EPTCS
Niall Murphy, Damien Woods
On acceptance conditions for membrane systems: characterisations of L and NL
null
EPTCS 1, 2009, pp. 172-184
10.4204/EPTCS.1.17
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the affect of various acceptance conditions on recogniser membrane systems without dissolution. We demonstrate that two particular acceptance conditions (one easier to program, the other easier to prove correctness) both characterise the same complexity class, NL. We also find that by restricting the acceptance conditions we obtain a characterisation of L. We obtain these results by investigating the connectivity properties of dependency graphs that model membrane system computations.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 01:04:51 GMT" } ]
2009-06-19T00:00:00
[ [ "Murphy", "Niall", "" ], [ "Woods", "Damien", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.3329
EPTCS
Liesbeth De Mol
On the boundaries of solvability and unsolvability in tag systems. Theoretical and Experimental Results
null
EPTCS 1, 2009, pp. 56-66
10.4204/EPTCS.1.5
null
cs.CC cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several older and more recent results on the boundaries of solvability and unsolvability in tag systems are surveyed. Emphasis will be put on the significance of computer experiments in research on very small tag systems.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 01:15:00 GMT" } ]
2009-06-22T00:00:00
[ [ "De Mol", "Liesbeth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3332
EPTCS
Matteo Cavaliere, Peter Leupold
Complexity through the Observation of Simple Systems
null
EPTCS 1, 2009, pp. 22-30
10.4204/EPTCS.1.3
null
cs.CC cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey work on the paradigm called "computing by observing." Its central feature is that one considers the behavior of an evolving system as the result of a computation. To this end an observer records this behavior. It has turned out that the observed behavior of computationally simple systems can be very complex, when an appropriate observer is used. For example, a restricted version of context-free grammars with regular observers suffices to obtain computational completeness. As a second instantiation presented here, we apply an observer to sticker systems. Finally, some directions for further research are proposed.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 01:15:53 GMT" } ]
2009-06-22T00:00:00
[ [ "Cavaliere", "Matteo", "" ], [ "Leupold", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3352
Stefano Buzzi
Stefano Buzzi, H. Vincent Poor, Alessio Zappone
Spreading Code and Widely-Linear Receiver Design: Non-Cooperative Games for Wireless CDMA Networks
submitted to IEEE Transactions on Information Theory, June 2009
null
null
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The issue of non-cooperative transceiver optimization in the uplink of a multiuser wireless code division multiple access data network with widely-linear detection at the receiver is considered. While previous work in this area has focused on a simple real signal model, in this paper a baseband complex representation of the data is used, so as to properly take into account the I and Q components of the received signal. For the case in which the received signal is improper, a widely-linear reception structure, processing separately the data and their complex conjugates, is considered. Several non-cooperative resource allocation games are considered for this new scenario, and the performance gains granted by the use of widely-linear detection are assessed through theoretical analysis. Numerical results confirm the validity of the theoretical findings, and show that exploiting the improper nature of the data in non-cooperative resource allocation brings remarkable performance improvements in multiuser wireless systems.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 05:35:32 GMT" } ]
2009-06-19T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "Poor", "H. Vincent", "" ], [ "Zappone", "Alessio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3394
Maziar Nekovee
Maziar Nekovee
Quantifying the Availability of TV White Spaces for Cognitive Radio Operation in the UK
Extended version is available from the author
In Proc. IEEE ICC joint Workshop Cognitive Wireless Networks and Systems, Dresden, Germany, June 2009
10.1109/ICCW.2009.5208035
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive radio is being intensively researched for opportunistic access to the so-called TV White Spaces (TVWS): large portions of the VHF/UHF TV bands which become available on a geographical basis after the digital switchover. Using accurate digital TV (DTV) coverage maps together with a database of DTV transmitters, we develop a methodology for identifying TVWS frequencies at any given location in the United Kingdom. We use our methodology to investigate variations in TVWS as a function of the location and transmit power of cognitive radios, and examine how constraints on adjacent channel interference imposed by regulators may affect the results. Our analysis provides a realistic view on the spectrum opportunity associated with cognitive devices, and presents the first quantitative study of the availability and frequency composition of TWVS outside the United States.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 09:54:20 GMT" } ]
2016-11-17T00:00:00
[ [ "Nekovee", "Maziar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.3410
Christian Spagnol
Christian Spagnol, Marta Rossi, Massimiliano Sala
Quasi-cyclic LDPC codes with high girth
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a class of quasi-cyclic LDPC codes. We provide precise conditions guaranteeing high girth in their Tanner graph. Experimentally, the codes we propose perform no worse than random LDPC codes with their same parameters, which is a significant achievement for algebraic codes.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 11:28:40 GMT" } ]
2009-06-19T00:00:00
[ [ "Spagnol", "Christian", "" ], [ "Rossi", "Marta", "" ], [ "Sala", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3421
Philippe Di Francesco
P. Di Francesco and R. Kedem
Q-system Cluster Algebras, Paths and Total Positivity
Testing the form interface
null
null
t09-083
q-fin.EC cs.SI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We review the solution of the $A_r$ Q-systems in terms of the partition function of paths on a weighted graph, and show that it is possible to modify the graphs and transfer matrices so as to provide an explicit connection to the theory of planar networks introduced in the context of totally positive matrices by Fomin and Zelevinsky.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 12:03:57 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2009 09:39:31 GMT" } ]
2023-07-12T00:00:00
[ [ "Di Francesco", "P.", "" ], [ "Kedem", "R.", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.EC", "description": "q-fin.EC is an alias for econ.GN. Economics, including micro and macro economics, international economics, theory of the firm, labor economics, and other economic topics outside finance", "span": "(Economics)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0906.3423
David Lorenz
Atzmon Hen-Tov, David H. Lorenz, and Lior Schachter
ModelTalk: A Framework for Developing Domain Specific Executable Models
null
Proc. 8th Ann. OOPSLA Workshop on Domain-Specific Modeling (DSM08), Nashville, Tennessee, USA, October 19-20, 2008
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Developing and maintaining complex, large-scale, product line of highly customized software systems is difficult and costly. Part of the difficulty is due to the need to communicate business knowledge between domain experts and application programmers. Domain specific model driven development (MDD) addresses this difficulty by providing domain experts and developers with domain specific abstractions for communicating designs. Most MDD implementations take a generative approach. In contrast, we adopt an interpretive approach to domain specific model driven development. We present a framework, named ModelTalk, that integrates MDD, dependency injection and meta-modeling to form an interpretive, domain specific modeling framework. The framework is complemented by tool support that provides developers with the same advanced level of usability for modeling as they are accustomed to in programming environments. ModelTalk is used in a commercial setting for developing a product line of Telco grade business support systems (BSS).
[ { "version": "v1", "created": "Thu, 18 Jun 2009 12:13:38 GMT" } ]
2009-06-19T00:00:00
[ [ "Hen-Tov", "Atzmon", "" ], [ "Lorenz", "David H.", "" ], [ "Schachter", "Lior", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.3424
Ziyuan Wang
Ziyuan Wang, Lars Kulik, Kotagiri Ramamohanarao
Decentralized Traffic Management Strategies for Sensor-Enabled Cars
null
null
null
SUM-06-07
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traffic Congestions and accidents are major concerns in today's transportation systems. This thesis investigates how to optimize traffic flow on highways, in particular for merging situations such as intersections where a ramp leads onto the highway. In our work, cars are equipped with sensors that can detect distance to neighboring cars, and communicate their velocity and acceleration readings with one another. Sensor-enabled cars can locally exchange sensed information about the traffic and adapt their behavior much earlier than regular cars. We propose proactive algorithms for merging different streams of sensor-enabled cars into a single stream. A proactive merging algorithm decouples the decision point from the actual merging point. Sensor-enabled cars allow us to decide where and when a car merges before it arrives at the actual merging point. This leads to a significant improvement in traffic flow as velocities can be adjusted appropriately. We compare proactive merging algorithms against the conventional priority-based merging algorithm in a controlled simulation environment. Experiment results show that proactive merging algorithms outperform the priority-based merging algorithm in terms of flow and delay.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 12:16:06 GMT" } ]
2016-09-08T00:00:00
[ [ "Wang", "Ziyuan", "" ], [ "Kulik", "Lars", "" ], [ "Ramamohanarao", "Kotagiri", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.3461
Martin Drozda
Martin Drozda, Sven Schaust, Helena Szczerbicka
AIS for Misbehavior Detection in Wireless Sensor Networks: Performance and Design Principles
16 pages, 20 figures, a full version of our IEEE CEC 2007 paper
null
10.1109/CEC.2007.4424955
null
cs.NI cs.AI cs.CR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A sensor network is a collection of wireless devices that are able to monitor physical or environmental conditions. These devices (nodes) are expected to operate autonomously, be battery powered and have very limited computational capabilities. This makes the task of protecting a sensor network against misbehavior or possible malfunction a challenging problem. In this document we discuss performance of Artificial immune systems (AIS) when used as the mechanism for detecting misbehavior. We show that (i) mechanism of the AIS have to be carefully applied in order to avoid security weaknesses, (ii) the choice of genes and their interaction have a profound influence on the performance of the AIS, (iii) randomly created detectors do not comply with limitations imposed by communications protocols and (iv) the data traffic pattern seems not to impact significantly the overall performance. We identified a specific MAC layer based gene that showed to be especially useful for detection; genes measure a network's performance from a node's viewpoint. Furthermore, we identified an interesting complementarity property of genes; this property exploits the local nature of sensor networks and moves the burden of excessive communication from normally behaving nodes to misbehaving nodes. These results have a direct impact on the design of AIS for sensor networks and on engineering of sensor networks.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 15:31:29 GMT" } ]
2016-11-17T00:00:00
[ [ "Drozda", "Martin", "" ], [ "Schaust", "Sven", "" ], [ "Szczerbicka", "Helena", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.3469
Panos Giannopoulos
Panos Giannopoulos, Christian Knauer, Gunter Rote, Daniel Werner
The parameterized complexity of some geometric problems in unbounded dimension
null
Proc. 4th Int. Workshop on Parameterized and Exact Computation-IWPEC 2009, Copenhagen, September 2009, Herausgeber: Jianer Chen und Fedor V. Fomin, Lecture Notes in Computer Science, 5917, Springer-Verlag, 2009, pp. 198-209
10.1007/978-3-642-11269-0_16
null
cs.CG cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the parameterized complexity of the following fundamental geometric problems with respect to the dimension $d$: i) Given $n$ points in $\Rd$, compute their minimum enclosing cylinder. ii) Given two $n$-point sets in $\Rd$, decide whether they can be separated by two hyperplanes. iii) Given a system of $n$ linear inequalities with $d$ variables, find a maximum-size feasible subsystem. We show that (the decision versions of) all these problems are W[1]-hard when parameterized by the dimension $d$. %and hence not solvable in ${O}(f(d)n^c)$ time, for any computable function $f$ and constant $c$ %(unless FPT=W[1]). Our reductions also give a $n^{\Omega(d)}$-time lower bound (under the Exponential Time Hypothesis).
[ { "version": "v1", "created": "Thu, 18 Jun 2009 15:44:18 GMT" } ]
2015-02-18T00:00:00
[ [ "Giannopoulos", "Panos", "" ], [ "Knauer", "Christian", "" ], [ "Rote", "Gunter", "" ], [ "Werner", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3483
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Nicolae Tapus
Efficient Offline Algorithmic Techniques for Several Packet Routing Problems in Distributed Systems
null
Acta Universitatis Apulensis - Mathematics-Informatics, no. 18, pp. 111-128, 2009. (ISSN: 1582-5329)
null
null
cs.DS cs.DC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider several problems concerning packet routing in distributed systems. Each problem is formulated using terms from Graph Theory and for each problem we present efficient, novel, algorithmic techniques for computing optimal solutions. We address topics like: bottleneck paths (trees), optimal paths with non-linear costs, optimal paths with multiple optimization objectives, maintaining aggregate connectivity information under a sequence of network link failures, and several others.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 17:38:39 GMT" } ]
2009-06-19T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Tapus", "Nicolae", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.3490
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Madalina Ecaterina Andreica, Costel Visan
Optimal Constrained Resource Allocation Strategies under Low Risk Circumstances
null
Metalurgia International, vol. 14, special issue no. 8, pp. 143-154, 2009. (ISSN: 1582-2214)
null
null
cs.DS cs.CG cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider multiple constrained resource allocation problems, where the constraints can be specified by formulating activity dependency restrictions or by using game-theoretic models. All the problems are focused on generic resources, with a few exceptions which consider financial resources in particular. The problems consider low-risk circumstances and the values of the uncertain variables which are used by the algorithms are the expected values of the variables. For each of the considered problems we propose novel algorithmic solutions for computing optimal resource allocation strategies. The presented solutions are optimal or near-optimal from the perspective of their time complexity. The considered problems have applications in a broad range of domains, like workflow scheduling in industry (e.g. in the mining and metallurgical industry) or the financial sector, motion planning, facility location and data transfer or job scheduling and resource management in Grids, clouds or other distributed systems.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 17:52:41 GMT" } ]
2009-06-19T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Andreica", "Madalina Ecaterina", "" ], [ "Visan", "Costel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.3499
Shiqian Ma
Donald Goldfarb and Shiqian Ma
Convergence of fixed-point continuation algorithms for matrix rank minimization
Conditions on RIP constant for an approximate recovery are improved
null
null
null
math.OC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The matrix rank minimization problem has applications in many fields such as system identification, optimal control, low-dimensional embedding, etc. As this problem is NP-hard in general, its convex relaxation, the nuclear norm minimization problem, is often solved instead. Recently, Ma, Goldfarb and Chen proposed a fixed-point continuation algorithm for solving the nuclear norm minimization problem. By incorporating an approximate singular value decomposition technique in this algorithm, the solution to the matrix rank minimization problem is usually obtained. In this paper, we study the convergence/recoverability properties of the fixed-point continuation algorithm and its variants for matrix rank minimization. Heuristics for determining the rank of the matrix when its true rank is not known are also proposed. Some of these algorithms are closely related to greedy algorithms in compressed sensing. Numerical results for these algorithms for solving affinely constrained matrix rank minimization problems are reported.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 18:42:56 GMT" }, { "version": "v2", "created": "Mon, 10 Aug 2009 02:24:06 GMT" }, { "version": "v3", "created": "Thu, 1 Jul 2010 18:44:25 GMT" }, { "version": "v4", "created": "Wed, 29 Dec 2010 23:35:49 GMT" } ]
2011-01-04T00:00:00
[ [ "Goldfarb", "Donald", "" ], [ "Ma", "Shiqian", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3527
Serge Gaspers
Serge Gaspers, Gregory B. Sorkin
A universally fastest algorithm for Max 2-Sat, Max 2-CSP, and everything in between
40 pages, a preliminary version appeared in the proceedings of SODA 2009
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce "hybrid" Max 2-CSP formulas consisting of "simple clauses", namely conjunctions and disjunctions of pairs of variables, and general 2-variable clauses, which can be any integer-valued functions of pairs of boolean variables. This allows an algorithm to use both efficient reductions specific to AND and OR clauses, and other powerful reductions that require the general CSP setting. We use new reductions introduced here, and recent reductions such as "clause-learning" and "2-reductions" generalized to our setting's mixture of simple and general clauses. Parametrizing an instance by the fraction p of non-simple clauses, we give an exact (exponential-time) algorithm that is the fastest known polynomial-space algorithm for p=0 (which includes the well-studied Max 2-Sat problem but also instances with arbitrary mixtures of AND and OR clauses); the only efficient algorithm for mixtures of AND, OR, and general integer-valued clauses; and tied for fastest for general Max 2-CSP (p=1). Since a pure 2-Sat input instance may be transformed to a general CSP instance in the course of being solved, the algorithm's efficiency and generality go hand in hand. Our algorithm analysis and optimization are a variation on the familiar measure-and-conquer approach, resulting in an optimizing mathematical program that is convex not merely quasi-convex, and thus can be solved efficiently and with a certificate of optimality. We produce a family of running-time upper-bound formulas, each optimized for instances with a particular value of p but valid for all instances.
[ { "version": "v1", "created": "Thu, 18 Jun 2009 21:29:31 GMT" } ]
2009-06-22T00:00:00
[ [ "Gaspers", "Serge", "" ], [ "Sorkin", "Gregory B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.3554
Hector Zenil
Hector Zenil, Jean-Paul Delahaye
On the Algorithmic Nature of the World
Book chapter in Gordana Dodig-Crnkovic and Mark Burgin (eds.) Information and Computation by World Scientific, 2010. (http://www.idt.mdh.se/ECAP-2005/INFOCOMPBOOK/). Paper website: http://www.mathrix.org/experimentalAIT/
Gordana Dodig-Crnkovic and Mark Burgin (eds.) Information and Computation by World Scientific, 2010
null
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a test based on the theory of algorithmic complexity and an experimental evaluation of Levin's universal distribution to identify evidence in support of or in contravention of the claim that the world is algorithmic in nature. To this end we have undertaken a statistical comparison of the frequency distributions of data from physical sources on the one hand--repositories of information such as images, data stored in a hard drive, computer programs and DNA sequences--and the frequency distributions generated by purely algorithmic means on the other--by running abstract computing devices such as Turing machines, cellular automata and Post Tag systems. Statistical correlations were found and their significance measured.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 00:08:50 GMT" }, { "version": "v2", "created": "Mon, 11 Jan 2010 15:59:00 GMT" }, { "version": "v3", "created": "Wed, 11 Aug 2010 07:30:19 GMT" } ]
2015-03-13T00:00:00
[ [ "Zenil", "Hector", "" ], [ "Delahaye", "Jean-Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3558
Mikhail Simkin
M.V. Simkin and V.P. Roychowdhury
Estimating achievement from fame
null
Significance 8 (2011) 22-26
10.1111/j.1740-9713.2011.00473.x
null
physics.soc-ph cs.CY physics.hist-ph stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report a method for estimating people's achievement based on their fame. Earlier we discovered (cond-mat/0310049) that fame of fighter pilot aces (measured as number of Google hits) grows exponentially with their achievement (number of victories). We hypothesize that the same functional relation between achievement and fame holds for other professions. This allows us to estimate achievement for professions where an unquestionable and universally accepted measure of achievement does not exist. We apply the method to Nobel Prize winners in Physics. For example, we obtain that Paul Dirac, who is hundred times less famous than Einstein contributed to physics only two times less. We compare our results with Landau's ranking.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 00:58:22 GMT" }, { "version": "v2", "created": "Tue, 15 Mar 2011 06:21:13 GMT" } ]
2011-03-16T00:00:00
[ [ "Simkin", "M. V.", "" ], [ "Roychowdhury", "V. P.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.hist-ph", "description": "History and philosophy of all branches of physics, astrophysics, and cosmology, including appreciations of physicists.", "span": "(History and Philosophy of Physics)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0906.3585
Arnab Bhattacharya
Vishwakarma Singh, Arnab Bhattacharya, Ambuj K. Singh
Finding Significant Subregions in Large Image Databases
16 pages, 48 figures
Extending Database Technology (EDBT) 2010
null
null
cs.DB cs.CV cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Images have become an important data source in many scientific and commercial domains. Analysis and exploration of image collections often requires the retrieval of the best subregions matching a given query. The support of such content-based retrieval requires not only the formulation of an appropriate scoring function for defining relevant subregions but also the design of new access methods that can scale to large databases. In this paper, we propose a solution to this problem of querying significant image subregions. We design a scoring scheme to measure the similarity of subregions. Our similarity measure extends to any image descriptor. All the images are tiled and each alignment of the query and a database image produces a tile score matrix. We show that the problem of finding the best connected subregion from this matrix is NP-hard and develop a dynamic programming heuristic. With this heuristic, we develop two index based scalable search strategies, TARS and SPARS, to query patterns in a large image repository. These strategies are general enough to work with other scoring schemes and heuristics. Experimental results on real image datasets show that TARS saves more than 87% query time on small queries, and SPARS saves up to 52% query time on large queries as compared to linear search. Qualitative tests on synthetic and real datasets achieve precision of more than 80%.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 06:57:51 GMT" } ]
2010-03-09T00:00:00
[ [ "Singh", "Vishwakarma", "" ], [ "Bhattacharya", "Arnab", "" ], [ "Singh", "Ambuj K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.3643
Haris Aziz
Haris Aziz, Oded Lachish, Mike Paterson and Rahul Savani
Spanning connectivity games
AAIM 2009
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Banzhaf index, Shapley-Shubik index and other voting power indices measure the importance of a player in a coalitional game. We consider a simple coalitional game called the spanning connectivity game (SCG) based on an undirected, unweighted multigraph, where edges are players. We examine the computational complexity of computing the voting power indices of edges in the SCG. It is shown that computing Banzhaf values and Shapley-Shubik indices is #P-complete for SCGs. Interestingly, Holler indices and Deegan-Packel indices can be computed in polynomial time. Among other results, it is proved that Banzhaf indices can be computed in polynomial time for graphs with bounded treewidth. It is also shown that for any reasonable representation of a simple game, a polynomial time algorithm to compute the Shapley-Shubik indices implies a polynomial time algorithm to compute the Banzhaf indices. As a corollary, computing the Shapley value is #P-complete for simple games represented by the set of minimal winning coalitions, Threshold Network Flow Games, Vertex Connectivity Games and Coalitional Skill Games.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 11:29:41 GMT" } ]
2009-06-22T00:00:00
[ [ "Aziz", "Haris", "" ], [ "Lachish", "Oded", "" ], [ "Paterson", "Mike", "" ], [ "Savani", "Rahul", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3667
Romain Couillet
Romain Couillet, Merouane Debbah, Jack W. Silverstein
A Deterministic Equivalent for the Analysis of Correlated MIMO Multiple Access Channels
to appear in IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2133151
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article, novel deterministic equivalents for the Stieltjes transform and the Shannon transform of a class of large dimensional random matrices are provided. These results are used to characterise the ergodic rate region of multiple antenna multiple access channels, when each point-to-point propagation channel is modelled according to the Kronecker model. Specifically, an approximation of all rates achieved within the ergodic rate region is derived and an approximation of the linear precoders that achieve the boundary of the rate region as well as an iterative water-filling algorithm to obtain these precoders are provided. An original feature of this work is that the proposed deterministic equivalents are proved valid even for strong correlation patterns at both communication sides. The above results are validated by Monte Carlo simulations.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 13:42:42 GMT" }, { "version": "v2", "created": "Thu, 2 Jul 2009 08:41:08 GMT" }, { "version": "v3", "created": "Wed, 15 Jul 2009 10:03:58 GMT" }, { "version": "v4", "created": "Thu, 25 Mar 2010 14:49:23 GMT" }, { "version": "v5", "created": "Sun, 24 Oct 2010 10:16:50 GMT" } ]
2016-11-18T00:00:00
[ [ "Couillet", "Romain", "" ], [ "Debbah", "Merouane", "" ], [ "Silverstein", "Jack W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3682
Sebastian Wagner
Sebastian Wagner, Romain Couillet, Merouane Debbah and Dirk. T. M. Slock
Large System Analysis of Linear Precoding in Correlated MISO Broadcast Channels under Limited Feedback
submitted to IEEE Transactions on Information Theory
IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4509 - 4537, Jul. 2012
10.1109/TIT.2012.2191700
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the sum rate performance of zero-forcing (ZF) and regularized ZF (RZF) precoding in large MISO broadcast systems under the assumptions of imperfect channel state information at the transmitter and per-user channel transmit correlation. Our analysis assumes that the number of transmit antennas $M$ and the number of single-antenna users $K$ are large while their ratio remains bounded. We derive deterministic approximations of the empirical signal-to-interference plus noise ratio (SINR) at the receivers, which are tight as $M,K\to\infty$. In the course of this derivation, the per-user channel correlation model requires the development of a novel deterministic equivalent of the empirical Stieltjes transform of large dimensional random matrices with generalized variance profile. The deterministic SINR approximations enable us to solve various practical optimization problems. Under sum rate maximization, we derive (i) for RZF the optimal regularization parameter, (ii) for ZF the optimal number of users, (iii) for ZF and RZF the optimal power allocation scheme and (iv) the optimal amount of feedback in large FDD/TDD multi-user systems. Numerical simulations suggest that the deterministic approximations are accurate even for small $M,K$.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 14:53:11 GMT" }, { "version": "v2", "created": "Tue, 27 Apr 2010 16:12:15 GMT" }, { "version": "v3", "created": "Tue, 13 Jul 2010 16:19:38 GMT" }, { "version": "v4", "created": "Thu, 2 Jun 2011 11:57:30 GMT" }, { "version": "v5", "created": "Fri, 3 Feb 2012 15:25:04 GMT" } ]
2012-09-11T00:00:00
[ [ "Wagner", "Sebastian", "" ], [ "Couillet", "Romain", "" ], [ "Debbah", "Merouane", "" ], [ "Slock", "Dirk. T. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3722
Nidhal Bouaynaya
Nidhal Bouaynaya, Jerzy Zielinski and Dan Schonfeld
Two-Dimensional ARMA Modeling for Breast Cancer Detection and Classification
null
null
null
null
cs.AI cs.CV physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new model-based computer-aided diagnosis (CAD) system for tumor detection and classification (cancerous v.s. benign) in breast images. Specifically, we show that (x-ray, ultrasound and MRI) images can be accurately modeled by two-dimensional autoregressive-moving average (ARMA) random fields. We derive a two-stage Yule-Walker Least-Squares estimates of the model parameters, which are subsequently used as the basis for statistical inference and biophysical interpretation of the breast image. We use a k-means classifier to segment the breast image into three regions: healthy tissue, benign tumor, and cancerous tumor. Our simulation results on ultrasound breast images illustrate the power of the proposed approach.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 17:56:16 GMT" } ]
2009-06-22T00:00:00
[ [ "Bouaynaya", "Nidhal", "" ], [ "Zielinski", "Jerzy", "" ], [ "Schonfeld", "Dan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "physics.med-ph", "description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.", "span": "(Medical Physics)" } ]
0906.3736
Dusan Jakovetic
Dusan Jakovetic, Joao Xavier, Jose M. F. Moura
Weight Optimization for Consensus Algorithms with Correlated Switching Topology
30 pages, 5 figures, submitted to IEEE Transactions On Signal Processing
null
10.1109/TSP.2010.2046635
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We design the weights in consensus algorithms with spatially correlated random topologies. These arise with: 1) networks with spatially correlated random link failures and 2) networks with randomized averaging protocols. We show that the weight optimization problem is convex for both symmetric and asymmetric random graphs. With symmetric random networks, we choose the consensus mean squared error (MSE) convergence rate as optimization criterion and explicitly express this rate as a function of the link formation probabilities, the link formation spatial correlations, and the consensus weights. We prove that the MSE convergence rate is a convex, nonsmooth function of the weights, enabling global optimization of the weights for arbitrary link formation probabilities and link correlation structures. We extend our results to the case of asymmetric random links. We adopt as optimization criterion the mean squared deviation (MSdev) of the nodes states from the current average state. We prove that MSdev is a convex function of the weights. Simulations show that significant performance gain is achieved with our weight design method when compared with methods available in the literature.
[ { "version": "v1", "created": "Fri, 19 Jun 2009 19:33:10 GMT" }, { "version": "v2", "created": "Fri, 25 Sep 2009 22:29:04 GMT" } ]
2015-05-13T00:00:00
[ [ "Jakovetic", "Dusan", "" ], [ "Xavier", "Joao", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3737
Sang Won Choi
Sang Won Choi, Syed A. Jafar, and Sae-Young Chung
On the Beamforming Design for Efficient Interference Alignment
3 pages, 1 figure, submitted to IEEE Comm. Letters, Mar. 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An efficient interference alignment (IA) scheme is developed for $K$-user single-input single-output frequency selective fading interference channels. The main idea is to steer the transmit beamforming matrices such that at each receiver the subspace dimensions occupied by interference-free desired streams are asymptotically the same as those occupied by all interferences. Our proposed scheme achieves a higher multiplexing gain at any given number of channel realizations in comparison with the original IA scheme, which is known to achieve the optimal multiplexing gain asymptotically.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 23:51:14 GMT" } ]
2009-06-23T00:00:00
[ [ "Choi", "Sang Won", "" ], [ "Jafar", "Syed A.", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3741
Lillian Lee
Cristian Danescu-Niculescu-Mizil, Gueorgi Kossinets, Jon Kleinberg, Lillian Lee
How opinions are received by online communities: A case study on Amazon.com helpfulness votes
null
Proceedings of WWW, pp. 141--150, 2009
null
null
cs.CL cs.IR physics.data-an physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many on-line settings in which users publicly express opinions. A number of these offer mechanisms for other users to evaluate these opinions; a canonical example is Amazon.com, where reviews come with annotations like "26 of 32 people found the following review helpful." Opinion evaluation appears in many off-line settings as well, including market research and political campaigns. Reasoning about the evaluation of an opinion is fundamentally different from reasoning about the opinion itself: rather than asking, "What did Y think of X?", we are asking, "What did Z think of Y's opinion of X?" Here we develop a framework for analyzing and modeling opinion evaluation, using a large-scale collection of Amazon book reviews as a dataset. We find that the perceived helpfulness of a review depends not just on its content but also but also in subtle ways on how the expressed evaluation relates to other evaluations of the same product. As part of our approach, we develop novel methods that take advantage of the phenomenon of review "plagiarism" to control for the effects of text in opinion evaluation, and we provide a simple and natural mathematical model consistent with our findings. Our analysis also allows us to distinguish among the predictions of competing theories from sociology and social psychology, and to discover unexpected differences in the collective opinion-evaluation behavior of user populations from different countries.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 01:59:21 GMT" } ]
2009-06-24T00:00:00
[ [ "Danescu-Niculescu-Mizil", "Cristian", "" ], [ "Kossinets", "Gueorgi", "" ], [ "Kleinberg", "Jon", "" ], [ "Lee", "Lillian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0906.3765
Hunter Monroe
Hunter Monroe
Speedup for Natural Problems and Noncomputability
8 pages
Theor. Comput. Sci. 412 (2011) 478-481
10.1016/j.tcs.2010.09.029
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A resource-bounded version of the statement "no algorithm recognizes all non-halting Turing machines" is equivalent to an infinitely often (i.o.) superpolynomial speedup for the time required to accept any coNP-complete language and also equivalent to a superpolynomial speedup in proof length in propositional proof systems for tautologies, each of which implies P!=NP. This suggests a correspondence between the properties 'has no algorithm at all' and 'has no best algorithm' which seems relevant to open problems in computational and proof complexity.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 02:58:26 GMT" }, { "version": "v2", "created": "Thu, 20 Sep 2012 18:57:03 GMT" }, { "version": "v3", "created": "Fri, 21 Sep 2012 00:33:41 GMT" } ]
2012-09-24T00:00:00
[ [ "Monroe", "Hunter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.3768
R Doomun
Srdjan Stankovic, Dejan Simic
Defense Strategies Against Modern Botnets
7 pages, International Journal of Computer Science and Information Security
IJCSIS, June 2009, Vol. 2
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Botnets are networks of compromised computers with malicious code which are remotely controlled and which are used for starting distributed denial of service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other sorts of attacks. Defense against modern Botnets is a real challenge. This paper offers several strategies for defense against Botnets with a list and description of measures and activities which should be carried out in order to establish successful defense. The paper also offers parallel preview of the strategies with their advantages and disadvantages considered in accordance with various criteria.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 02:43:46 GMT" }, { "version": "v2", "created": "Tue, 23 Jun 2009 08:01:23 GMT" } ]
2009-06-23T00:00:00
[ [ "Stankovic", "Srdjan", "" ], [ "Simic", "Dejan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.3769
R Doomun
C. H. Liu, Y. F. Lin, Jason J. Y. Chen
Using Agent to Coordinate Web Services
7 pages, International Journal of Computer Science and Information Security
IJCSIS, June 2009, Vol. 2
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditionally, agent and web service are two separate research areas. We figure that, through agent communication, agent is suitable to coordinate web services. However, there exist agent communication problems due to the lack of uniform, cross-platform vocabulary. Fortunately, ontology defines a vocabulary. We thus propose a new agent communication layer and present the web ontology language (OWL)-based operational ontologies that provides a declarative description. It can be accessed by various engines to facilitate agent communication. Further, in our operational ontologies, we define the mental attitudes of agents that can be shared among other agents. Our architecture enhanced the 3APL agent platform, and it is implemented as an agent communication framework. Finally, we extended the framework to be compatible with the web ontology language for service (OWL-S), and then develop a movie recommendation system with four OWL-S semantic web services on the framework. The benefits of this work are: 1) dynamic web service coordination, 2) ontological reasoning through uniform representation, namely, the declarative description, and 3) easy reuse and extension of both ontology and engine through extending ontology.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 02:46:20 GMT" } ]
2009-06-23T00:00:00
[ [ "Liu", "C. H.", "" ], [ "Lin", "Y. F.", "" ], [ "Chen", "Jason J. Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.3770
R Doomun
G. M. Atiqur Rahaman, Md. Mobarak Hossain
Automatic Defect Detection and Classification Technique from Image: A Special Case Using Ceramic Tiles
9 pages, International Journal of Computer Science and Information Security
IJCSIS, June 2009, Vol. 1
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quality control is an important issue in the ceramic tile industry. On the other hand maintaining the rate of production with respect to time is also a major issue in ceramic tile manufacturing. Again, price of ceramic tiles also depends on purity of texture, accuracy of color, shape etc. Considering this criteria, an automated defect detection and classification technique has been proposed in this report that can have ensured the better quality of tiles in manufacturing process as well as production rate. Our proposed method plays an important role in ceramic tiles industries to detect the defects and to control the quality of ceramic tiles. This automated classification method helps us to acquire knowledge about the pattern of defect within a very short period of time and also to decide about the recovery process so that the defected tiles may not be mixed with the fresh tiles.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 03:00:37 GMT" } ]
2009-06-23T00:00:00
[ [ "Rahaman", "G. M. Atiqur", "" ], [ "Hossain", "Md. Mobarak", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.3771
R Doomun
Abd El Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Gaber E. S. M. El Abyad, Abd El Fattah A. Saad
High Transmission Bit Rate of A thermal Arrayed Waveguide Grating (AWG) Module in Passive Optical Networks
9 pages, International Journal of Computer Science and Information Security
IJCSIS, May 2009, Vol. 1
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the present paper, high transmission bit rate of a thermal arrayed waveguide grating (AWG) which is composed of lithium niobate (LiNbO3)/polymethyl metha acrylate (PMMA) hybrid materials on a silicon substrate in Passive Optical Networks (PONs) has parametrically analyzed and investigated over wide range of the affecting parameters. We have theoretically investigated the temperature dependent wavelength shift of the arrayed waveguide grating (AWG) depends on the refractive-indices of the materials and the size of the waveguide. A thermalization of the AWG can be realized by selecting proper values of the material and structural parameters of the device. Moreover, we have analyzed the data transmission bit rate of a thermal AWG in passsive optical networks (PONs) based on Maximum Time Division Multiplexing (MTDM) technique.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 03:06:35 GMT" } ]
2009-06-23T00:00:00
[ [ "Mohammed", "Abd El Naser A.", "" ], [ "Rashed", "Ahmed Nabih Zaki", "" ], [ "Abyad", "Gaber E. S. M. El", "" ], [ "Saad", "Abd El Fattah A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.3772
R Doomun
Baolong Liu, Joan Lu, Jim Yip
XML Data Integrity Based on Concatenated Hash Function
10 pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS, May 2009, Vol. 1
null
null
cs.SE cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through investigation, the paper discovered that besides data content integrity, XML data integrity should also protect element location information, and context referential integrity under fine-grained security situation. The aim of this paper is to propose a model for XML data integrity considering XML data features. The paper presents an XML data integrity model named as CSR (content integrity, structure integrity, context referential integrity) based on a concatenated hash function. XML data content integrity is ensured using an iterative hash process, structure integrity is protected by hashing an absolute path string from root node, and context referential integrity is ensured by protecting context-related elements. Presented XML data integrity model can satisfy integrity requirements under situation of fine-grained security, and compatible with XML signature. Through evaluation, the integrity model presented has a higher efficiency on digest value-generation than the Merkle hash tree-based integrity model for XML data.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 03:10:16 GMT" } ]
2009-06-23T00:00:00
[ [ "Liu", "Baolong", "" ], [ "Lu", "Joan", "" ], [ "Yip", "Jim", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.3778
Dilip Sarwate
Dilip V. Sarwate and Zhiyuan Yan
Modified Euclidean Algorithms for Decoding Reed-Solomon Codes
This paper is a corrected version of a paper with the same title that will appear in the Proceedings of the 2009 IEEE International Symposium on Information Theory. The major change is in Algorithm II of Section IV
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The extended Euclidean algorithm (EEA) for polynomial greatest common divisors is commonly used in solving the key equation in the decoding of Reed-Solomon (RS) codes, and more generally in BCH decoding. For this particular application, the iterations in the EEA are stopped when the degree of the remainder polynomial falls below a threshold. While determining the degree of a polynomial is a simple task for human beings, hardware implementation of this stopping rule is more complicated. This paper describes a modified version of the EEA that is specifically adapted to the RS decoding problem. This modified algorithm requires no degree computation or comparison to a threshold, and it uses a fixed number of iterations. Another advantage of this modified version is in its application to the errors-and-erasures decoding problem for RS codes where significant hardware savings can be achieved via seamless computation.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 19:12:02 GMT" } ]
2009-06-23T00:00:00
[ [ "Sarwate", "Dilip V.", "" ], [ "Yan", "Zhiyuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3782
Ashwin Ganesan
Ashwin Ganesan
On some sufficient conditions for distributed Quality-of-Service support in wireless networks
Submitted to First Workshop on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 09)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a wireless network where some pairs of communication links interfere with each other, we study sufficient conditions for determining whether a given set of minimum bandwidth Quality of Service (QoS) requirements can be satisfied. We are especially interested in algorithms which have low communication overhead and low processing complexity. The interference in the network is modeled using a conflict graph whose vertices are the communication links in the network. Two links are adjacent in this graph if and only if they interfere with each other due to being in the same vicinity and hence cannot be simultaneously active. The problem of scheduling the transmission of the various links is then essentially a fractional, weighted vertex coloring problem, for which upper bounds on the fractional chromatic number are sought using only localized information. We present some distributed algorithms for this problem, and discuss their worst-case performance. These algorithms are seen to be within a bounded factor away from optimal for some well known classes of networks and interference models.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 06:45:17 GMT" } ]
2009-06-23T00:00:00
[ [ "Ganesan", "Ashwin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3815
Wlodzimierz Drabent
W. Drabent, J. Maluszynski
Hybrid Rules with Well-Founded Semantics
null
Knowledge and Information Systems, 25:137-168, 2010
10.1007/s10115-010-0300-5
null
cs.LO cs.AI cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A general framework is proposed for integration of rules and external first order theories. It is based on the well-founded semantics of normal logic programs and inspired by ideas of Constraint Logic Programming (CLP) and constructive negation for logic programs. Hybrid rules are normal clauses extended with constraints in the bodies; constraints are certain formulae in the language of the external theory. A hybrid program is a pair of a set of hybrid rules and an external theory. Instances of the framework are obtained by specifying the class of external theories, and the class of constraints. An example instance is integration of (non-disjunctive) Datalog with ontologies formalized as description logics. The paper defines a declarative semantics of hybrid programs and a goal-driven formal operational semantics. The latter can be seen as a generalization of SLS-resolution. It provides a basis for hybrid implementations combining Prolog with constraint solvers. Soundness of the operational semantics is proven. Sufficient conditions for decidability of the declarative semantics, and for completeness of the operational semantics are given.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 16:09:24 GMT" } ]
2010-12-08T00:00:00
[ [ "Drabent", "W.", "" ], [ "Maluszynski", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.3816
Alexander Kocian
E. Panayirci, A. Kocian, H. V. Poor, and M. Ruggieri
A Monte-Carlo Implementation of the SAGE Algorithm for Joint Soft Multiuser and Channel Parameter Estimation
5 pages, 3 figures, 10th IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC) 2009
null
10.1109/SPAWC.2009.5161876
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An efficient, joint transmission delay and channel parameter estimation algorithm is proposed for uplink asynchronous direct-sequence code-division multiple access (DS-CDMA) systems based on the space-alternating generalized expectation maximization (SAGE) framework. The marginal likelihood of the unknown parameters, averaged over the data sequence, as well as the expectation and maximization steps of the SAGE algorithm are derived analytically. To implement the proposed algorithm, a Markov Chain Monte Carlo (MCMC) technique, called Gibbs sampling, is employed to compute the {\em a posteriori} probabilities of data symbols in a computationally efficient way. Computer simulations show that the proposed algorithm has excellent estimation performance. This so-called MCMC-SAGE receiver is guaranteed to converge in likelihood.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 16:29:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Panayirci", "E.", "" ], [ "Kocian", "A.", "" ], [ "Poor", "H. V.", "" ], [ "Ruggieri", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3821
Deniz Gunduz
D. Gunduz, O. Simeone, A. Goldsmith, H. V. Poor and S. Shamai (Shitz)
Relaying Simultaneous Multicast Messages
This paper was presented at the IEEE Information Theory Workshop, Volos, Greece, June 2009
null
10.1109/ITWNIT.2009.5158539
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of multicasting multiple messages with the help of a relay, which may also have an independent message of its own to multicast, is considered. As a first step to address this general model, referred to as the compound multiple access channel with a relay (cMACr), the capacity region of the multiple access channel with a "cognitive" relay is characterized, including the cases of partial and rate-limited cognition. Achievable rate regions for the cMACr model are then presented based on decode-and-forward (DF) and compress-and-forward (CF) relaying strategies. Moreover, an outer bound is derived for the special case in which each transmitter has a direct link to one of the receivers while the connection to the other receiver is enabled only through the relay terminal. Numerical results for the Gaussian channel are also provided.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 17:55:09 GMT" } ]
2016-11-17T00:00:00
[ [ "Gunduz", "D.", "", "Shitz" ], [ "Simeone", "O.", "", "Shitz" ], [ "Goldsmith", "A.", "", "Shitz" ], [ "Poor", "H. V.", "", "Shitz" ], [ "Shamai", "S.", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3832
Yuriy Shiyanovskii
Y. Shiyanovskii, F. Wolff, C. Papachristou, D. Weyer, W. Clay
Hardware Trojan by Hot Carrier Injection
6 pages, 5 figures
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses how hot carrier injection (HCI) can be exploited to create a trojan that will cause hardware failures. The trojan is produced not via additional logic circuitry but by controlled scenarios that maximize and accelerate the HCI effect in transistors. These scenarios range from manipulating the manufacturing process to varying the internal voltage distribution. This new type of trojan is difficult to test due to its gradual hardware degradation mechanism. This paper describes the HCI effect, detection techniques and discusses the possibility for maliciously induced HCI trojans.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 22:56:19 GMT" } ]
2009-06-23T00:00:00
[ [ "Shiyanovskii", "Y.", "" ], [ "Wolff", "F.", "" ], [ "Papachristou", "C.", "" ], [ "Weyer", "D.", "" ], [ "Clay", "W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0906.3834
Yuriy Shiyanovskii
Y. Shiyanovskii, F. Wolff, C. Papachristou, D. Weyer, W. Clay
Exploiting Semiconductor Properties for Hardware Trojans
6 pages, 1 figure
null
null
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses the possible introduction of hidden reliability defects during CMOS foundry fabrication processes that may lead to accelerated wearout of the devices. These hidden defects or hardware Trojans can be created by deviation from foundry design rules and processing parameters. The Trojans are produced by exploiting time-based wearing mechanisms (HCI, NBTI, TDDB and EM) and/or condition-based triggers (ESD, Latchup and Softerror). This class of latent damage is difficult to test due to its gradual degradation nature. The paper describes life-time expectancy results for various Trojan induced scenarios. Semiconductor properties, processing and design parameters critical for device reliability and Trojan creation are discussed.
[ { "version": "v1", "created": "Sat, 20 Jun 2009 23:12:45 GMT" } ]
2009-06-23T00:00:00
[ [ "Shiyanovskii", "Y.", "" ], [ "Wolff", "F.", "" ], [ "Papachristou", "C.", "" ], [ "Weyer", "D.", "" ], [ "Clay", "W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0906.3843
R Doomun
M. A. Faizal, M. Mohd Zaki, S. Shahrin, Y. Robiah, S. Siti Rahayu, B. Nazrulazhar
Threshold Verification Technique for Network Intrusion Detection System
8 Pages, International Journal of Computer Science and Information Security
IJCSIS Vol.2, No.1, June 2009
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet has played a vital role in this modern world, the possibilities and opportunities offered are limitless. Despite all the hype, Internet services are liable to intrusion attack that could tamper the confidentiality and integrity of important information. An attack started with gathering the information of the attack target, this gathering of information activity can be done as either fast or slow attack. The defensive measure network administrator can take to overcome this liability is by introducing Intrusion Detection Systems (IDSs) in their network. IDS have the capabilities to analyze the network traffic and recognize incoming and on-going intrusion. Unfortunately the combination of both modules in real time network traffic slowed down the detection process. In real time network, early detection of fast attack can prevent any further attack and reduce the unauthorized access on the targeted machine. The suitable set of feature selection and the correct threshold value, add an extra advantage for IDS to detect anomalies in the network. Therefore this paper discusses a new technique for selecting static threshold value from a minimum standard features in detecting fast attack from the victim perspective. In order to increase the confidence of the threshold value the result is verified using Statistical Process Control (SPC). The implementation of this approach shows that the threshold selected is suitable for identifying the fast attack in real time.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 04:06:42 GMT" } ]
2009-06-23T00:00:00
[ [ "Faizal", "M. A.", "" ], [ "Zaki", "M. Mohd", "" ], [ "Shahrin", "S.", "" ], [ "Robiah", "Y.", "" ], [ "Rahayu", "S. Siti", "" ], [ "Nazrulazhar", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.3846
Michael Schapira
Yi Wang, Michael Schapira, Jennifer Rexford
Neighbor-Specific BGP: More Flexible Routing Policies While Improving Global Stability
null
null
null
null
cs.NI cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Please Note: This document was written to summarize and facilitate discussion regarding (1) the benefits of changing the way BGP selects routes to selecting the most preferred route allowed by export policies, or more generally, to selecting BGP routes on a per-neighbor basis, (2) the safety condition that guarantees global routing stability under the Neighbor-Specific BGP model, and (3) ways of deploying this model in practice. A paper presenting the formal model and proof of the stability conditions was published at SIGMETRICS 2009 and is available online.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 04:58:23 GMT" } ]
2009-06-24T00:00:00
[ [ "Wang", "Yi", "" ], [ "Schapira", "Michael", "" ], [ "Rexford", "Jennifer", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.3849
Yaming Yu
Yaming Yu
Squeezing the Arimoto-Blahut algorithm for faster convergence
null
IEEE Trans. Inform. Theory 56 (2010) 3149-3157
10.1109/TIT.2010.2048452
null
cs.IT math.IT stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Arimoto--Blahut algorithm for computing the capacity of a discrete memoryless channel is revisited. A so-called ``squeezing'' strategy is used to design algorithms that preserve its simplicity and monotonic convergence properties, but have provably better rates of convergence.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 19:11:49 GMT" } ]
2010-06-16T00:00:00
[ [ "Yu", "Yaming", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" } ]
0906.3853
Nelma Moreira
Marco Almeida, Nelma Moreira and Rog\'erio Reis
Aspects of enumeration and generation with a string automata representation
null
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In general, the representation of combinatorial objects is decisive for the feasibility of several enumerative tasks. In this work, we show how a (unique) string representation for (complete) initially-connected deterministic automata (ICDFAs) with n states over an alphabet of k symbols can be used for counting, exact enumeration, sampling and optimal coding, not only the set of ICDFAs but, to some extent, the set of regular languages. An exact generation algorithm can be used to partition the set of ICDFAs in order to parallelize the counting of minimal automata (and thus of regular languages). We present also a uniform random generator for ICDFAs that uses a table of pre-calculated values. Based on the same table it is also possible to obtain an optimal coding for ICDFAs.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 09:25:39 GMT" } ]
2009-06-23T00:00:00
[ [ "Almeida", "Marco", "" ], [ "Moreira", "Nelma", "" ], [ "Reis", "Rogério", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.3857
Isolde Adler
Isolde Adler
Games for width parameters and monotonicity
null
null
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a search game for two players played on a "scenario" consisting of a ground set together with a collection of feasible partitions. This general setting allows us to obtain new characterisations of many width parameters such as rank-width and carving-width of graphs, matroid tree-width and GF(4)-rank-width. We show that the monotone game variant corresponds to a tree decomposition of the ground set along feasible partitions. Our framework also captures many other decompositions into "simple" subsets of the ground set, such as decompositions into planar subgraphs. Within our general framework, we take a step towards characterising monotone search games. We exhibit a large class of "monotone" scenarios, i.e. of scenarios where the game and its monotone variant coincide. As a consequence, determining the winner is in NP for these games. This result implies monotonicity for all our search games, that are equivalent to branch-width of a submodular function. Finally, we include a proof showing that the matroid tree-width of a graphic matroid is not larger than the tree-width of the corresponding graph. This proof is considerably shorter than the original proof and it is purely graph theoretic.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 10:26:44 GMT" } ]
2009-06-23T00:00:00
[ [ "Adler", "Isolde", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.3864
Oren Somekh
O. Somekh, O. Simeone, H. V. Poor, and S. Shamai (Shitz)
The Two-Tap Input-Erasure Gaussian Channel and its Application to Cellular Communications
Presented at the Forty-Sixth Annual Allerton Conference on Communication, Control, and Computing, Sep. 2008, Monticello, Illinois
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the input-erasure Gaussian channel. In contrast to the output-erasure channel where erasures are applied to the output of a linear time-invariant (LTI) system, here erasures, known to the receiver, are applied to the inputs of the LTI system. Focusing on the case where the input symbols are independent and identically distributed (i.i.d)., it is shown that the two channels (input- and output-erasure) are equivalent. Furthermore, assuming that the LTI system consists of a two-tap finite impulse response (FIR) filter, and using simple properties of tri-diagonal matrices, an achievable rate expression is presented in the form of an infinite sum. The results are then used to study the benefits of joint multicell processing (MCP) over single-cell processing (SCP) in a simple linear cellular uplink, where each mobile terminal is received by only the two nearby base-stations (BSs). Specifically, the analysis accounts for ergodic shadowing that simultaneously blocks the mobile terminal (MT) signal from being received by the two BS. It is shown that the resulting ergodic per-cell capacity with optimal MCP is equivalent to that of the two-tap input-erasure channel. Finally, the same cellular uplink is addressed by accounting for dynamic user activity, which is modelled by assuming that each MT is randomly selected to be active or to remain silent throughout the whole transmission block. For this alternative model, a similar equivalence results to the input-erasure channel are reported.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 11:54:54 GMT" } ]
2009-06-23T00:00:00
[ [ "Somekh", "O.", "", "Shitz" ], [ "Simeone", "O.", "", "Shitz" ], [ "Poor", "H. V.", "", "Shitz" ], [ "Shamai", "S.", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3883
Mustafa Cenk Gursoy
Mustafa Cenk Gursoy and Qingyun Wang
Diversity Analysis of Peaky FSK Signaling in Fading Channels
to appear in the IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Error performance of noncoherent detection of on-off frequency shift keying (OOFSK) modulation over fading channels is analyzed when the receiver is equipped with multiple antennas. The analysis is conducted for two cases: 1) the case in which the receiver has the channel distribution knowledge only; and 2) the case in which the receiver perfectly knows the fading magnitudes. For both cases, the maximum a posteriori probability (MAP) detection rule is derived and analytical probability of error expressions are obtained. Numerical and simulation results indicate that for sufficiently low duty cycle values, lower error probabilities with respect to FSK signaling are achieved. Equivalently, when compared to FSK modulation, OOFSK with low duty cycle requires less energy to achieve the same probability of error, which renders this modulation a more energy efficient transmission technique. Also, through numerical results, the impact of number of antennas, antenna correlation, duty cycle values, and unknown channel fading on the performance are investigated.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 18:00:30 GMT" } ]
2009-06-23T00:00:00
[ [ "Gursoy", "Mustafa Cenk", "" ], [ "Wang", "Qingyun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3887
Mustafa Cenk Gursoy
Qing Chen and Mustafa Cenk Gursoy
Energy-Efficient Modulation Design for Reliable Communication in Wireless Networks
appeared at CISS 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we have considered the optimization of the $M$-ary quadrature amplitude modulation (MQAM) constellation size to minimize the bit energy consumption under average bit error rate (BER) constraints. In the computation of the energy expenditure, the circuit, transmission, and retransmission energies are taken into account. A combined log-normal shadowing and Rayleigh fading model is employed to model the wireless channel. The link reliabilities and retransmission probabilities are determined through the outage probabilities under log-normal shadowing effects. Both single-hop and multi-hop transmissions are considered. Through numerical results, the optimal constellation sizes are identified. Several interesting observations with practical implications are made. It is seen that while large constellations are preferred at small transmission distances, constellation size should be decreased as the distance increases. Similar trends are observed in both fixed and variable transmit power scenarios. We have noted that variable power schemes can attain higher energy-efficiencies. The analysis of energy-efficient modulation design is also conducted in multi-hop linear networks. In this case, the modulation size and routing paths are jointly optimized, and the analysis of both the bit energy and delay experienced in the linear network is provided.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 18:16:43 GMT" } ]
2009-06-23T00:00:00
[ [ "Chen", "Qing", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3888
Mustafa Cenk Gursoy
Sami Akin and Mustafa Cenk Gursoy
Effective Capacity Analysis of Cognitive Radio Channels for Quality of Service Provisioning
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, cognitive transmission under quality of service (QoS) constraints is studied. In the cognitive radio channel model, it is assumed that the secondary transmitter sends the data at two different average power levels, depending on the activity of the primary users, which is determined by channel sensing performed by the secondary users. A state-transition model is constructed for this cognitive transmission channel. Statistical limitations on the buffer lengths are imposed to take into account the QoS constraints. The maximum throughput under these statistical QoS constraints is identified by finding the effective capacity of the cognitive radio channel. This analysis is conducted for fixed-power/fixed-rate, fixed-power/variable-rate, and variable-power/variable-rate transmission schemes under different assumptions on the availability of channel side information (CSI) at the transmitter. The impact upon the effective capacity of several system parameters, including channel sensing duration, detection threshold, detection and false alarm probabilities, QoS parameters, and transmission rates, is investigated. The performances of fixed-rate and variable-rate transmission methods are compared in the presence of QoS limitations. It is shown that variable schemes outperform fixed-rate transmission techniques if the detection probabilities are high. Performance gains through adapting the power and rate are quantified and it is shown that these gains diminish as the QoS limitations become more stringent.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 18:22:57 GMT" } ]
2009-06-23T00:00:00
[ [ "Akin", "Sami", "" ], [ "Gursoy", "Mustafa Cenk", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3889
Mustafa Cenk Gursoy
Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar
Energy Efficiency in the Low-SNR Regime under Queueing Constraints and Channel Uncertainty
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Energy efficiency of fixed-rate transmissions is studied in the presence of queueing constraints and channel uncertainty. It is assumed that neither the transmitter nor the receiver has channel side information prior to transmission. The channel coefficients are estimated at the receiver via minimum mean-square-error (MMSE) estimation with the aid of training symbols. It is further assumed that the system operates under statistical queueing constraints in the form of limitations on buffer violation probabilities. The optimal fraction of power allocated to training is identified. Spectral efficiency--bit energy tradeoff is analyzed in the low-power and wideband regimes by employing the effective capacity formulation. In particular, it is shown that the bit energy increases without bound in the low-power regime as the average power vanishes. A similar conclusion is reached in the wideband regime if the number of noninteracting subchannels grow without bound with increasing bandwidth. On the other hand, it is proven that if the number of resolvable independent paths and hence the number of noninteracting subchannels remain bounded as the available bandwidth increases, the bit energy diminishes to its minimum value in the wideband regime. For this case, expressions for the minimum bit energy and wideband slope are derived. Overall, energy costs of channel uncertainty and queueing constraints are identified, and the impact of multipath richness and sparsity is determined.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 18:33:24 GMT" } ]
2009-06-23T00:00:00
[ [ "Qiao", "Deli", "" ], [ "Gursoy", "Mustafa Cenk", "" ], [ "Velipasalar", "Senem", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3895
Igor Margasi\'nski Ph.D.
Igor Margasinski
A Parallelism-Based Approach to Network Anonymization
16 pages, 9 figures
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Considering topologies of anonymous networks we used to organizing anonymous communication into hard to trace paths hiding its origin or destination. In anonymity the company is crucial, however the serial transportation imposes a costly tradeoff between a level of privacy and a speed of communication. This paper introduces a framework of a novel architecture for anonymous networks that hides initiators of communications by parallelization of anonymous links. The new approach, which is based on the grounds of the anonymous P2P network called P2Priv, does not require content forwarding via a chain of proxy nodes to assure high degree of anonymity. Contrary to P2Priv, the new architecture can be suited to anonymization of various network communications, including anonymous access to distributed as well as client-server services. In particular, it can be considered as an anonymization platform for these network applications where both privacy and low delays are required.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 20:55:13 GMT" } ]
2009-06-23T00:00:00
[ [ "Margasinski", "Igor", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.3896
Panos Giannopoulos
Panos Giannopoulos, Christian Knauer, Gunter Rote, Daniel Werner
Fixed-parameter tractability and lower bounds for stabbing problems
Based on the MSc. Thesis of Daniel Werner, Free University Berlin, Berlin, Germany
Computational Geometry, Theory and Applications 46 (2013), 839-860. Special issue for the 25th European Workshop on Computational Geometry (EuroCG'09)
10.1016/j.comgeo.2011.06.005
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the following general stabbing problem from a parameterized complexity point of view: Given a set $\mathcal S$ of $n$ translates of an object in $\Rd$, find a set of $k$ lines with the property that every object in $\mathcal S$ is ''stabbed'' (intersected) by at least one line. We show that when $S$ consists of axis-parallel unit squares in $\Rtwo$ the (decision) problem of stabbing $S$ with axis-parallel lines is W[1]-hard with respect to $k$ (and thus, not fixed-parameter tractable unless FPT=W[1]) while it becomes fixed-parameter tractable when the squares are disjoint. We also show that the problem of stabbing a set of disjoint unit squares in $\Rtwo$ with lines of arbitrary directions is W[1]--hard with respect to $k$. Several generalizations to other types of objects and lines with arbitrary directions are also presented. Finally, we show that deciding whether a set of unit balls in $\Rd$ can be stabbed by one line is W[1]--hard with respect to the dimension $d$.
[ { "version": "v1", "created": "Sun, 21 Jun 2009 20:50:58 GMT" } ]
2015-02-18T00:00:00
[ [ "Giannopoulos", "Panos", "" ], [ "Knauer", "Christian", "" ], [ "Rote", "Gunter", "" ], [ "Werner", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.3911
Serguei Mokhov
Serguei A. Mokhov and Joey Paquet
Using the General Intensional Programming System (GIPSY) for Evaluation of Higher-Order Intensional Logic (HOIL) Expressions
14 pages; 8 figures
null
10.1109/SERA.2010.23
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The General Intensional Programming System (GIPSY) has been built around the Lucid family of intensional programming languages that rely on the higher-order intensional logic (HOIL) to provide context-oriented multidimensional reasoning of intensional expressions. HOIL combines functional programming with various intensional logics to allow explicit context expressions to be evaluated as first-class values that can be passed as parameters to functions and return as results with an appropriate set of operators defined on contexts. GIPSY's frameworks are implemented in Java as a collection of replaceable components for the compilers of various Lucid dialects and the demand-driven eductive evaluation engine that can run distributively. GIPSY provides support for hybrid programming models that couple intensional and imperative languages for a variety of needs. Explicit context expressions limit the scope of evaluation of math expressions (effectively a Lucid program is a mathematics or physics expression constrained by the context) in tensor physics, regular math in multiple dimensions, etc., and for cyberforensic reasoning as one of the use-cases of interest. Thus, GIPSY is a support testbed for HOIL-based languages some of which enable such reasoning, as in formal cyberforensic case analysis with event reconstruction. In this paper we discuss the GIPSY architecture, its evaluation engine and example use-cases.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 03:05:48 GMT" } ]
2010-07-09T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "Paquet", "Joey", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.3916
EPTCS
Fabio Patrizi
An Introduction to Simulation-Based Techniques for Automated Service Composition
null
EPTCS 2, 2009, pp. 37-49
10.4204/EPTCS.2.4
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work is an introduction to the author's contributions to the SOC area, resulting from his PhD research activity. It focuses on the problem of automatically composing a desired service, given a set of available ones and a target specification. As for description, services are represented as finite-state transition systems, so to provide an abstract account of their behavior, seen as the set of possible conversations with external clients. In addition, the presence of a finite shared memory is considered, that services can interact with and which provides a basic form of communication. Rather than describing technical details, we offer an informal overview of the whole work, and refer the reader to the original papers, referenced throughout this work, for all details.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 03:54:04 GMT" } ]
2009-06-23T00:00:00
[ [ "Patrizi", "Fabio", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.3919
Serguei Mokhov
Serguei A. Mokhov and Joey Paquet
A Type System Theory for Higher-Order Intensional Logic Support for Variable Bindings in Hybrid Intensional-Imperative Programs in GIPSY
12 pages, 1 table; 2 figures
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a type system for a platform called the General Intensional Programming System (GIPSY), designed to support intensional programming languages built upon intensional logic and their imperative counter-parts for the intensional execution model. In GIPSY, the type system glues the static and dynamic typing between intensional and imperative languages in its compiler and run-time environments to support the intensional evaluation of expressions written in various dialects of the intensional programming language Lucid. The intensionality makes expressions to explicitly take into the account a multidimensional context of evaluation with the context being a first-class value that serves a number of applications that need the notion of context to proceed. We describe and discuss the properties of such a type system and the related type theory as well as particularities of the semantics, design and implementation of the GIPSY type system.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 05:27:49 GMT" } ]
2009-12-21T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "Paquet", "Joey", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.3920
EPTCS
Claudio Guidi, Fabrizio Montesi
Reasoning About a Service-oriented Programming Paradigm
null
EPTCS 2, 2009, pp. 67-81
10.4204/EPTCS.2.6
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is about a new way for programming distributed applications: the service-oriented one. It is a concept paper based upon our experience in developing a theory and a language for programming services. Both the theoretical formalization and the language interpreter showed us the evidence that a new programming paradigm exists. In this paper we illustrate the basic features it is characterized by.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 05:49:12 GMT" } ]
2009-06-23T00:00:00
[ [ "Guidi", "Claudio", "" ], [ "Montesi", "Fabrizio", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.3921
EPTCS
Stefano Bistarelli, Paola Campli
Fairness as a QoS Measure for Web Services
null
EPTCS 2, 2009, pp. 115-127
10.4204/EPTCS.2.9
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Service Oriented Architectures (SOAs) are component-based architectures, characterized by reusability, modularization and composition, usually offered by HTTP (web services) and often equipped with a Quality of Services (QoS) measure. In order to guarantee the fairness property to each client requesting a service, we propose a fair version of the (Soft) Concurrent Constraint language to deal with the negotiation phases of the Service Level Agreement (SLA) protocol.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 06:08:14 GMT" } ]
2009-06-23T00:00:00
[ [ "Bistarelli", "Stefano", "" ], [ "Campli", "Paola", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.3923
Daiki Koizumi
Daiki Koizumi, Toshiyasu Matsushima, and Shigeichi Hirasawa
Bayesian Forecasting of WWW Traffic on the Time Varying Poisson Model
8 pages, 6 figures. This paper was published in Proceeding of The 2009 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'09) in July, 2009. In version of v4, research grants are included in acknowledgment
null
null
null
cs.NI cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traffic forecasting from past observed traffic data with small calculation complexity is one of important problems for planning of servers and networks. Focusing on World Wide Web (WWW) traffic as fundamental investigation, this paper would deal with Bayesian forecasting of network traffic on the time varying Poisson model from a viewpoint from statistical decision theory. Under this model, we would show that the estimated forecasting value is obtained by simple arithmetic calculation and expresses real WWW traffic well from both theoretical and empirical points of view.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 07:48:12 GMT" }, { "version": "v2", "created": "Thu, 19 Nov 2009 08:41:17 GMT" }, { "version": "v3", "created": "Fri, 20 Nov 2009 07:02:06 GMT" }, { "version": "v4", "created": "Thu, 3 Dec 2009 02:15:11 GMT" } ]
2009-12-03T00:00:00
[ [ "Koizumi", "Daiki", "" ], [ "Matsushima", "Toshiyasu", "" ], [ "Hirasawa", "Shigeichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.3924
EPTCS
L\'aszl\'o Kov\'acs, P\'eter M\'at\'etelki, Bal\'azs Pataki
Service-oriented Context-aware Framework
null
EPTCS 2, 2009, pp. 15-26
10.4204/EPTCS.2.2
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Location- and context-aware services are emerging technologies in mobile and desktop environments, however, most of them are difficult to use and do not seem to be beneficial enough. Our research focuses on designing and creating a service-oriented framework that helps location- and context-aware, client-service type application development and use. Location information is combined with other contexts such as the users' history, preferences and disabilities. The framework also handles the spatial model of the environment (e.g. map of a room or a building) as a context. The framework is built on a semantic backend where the ontologies are represented using the OWL description language. The use of ontologies enables the framework to run inference tasks and to easily adapt to new context types. The framework contains a compatibility layer for positioning devices, which hides the technical differences of positioning technologies and enables the combination of location data of various sources.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 06:26:17 GMT" } ]
2009-06-23T00:00:00
[ [ "Kovács", "László", "" ], [ "Mátételki", "Péter", "" ], [ "Pataki", "Balázs", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.3925
EPTCS
Kamran Taj Pathan, Stephan Reiff-Marganiec
Towards Activity Context using Software Sensors
null
EPTCS 2, 2009, pp. 27-35
10.4204/EPTCS.2.3
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Service-Oriented Computing delivers the promise of configuring and reconfiguring software systems to address user's needs in a dynamic way. Context-aware computing promises to capture the user's needs and hence the requirements they have on systems. The marriage of both can deliver ad-hoc software solutions relevant to the user in the most current fashion. However, here it is a key to gather information on the users' activity (that is what they are doing). Traditionally any context sensing was conducted with hardware sensors. However, software can also play the same role and in some situations will be more useful to sense the activity of the user. Furthermore they can make use of the fact that Service-oriented systems exchange information through standard protocols. In this paper we discuss our proposed approach to sense the activity of the user making use of software.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 06:33:35 GMT" } ]
2009-06-23T00:00:00
[ [ "Pathan", "Kamran Taj", "" ], [ "Reiff-Marganiec", "Stephan", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.3926
EPTCS
Stefano Bistarelli, Francesco Santini
Soft Constraints for Quality Aspects in Service Oriented Architectures
null
EPTCS 2, 2009, pp. 51-65
10.4204/EPTCS.2.5
null
cs.AI cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose the use of Soft Constraints as a natural way to model Service Oriented Architecture. In the framework, constraints are used to model components and connectors and constraint aggregation is used to represent their interactions. The "quality of a service" is measured and considered when performing queries to service providers. Some examples consist in the levels of cost, performance and availability required by clients. In our framework, the QoS scores are represented by the softness level of the constraint and the measure of complex (web) services is computed by combining the levels of the components.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 06:37:02 GMT" } ]
2009-06-23T00:00:00
[ [ "Bistarelli", "Stefano", "" ], [ "Santini", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.3930
EPTCS
Dessislava Petrova-Antonova, Sylvia Ilieva
Towards a Unifying View of QoS-Enhanced Web Service Description and Discovery Approaches
null
EPTCS 2, 2009, pp. 99-113
10.4204/EPTCS.2.8
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The number of web services increased vastly in the last years. Various providers offer web services with the same functionality, so for web service consumers it is getting more complicated to select the web service, which best fits their requirements. That is why a lot of the research efforts point to discover semantic means for describing web services taking into account not only functional characteristics of services, but also the quality of service (QoS) properties such as availability, reliability, response time, trust, etc. This motivated us to research current approaches presenting complete solutions for QoS enabled web service description, publication and discovery. In this paper we present comparative analysis of these approaches according to their common principals. Based on such analysis we extract the essential aspects from them and propose a pattern for the development of QoS-aware service-oriented architectures.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 06:56:40 GMT" } ]
2009-06-23T00:00:00
[ [ "Petrova-Antonova", "Dessislava", "" ], [ "Ilieva", "Sylvia", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.3946
Xueliang Li
Xueliang Li, Yuefang Sun
The rainbow $k$-connectivity of two classes of graphs
9 pages
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A path in an edge-colored graph $G$, where adjacent edges may be colored the same, is called a rainbow path if no two edges of $G$ are colored the same. For a $\kappa$-connected graph $G$ and an integer $k$ with $1\leq k\leq \kappa$, the rainbow $k$-connectivity $rc_k(G)$ of $G$ is defined as the minimum integer $j$ for which there exists a $j$-edge-coloring of $G$ such that every two distinct vertices of $G$ are connected by $k$ internally disjoint rainbow paths. Let $G$ be a complete $(\ell+1)$-partite graph with $\ell$ parts of size $r$ and one part of size $p$ where $0\leq p <r$ (in the case $p=0$, $G$ is a complete $\ell$-partite graph with each part of size $r$). This paper is to investigate the rainbow $k$-connectivity of $G$. We show that for every pair of integers $k\geq 2$ and $r\geq 1$, there is an integer $f(k,r)$ such that if $\ell\geq f(k,r)$, then $rc_k(G)=2$. As a consequence, we improve the upper bound of $f(k)$ from $(k+1)^2$ to $ck^{{3/2}}+C$, where $0<c<1$, $C=o(k^{{3/2}})$, and $f(k)$ is the integer such that if $n \geq f(k)$ then $rc_k(K_n)=2$.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 08:20:23 GMT" } ]
2009-06-23T00:00:00
[ [ "Li", "Xueliang", "" ], [ "Sun", "Yuefang", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.3956
R Doomun
Joe Prathap P M., V. Vasudevan
Analysis of the various key management algorithms and new proposal in the secure multicast communications
8 pages, International Journal of Computer Science and Information Security
IJCSIS 2009, June Issue, Vol.2. No.1
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life. Several key tree based approach has been proposed by various authors to create and distribute the multicast group key in effective manner. There are different key management algorithms that facilitate efficient distribution and rekeying of the group key. These protocols normally add communication overhead as well as computation overhead at the group key controller and at the group members. This paper explores the various algorithms along with the performances and derives an improved method.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 08:55:33 GMT" } ]
2009-06-23T00:00:00
[ [ "M.", "Joe Prathap P", "" ], [ "Vasudevan", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.3966
R Doomun
K Pradheep Kumar, A P Shanthi
Application of non-uniform laxity to EDF for aperiodic tasks to improve task utilisation on multicore platforms
7 pages, Journal of Computer Science and Information Security
IJCSIS 2009, June Issue, Vol. 2, No. 1
null
null
cs.PF cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a new scheduler applying the concept of non-uniform laxity to Earliest deadline first (EDF) approach for aperiodic tasks. This scheduler improves task utilisation (Execution time / deadline) and also increases the number of tasks that are being scheduled. Laxity is a measure of the spare time permitted for the task before it misses its deadline, and is computed using the expression (deadline - (current time + execution time)). Weight decides the priority of the task and is defined by the expression (quantum slice time / allocated time)*total core time for the task. Quantum slice time is the time actually used, allocated time is the time allocated by the scheduler, and total core time is the time actually reserved by the core for execution of one quantum of the task. Non-uniform laxity enables scheduling of tasks that have higher priority before the normal execution of other tasks and is computed by multiplying the weight of the task with its laxity. The algorithm presented in the paper has been simulated on Cheddar, a real time scheduling tool and also on SESC, an architectural simulator for multicore platforms, for upto 5000 random task sets, and upto 5000 cores. This scheduler improves task utilisation by 35% and the number of tasks being scheduled by 36%, compared to conventional EDF.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 09:33:17 GMT" } ]
2009-06-23T00:00:00
[ [ "Kumar", "K Pradheep", "" ], [ "Shanthi", "A P", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.3988
Sinan Gezici
Sinan Gezici, Hasari Celebi, Huseyin Arslan, H. Vincent Poor
Theoretical Limits on Time Delay Estimation for Ultra-Wideband Cognitive Radios
IEEE ICUWB 2008
null
10.1109/ICUWB.2008.4653380
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, theoretical limits on time delay estimation are studied for ultra-wideband (UWB) cognitive radio systems. For a generic UWB spectrum with dispersed bands, the Cramer-Rao lower bound (CRLB) is derived for unknown channel coefficients and carrier-frequency offsets (CFOs). Then, the effects of unknown channel coefficients and CFOs are investigated for linearly and non-linearly modulated training signals by obtaining specific CRLB expressions. It is shown that for linear modulations with a constant envelope, the effects of the unknown parameters can be mitigated. Finally, numerical results, which support the theoretical analysis, are presented.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 12:31:02 GMT" } ]
2016-11-17T00:00:00
[ [ "Gezici", "Sinan", "" ], [ "Celebi", "Hasari", "" ], [ "Arslan", "Huseyin", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.3994
Emmanuel Beffara
Emmanuel Beffara (IML)
Quantitative testing semantics for non-interleaving
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a non-interleaving denotational semantics for the ?-calculus. The basic idea is to define a notion of test where the outcome is not only whether a given process passes a given test, but also in how many different ways it can pass it. More abstractly, the set of possible outcomes for tests forms a semiring, and the set of process interpretations appears as a module over this semiring, in which basic syntactic constructs are affine operators. This notion of test leads to a trace semantics in which traces are partial orders, in the style of Mazurkiewicz traces, extended with readiness information. Our construction has standard may- and must-testing as special cases.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 13:02:27 GMT" } ]
2009-06-23T00:00:00
[ [ "Beffara", "Emmanuel", "", "IML" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4008
Hakan Ozadam
Hakan Ozadam and Ferruh Ozbudak
Two generalizations on the minimum Hamming distance of repeated-root constacyclic codes
We do not plan to publish the results of this paper on their own. We have put this paper for referring purposes
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study constacyclic codes, of length $np^s$ and $2np^s$, that are generated by the polynomials $(x^n + \gamma)^{\ell}$ and $(x^n - \xi)^i(x^n + \xi)^j$\ respectively, where $x^n + \gamma$, $x^n - \xi$ and $x^n + \xi$ are irreducible over the alphabet $\F_{p^a}$. We generalize the results of [5], [6] and [7] by computing the minimum Hamming distance of these codes. As a particular case, we determine the minimum Hamming distance of cyclic and negacyclic codes, of length $2p^s$, over a finite field of characteristic $p$.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 14:21:05 GMT" } ]
2009-06-23T00:00:00
[ [ "Ozadam", "Hakan", "" ], [ "Ozbudak", "Ferruh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4012
Man-On Pun
Man-On Pun, Kyeong Jin Kim, Ronald Iltis and H. Vincent Poor
Reduced-Feedback Opportunistic Scheduling and Beamforming with GMD for MIMO-OFDMA
Proc. Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, Nov. 2008
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Opportunistic scheduling and beamforming schemes have been proposed previously by the authors for reduced-feedback MIMO-OFDMA downlink systems where the MIMO channel of each subcarrier is decomposed into layered spatial subchannels. It has been demonstrated that significant feedback reduction can be achieved by returning information about only one beamforming matrix (BFM) for all subcarriers from each MT, compared to one BFM for each subcarrier in the conventional schemes. However, since the previously proposed channel decomposition was derived based on singular value decomposition, the resulting system performance is impaired by the subchannels associated with the smallest singular values. To circumvent this obstacle, this work proposes improved opportunistic scheduling and beamforming schemes based on geometric mean decomposition-based channel decomposition. In addition to the inherent advantage in reduced feedback, the proposed schemes can achieve improved system performance by decomposing the MIMO channels into spatial subchannels with more evenly distributed channel gains. Numerical results confirm the effectiveness of the proposed opportunistic scheduling and beamforming schemes.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 14:28:14 GMT" } ]
2009-06-23T00:00:00
[ [ "Pun", "Man-On", "" ], [ "Kim", "Kyeong Jin", "" ], [ "Iltis", "Ronald", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4019
Vincent Lariviere
Vincent Lariviere, Yves Gingras
On the prevalence and scientific impact of duplicate publications in different scientific fields (1980-2007)
13 pages, 7 figures
null
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The issue of duplicate publications has received a lot of attention in the medical literature, but much less in the information science community. This paper aims at analyzing the prevalence and scientific impact of duplicate publications across all fields of research between 1980 and 2007, using a definition of duplicate papers based on their metadata. It shows that in all fields combined, the prevalence of duplicates is one out of two-thousand papers, but is higher in the natural and medical sciences than in the social sciences and humanities. A very high proportion (>85%) of these papers are published the same year or one year apart, which suggest that most duplicate papers were submitted simultaneously. Furthermore, duplicate papers are generally published in journals with impact factors below the average of their field and obtain a lower number of citations. This paper provides clear evidence that the prevalence of duplicate papers is low and, more importantly, that the scientific impact of such papers is below average.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 14:28:31 GMT" } ]
2009-06-23T00:00:00
[ [ "Lariviere", "Vincent", "" ], [ "Gingras", "Yves", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0906.4026
Benjamin Piwowarski
B. Piwowarski, M. Lalmas
A Quantum-based Model for Interactive Information Retrieval (extended version)
14 pages, 1 figure
null
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Even the best information retrieval model cannot always identify the most useful answers to a user query. This is in particular the case with web search systems, where it is known that users tend to minimise their effort to access relevant information. It is, however, believed that the interaction between users and a retrieval system, such as a web search engine, can be exploited to provide better answers to users. Interactive Information Retrieval (IR) systems, in which users access information through a series of interactions with the search system, are concerned with building models for IR, where interaction plays a central role. There are many possible interactions between a user and a search system, ranging from query (re)formulation to relevance feedback. However, capturing them within a single framework is difficult and previously proposed approaches have mostly focused on relevance feedback. In this paper, we propose a general framework for interactive IR that is able to capture the full interaction process in a principled way. Our approach relies upon a generalisation of the probability framework of quantum physics, whose strong geometric component can be a key towards a successful interactive IR model.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 16:17:36 GMT" }, { "version": "v2", "created": "Tue, 23 Jun 2009 09:11:19 GMT" } ]
2009-06-23T00:00:00
[ [ "Piwowarski", "B.", "" ], [ "Lalmas", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0906.4032
Karsten Borgwardt M.
Karsten M. Borgwardt, Zoubin Ghahramani
Bayesian two-sample tests
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present two classes of Bayesian approaches to the two-sample problem. Our first class of methods extends the Bayesian t-test to include all parametric models in the exponential family and their conjugate priors. Our second class of methods uses Dirichlet process mixtures (DPM) of such conjugate-exponential distributions as flexible nonparametric priors over the unknown distributions.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 15:25:23 GMT" } ]
2009-06-23T00:00:00
[ [ "Borgwardt", "Karsten M.", "" ], [ "Ghahramani", "Zoubin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.4036
Hongyu Lu
Hongyu Lu, Shanglian Bao
Physical Modeling Techniques in Active Contours for Image Segmentation
null
null
null
null
cs.CV cs.GR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Physical modeling method, represented by simulation and visualization of the principles in physics, is introduced in the shape extraction of the active contours. The objectives of adopting this concept are to address the several major difficulties in the application of Active Contours. Primarily, a technique is developed to realize the topological changes of Parametric Active Contours (Snakes). The key strategy is to imitate the process of a balloon expanding and filling in a closed space with several objects. After removing the touched balloon surfaces, the objects can be identified by surrounded remaining balloon surfaces. A burned region swept by Snakes is utilized to trace the contour and to give a criterion for stopping the movement of Snake curve. When the Snakes terminates evolution totally, through ignoring this criterion, it can form a connected area by evolving the Snakes again and continuing the region burning. The contours extracted from the boundaries of the burned area can represent the child snake of each object respectively. Secondly, a novel scheme is designed to solve the problems of leakage of the contour from the large gaps, and the segmentation error in Geometric Active Contours (GAC). It divides the segmentation procedure into two processing stages. By simulating the wave propagating in the isotropic substance at the final stage, it can significantly enhance the effect of image force in GAC based on Level Set and give the satisfied solutions to the two problems. Thirdly, to support the physical models for active contours above, we introduce a general image force field created on a template plane over the image plane. This force is more adaptable to noisy images with complicated geometric shapes.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 16:38:30 GMT" }, { "version": "v2", "created": "Sun, 28 Jun 2009 03:03:04 GMT" }, { "version": "v3", "created": "Tue, 30 Jun 2009 15:53:02 GMT" } ]
2009-06-30T00:00:00
[ [ "Lu", "Hongyu", "" ], [ "Bao", "Shanglian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0906.4044
Don Conry
Don Conry, Yehuda Koren, Naren Ramakrishnan
Recommender Systems for the Conference Paper Assignment Problem
8 pages, 5 figures, submitted to the ACM Conference on Recommender Systems 2009
null
null
null
cs.IR cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conference paper assignment, i.e., the task of assigning paper submissions to reviewers, presents multi-faceted issues for recommender systems research. Besides the traditional goal of predicting `who likes what?', a conference management system must take into account aspects such as: reviewer capacity constraints, adequate numbers of reviews for papers, expertise modeling, conflicts of interest, and an overall distribution of assignments that balances reviewer preferences with conference objectives. Among these, issues of modeling preferences and tastes in reviewing have traditionally been studied separately from the optimization of paper-reviewer assignment. In this paper, we present an integrated study of both these aspects. First, due to the paucity of data per reviewer or per paper (relative to other recommender systems applications) we show how we can integrate multiple sources of information to learn paper-reviewer preference models. Second, our models are evaluated not just in terms of prediction accuracy but in terms of the end-assignment quality. Using a linear programming-based assignment optimization formulation, we show how our approach better explores the space of unsupplied assignments to maximize the overall affinities of papers assigned to reviewers. We demonstrate our results on real reviewer preference data from the IEEE ICDM 2007 conference.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 17:26:24 GMT" } ]
2009-06-23T00:00:00
[ [ "Conry", "Don", "" ], [ "Koren", "Yehuda", "" ], [ "Ramakrishnan", "Naren", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.4096
Naveen Ashish
Naveen Ashish, Dmitri Kalashnikov, Sharad Mehrotra and Nalini Venkatasubramanian
An Event Based Approach To Situational Representation
null
null
null
null
cs.DB cs.AI
http://creativecommons.org/licenses/by/3.0/
Many application domains require representing interrelated real-world activities and/or evolving physical phenomena. In the crisis response domain, for instance, one may be interested in representing the state of the unfolding crisis (e.g., forest fire), the progress of the response activities such as evacuation and traffic control, and the state of the crisis site(s). Such a situation representation can then be used to support a multitude of applications including situation monitoring, analysis, and planning. In this paper, we make a case for an event based representation of situations where events are defined to be domain-specific significant occurrences in space and time. We argue that events offer a unifying and powerful abstraction to building situational awareness applications. We identify challenges in building an Event Management System (EMS) for which traditional data and knowledge management systems prove to be limited and suggest possible directions and technologies to address the challenges.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 19:40:12 GMT" }, { "version": "v2", "created": "Mon, 22 Jun 2009 20:04:32 GMT" } ]
2009-09-30T00:00:00
[ [ "Ashish", "Naveen", "" ], [ "Kalashnikov", "Dmitri", "" ], [ "Mehrotra", "Sharad", "" ], [ "Venkatasubramanian", "Nalini", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.4121
Mark Giesbrecht
Mark Giesbrecht and Myung Sub Kim
On computing the Hermite form of a matrix of differential polynomials
null
null
10.1007/978-3-642-04103-7_12
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given an n x n matrix over the ring of differential polynomials F(t)[\D;\delta], we show how to compute the Hermite form H of A, and a unimodular matrix U such that UA=H. The algorithm requires a polynomial number of operations in terms of n, deg_D(A), and deg_t(A). When F is the field of rational numbers, it also requires time polynomial in the bit-length of the coefficients.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 20:29:09 GMT" } ]
2015-05-13T00:00:00
[ [ "Giesbrecht", "Mark", "" ], [ "Kim", "Myung Sub", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0906.4125
Mauro Cherubini
Mauro Cherubini and Nuria Oliver
A Refined Experience Sampling Method to Capture Mobile User Experience
Cherubini, M., and Oliver, N. A refined experience sampling method to capture mobile user experience. In Presented at the International Workshop of Mobile User Experience Research part of CHI'2009 (Boston, MA, USA, April 4-9 2009), Y. Nakhimovsky, D. Eckles, and J. Riegelsberger, Eds. 12 pages, 5 figures
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reviews research methods used to understand the user experience of mobile technology. The paper presents an improvement of the Experience Sampling Method and case studies supporting its design. The paper concludes with an agenda of future work for improving research in this field. Keywords: Research methods, topology, case study, contrasting graph, Experience Sampling Method
[ { "version": "v1", "created": "Mon, 22 Jun 2009 20:31:45 GMT" } ]
2009-06-24T00:00:00
[ [ "Cherubini", "Mauro", "" ], [ "Oliver", "Nuria", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0906.4131
Josna Rao
Josna Rao, Ghassan Hamarneh, Rafeef Abugharbieh
Automatic Spatially-Adaptive Balancing of Energy Terms for Image Segmentation
12 pages, 7 figures
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Image segmentation techniques are predominately based on parameter-laden optimization. The objective function typically involves weights for balancing competing image fidelity and segmentation regularization cost terms. Setting these weights suitably has been a painstaking, empirical process. Even if such ideal weights are found for a novel image, most current approaches fix the weight across the whole image domain, ignoring the spatially-varying properties of object shape and image appearance. We propose a novel technique that autonomously balances these terms in a spatially-adaptive manner through the incorporation of image reliability in a graph-based segmentation framework. We validate on synthetic data achieving a reduction in mean error of 47% (p-value << 0.05) when compared to the best fixed parameter segmentation. We also present results on medical images (including segmentations of the corpus callosum and brain tissue in MRI data) and on natural images.
[ { "version": "v1", "created": "Mon, 22 Jun 2009 21:10:46 GMT" }, { "version": "v2", "created": "Tue, 23 Jun 2009 21:57:29 GMT" } ]
2009-06-24T00:00:00
[ [ "Rao", "Josna", "" ], [ "Hamarneh", "Ghassan", "" ], [ "Abugharbieh", "Rafeef", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.4149
EPTCS
Massimiliano de Leoni
Adaptive Process Management in Highly Dynamic and Pervasive Scenarios
null
EPTCS 2, 2009, pp. 83-97
10.4204/EPTCS.2.7
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Process Management Systems (PMSs) are currently more and more used as a supporting tool for cooperative processes in pervasive and highly dynamic situations, such as emergency situations, pervasive healthcare or domotics/home automation. But in all such situations, designed processes can be easily invalidated since the execution environment may change continuously due to frequent unforeseeable events. This paper aims at illustrating the theoretical framework and the concrete implementation of SmartPM, a PMS that features a set of sound and complete techniques to automatically cope with unplanned exceptions. PMS SmartPM is based on a general framework which adopts the Situation Calculus and Indigolog.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 01:34:37 GMT" } ]
2009-06-24T00:00:00
[ [ "de Leoni", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.4154
Oliver Obst
Oliver Obst
Distributed Fault Detection in Sensor Networks using a Recurrent Neural Network
10 pages
null
null
null
cs.NE cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In long-term deployments of sensor networks, monitoring the quality of gathered data is a critical issue. Over the time of deployment, sensors are exposed to harsh conditions, causing some of them to fail or to deliver less accurate data. If such a degradation remains undetected, the usefulness of a sensor network can be greatly reduced. We present an approach that learns spatio-temporal correlations between different sensors, and makes use of the learned model to detect misbehaving sensors by using distributed computation and only local communication between nodes. We introduce SODESN, a distributed recurrent neural network architecture, and a learning method to train SODESN for fault detection in a distributed scenario. Our approach is evaluated using data from different types of sensors and is able to work well even with less-than-perfect link qualities and more than 50% of failed nodes.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 01:54:55 GMT" } ]
2009-12-05T00:00:00
[ [ "Obst", "Oliver", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.4162
EPTCS
Jack H. Lutz
A Divergence Formula for Randomness and Dimension (Short Version)
null
EPTCS 1, 2009, pp. 149-152
10.4204/EPTCS.1.14
null
cs.CC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If $S$ is an infinite sequence over a finite alphabet $\Sigma$ and $\beta$ is a probability measure on $\Sigma$, then the {\it dimension} of $ S$ with respect to $\beta$, written $\dim^\beta(S)$, is a constructive version of Billingsley dimension that coincides with the (constructive Hausdorff) dimension $\dim(S)$ when $\beta$ is the uniform probability measure. This paper shows that $\dim^\beta(S)$ and its dual $\Dim^\beta(S)$, the {\it strong dimension} of $S$ with respect to $\beta$, can be used in conjunction with randomness to measure the similarity of two probability measures $\alpha$ and $\beta$ on $\Sigma$. Specifically, we prove that the {\it divergence formula} $$\dim^\beta(R) = \Dim^\beta(R) =\CH(\alpha) / (\CH(\alpha) + \D(\alpha || \beta))$$ holds whenever $\alpha$ and $\beta$ are computable, positive probability measures on $\Sigma$ and $R \in \Sigma^\infty$ is random with respect to $\alpha$. In this formula, $\CH(\alpha)$ is the Shannon entropy of $\alpha$, and $\D(\alpha||\beta)$ is the Kullback-Leibler divergence between $\alpha$ and $\beta$.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 10:15:31 GMT" } ]
2009-06-24T00:00:00
[ [ "Lutz", "Jack H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4172
R Doomun
Anjana Pandey, K.R.Pardasani
Rough Set Model for Discovering Hybrid Association Rules
5 pages, International Journal of Computer Science and Information Security
IJCSIS June 2009 Issue, Vol. 2
null
null
cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the mining of hybrid association rules with rough set approach is investigated as the algorithm RSHAR.The RSHAR algorithm is constituted of two steps mainly. At first, to join the participant tables into a general table to generate the rules which is expressing the relationship between two or more domains that belong to several different tables in a database. Then we apply the mapping code on selected dimension, which can be added directly into the information system as one certain attribute. To find the association rules, frequent itemsets are generated in second step where candidate itemsets are generated through equivalence classes and also transforming the mapping code in to real dimensions. The searching method for candidate itemset is similar to apriori algorithm. The analysis of the performance of algorithm has been carried out.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 06:24:57 GMT" } ]
2009-06-24T00:00:00
[ [ "Pandey", "Anjana", "" ], [ "Pardasani", "K. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.4173
Frederic Blanqui
Fr\'ed\'eric Blanqui (LIAMA), Cody Roux (INRIA Lorraine - LORIA)
On the relation between size-based termination and semantic labelling
null
18th EACSL Annual Conference on Computer Science Logic (2009)
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the relationship between two independently developed termination techniques. On the one hand, sized-types based termination (SBT) uses types annotated with size expressions and Girard's reducibility candidates, and applies on systems using constructor matching only. On the other hand, semantic labelling transforms a rewrite system by annotating each function symbol with the semantics of its arguments, and applies to any rewrite system. First, we introduce a simplified version of SBT for the simply-typed lambda-calculus. Then, we give new proofs of the correctness of SBT using semantic labelling, both in the first and in the higher-order case. As a consequence, we show that SBT can be extended to systems using matching on defined symbols (e.g. associative functions).
[ { "version": "v1", "created": "Tue, 23 Jun 2009 06:28:55 GMT" } ]
2009-06-24T00:00:00
[ [ "Blanqui", "Frédéric", "", "LIAMA" ], [ "Roux", "Cody", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4216
Viswanath Kasturi
Venkata Rao Kuchibhotla, Viswanath Kasturi
On the Definition of Non-deterministic Mechanisms
16 pages
null
null
null
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present here three different approaches to the problem of modeling mathematically the concept of a non-deterministic mechanism. Each of these three approaches leads to a mathematical definition. We then show that all the three mathematical concepts are equivalent to one another. This insight gives us the option of approaching the wp-formalism of Dijkstra from a different viewpoint that is easier to understand and to teach.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 10:27:40 GMT" } ]
2009-06-24T00:00:00
[ [ "Kuchibhotla", "Venkata Rao", "" ], [ "Kasturi", "Viswanath", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.4217
Krzysztof Szczypiorski
Krzysztof Szczypiorski
A Performance Analysis of HICCUPS - a Steganographic System for WLAN
5 pages, 5 figures, 3 tables. Submitted to the First International Workshop on Network Steganography - IWNS 2009, November 18-20, 2009, Wuhan (China)
null
null
null
cs.CR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents an analysis of performance features of the HICCUPS (HIdden Communication system for CorrUPted networkS) including the efficiency and the cost of the system in WLANs (Wireless Local Area Networks). The analysis relies on the original CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) 802.11 Markov chain-based model.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 14:43:07 GMT" } ]
2009-06-24T00:00:00
[ [ "Szczypiorski", "Krzysztof", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.4228
Michael Meier
Michael Meier, Michael Schmidt, Georg Lausen
On Chase Termination Beyond Stratification
Technical Report of VLDB 2009 conference version
null
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the termination problem of the chase algorithm, a central tool in various database problems such as the constraint implication problem, Conjunctive Query optimization, rewriting queries using views, data exchange, and data integration. The basic idea of the chase is, given a database instance and a set of constraints as input, to fix constraint violations in the database instance. It is well-known that, for an arbitrary set of constraints, the chase does not necessarily terminate (in general, it is even undecidable if it does or not). Addressing this issue, we review the limitations of existing sufficient termination conditions for the chase and develop new techniques that allow us to establish weaker sufficient conditions. In particular, we introduce two novel termination conditions called safety and inductive restriction, and use them to define the so-called T-hierarchy of termination conditions. We then study the interrelations of our termination conditions with previous conditions and the complexity of checking our conditions. This analysis leads to an algorithm that checks membership in a level of the T-hierarchy and accounts for the complexity of termination conditions. As another contribution, we study the problem of data-dependent chase termination and present sufficient termination conditions w.r.t. fixed instances. They might guarantee termination although the chase does not terminate in the general case. As an application of our techniques beyond those already mentioned, we transfer our results into the field of query answering over knowledge bases where the chase on the underlying database may not terminate, making existing algorithms applicable to broader classes of constraints.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 11:46:43 GMT" }, { "version": "v2", "created": "Thu, 17 Sep 2009 14:38:04 GMT" } ]
2009-09-17T00:00:00
[ [ "Meier", "Michael", "" ], [ "Schmidt", "Michael", "" ], [ "Lausen", "Georg", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.4291
Alexander A. Sherstov
Alexander A. Sherstov
The Pattern Matrix Method (Journal Version)
Revised and expanded version of the STOC'08 article. To appear in SIAM J. Comput., 2009
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a novel and powerful technique for communication lower bounds, the pattern matrix method. Specifically, fix an arbitrary function f:{0,1}^n->{0,1} and let A_f be the matrix whose columns are each an application of f to some subset of the variables x_1,x_2,...,x_{4n}. We prove that A_f has bounded-error communication complexity Omega(d), where d is the approximate degree of f. This result remains valid in the quantum model, regardless of prior entanglement. In particular, it gives a new and simple proof of Razborov's breakthrough quantum lower bounds for disjointness and other symmetric predicates. We further characterize the discrepancy, approximate rank, and approximate trace norm of A_f in terms of well-studied analytic properties of f, broadly generalizing several recent results on small-bias communication and agnostic learning. The method of this paper has recently enabled important progress in multiparty communication complexity.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 15:51:36 GMT" } ]
2009-06-24T00:00:00
[ [ "Sherstov", "Alexander A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0906.4302
Ahmed Mihoob Mr
Ahmed Mihoob, Carlos Molina-Jimenez (School Of Computing Science, University Of Newcastle, UK)
A Peer to Peer Protocol for Online Dispute Resolution over Storage Consumption
12 pages, 7 figures
EPTCS 2, 2009, pp. 3-14
10.4204/EPTCS.2.1
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In bilateral accounting of resource consumption both the consumer and provider independently measure the amount of resources consumed by the consumer. The problem here is that potential disparities between the provider's and consumer's accountings, might lead to conflicts between the two parties that need to be resolved. We argue that with the proper mechanisms available, most of these conflicts can be solved online, as opposite to in court resolution; the design of such mechanisms is still a research topic; to help cover the gap, in this paper we propose a peer--to--peer protocol for online dispute resolution over storage consumption. The protocol is peer--to--peer and takes into consideration the possible causes (e.g, transmission delays, unsynchronized metric collectors, etc.) of the disparity between the provider's and consumer's accountings to make, if possible, the two results converge.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 16:30:51 GMT" } ]
2009-06-24T00:00:00
[ [ "Mihoob", "Ahmed", "", "School Of Computing Science,\n University Of Newcastle, UK" ], [ "Molina-Jimenez", "Carlos", "", "School Of Computing Science,\n University Of Newcastle, UK" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.4315
Sabina Petride
Mark Bickford (Cornell University), Robert Constable (Cornell University), Joseph Halpern (Cornell University), Sabina Petride (Cornell University)
Knowledge-Based Synthesis of Distributed Systems Using Event Structures
A preliminary version of this paper appeared in Proceedings of the 11th International Conference on Logic for Programming, Artificial Intelligence, and Reasoning LPAR 2004, pp. 449-465
Logical Methods in Computer Science, Volume 7, Issue 2 (May 21, 2011) lmcs:804
10.2168/LMCS-7(2:14)2011
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To produce a program guaranteed to satisfy a given specification one can synthesize it from a formal constructive proof that a computation satisfying that specification exists. This process is particularly effective if the specifications are written in a high-level language that makes it easy for designers to specify their goals. We consider a high-level specification language that results from adding knowledge to a fragment of Nuprl specifically tailored for specifying distributed protocols, called event theory. We then show how high-level knowledge-based programs can be synthesized from the knowledge-based specifications using a proof development system such as Nuprl. Methods of Halpern and Zuck then apply to convert these knowledge-based protocols to ordinary protocols. These methods can be expressed as heuristic transformation tactics in Nuprl.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 17:10:42 GMT" }, { "version": "v2", "created": "Fri, 7 Jan 2011 19:30:13 GMT" }, { "version": "v3", "created": "Thu, 19 May 2011 07:14:28 GMT" } ]
2015-07-01T00:00:00
[ [ "Bickford", "Mark", "", "Cornell University" ], [ "Constable", "Robert", "", "Cornell\n University" ], [ "Halpern", "Joseph", "", "Cornell University" ], [ "Petride", "Sabina", "", "Cornell\n University" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4316
Joseph Y. Halpern
Lawrence Blume, David Easley, and Joseph Y. Halpern
Constructive Decision Theory
A preliminary version of paper, with the title "Redoing the Foundations of Decision Theory" appeared in the Tenth International Conference on Principles of Knowledge Representation and Reasoning. The paper will appear in "Journal of Economic Theory"
null
null
null
cs.GT cs.AI econ.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In most contemporary approaches to decision making, a decision problem is described by a sets of states and set of outcomes, and a rich set of acts, which are functions from states to outcomes over which the decision maker (DM) has preferences. Most interesting decision problems, however, do not come with a state space and an outcome space. Indeed, in complex problems it is often far from clear what the state and outcome spaces would be. We present an alternative foundation for decision making, in which the primitive objects of choice are syntactic programs. A representation theorem is proved in the spirit of standard representation theorems, showing that if the DM's preference relation on objects of choice satisfies appropriate axioms, then there exist a set S of states, a set O of outcomes, a way of interpreting the objects of choice as functions from S to O, a probability on S, and a utility function on O, such that the DM prefers choice a to choice b if and only if the expected utility of a is higher than that of b. Thus, the state space and outcome space are subjective, just like the probability and utility; they are not part of the description of the problem. In principle, a modeler can test for SEU behavior without having access to states or outcomes. We illustrate the power of our approach by showing that it can capture decision makers who are subject to framing effects.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 18:22:45 GMT" }, { "version": "v2", "created": "Fri, 2 Jul 2021 16:28:50 GMT" } ]
2021-09-07T00:00:00
[ [ "Blume", "Lawrence", "" ], [ "Easley", "David", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Economics", "code": "econ.TH", "description": "Includes theoretical contributions to Contract Theory, Decision Theory, Game Theory, General Equilibrium, Growth, Learning and Evolution, Macroeconomics, Market and Mechanism Design, and Social Choice.", "span": "(Theoretical Economics)" } ]
0906.4321
Joseph Y. Halpern
Joseph Y. Halpern and Leandro Rego
Reasoning About Knowledge of Unawareness Revisited
In Proceedings of Twelfth Conference on Theoretical Aspects of Rationality and Knowledge, 2009, pp. 166-173
null
null
null
cs.AI cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In earlier work, we proposed a logic that extends the Logic of General Awareness of Fagin and Halpern [1988] by allowing quantification over primitive propositions. This makes it possible to express the fact that an agent knows that there are some facts of which he is unaware. In that logic, it is not possible to model an agent who is uncertain about whether he is aware of all formulas. To overcome this problem, we keep the syntax of the earlier paper, but allow models where, with each world, a possibly different language is associated. We provide a sound and complete axiomatization for this logic and show that, under natural assumptions, the quantifier-free fragment of the logic is characterized by exactly the same axioms as the logic of Heifetz, Meier, and Schipper [2008].
[ { "version": "v1", "created": "Tue, 23 Jun 2009 17:34:16 GMT" } ]
2009-06-24T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Rego", "Leandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4326
Joseph Y. Halpern
Joseph Y. Halpern and Rafael Pass
A Logical Characterization of Iterated Admissibility
In Proceedings of Twelfth Conference on Theoretical Aspects of Rationality and Knowledge, 2009, pp. 146-155
null
null
null
cs.AI cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Brandenburger, Friedenberg, and Keisler provide an epistemic characterization of iterated admissibility (i.e., iterated deletion of weakly dominated strategies) where uncertainty is represented using LPSs (lexicographic probability sequences). Their characterization holds in a rich structure called a complete structure, where all types are possible. Here, a logical charaacterization of iterated admisibility is given that involves only standard probability and holds in all structures, not just complete structures. A stronger notion of strong admissibility is then defined. Roughly speaking, strong admissibility is meant to capture the intuition that "all the agent knows" is that the other agents satisfy the appropriate rationality assumptions. Strong admissibility makes it possible to relate admissibility, canonical structures (as typically considered in completeness proofs in modal logic), complete structures, and the notion of ``all I know''.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 18:04:05 GMT" } ]
2009-06-24T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Pass", "Rafael", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4327
R Doomun
Jigyasa Bisaria, Namita Shrivastava, K.R. Pardasani
A Rough Sets Partitioning Model for Mining Sequential Patterns with Time Constraint
9 pages, International Journal of Computer Science and Information Security, IJCSIS 2009
IJCSIS, June 2009 Issue, Vol. 2, No.1
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Now a days, data mining and knowledge discovery methods are applied to a variety of enterprise and engineering disciplines to uncover interesting patterns from databases. The study of Sequential patterns is an important data mining problem due to its wide applications to real world time dependent databases. Sequential patterns are inter-event patterns ordered over a time-period associated with specific objects under study. Analysis and discovery of frequent sequential patterns over a predetermined time-period are interesting data mining results, and can aid in decision support in many enterprise applications. The problem of sequential pattern mining poses computational challenges as a long frequent sequence contains enormous number of frequent subsequences. Also useful results depend on the right choice of event window. In this paper, we have studied the problem of sequential pattern mining through two perspectives, one the computational aspect of the problem and the other is incorporation and adjustability of time constraint. We have used Indiscernibility relation from theory of rough sets to partition the search space of sequential patterns and have proposed a novel algorithm that allows previsualization of patterns and allows adjustment of time constraint prior to execution of mining task. The algorithm Rough Set Partitioning is at least ten times faster than the naive time constraint based sequential pattern mining algorithm GSP. Besides this an additional knowledge of time interval of sequential patterns is also determined with the method.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 18:29:06 GMT" } ]
2009-06-24T00:00:00
[ [ "Bisaria", "Jigyasa", "" ], [ "Shrivastava", "Namita", "" ], [ "Pardasani", "K. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0906.4332
Joseph Y. Halpern
Adam J. Grove and Joseph Y. Halpern
Updating Sets of Probabilities
In Proceedings of the Fourteenth Conference on Uncertainty in AI, 1998, pp. 173-182
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are several well-known justifications for conditioning as the appropriate method for updating a single probability measure, given an observation. However, there is a significant body of work arguing for sets of probability measures, rather than single measures, as a more realistic model of uncertainty. Conditioning still makes sense in this context--we can simply condition each measure in the set individually, then combine the results--and, indeed, it seems to be the preferred updating procedure in the literature. But how justified is conditioning in this richer setting? Here we show, by considering an axiomatic account of conditioning given by van Fraassen, that the single-measure and sets-of-measures cases are very different. We show that van Fraassen's axiomatization for the former case is nowhere near sufficient for updating sets of measures. We give a considerably longer (and not as compelling) list of axioms that together force conditioning in this setting, and describe other update methods that are allowed once any of these axioms is dropped.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 19:34:47 GMT" }, { "version": "v2", "created": "Sun, 10 Aug 2014 01:47:19 GMT" } ]
2014-08-12T00:00:00
[ [ "Grove", "Adam J.", "" ], [ "Halpern", "Joseph Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.4377
Daniel Perrucci
Gabriela Jeronimo, Daniel Perrucci
On the minimum of a positive polynomial over the standard simplex
null
null
null
null
math.AG cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new positive lower bound for the minimum value taken by a polynomial P with integer coefficients in k variables over the standard simplex of R^k, assuming that P is positive on the simplex. This bound depends only on the number of variables, the degree and the bitsize of the coefficients of P and improves all previous bounds for arbitrary polynomials which are positive over the simplex.
[ { "version": "v1", "created": "Tue, 23 Jun 2009 23:40:34 GMT" } ]
2009-06-25T00:00:00
[ [ "Jeronimo", "Gabriela", "" ], [ "Perrucci", "Daniel", "" ] ]
[ { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0906.4415
Gaurav Bhatnagar Mr.
Gaurav Bhatnagar and Balasubramanian Raman
Robust Watermarking in Multiresolution Walsh-Hadamard Transform
6 Pages, 16 Figure, 2 Tables
Proc. of IEEE International Advance Computing Conference (IACC 2009), Patiala, India, 6-7 March 2009, pp. 894-899
10.1109/IADCC.2009.4809134
null
cs.CR cs.IT cs.MM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a newer version of Walsh-Hadamard Transform namely multiresolution Walsh-Hadamard Transform (MR-WHT) is proposed for images. Further, a robust watermarking scheme is proposed for copyright protection using MRWHT and singular value decomposition. The core idea of the proposed scheme is to decompose an image using MR-WHT and then middle singular values of high frequency sub-band at the coarsest and the finest level are modified with the singular values of the watermark. Finally, a reliable watermark extraction scheme is developed for the extraction of the watermark from the distorted image. The experimental results show better visual imperceptibility and resiliency of the proposed scheme against intentional or un-intentional variety of attacks.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 07:23:51 GMT" } ]
2009-06-25T00:00:00
[ [ "Bhatnagar", "Gaurav", "" ], [ "Raman", "Balasubramanian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4431
Joerg Rothe
Daniel Binkele-Raible, G\'abor Erd\'elyi, Henning Fernau, Judy Goldsmith, Nicholas Mattei, and J\"org Rothe
The Complexity of Probabilistic Lobbying
35 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose models for lobbying in a probabilistic environment, in which an actor (called "The Lobby") seeks to influence voters' preferences of voting for or against multiple issues when the voters' preferences are represented in terms of probabilities. In particular, we provide two evaluation criteria and two bribery methods to formally describe these models, and we consider the resulting forms of lobbying with and without issue weighting. We provide a formal analysis for these problems of lobbying in a stochastic environment, and determine their classical and parameterized complexity depending on the given bribery/evaluation criteria and on various natural parameterizations. Specifically, we show that some of these problems can be solved in polynomial time, some are NP-complete but fixed-parameter tractable, and some are W[2]-complete. Finally, we provide approximability and inapproximability results for these problems and several variants.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 10:14:13 GMT" }, { "version": "v2", "created": "Fri, 26 Jun 2009 22:10:34 GMT" }, { "version": "v3", "created": "Fri, 13 Nov 2009 12:11:55 GMT" }, { "version": "v4", "created": "Sat, 26 Feb 2011 21:29:30 GMT" } ]
2011-03-01T00:00:00
[ [ "Binkele-Raible", "Daniel", "" ], [ "Erdélyi", "Gábor", "" ], [ "Fernau", "Henning", "" ], [ "Goldsmith", "Judy", "" ], [ "Mattei", "Nicholas", "" ], [ "Rothe", "Jörg", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.4454
Patrick Coquillard
Patrick Coquillard (IBSV), Alexandre Muzy (LISA), Eric Wajnberg (IBSV)
Activatability for simulation tractability of NP problems: Application to Ecology
Complex Systems: Activity-Based Modeling and Simulation, Cargese Interdisciplinary Seminar, Corsica, France., France (2009)
null
null
null
q-bio.QM cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dynamics of biological-ecological systems is strongly depending on spatial dimensions. Most of powerful simulators in ecology take into account for system spatiality thus embedding stochastic processes. Due to the difficulty of researching particular trajectories, biologists and computer scientists aim at predicting the most probable trajectories of systems under study. Doing that, they considerably reduce computation times. However, because of the largeness of space, the execution time remains usually polynomial in time. In order to reduce execution times we propose an activatability-based search cycle through the process space. This cycle eliminates the redundant processes on a statistical basis (Generalized Linear Model), and converges to the minimal number of processes required to match simulation objectives.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 11:59:29 GMT" } ]
2009-09-04T00:00:00
[ [ "Coquillard", "Patrick", "", "IBSV" ], [ "Muzy", "Alexandre", "", "LISA" ], [ "Wajnberg", "Eric", "", "IBSV" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0906.4474
Jon Sneyers
Jon Sneyers, Peter Van Weert, Tom Schrijvers, Leslie De Koninck
As time goes by: Constraint Handling Rules - A survey of CHR research from 1998 to 2007
49 pages. To appear in Theory and Practice of Logic Programming
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Constraint Handling Rules (CHR) is a high-level programming language based on multi-headed multiset rewrite rules. Originally designed for writing user-defined constraint solvers, it is now recognized as an elegant general purpose language. CHR-related research has surged during the decade following the previous survey by Fruehwirth. Covering more than 180 publications, this new survey provides an overview of recent results in a wide range of research areas, from semantics and analysis to systems, extensions and applications.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 13:54:41 GMT" }, { "version": "v2", "created": "Thu, 25 Jun 2009 13:17:41 GMT" } ]
2009-06-25T00:00:00
[ [ "Sneyers", "Jon", "" ], [ "Van Weert", "Peter", "" ], [ "Schrijvers", "Tom", "" ], [ "De Koninck", "Leslie", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]