id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0906.3306 | Niall Murphy | Matthew J. Patitz and Scott M. Summers | Self-Assembly of Infinite Structures | null | EPTCS 1, 2009, pp. 215-225 | 10.4204/EPTCS.1.21 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We review some recent results related to the self-assembly of infinite
structures in the Tile Assembly Model. These results include impossibility
results, as well as novel tile assembly systems in which shapes and patterns
that represent various notions of computation self-assemble. Several open
questions are also presented and motivated.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 20:33:07 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Patitz",
"Matthew J.",
""
],
[
"Summers",
"Scott M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3313 | Venkatesh Ramakrishnan | Venkatesh Ramakrishnan (1), Ernst M. Witte (1), Torsten Kempf (1),
David Kammler (1), Gerd Ascheid (1), Heinrich Meyr (1), Marc Adrat (2),
Markus Antweiler (2) ((1) Institute for Integrated Signal Processing Systems,
RWTH Aachen University, Germany (2) Research Establishment for Applied
Science (FGAN), Dept. FKIE/KOM, Wachtberg, Germany) | Efficient And Portable SDR Waveform Development: The Nucleus Concept | To Appear in 2009 IEEE Military Communications Conference (MILCOM
2009) | null | 10.1109/MILCOM.2009.5379897 | null | cs.IT cs.NI math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Future wireless communication systems should be flexible to support different
waveforms (WFs) and be cognitive to sense the environment and tune themselves.
This has lead to tremendous interest in software defined radios (SDRs).
Constraints like throughput, latency and low energy demand high implementation
efficiency. The tradeoff of going for a highly efficient implementation is the
increase of porting effort to a new hardware (HW) platform. In this paper, we
propose a novel concept for WF development, the Nucleus concept, that exploits
the common structure in various wireless signal processing algorithms and
provides a way for efficient and portable implementation. Tool assisted WF
mapping and exploration is done efficiently by propagating the implementation
and interface properties of Nuclei. The Nucleus concept aims at providing
software flexibility with high level programmability, but at the same time
limiting HW flexibility to maximize area and energy efficiency.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 07:40:51 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Jul 2009 12:39:26 GMT"
}
]
| 2010-12-21T00:00:00 | [
[
"Ramakrishnan",
"Venkatesh",
""
],
[
"Witte",
"Ernst M.",
""
],
[
"Kempf",
"Torsten",
""
],
[
"Kammler",
"David",
""
],
[
"Ascheid",
"Gerd",
""
],
[
"Meyr",
"Heinrich",
""
],
[
"Adrat",
"Marc",
""
],
[
"Antweiler",
"Markus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3323 | Andriy Myronenko | Andriy Myronenko, Xubo Song | Adaptive Regularization of Ill-Posed Problems: Application to Non-rigid
Image Registration | null | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an adaptive regularization approach. In contrast to conventional
Tikhonov regularization, which specifies a fixed regularization operator, we
estimate it simultaneously with parameters. From a Bayesian perspective we
estimate the prior distribution on parameters assuming that it is close to some
given model distribution. We constrain the prior distribution to be a
Gauss-Markov random field (GMRF), which allows us to solve for the prior
distribution analytically and provides a fast optimization algorithm. We apply
our approach to non-rigid image registration to estimate the spatial
transformation between two images. Our evaluation shows that the adaptive
regularization approach significantly outperforms standard variational methods.
| [
{
"version": "v1",
"created": "Wed, 17 Jun 2009 23:24:38 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Myronenko",
"Andriy",
""
],
[
"Song",
"Xubo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.3327 | EPTCS | Niall Murphy, Damien Woods | On acceptance conditions for membrane systems: characterisations of L
and NL | null | EPTCS 1, 2009, pp. 172-184 | 10.4204/EPTCS.1.17 | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we investigate the affect of various acceptance conditions on
recogniser membrane systems without dissolution. We demonstrate that two
particular acceptance conditions (one easier to program, the other easier to
prove correctness) both characterise the same complexity class, NL. We also
find that by restricting the acceptance conditions we obtain a characterisation
of L. We obtain these results by investigating the connectivity properties of
dependency graphs that model membrane system computations.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 01:04:51 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Murphy",
"Niall",
""
],
[
"Woods",
"Damien",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.3329 | EPTCS | Liesbeth De Mol | On the boundaries of solvability and unsolvability in tag systems.
Theoretical and Experimental Results | null | EPTCS 1, 2009, pp. 56-66 | 10.4204/EPTCS.1.5 | null | cs.CC cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Several older and more recent results on the boundaries of solvability and
unsolvability in tag systems are surveyed. Emphasis will be put on the
significance of computer experiments in research on very small tag systems.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 01:15:00 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"De Mol",
"Liesbeth",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3332 | EPTCS | Matteo Cavaliere, Peter Leupold | Complexity through the Observation of Simple Systems | null | EPTCS 1, 2009, pp. 22-30 | 10.4204/EPTCS.1.3 | null | cs.CC cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We survey work on the paradigm called "computing by observing." Its central
feature is that one considers the behavior of an evolving system as the result
of a computation. To this end an observer records this behavior. It has turned
out that the observed behavior of computationally simple systems can be very
complex, when an appropriate observer is used. For example, a restricted
version of context-free grammars with regular observers suffices to obtain
computational completeness. As a second instantiation presented here, we apply
an observer to sticker systems. Finally, some directions for further research
are proposed.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 01:15:53 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Cavaliere",
"Matteo",
""
],
[
"Leupold",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3352 | Stefano Buzzi | Stefano Buzzi, H. Vincent Poor, Alessio Zappone | Spreading Code and Widely-Linear Receiver Design: Non-Cooperative Games
for Wireless CDMA Networks | submitted to IEEE Transactions on Information Theory, June 2009 | null | null | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The issue of non-cooperative transceiver optimization in the uplink of a
multiuser wireless code division multiple access data network with
widely-linear detection at the receiver is considered. While previous work in
this area has focused on a simple real signal model, in this paper a baseband
complex representation of the data is used, so as to properly take into account
the I and Q components of the received signal. For the case in which the
received signal is improper, a widely-linear reception structure, processing
separately the data and their complex conjugates, is considered. Several
non-cooperative resource allocation games are considered for this new scenario,
and the performance gains granted by the use of widely-linear detection are
assessed through theoretical analysis. Numerical results confirm the validity
of the theoretical findings, and show that exploiting the improper nature of
the data in non-cooperative resource allocation brings remarkable performance
improvements in multiuser wireless systems.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 05:35:32 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Buzzi",
"Stefano",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Zappone",
"Alessio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3394 | Maziar Nekovee | Maziar Nekovee | Quantifying the Availability of TV White Spaces for Cognitive Radio
Operation in the UK | Extended version is available from the author | In Proc. IEEE ICC joint Workshop Cognitive Wireless Networks and
Systems, Dresden, Germany, June 2009 | 10.1109/ICCW.2009.5208035 | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cognitive radio is being intensively researched for opportunistic access to
the so-called TV White Spaces (TVWS): large portions of the VHF/UHF TV bands
which become available on a geographical basis after the digital switchover.
Using accurate digital TV (DTV) coverage maps together with a database of DTV
transmitters, we develop a methodology for identifying TVWS frequencies at any
given location in the United Kingdom. We use our methodology to investigate
variations in TVWS as a function of the location and transmit power of
cognitive radios, and examine how constraints on adjacent channel interference
imposed by regulators may affect the results. Our analysis provides a realistic
view on the spectrum opportunity associated with cognitive devices, and
presents the first quantitative study of the availability and frequency
composition of TWVS outside the United States.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 09:54:20 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Nekovee",
"Maziar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.3410 | Christian Spagnol | Christian Spagnol, Marta Rossi, Massimiliano Sala | Quasi-cyclic LDPC codes with high girth | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a class of quasi-cyclic LDPC codes. We provide precise conditions
guaranteeing high girth in their Tanner graph. Experimentally, the codes we
propose perform no worse than random LDPC codes with their same parameters,
which is a significant achievement for algebraic codes.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 11:28:40 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Spagnol",
"Christian",
""
],
[
"Rossi",
"Marta",
""
],
[
"Sala",
"Massimiliano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3421 | Philippe Di Francesco | P. Di Francesco and R. Kedem | Q-system Cluster Algebras, Paths and Total Positivity | Testing the form interface | null | null | t09-083 | q-fin.EC cs.SI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We review the solution of the $A_r$ Q-systems in terms of the partition
function of paths on a weighted graph, and show that it is possible to modify
the graphs and transfer matrices so as to provide an explicit connection to the
theory of planar networks introduced in the context of totally positive
matrices by Fomin and Zelevinsky.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 12:03:57 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Sep 2009 09:39:31 GMT"
}
]
| 2023-07-12T00:00:00 | [
[
"Di Francesco",
"P.",
""
],
[
"Kedem",
"R.",
""
]
]
| [
{
"class": "Quantitative Finance",
"code": "q-fin.EC",
"description": "q-fin.EC is an alias for econ.GN. Economics, including micro and macro economics, international economics, theory of the firm, labor economics, and other economic topics outside finance",
"span": "(Economics)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0906.3423 | David Lorenz | Atzmon Hen-Tov, David H. Lorenz, and Lior Schachter | ModelTalk: A Framework for Developing Domain Specific Executable Models | null | Proc. 8th Ann. OOPSLA Workshop on Domain-Specific Modeling
(DSM08), Nashville, Tennessee, USA, October 19-20, 2008 | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Developing and maintaining complex, large-scale, product line of highly
customized software systems is difficult and costly. Part of the difficulty is
due to the need to communicate business knowledge between domain experts and
application programmers. Domain specific model driven development (MDD)
addresses this difficulty by providing domain experts and developers with
domain specific abstractions for communicating designs. Most MDD
implementations take a generative approach. In contrast, we adopt an
interpretive approach to domain specific model driven development. We present a
framework, named ModelTalk, that integrates MDD, dependency injection and
meta-modeling to form an interpretive, domain specific modeling framework. The
framework is complemented by tool support that provides developers with the
same advanced level of usability for modeling as they are accustomed to in
programming environments. ModelTalk is used in a commercial setting for
developing a product line of Telco grade business support systems (BSS).
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 12:13:38 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Hen-Tov",
"Atzmon",
""
],
[
"Lorenz",
"David H.",
""
],
[
"Schachter",
"Lior",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.3424 | Ziyuan Wang | Ziyuan Wang, Lars Kulik, Kotagiri Ramamohanarao | Decentralized Traffic Management Strategies for Sensor-Enabled Cars | null | null | null | SUM-06-07 | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traffic Congestions and accidents are major concerns in today's
transportation systems. This thesis investigates how to optimize traffic flow
on highways, in particular for merging situations such as intersections where a
ramp leads onto the highway. In our work, cars are equipped with sensors that
can detect distance to neighboring cars, and communicate their velocity and
acceleration readings with one another. Sensor-enabled cars can locally
exchange sensed information about the traffic and adapt their behavior much
earlier than regular cars.
We propose proactive algorithms for merging different streams of
sensor-enabled cars into a single stream. A proactive merging algorithm
decouples the decision point from the actual merging point. Sensor-enabled cars
allow us to decide where and when a car merges before it arrives at the actual
merging point. This leads to a significant improvement in traffic flow as
velocities can be adjusted appropriately. We compare proactive merging
algorithms against the conventional priority-based merging algorithm in a
controlled simulation environment. Experiment results show that proactive
merging algorithms outperform the priority-based merging algorithm in terms of
flow and delay.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 12:16:06 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Wang",
"Ziyuan",
""
],
[
"Kulik",
"Lars",
""
],
[
"Ramamohanarao",
"Kotagiri",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.3461 | Martin Drozda | Martin Drozda, Sven Schaust, Helena Szczerbicka | AIS for Misbehavior Detection in Wireless Sensor Networks: Performance
and Design Principles | 16 pages, 20 figures, a full version of our IEEE CEC 2007 paper | null | 10.1109/CEC.2007.4424955 | null | cs.NI cs.AI cs.CR cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A sensor network is a collection of wireless devices that are able to monitor
physical or environmental conditions. These devices (nodes) are expected to
operate autonomously, be battery powered and have very limited computational
capabilities. This makes the task of protecting a sensor network against
misbehavior or possible malfunction a challenging problem. In this document we
discuss performance of Artificial immune systems (AIS) when used as the
mechanism for detecting misbehavior.
We show that (i) mechanism of the AIS have to be carefully applied in order
to avoid security weaknesses, (ii) the choice of genes and their interaction
have a profound influence on the performance of the AIS, (iii) randomly created
detectors do not comply with limitations imposed by communications protocols
and (iv) the data traffic pattern seems not to impact significantly the overall
performance.
We identified a specific MAC layer based gene that showed to be especially
useful for detection; genes measure a network's performance from a node's
viewpoint. Furthermore, we identified an interesting complementarity property
of genes; this property exploits the local nature of sensor networks and moves
the burden of excessive communication from normally behaving nodes to
misbehaving nodes. These results have a direct impact on the design of AIS for
sensor networks and on engineering of sensor networks.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 15:31:29 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Drozda",
"Martin",
""
],
[
"Schaust",
"Sven",
""
],
[
"Szczerbicka",
"Helena",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.3469 | Panos Giannopoulos | Panos Giannopoulos, Christian Knauer, Gunter Rote, Daniel Werner | The parameterized complexity of some geometric problems in unbounded
dimension | null | Proc. 4th Int. Workshop on Parameterized and Exact
Computation-IWPEC 2009, Copenhagen, September 2009, Herausgeber: Jianer Chen
und Fedor V. Fomin, Lecture Notes in Computer Science, 5917, Springer-Verlag,
2009, pp. 198-209 | 10.1007/978-3-642-11269-0_16 | null | cs.CG cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the parameterized complexity of the following fundamental geometric
problems with respect to the dimension $d$: i) Given $n$ points in $\Rd$,
compute their minimum enclosing cylinder. ii) Given two $n$-point sets in
$\Rd$, decide whether they can be separated by two hyperplanes. iii) Given a
system of $n$ linear inequalities with $d$ variables, find a maximum-size
feasible subsystem. We show that (the decision versions of) all these problems
are W[1]-hard when parameterized by the dimension $d$. %and hence not solvable
in ${O}(f(d)n^c)$ time, for any computable function $f$ and constant $c$
%(unless FPT=W[1]). Our reductions also give a $n^{\Omega(d)}$-time lower bound
(under the Exponential Time Hypothesis).
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 15:44:18 GMT"
}
]
| 2015-02-18T00:00:00 | [
[
"Giannopoulos",
"Panos",
""
],
[
"Knauer",
"Christian",
""
],
[
"Rote",
"Gunter",
""
],
[
"Werner",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3483 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Nicolae Tapus | Efficient Offline Algorithmic Techniques for Several Packet Routing
Problems in Distributed Systems | null | Acta Universitatis Apulensis - Mathematics-Informatics, no. 18,
pp. 111-128, 2009. (ISSN: 1582-5329) | null | null | cs.DS cs.DC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider several problems concerning packet routing in
distributed systems. Each problem is formulated using terms from Graph Theory
and for each problem we present efficient, novel, algorithmic techniques for
computing optimal solutions. We address topics like: bottleneck paths (trees),
optimal paths with non-linear costs, optimal paths with multiple optimization
objectives, maintaining aggregate connectivity information under a sequence of
network link failures, and several others.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 17:38:39 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tapus",
"Nicolae",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.3490 | Mugurel Ionut Andreica | Mugurel Ionut Andreica, Madalina Ecaterina Andreica, Costel Visan | Optimal Constrained Resource Allocation Strategies under Low Risk
Circumstances | null | Metalurgia International, vol. 14, special issue no. 8, pp.
143-154, 2009. (ISSN: 1582-2214) | null | null | cs.DS cs.CG cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider multiple constrained resource allocation problems,
where the constraints can be specified by formulating activity dependency
restrictions or by using game-theoretic models. All the problems are focused on
generic resources, with a few exceptions which consider financial resources in
particular. The problems consider low-risk circumstances and the values of the
uncertain variables which are used by the algorithms are the expected values of
the variables. For each of the considered problems we propose novel algorithmic
solutions for computing optimal resource allocation strategies. The presented
solutions are optimal or near-optimal from the perspective of their time
complexity. The considered problems have applications in a broad range of
domains, like workflow scheduling in industry (e.g. in the mining and
metallurgical industry) or the financial sector, motion planning, facility
location and data transfer or job scheduling and resource management in Grids,
clouds or other distributed systems.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 17:52:41 GMT"
}
]
| 2009-06-19T00:00:00 | [
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Andreica",
"Madalina Ecaterina",
""
],
[
"Visan",
"Costel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.3499 | Shiqian Ma | Donald Goldfarb and Shiqian Ma | Convergence of fixed-point continuation algorithms for matrix rank
minimization | Conditions on RIP constant for an approximate recovery are improved | null | null | null | math.OC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The matrix rank minimization problem has applications in many fields such as
system identification, optimal control, low-dimensional embedding, etc. As this
problem is NP-hard in general, its convex relaxation, the nuclear norm
minimization problem, is often solved instead. Recently, Ma, Goldfarb and Chen
proposed a fixed-point continuation algorithm for solving the nuclear norm
minimization problem. By incorporating an approximate singular value
decomposition technique in this algorithm, the solution to the matrix rank
minimization problem is usually obtained. In this paper, we study the
convergence/recoverability properties of the fixed-point continuation algorithm
and its variants for matrix rank minimization. Heuristics for determining the
rank of the matrix when its true rank is not known are also proposed. Some of
these algorithms are closely related to greedy algorithms in compressed
sensing. Numerical results for these algorithms for solving affinely
constrained matrix rank minimization problems are reported.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 18:42:56 GMT"
},
{
"version": "v2",
"created": "Mon, 10 Aug 2009 02:24:06 GMT"
},
{
"version": "v3",
"created": "Thu, 1 Jul 2010 18:44:25 GMT"
},
{
"version": "v4",
"created": "Wed, 29 Dec 2010 23:35:49 GMT"
}
]
| 2011-01-04T00:00:00 | [
[
"Goldfarb",
"Donald",
""
],
[
"Ma",
"Shiqian",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3527 | Serge Gaspers | Serge Gaspers, Gregory B. Sorkin | A universally fastest algorithm for Max 2-Sat, Max 2-CSP, and everything
in between | 40 pages, a preliminary version appeared in the proceedings of SODA
2009 | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we introduce "hybrid" Max 2-CSP formulas consisting of "simple
clauses", namely conjunctions and disjunctions of pairs of variables, and
general 2-variable clauses, which can be any integer-valued functions of pairs
of boolean variables. This allows an algorithm to use both efficient reductions
specific to AND and OR clauses, and other powerful reductions that require the
general CSP setting. We use new reductions introduced here, and recent
reductions such as "clause-learning" and "2-reductions" generalized to our
setting's mixture of simple and general clauses.
Parametrizing an instance by the fraction p of non-simple clauses, we give an
exact (exponential-time) algorithm that is the fastest known polynomial-space
algorithm for p=0 (which includes the well-studied Max 2-Sat problem but also
instances with arbitrary mixtures of AND and OR clauses); the only efficient
algorithm for mixtures of AND, OR, and general integer-valued clauses; and tied
for fastest for general Max 2-CSP (p=1). Since a pure 2-Sat input instance may
be transformed to a general CSP instance in the course of being solved, the
algorithm's efficiency and generality go hand in hand.
Our algorithm analysis and optimization are a variation on the familiar
measure-and-conquer approach, resulting in an optimizing mathematical program
that is convex not merely quasi-convex, and thus can be solved efficiently and
with a certificate of optimality. We produce a family of running-time
upper-bound formulas, each optimized for instances with a particular value of p
but valid for all instances.
| [
{
"version": "v1",
"created": "Thu, 18 Jun 2009 21:29:31 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Gaspers",
"Serge",
""
],
[
"Sorkin",
"Gregory B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.3554 | Hector Zenil | Hector Zenil, Jean-Paul Delahaye | On the Algorithmic Nature of the World | Book chapter in Gordana Dodig-Crnkovic and Mark Burgin (eds.)
Information and Computation by World Scientific, 2010.
(http://www.idt.mdh.se/ECAP-2005/INFOCOMPBOOK/). Paper website:
http://www.mathrix.org/experimentalAIT/ | Gordana Dodig-Crnkovic and Mark Burgin (eds.) Information and
Computation by World Scientific, 2010 | null | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a test based on the theory of algorithmic complexity and an
experimental evaluation of Levin's universal distribution to identify evidence
in support of or in contravention of the claim that the world is algorithmic in
nature. To this end we have undertaken a statistical comparison of the
frequency distributions of data from physical sources on the one
hand--repositories of information such as images, data stored in a hard drive,
computer programs and DNA sequences--and the frequency distributions generated
by purely algorithmic means on the other--by running abstract computing devices
such as Turing machines, cellular automata and Post Tag systems. Statistical
correlations were found and their significance measured.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 00:08:50 GMT"
},
{
"version": "v2",
"created": "Mon, 11 Jan 2010 15:59:00 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Aug 2010 07:30:19 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Zenil",
"Hector",
""
],
[
"Delahaye",
"Jean-Paul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3558 | Mikhail Simkin | M.V. Simkin and V.P. Roychowdhury | Estimating achievement from fame | null | Significance 8 (2011) 22-26 | 10.1111/j.1740-9713.2011.00473.x | null | physics.soc-ph cs.CY physics.hist-ph stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We report a method for estimating people's achievement based on their fame.
Earlier we discovered (cond-mat/0310049) that fame of fighter pilot aces
(measured as number of Google hits) grows exponentially with their achievement
(number of victories). We hypothesize that the same functional relation between
achievement and fame holds for other professions. This allows us to estimate
achievement for professions where an unquestionable and universally accepted
measure of achievement does not exist. We apply the method to Nobel Prize
winners in Physics. For example, we obtain that Paul Dirac, who is hundred
times less famous than Einstein contributed to physics only two times less. We
compare our results with Landau's ranking.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 00:58:22 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Mar 2011 06:21:13 GMT"
}
]
| 2011-03-16T00:00:00 | [
[
"Simkin",
"M. V.",
""
],
[
"Roychowdhury",
"V. P.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.hist-ph",
"description": "History and philosophy of all branches of physics, astrophysics, and cosmology, including appreciations of physicists.",
"span": "(History and Philosophy of Physics)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0906.3585 | Arnab Bhattacharya | Vishwakarma Singh, Arnab Bhattacharya, Ambuj K. Singh | Finding Significant Subregions in Large Image Databases | 16 pages, 48 figures | Extending Database Technology (EDBT) 2010 | null | null | cs.DB cs.CV cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Images have become an important data source in many scientific and commercial
domains. Analysis and exploration of image collections often requires the
retrieval of the best subregions matching a given query. The support of such
content-based retrieval requires not only the formulation of an appropriate
scoring function for defining relevant subregions but also the design of new
access methods that can scale to large databases. In this paper, we propose a
solution to this problem of querying significant image subregions. We design a
scoring scheme to measure the similarity of subregions. Our similarity measure
extends to any image descriptor. All the images are tiled and each alignment of
the query and a database image produces a tile score matrix. We show that the
problem of finding the best connected subregion from this matrix is NP-hard and
develop a dynamic programming heuristic. With this heuristic, we develop two
index based scalable search strategies, TARS and SPARS, to query patterns in a
large image repository. These strategies are general enough to work with other
scoring schemes and heuristics. Experimental results on real image datasets
show that TARS saves more than 87% query time on small queries, and SPARS saves
up to 52% query time on large queries as compared to linear search. Qualitative
tests on synthetic and real datasets achieve precision of more than 80%.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 06:57:51 GMT"
}
]
| 2010-03-09T00:00:00 | [
[
"Singh",
"Vishwakarma",
""
],
[
"Bhattacharya",
"Arnab",
""
],
[
"Singh",
"Ambuj K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.3643 | Haris Aziz | Haris Aziz, Oded Lachish, Mike Paterson and Rahul Savani | Spanning connectivity games | AAIM 2009 | null | null | null | cs.GT cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Banzhaf index, Shapley-Shubik index and other voting power indices
measure the importance of a player in a coalitional game. We consider a simple
coalitional game called the spanning connectivity game (SCG) based on an
undirected, unweighted multigraph, where edges are players. We examine the
computational complexity of computing the voting power indices of edges in the
SCG. It is shown that computing Banzhaf values and Shapley-Shubik indices is
#P-complete for SCGs. Interestingly, Holler indices and Deegan-Packel indices
can be computed in polynomial time. Among other results, it is proved that
Banzhaf indices can be computed in polynomial time for graphs with bounded
treewidth. It is also shown that for any reasonable representation of a simple
game, a polynomial time algorithm to compute the Shapley-Shubik indices implies
a polynomial time algorithm to compute the Banzhaf indices. As a corollary,
computing the Shapley value is #P-complete for simple games represented by the
set of minimal winning coalitions, Threshold Network Flow Games, Vertex
Connectivity Games and Coalitional Skill Games.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 11:29:41 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Aziz",
"Haris",
""
],
[
"Lachish",
"Oded",
""
],
[
"Paterson",
"Mike",
""
],
[
"Savani",
"Rahul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3667 | Romain Couillet | Romain Couillet, Merouane Debbah, Jack W. Silverstein | A Deterministic Equivalent for the Analysis of Correlated MIMO Multiple
Access Channels | to appear in IEEE Transactions on Information Theory | null | 10.1109/TIT.2011.2133151 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article, novel deterministic equivalents for the Stieltjes transform
and the Shannon transform of a class of large dimensional random matrices are
provided. These results are used to characterise the ergodic rate region of
multiple antenna multiple access channels, when each point-to-point propagation
channel is modelled according to the Kronecker model. Specifically, an
approximation of all rates achieved within the ergodic rate region is derived
and an approximation of the linear precoders that achieve the boundary of the
rate region as well as an iterative water-filling algorithm to obtain these
precoders are provided. An original feature of this work is that the proposed
deterministic equivalents are proved valid even for strong correlation patterns
at both communication sides. The above results are validated by Monte Carlo
simulations.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 13:42:42 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Jul 2009 08:41:08 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Jul 2009 10:03:58 GMT"
},
{
"version": "v4",
"created": "Thu, 25 Mar 2010 14:49:23 GMT"
},
{
"version": "v5",
"created": "Sun, 24 Oct 2010 10:16:50 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Couillet",
"Romain",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Silverstein",
"Jack W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3682 | Sebastian Wagner | Sebastian Wagner, Romain Couillet, Merouane Debbah and Dirk. T. M.
Slock | Large System Analysis of Linear Precoding in Correlated MISO Broadcast
Channels under Limited Feedback | submitted to IEEE Transactions on Information Theory | IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4509 - 4537, Jul.
2012 | 10.1109/TIT.2012.2191700 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the sum rate performance of zero-forcing (ZF) and
regularized ZF (RZF) precoding in large MISO broadcast systems under the
assumptions of imperfect channel state information at the transmitter and
per-user channel transmit correlation. Our analysis assumes that the number of
transmit antennas $M$ and the number of single-antenna users $K$ are large
while their ratio remains bounded. We derive deterministic approximations of
the empirical signal-to-interference plus noise ratio (SINR) at the receivers,
which are tight as $M,K\to\infty$. In the course of this derivation, the
per-user channel correlation model requires the development of a novel
deterministic equivalent of the empirical Stieltjes transform of large
dimensional random matrices with generalized variance profile. The
deterministic SINR approximations enable us to solve various practical
optimization problems. Under sum rate maximization, we derive (i) for RZF the
optimal regularization parameter, (ii) for ZF the optimal number of users,
(iii) for ZF and RZF the optimal power allocation scheme and (iv) the optimal
amount of feedback in large FDD/TDD multi-user systems. Numerical simulations
suggest that the deterministic approximations are accurate even for small
$M,K$.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 14:53:11 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Apr 2010 16:12:15 GMT"
},
{
"version": "v3",
"created": "Tue, 13 Jul 2010 16:19:38 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Jun 2011 11:57:30 GMT"
},
{
"version": "v5",
"created": "Fri, 3 Feb 2012 15:25:04 GMT"
}
]
| 2012-09-11T00:00:00 | [
[
"Wagner",
"Sebastian",
""
],
[
"Couillet",
"Romain",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Slock",
"Dirk. T. M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3722 | Nidhal Bouaynaya | Nidhal Bouaynaya, Jerzy Zielinski and Dan Schonfeld | Two-Dimensional ARMA Modeling for Breast Cancer Detection and
Classification | null | null | null | null | cs.AI cs.CV physics.med-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new model-based computer-aided diagnosis (CAD) system for tumor
detection and classification (cancerous v.s. benign) in breast images.
Specifically, we show that (x-ray, ultrasound and MRI) images can be accurately
modeled by two-dimensional autoregressive-moving average (ARMA) random fields.
We derive a two-stage Yule-Walker Least-Squares estimates of the model
parameters, which are subsequently used as the basis for statistical inference
and biophysical interpretation of the breast image. We use a k-means classifier
to segment the breast image into three regions: healthy tissue, benign tumor,
and cancerous tumor. Our simulation results on ultrasound breast images
illustrate the power of the proposed approach.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 17:56:16 GMT"
}
]
| 2009-06-22T00:00:00 | [
[
"Bouaynaya",
"Nidhal",
""
],
[
"Zielinski",
"Jerzy",
""
],
[
"Schonfeld",
"Dan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "physics.med-ph",
"description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.",
"span": "(Medical Physics)"
}
]
|
0906.3736 | Dusan Jakovetic | Dusan Jakovetic, Joao Xavier, Jose M. F. Moura | Weight Optimization for Consensus Algorithms with Correlated Switching
Topology | 30 pages, 5 figures, submitted to IEEE Transactions On Signal
Processing | null | 10.1109/TSP.2010.2046635 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We design the weights in consensus algorithms with spatially correlated
random topologies. These arise with: 1) networks with spatially correlated
random link failures and 2) networks with randomized averaging protocols. We
show that the weight optimization problem is convex for both symmetric and
asymmetric random graphs. With symmetric random networks, we choose the
consensus mean squared error (MSE) convergence rate as optimization criterion
and explicitly express this rate as a function of the link formation
probabilities, the link formation spatial correlations, and the consensus
weights. We prove that the MSE convergence rate is a convex, nonsmooth function
of the weights, enabling global optimization of the weights for arbitrary link
formation probabilities and link correlation structures. We extend our results
to the case of asymmetric random links. We adopt as optimization criterion the
mean squared deviation (MSdev) of the nodes states from the current average
state. We prove that MSdev is a convex function of the weights. Simulations
show that significant performance gain is achieved with our weight design
method when compared with methods available in the literature.
| [
{
"version": "v1",
"created": "Fri, 19 Jun 2009 19:33:10 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Sep 2009 22:29:04 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Jakovetic",
"Dusan",
""
],
[
"Xavier",
"Joao",
""
],
[
"Moura",
"Jose M. F.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3737 | Sang Won Choi | Sang Won Choi, Syed A. Jafar, and Sae-Young Chung | On the Beamforming Design for Efficient Interference Alignment | 3 pages, 1 figure, submitted to IEEE Comm. Letters, Mar. 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An efficient interference alignment (IA) scheme is developed for $K$-user
single-input single-output frequency selective fading interference channels.
The main idea is to steer the transmit beamforming matrices such that at each
receiver the subspace dimensions occupied by interference-free desired streams
are asymptotically the same as those occupied by all interferences. Our
proposed scheme achieves a higher multiplexing gain at any given number of
channel realizations in comparison with the original IA scheme, which is known
to achieve the optimal multiplexing gain asymptotically.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 23:51:14 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Choi",
"Sang Won",
""
],
[
"Jafar",
"Syed A.",
""
],
[
"Chung",
"Sae-Young",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3741 | Lillian Lee | Cristian Danescu-Niculescu-Mizil, Gueorgi Kossinets, Jon Kleinberg,
Lillian Lee | How opinions are received by online communities: A case study on
Amazon.com helpfulness votes | null | Proceedings of WWW, pp. 141--150, 2009 | null | null | cs.CL cs.IR physics.data-an physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are many on-line settings in which users publicly express opinions. A
number of these offer mechanisms for other users to evaluate these opinions; a
canonical example is Amazon.com, where reviews come with annotations like "26
of 32 people found the following review helpful." Opinion evaluation appears in
many off-line settings as well, including market research and political
campaigns. Reasoning about the evaluation of an opinion is fundamentally
different from reasoning about the opinion itself: rather than asking, "What
did Y think of X?", we are asking, "What did Z think of Y's opinion of X?" Here
we develop a framework for analyzing and modeling opinion evaluation, using a
large-scale collection of Amazon book reviews as a dataset. We find that the
perceived helpfulness of a review depends not just on its content but also but
also in subtle ways on how the expressed evaluation relates to other
evaluations of the same product. As part of our approach, we develop novel
methods that take advantage of the phenomenon of review "plagiarism" to control
for the effects of text in opinion evaluation, and we provide a simple and
natural mathematical model consistent with our findings. Our analysis also
allows us to distinguish among the predictions of competing theories from
sociology and social psychology, and to discover unexpected differences in the
collective opinion-evaluation behavior of user populations from different
countries.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 01:59:21 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Danescu-Niculescu-Mizil",
"Cristian",
""
],
[
"Kossinets",
"Gueorgi",
""
],
[
"Kleinberg",
"Jon",
""
],
[
"Lee",
"Lillian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0906.3765 | Hunter Monroe | Hunter Monroe | Speedup for Natural Problems and Noncomputability | 8 pages | Theor. Comput. Sci. 412 (2011) 478-481 | 10.1016/j.tcs.2010.09.029 | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A resource-bounded version of the statement "no algorithm recognizes all
non-halting Turing machines" is equivalent to an infinitely often (i.o.)
superpolynomial speedup for the time required to accept any coNP-complete
language and also equivalent to a superpolynomial speedup in proof length in
propositional proof systems for tautologies, each of which implies P!=NP. This
suggests a correspondence between the properties 'has no algorithm at all' and
'has no best algorithm' which seems relevant to open problems in computational
and proof complexity.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 02:58:26 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Sep 2012 18:57:03 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Sep 2012 00:33:41 GMT"
}
]
| 2012-09-24T00:00:00 | [
[
"Monroe",
"Hunter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.3768 | R Doomun | Srdjan Stankovic, Dejan Simic | Defense Strategies Against Modern Botnets | 7 pages, International Journal of Computer Science and Information
Security | IJCSIS, June 2009, Vol. 2 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Botnets are networks of compromised computers with malicious code which are
remotely controlled and which are used for starting distributed denial of
service (DDoS) attacks, sending enormous number of e-mails (SPAM) and other
sorts of attacks. Defense against modern Botnets is a real challenge. This
paper offers several strategies for defense against Botnets with a list and
description of measures and activities which should be carried out in order to
establish successful defense. The paper also offers parallel preview of the
strategies with their advantages and disadvantages considered in accordance
with various criteria.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 02:43:46 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jun 2009 08:01:23 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Stankovic",
"Srdjan",
""
],
[
"Simic",
"Dejan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.3769 | R Doomun | C. H. Liu, Y. F. Lin, Jason J. Y. Chen | Using Agent to Coordinate Web Services | 7 pages, International Journal of Computer Science and Information
Security | IJCSIS, June 2009, Vol. 2 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traditionally, agent and web service are two separate research areas. We
figure that, through agent communication, agent is suitable to coordinate web
services. However, there exist agent communication problems due to the lack of
uniform, cross-platform vocabulary. Fortunately, ontology defines a vocabulary.
We thus propose a new agent communication layer and present the web ontology
language (OWL)-based operational ontologies that provides a declarative
description. It can be accessed by various engines to facilitate agent
communication. Further, in our operational ontologies, we define the mental
attitudes of agents that can be shared among other agents. Our architecture
enhanced the 3APL agent platform, and it is implemented as an agent
communication framework. Finally, we extended the framework to be compatible
with the web ontology language for service (OWL-S), and then develop a movie
recommendation system with four OWL-S semantic web services on the framework.
The benefits of this work are: 1) dynamic web service coordination, 2)
ontological reasoning through uniform representation, namely, the declarative
description, and 3) easy reuse and extension of both ontology and engine
through extending ontology.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 02:46:20 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Liu",
"C. H.",
""
],
[
"Lin",
"Y. F.",
""
],
[
"Chen",
"Jason J. Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.3770 | R Doomun | G. M. Atiqur Rahaman, Md. Mobarak Hossain | Automatic Defect Detection and Classification Technique from Image: A
Special Case Using Ceramic Tiles | 9 pages, International Journal of Computer Science and Information
Security | IJCSIS, June 2009, Vol. 1 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quality control is an important issue in the ceramic tile industry. On the
other hand maintaining the rate of production with respect to time is also a
major issue in ceramic tile manufacturing. Again, price of ceramic tiles also
depends on purity of texture, accuracy of color, shape etc. Considering this
criteria, an automated defect detection and classification technique has been
proposed in this report that can have ensured the better quality of tiles in
manufacturing process as well as production rate. Our proposed method plays an
important role in ceramic tiles industries to detect the defects and to control
the quality of ceramic tiles. This automated classification method helps us to
acquire knowledge about the pattern of defect within a very short period of
time and also to decide about the recovery process so that the defected tiles
may not be mixed with the fresh tiles.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 03:00:37 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Rahaman",
"G. M. Atiqur",
""
],
[
"Hossain",
"Md. Mobarak",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.3771 | R Doomun | Abd El Naser A. Mohammed, Ahmed Nabih Zaki Rashed, Gaber E. S. M. El
Abyad, Abd El Fattah A. Saad | High Transmission Bit Rate of A thermal Arrayed Waveguide Grating (AWG)
Module in Passive Optical Networks | 9 pages, International Journal of Computer Science and Information
Security | IJCSIS, May 2009, Vol. 1 | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the present paper, high transmission bit rate of a thermal arrayed
waveguide grating (AWG) which is composed of lithium niobate
(LiNbO3)/polymethyl metha acrylate (PMMA) hybrid materials on a silicon
substrate in Passive Optical Networks (PONs) has parametrically analyzed and
investigated over wide range of the affecting parameters. We have theoretically
investigated the temperature dependent wavelength shift of the arrayed
waveguide grating (AWG) depends on the refractive-indices of the materials and
the size of the waveguide. A thermalization of the AWG can be realized by
selecting proper values of the material and structural parameters of the
device. Moreover, we have analyzed the data transmission bit rate of a thermal
AWG in passsive optical networks (PONs) based on Maximum Time Division
Multiplexing (MTDM) technique.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 03:06:35 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Mohammed",
"Abd El Naser A.",
""
],
[
"Rashed",
"Ahmed Nabih Zaki",
""
],
[
"Abyad",
"Gaber E. S. M. El",
""
],
[
"Saad",
"Abd El Fattah A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.3772 | R Doomun | Baolong Liu, Joan Lu, Jim Yip | XML Data Integrity Based on Concatenated Hash Function | 10 pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS, May 2009, Vol. 1 | null | null | cs.SE cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Data integrity is the fundamental for data authentication. A major problem
for XML data authentication is that signed XML data can be copied to another
document but still keep signature valid. This is caused by XML data integrity
protecting. Through investigation, the paper discovered that besides data
content integrity, XML data integrity should also protect element location
information, and context referential integrity under fine-grained security
situation. The aim of this paper is to propose a model for XML data integrity
considering XML data features. The paper presents an XML data integrity model
named as CSR (content integrity, structure integrity, context referential
integrity) based on a concatenated hash function. XML data content integrity is
ensured using an iterative hash process, structure integrity is protected by
hashing an absolute path string from root node, and context referential
integrity is ensured by protecting context-related elements. Presented XML data
integrity model can satisfy integrity requirements under situation of
fine-grained security, and compatible with XML signature. Through evaluation,
the integrity model presented has a higher efficiency on digest
value-generation than the Merkle hash tree-based integrity model for XML data.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 03:10:16 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Liu",
"Baolong",
""
],
[
"Lu",
"Joan",
""
],
[
"Yip",
"Jim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.3778 | Dilip Sarwate | Dilip V. Sarwate and Zhiyuan Yan | Modified Euclidean Algorithms for Decoding Reed-Solomon Codes | This paper is a corrected version of a paper with the same title that
will appear in the Proceedings of the 2009 IEEE International Symposium on
Information Theory. The major change is in Algorithm II of Section IV | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The extended Euclidean algorithm (EEA) for polynomial greatest common
divisors is commonly used in solving the key equation in the decoding of
Reed-Solomon (RS) codes, and more generally in BCH decoding. For this
particular application, the iterations in the EEA are stopped when the degree
of the remainder polynomial falls below a threshold. While determining the
degree of a polynomial is a simple task for human beings, hardware
implementation of this stopping rule is more complicated. This paper describes
a modified version of the EEA that is specifically adapted to the RS decoding
problem. This modified algorithm requires no degree computation or comparison
to a threshold, and it uses a fixed number of iterations. Another advantage of
this modified version is in its application to the errors-and-erasures decoding
problem for RS codes where significant hardware savings can be achieved via
seamless computation.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 19:12:02 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Sarwate",
"Dilip V.",
""
],
[
"Yan",
"Zhiyuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3782 | Ashwin Ganesan | Ashwin Ganesan | On some sufficient conditions for distributed Quality-of-Service support
in wireless networks | Submitted to First Workshop on Applications of Graph Theory in
Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC 09) | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given a wireless network where some pairs of communication links interfere
with each other, we study sufficient conditions for determining whether a given
set of minimum bandwidth Quality of Service (QoS) requirements can be
satisfied. We are especially interested in algorithms which have low
communication overhead and low processing complexity. The interference in the
network is modeled using a conflict graph whose vertices are the communication
links in the network. Two links are adjacent in this graph if and only if they
interfere with each other due to being in the same vicinity and hence cannot be
simultaneously active. The problem of scheduling the transmission of the
various links is then essentially a fractional, weighted vertex coloring
problem, for which upper bounds on the fractional chromatic number are sought
using only localized information. We present some distributed algorithms for
this problem, and discuss their worst-case performance. These algorithms are
seen to be within a bounded factor away from optimal for some well known
classes of networks and interference models.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 06:45:17 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Ganesan",
"Ashwin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3815 | Wlodzimierz Drabent | W. Drabent, J. Maluszynski | Hybrid Rules with Well-Founded Semantics | null | Knowledge and Information Systems, 25:137-168, 2010 | 10.1007/s10115-010-0300-5 | null | cs.LO cs.AI cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A general framework is proposed for integration of rules and external first
order theories. It is based on the well-founded semantics of normal logic
programs and inspired by ideas of Constraint Logic Programming (CLP) and
constructive negation for logic programs. Hybrid rules are normal clauses
extended with constraints in the bodies; constraints are certain formulae in
the language of the external theory. A hybrid program is a pair of a set of
hybrid rules and an external theory. Instances of the framework are obtained by
specifying the class of external theories, and the class of constraints. An
example instance is integration of (non-disjunctive) Datalog with ontologies
formalized as description logics.
The paper defines a declarative semantics of hybrid programs and a
goal-driven formal operational semantics. The latter can be seen as a
generalization of SLS-resolution. It provides a basis for hybrid
implementations combining Prolog with constraint solvers. Soundness of the
operational semantics is proven. Sufficient conditions for decidability of the
declarative semantics, and for completeness of the operational semantics are
given.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 16:09:24 GMT"
}
]
| 2010-12-08T00:00:00 | [
[
"Drabent",
"W.",
""
],
[
"Maluszynski",
"J.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.3816 | Alexander Kocian | E. Panayirci, A. Kocian, H. V. Poor, and M. Ruggieri | A Monte-Carlo Implementation of the SAGE Algorithm for Joint Soft
Multiuser and Channel Parameter Estimation | 5 pages, 3 figures, 10th IEEE International Workshop on Signal
Processing Advances in Wireless Communications (SPAWC) 2009 | null | 10.1109/SPAWC.2009.5161876 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An efficient, joint transmission delay and channel parameter estimation
algorithm is proposed for uplink asynchronous direct-sequence code-division
multiple access (DS-CDMA) systems based on the space-alternating generalized
expectation maximization (SAGE) framework. The marginal likelihood of the
unknown parameters, averaged over the data sequence, as well as the expectation
and maximization steps of the SAGE algorithm are derived analytically. To
implement the proposed algorithm, a Markov Chain Monte Carlo (MCMC) technique,
called Gibbs sampling, is employed to compute the {\em a posteriori}
probabilities of data symbols in a computationally efficient way. Computer
simulations show that the proposed algorithm has excellent estimation
performance. This so-called MCMC-SAGE receiver is guaranteed to converge in
likelihood.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 16:29:53 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Panayirci",
"E.",
""
],
[
"Kocian",
"A.",
""
],
[
"Poor",
"H. V.",
""
],
[
"Ruggieri",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3821 | Deniz Gunduz | D. Gunduz, O. Simeone, A. Goldsmith, H. V. Poor and S. Shamai (Shitz) | Relaying Simultaneous Multicast Messages | This paper was presented at the IEEE Information Theory Workshop,
Volos, Greece, June 2009 | null | 10.1109/ITWNIT.2009.5158539 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of multicasting multiple messages with the help of a relay, which
may also have an independent message of its own to multicast, is considered. As
a first step to address this general model, referred to as the compound
multiple access channel with a relay (cMACr), the capacity region of the
multiple access channel with a "cognitive" relay is characterized, including
the cases of partial and rate-limited cognition. Achievable rate regions for
the cMACr model are then presented based on decode-and-forward (DF) and
compress-and-forward (CF) relaying strategies. Moreover, an outer bound is
derived for the special case in which each transmitter has a direct link to one
of the receivers while the connection to the other receiver is enabled only
through the relay terminal. Numerical results for the Gaussian channel are also
provided.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 17:55:09 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Gunduz",
"D.",
"",
"Shitz"
],
[
"Simeone",
"O.",
"",
"Shitz"
],
[
"Goldsmith",
"A.",
"",
"Shitz"
],
[
"Poor",
"H. V.",
"",
"Shitz"
],
[
"Shamai",
"S.",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3832 | Yuriy Shiyanovskii | Y. Shiyanovskii, F. Wolff, C. Papachristou, D. Weyer, W. Clay | Hardware Trojan by Hot Carrier Injection | 6 pages, 5 figures | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discusses how hot carrier injection (HCI) can be exploited to
create a trojan that will cause hardware failures. The trojan is produced not
via additional logic circuitry but by controlled scenarios that maximize and
accelerate the HCI effect in transistors. These scenarios range from
manipulating the manufacturing process to varying the internal voltage
distribution. This new type of trojan is difficult to test due to its gradual
hardware degradation mechanism. This paper describes the HCI effect, detection
techniques and discusses the possibility for maliciously induced HCI trojans.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 22:56:19 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Shiyanovskii",
"Y.",
""
],
[
"Wolff",
"F.",
""
],
[
"Papachristou",
"C.",
""
],
[
"Weyer",
"D.",
""
],
[
"Clay",
"W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0906.3834 | Yuriy Shiyanovskii | Y. Shiyanovskii, F. Wolff, C. Papachristou, D. Weyer, W. Clay | Exploiting Semiconductor Properties for Hardware Trojans | 6 pages, 1 figure | null | null | null | cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper discusses the possible introduction of hidden reliability defects
during CMOS foundry fabrication processes that may lead to accelerated wearout
of the devices. These hidden defects or hardware Trojans can be created by
deviation from foundry design rules and processing parameters. The Trojans are
produced by exploiting time-based wearing mechanisms (HCI, NBTI, TDDB and EM)
and/or condition-based triggers (ESD, Latchup and Softerror). This class of
latent damage is difficult to test due to its gradual degradation nature. The
paper describes life-time expectancy results for various Trojan induced
scenarios. Semiconductor properties, processing and design parameters critical
for device reliability and Trojan creation are discussed.
| [
{
"version": "v1",
"created": "Sat, 20 Jun 2009 23:12:45 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Shiyanovskii",
"Y.",
""
],
[
"Wolff",
"F.",
""
],
[
"Papachristou",
"C.",
""
],
[
"Weyer",
"D.",
""
],
[
"Clay",
"W.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0906.3843 | R Doomun | M. A. Faizal, M. Mohd Zaki, S. Shahrin, Y. Robiah, S. Siti Rahayu, B.
Nazrulazhar | Threshold Verification Technique for Network Intrusion Detection System | 8 Pages, International Journal of Computer Science and Information
Security | IJCSIS Vol.2, No.1, June 2009 | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Internet has played a vital role in this modern world, the possibilities and
opportunities offered are limitless. Despite all the hype, Internet services
are liable to intrusion attack that could tamper the confidentiality and
integrity of important information. An attack started with gathering the
information of the attack target, this gathering of information activity can be
done as either fast or slow attack. The defensive measure network administrator
can take to overcome this liability is by introducing Intrusion Detection
Systems (IDSs) in their network. IDS have the capabilities to analyze the
network traffic and recognize incoming and on-going intrusion. Unfortunately
the combination of both modules in real time network traffic slowed down the
detection process. In real time network, early detection of fast attack can
prevent any further attack and reduce the unauthorized access on the targeted
machine. The suitable set of feature selection and the correct threshold value,
add an extra advantage for IDS to detect anomalies in the network. Therefore
this paper discusses a new technique for selecting static threshold value from
a minimum standard features in detecting fast attack from the victim
perspective. In order to increase the confidence of the threshold value the
result is verified using Statistical Process Control (SPC). The implementation
of this approach shows that the threshold selected is suitable for identifying
the fast attack in real time.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 04:06:42 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Faizal",
"M. A.",
""
],
[
"Zaki",
"M. Mohd",
""
],
[
"Shahrin",
"S.",
""
],
[
"Robiah",
"Y.",
""
],
[
"Rahayu",
"S. Siti",
""
],
[
"Nazrulazhar",
"B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.3846 | Michael Schapira | Yi Wang, Michael Schapira, Jennifer Rexford | Neighbor-Specific BGP: More Flexible Routing Policies While Improving
Global Stability | null | null | null | null | cs.NI cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Please Note: This document was written to summarize and facilitate discussion
regarding (1) the benefits of changing the way BGP selects routes to selecting
the most preferred route allowed by export policies, or more generally, to
selecting BGP routes on a per-neighbor basis, (2) the safety condition that
guarantees global routing stability under the Neighbor-Specific BGP model, and
(3) ways of deploying this model in practice. A paper presenting the formal
model and proof of the stability conditions was published at SIGMETRICS 2009
and is available online.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 04:58:23 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Wang",
"Yi",
""
],
[
"Schapira",
"Michael",
""
],
[
"Rexford",
"Jennifer",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.3849 | Yaming Yu | Yaming Yu | Squeezing the Arimoto-Blahut algorithm for faster convergence | null | IEEE Trans. Inform. Theory 56 (2010) 3149-3157 | 10.1109/TIT.2010.2048452 | null | cs.IT math.IT stat.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Arimoto--Blahut algorithm for computing the capacity of a discrete
memoryless channel is revisited. A so-called ``squeezing'' strategy is used to
design algorithms that preserve its simplicity and monotonic convergence
properties, but have provably better rates of convergence.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 19:11:49 GMT"
}
]
| 2010-06-16T00:00:00 | [
[
"Yu",
"Yaming",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
}
]
|
0906.3853 | Nelma Moreira | Marco Almeida, Nelma Moreira and Rog\'erio Reis | Aspects of enumeration and generation with a string automata
representation | null | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In general, the representation of combinatorial objects is decisive for the
feasibility of several enumerative tasks. In this work, we show how a (unique)
string representation for (complete) initially-connected deterministic automata
(ICDFAs) with n states over an alphabet of k symbols can be used for counting,
exact enumeration, sampling and optimal coding, not only the set of ICDFAs but,
to some extent, the set of regular languages. An exact generation algorithm can
be used to partition the set of ICDFAs in order to parallelize the counting of
minimal automata (and thus of regular languages). We present also a uniform
random generator for ICDFAs that uses a table of pre-calculated values. Based
on the same table it is also possible to obtain an optimal coding for ICDFAs.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 09:25:39 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Almeida",
"Marco",
""
],
[
"Moreira",
"Nelma",
""
],
[
"Reis",
"Rogério",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.3857 | Isolde Adler | Isolde Adler | Games for width parameters and monotonicity | null | null | null | null | cs.DM cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce a search game for two players played on a "scenario" consisting
of a ground set together with a collection of feasible partitions. This general
setting allows us to obtain new characterisations of many width parameters such
as rank-width and carving-width of graphs, matroid tree-width and
GF(4)-rank-width. We show that the monotone game variant corresponds to a tree
decomposition of the ground set along feasible partitions. Our framework also
captures many other decompositions into "simple" subsets of the ground set,
such as decompositions into planar subgraphs.
Within our general framework, we take a step towards characterising monotone
search games. We exhibit a large class of "monotone" scenarios, i.e. of
scenarios where the game and its monotone variant coincide. As a consequence,
determining the winner is in NP for these games. This result implies
monotonicity for all our search games, that are equivalent to branch-width of a
submodular function.
Finally, we include a proof showing that the matroid tree-width of a graphic
matroid is not larger than the tree-width of the corresponding graph. This
proof is considerably shorter than the original proof and it is purely graph
theoretic.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 10:26:44 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Adler",
"Isolde",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.3864 | Oren Somekh | O. Somekh, O. Simeone, H. V. Poor, and S. Shamai (Shitz) | The Two-Tap Input-Erasure Gaussian Channel and its Application to
Cellular Communications | Presented at the Forty-Sixth Annual Allerton Conference on
Communication, Control, and Computing, Sep. 2008, Monticello, Illinois | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the input-erasure Gaussian channel. In contrast to the
output-erasure channel where erasures are applied to the output of a linear
time-invariant (LTI) system, here erasures, known to the receiver, are applied
to the inputs of the LTI system. Focusing on the case where the input symbols
are independent and identically distributed (i.i.d)., it is shown that the two
channels (input- and output-erasure) are equivalent. Furthermore, assuming that
the LTI system consists of a two-tap finite impulse response (FIR) filter, and
using simple properties of tri-diagonal matrices, an achievable rate expression
is presented in the form of an infinite sum. The results are then used to study
the benefits of joint multicell processing (MCP) over single-cell processing
(SCP) in a simple linear cellular uplink, where each mobile terminal is
received by only the two nearby base-stations (BSs). Specifically, the analysis
accounts for ergodic shadowing that simultaneously blocks the mobile terminal
(MT) signal from being received by the two BS. It is shown that the resulting
ergodic per-cell capacity with optimal MCP is equivalent to that of the two-tap
input-erasure channel. Finally, the same cellular uplink is addressed by
accounting for dynamic user activity, which is modelled by assuming that each
MT is randomly selected to be active or to remain silent throughout the whole
transmission block. For this alternative model, a similar equivalence results
to the input-erasure channel are reported.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 11:54:54 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Somekh",
"O.",
"",
"Shitz"
],
[
"Simeone",
"O.",
"",
"Shitz"
],
[
"Poor",
"H. V.",
"",
"Shitz"
],
[
"Shamai",
"S.",
"",
"Shitz"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3883 | Mustafa Cenk Gursoy | Mustafa Cenk Gursoy and Qingyun Wang | Diversity Analysis of Peaky FSK Signaling in Fading Channels | to appear in the IEEE Transactions on Wireless Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Error performance of noncoherent detection of on-off frequency shift keying
(OOFSK) modulation over fading channels is analyzed when the receiver is
equipped with multiple antennas. The analysis is conducted for two cases: 1)
the case in which the receiver has the channel distribution knowledge only; and
2) the case in which the receiver perfectly knows the fading magnitudes. For
both cases, the maximum a posteriori probability (MAP) detection rule is
derived and analytical probability of error expressions are obtained. Numerical
and simulation results indicate that for sufficiently low duty cycle values,
lower error probabilities with respect to FSK signaling are achieved.
Equivalently, when compared to FSK modulation, OOFSK with low duty cycle
requires less energy to achieve the same probability of error, which renders
this modulation a more energy efficient transmission technique. Also, through
numerical results, the impact of number of antennas, antenna correlation, duty
cycle values, and unknown channel fading on the performance are investigated.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 18:00:30 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Gursoy",
"Mustafa Cenk",
""
],
[
"Wang",
"Qingyun",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3887 | Mustafa Cenk Gursoy | Qing Chen and Mustafa Cenk Gursoy | Energy-Efficient Modulation Design for Reliable Communication in
Wireless Networks | appeared at CISS 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we have considered the optimization of the $M$-ary quadrature
amplitude modulation (MQAM) constellation size to minimize the bit energy
consumption under average bit error rate (BER) constraints. In the computation
of the energy expenditure, the circuit, transmission, and retransmission
energies are taken into account. A combined log-normal shadowing and Rayleigh
fading model is employed to model the wireless channel. The link reliabilities
and retransmission probabilities are determined through the outage
probabilities under log-normal shadowing effects. Both single-hop and multi-hop
transmissions are considered. Through numerical results, the optimal
constellation sizes are identified. Several interesting observations with
practical implications are made. It is seen that while large constellations are
preferred at small transmission distances, constellation size should be
decreased as the distance increases. Similar trends are observed in both fixed
and variable transmit power scenarios. We have noted that variable power
schemes can attain higher energy-efficiencies. The analysis of energy-efficient
modulation design is also conducted in multi-hop linear networks. In this case,
the modulation size and routing paths are jointly optimized, and the analysis
of both the bit energy and delay experienced in the linear network is provided.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 18:16:43 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Chen",
"Qing",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3888 | Mustafa Cenk Gursoy | Sami Akin and Mustafa Cenk Gursoy | Effective Capacity Analysis of Cognitive Radio Channels for Quality of
Service Provisioning | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, cognitive transmission under quality of service (QoS)
constraints is studied. In the cognitive radio channel model, it is assumed
that the secondary transmitter sends the data at two different average power
levels, depending on the activity of the primary users, which is determined by
channel sensing performed by the secondary users. A state-transition model is
constructed for this cognitive transmission channel. Statistical limitations on
the buffer lengths are imposed to take into account the QoS constraints. The
maximum throughput under these statistical QoS constraints is identified by
finding the effective capacity of the cognitive radio channel. This analysis is
conducted for fixed-power/fixed-rate, fixed-power/variable-rate, and
variable-power/variable-rate transmission schemes under different assumptions
on the availability of channel side information (CSI) at the transmitter. The
impact upon the effective capacity of several system parameters, including
channel sensing duration, detection threshold, detection and false alarm
probabilities, QoS parameters, and transmission rates, is investigated. The
performances of fixed-rate and variable-rate transmission methods are compared
in the presence of QoS limitations. It is shown that variable schemes
outperform fixed-rate transmission techniques if the detection probabilities
are high. Performance gains through adapting the power and rate are quantified
and it is shown that these gains diminish as the QoS limitations become more
stringent.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 18:22:57 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Akin",
"Sami",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3889 | Mustafa Cenk Gursoy | Deli Qiao, Mustafa Cenk Gursoy, and Senem Velipasalar | Energy Efficiency in the Low-SNR Regime under Queueing Constraints and
Channel Uncertainty | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Energy efficiency of fixed-rate transmissions is studied in the presence of
queueing constraints and channel uncertainty. It is assumed that neither the
transmitter nor the receiver has channel side information prior to
transmission. The channel coefficients are estimated at the receiver via
minimum mean-square-error (MMSE) estimation with the aid of training symbols.
It is further assumed that the system operates under statistical queueing
constraints in the form of limitations on buffer violation probabilities. The
optimal fraction of power allocated to training is identified. Spectral
efficiency--bit energy tradeoff is analyzed in the low-power and wideband
regimes by employing the effective capacity formulation. In particular, it is
shown that the bit energy increases without bound in the low-power regime as
the average power vanishes. A similar conclusion is reached in the wideband
regime if the number of noninteracting subchannels grow without bound with
increasing bandwidth. On the other hand, it is proven that if the number of
resolvable independent paths and hence the number of noninteracting subchannels
remain bounded as the available bandwidth increases, the bit energy diminishes
to its minimum value in the wideband regime. For this case, expressions for the
minimum bit energy and wideband slope are derived. Overall, energy costs of
channel uncertainty and queueing constraints are identified, and the impact of
multipath richness and sparsity is determined.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 18:33:24 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Qiao",
"Deli",
""
],
[
"Gursoy",
"Mustafa Cenk",
""
],
[
"Velipasalar",
"Senem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3895 | Igor Margasi\'nski Ph.D. | Igor Margasinski | A Parallelism-Based Approach to Network Anonymization | 16 pages, 9 figures | null | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Considering topologies of anonymous networks we used to organizing anonymous
communication into hard to trace paths hiding its origin or destination. In
anonymity the company is crucial, however the serial transportation imposes a
costly tradeoff between a level of privacy and a speed of communication.
This paper introduces a framework of a novel architecture for anonymous
networks that hides initiators of communications by parallelization of
anonymous links. The new approach, which is based on the grounds of the
anonymous P2P network called P2Priv, does not require content forwarding via a
chain of proxy nodes to assure high degree of anonymity. Contrary to P2Priv,
the new architecture can be suited to anonymization of various network
communications, including anonymous access to distributed as well as
client-server services. In particular, it can be considered as an anonymization
platform for these network applications where both privacy and low delays are
required.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 20:55:13 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Margasinski",
"Igor",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.3896 | Panos Giannopoulos | Panos Giannopoulos, Christian Knauer, Gunter Rote, Daniel Werner | Fixed-parameter tractability and lower bounds for stabbing problems | Based on the MSc. Thesis of Daniel Werner, Free University Berlin,
Berlin, Germany | Computational Geometry, Theory and Applications 46 (2013),
839-860. Special issue for the 25th European Workshop on Computational
Geometry (EuroCG'09) | 10.1016/j.comgeo.2011.06.005 | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the following general stabbing problem from a parameterized
complexity point of view: Given a set $\mathcal S$ of $n$ translates of an
object in $\Rd$, find a set of $k$ lines with the property that every object in
$\mathcal S$ is ''stabbed'' (intersected) by at least one line.
We show that when $S$ consists of axis-parallel unit squares in $\Rtwo$ the
(decision) problem of stabbing $S$ with axis-parallel lines is W[1]-hard with
respect to $k$ (and thus, not fixed-parameter tractable unless FPT=W[1]) while
it becomes fixed-parameter tractable when the squares are disjoint. We also
show that the problem of stabbing a set of disjoint unit squares in $\Rtwo$
with lines of arbitrary directions is W[1]--hard with respect to $k$. Several
generalizations to other types of objects and lines with arbitrary directions
are also presented. Finally, we show that deciding whether a set of unit balls
in $\Rd$ can be stabbed by one line is W[1]--hard with respect to the dimension
$d$.
| [
{
"version": "v1",
"created": "Sun, 21 Jun 2009 20:50:58 GMT"
}
]
| 2015-02-18T00:00:00 | [
[
"Giannopoulos",
"Panos",
""
],
[
"Knauer",
"Christian",
""
],
[
"Rote",
"Gunter",
""
],
[
"Werner",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.3911 | Serguei Mokhov | Serguei A. Mokhov and Joey Paquet | Using the General Intensional Programming System (GIPSY) for Evaluation
of Higher-Order Intensional Logic (HOIL) Expressions | 14 pages; 8 figures | null | 10.1109/SERA.2010.23 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The General Intensional Programming System (GIPSY) has been built around the
Lucid family of intensional programming languages that rely on the higher-order
intensional logic (HOIL) to provide context-oriented multidimensional reasoning
of intensional expressions. HOIL combines functional programming with various
intensional logics to allow explicit context expressions to be evaluated as
first-class values that can be passed as parameters to functions and return as
results with an appropriate set of operators defined on contexts. GIPSY's
frameworks are implemented in Java as a collection of replaceable components
for the compilers of various Lucid dialects and the demand-driven eductive
evaluation engine that can run distributively. GIPSY provides support for
hybrid programming models that couple intensional and imperative languages for
a variety of needs. Explicit context expressions limit the scope of evaluation
of math expressions (effectively a Lucid program is a mathematics or physics
expression constrained by the context) in tensor physics, regular math in
multiple dimensions, etc., and for cyberforensic reasoning as one of the
use-cases of interest. Thus, GIPSY is a support testbed for HOIL-based
languages some of which enable such reasoning, as in formal cyberforensic case
analysis with event reconstruction. In this paper we discuss the GIPSY
architecture, its evaluation engine and example use-cases.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 03:05:48 GMT"
}
]
| 2010-07-09T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
],
[
"Paquet",
"Joey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.3916 | EPTCS | Fabio Patrizi | An Introduction to Simulation-Based Techniques for Automated Service
Composition | null | EPTCS 2, 2009, pp. 37-49 | 10.4204/EPTCS.2.4 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This work is an introduction to the author's contributions to the SOC area,
resulting from his PhD research activity. It focuses on the problem of
automatically composing a desired service, given a set of available ones and a
target specification. As for description, services are represented as
finite-state transition systems, so to provide an abstract account of their
behavior, seen as the set of possible conversations with external clients. In
addition, the presence of a finite shared memory is considered, that services
can interact with and which provides a basic form of communication. Rather than
describing technical details, we offer an informal overview of the whole work,
and refer the reader to the original papers, referenced throughout this work,
for all details.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 03:54:04 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Patrizi",
"Fabio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.3919 | Serguei Mokhov | Serguei A. Mokhov and Joey Paquet | A Type System Theory for Higher-Order Intensional Logic Support for
Variable Bindings in Hybrid Intensional-Imperative Programs in GIPSY | 12 pages, 1 table; 2 figures | null | null | null | cs.LO cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a type system for a platform called the General Intensional
Programming System (GIPSY), designed to support intensional programming
languages built upon intensional logic and their imperative counter-parts for
the intensional execution model. In GIPSY, the type system glues the static and
dynamic typing between intensional and imperative languages in its compiler and
run-time environments to support the intensional evaluation of expressions
written in various dialects of the intensional programming language Lucid. The
intensionality makes expressions to explicitly take into the account a
multidimensional context of evaluation with the context being a first-class
value that serves a number of applications that need the notion of context to
proceed. We describe and discuss the properties of such a type system and the
related type theory as well as particularities of the semantics, design and
implementation of the GIPSY type system.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 05:27:49 GMT"
}
]
| 2009-12-21T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
],
[
"Paquet",
"Joey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.3920 | EPTCS | Claudio Guidi, Fabrizio Montesi | Reasoning About a Service-oriented Programming Paradigm | null | EPTCS 2, 2009, pp. 67-81 | 10.4204/EPTCS.2.6 | null | cs.PL cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is about a new way for programming distributed applications: the
service-oriented one. It is a concept paper based upon our experience in
developing a theory and a language for programming services. Both the
theoretical formalization and the language interpreter showed us the evidence
that a new programming paradigm exists. In this paper we illustrate the basic
features it is characterized by.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 05:49:12 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Guidi",
"Claudio",
""
],
[
"Montesi",
"Fabrizio",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.3921 | EPTCS | Stefano Bistarelli, Paola Campli | Fairness as a QoS Measure for Web Services | null | EPTCS 2, 2009, pp. 115-127 | 10.4204/EPTCS.2.9 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Service Oriented Architectures (SOAs) are component-based architectures,
characterized by reusability, modularization and composition, usually offered
by HTTP (web services) and often equipped with a Quality of Services (QoS)
measure. In order to guarantee the fairness property to each client requesting
a service, we propose a fair version of the (Soft) Concurrent Constraint
language to deal with the negotiation phases of the Service Level Agreement
(SLA) protocol.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 06:08:14 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Bistarelli",
"Stefano",
""
],
[
"Campli",
"Paola",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.3923 | Daiki Koizumi | Daiki Koizumi, Toshiyasu Matsushima, and Shigeichi Hirasawa | Bayesian Forecasting of WWW Traffic on the Time Varying Poisson Model | 8 pages, 6 figures. This paper was published in Proceeding of The
2009 International Conference on Parallel and Distributed Processing
Techniques and Applications (PDPTA'09) in July, 2009. In version of v4,
research grants are included in acknowledgment | null | null | null | cs.NI cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Traffic forecasting from past observed traffic data with small calculation
complexity is one of important problems for planning of servers and networks.
Focusing on World Wide Web (WWW) traffic as fundamental investigation, this
paper would deal with Bayesian forecasting of network traffic on the time
varying Poisson model from a viewpoint from statistical decision theory. Under
this model, we would show that the estimated forecasting value is obtained by
simple arithmetic calculation and expresses real WWW traffic well from both
theoretical and empirical points of view.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 07:48:12 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Nov 2009 08:41:17 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Nov 2009 07:02:06 GMT"
},
{
"version": "v4",
"created": "Thu, 3 Dec 2009 02:15:11 GMT"
}
]
| 2009-12-03T00:00:00 | [
[
"Koizumi",
"Daiki",
""
],
[
"Matsushima",
"Toshiyasu",
""
],
[
"Hirasawa",
"Shigeichi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.3924 | EPTCS | L\'aszl\'o Kov\'acs, P\'eter M\'at\'etelki, Bal\'azs Pataki | Service-oriented Context-aware Framework | null | EPTCS 2, 2009, pp. 15-26 | 10.4204/EPTCS.2.2 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Location- and context-aware services are emerging technologies in mobile and
desktop environments, however, most of them are difficult to use and do not
seem to be beneficial enough. Our research focuses on designing and creating a
service-oriented framework that helps location- and context-aware,
client-service type application development and use. Location information is
combined with other contexts such as the users' history, preferences and
disabilities. The framework also handles the spatial model of the environment
(e.g. map of a room or a building) as a context. The framework is built on a
semantic backend where the ontologies are represented using the OWL description
language. The use of ontologies enables the framework to run inference tasks
and to easily adapt to new context types. The framework contains a
compatibility layer for positioning devices, which hides the technical
differences of positioning technologies and enables the combination of location
data of various sources.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 06:26:17 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Kovács",
"László",
""
],
[
"Mátételki",
"Péter",
""
],
[
"Pataki",
"Balázs",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.3925 | EPTCS | Kamran Taj Pathan, Stephan Reiff-Marganiec | Towards Activity Context using Software Sensors | null | EPTCS 2, 2009, pp. 27-35 | 10.4204/EPTCS.2.3 | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Service-Oriented Computing delivers the promise of configuring and
reconfiguring software systems to address user's needs in a dynamic way.
Context-aware computing promises to capture the user's needs and hence the
requirements they have on systems. The marriage of both can deliver ad-hoc
software solutions relevant to the user in the most current fashion. However,
here it is a key to gather information on the users' activity (that is what
they are doing). Traditionally any context sensing was conducted with hardware
sensors. However, software can also play the same role and in some situations
will be more useful to sense the activity of the user. Furthermore they can
make use of the fact that Service-oriented systems exchange information through
standard protocols. In this paper we discuss our proposed approach to sense the
activity of the user making use of software.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 06:33:35 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Pathan",
"Kamran Taj",
""
],
[
"Reiff-Marganiec",
"Stephan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.3926 | EPTCS | Stefano Bistarelli, Francesco Santini | Soft Constraints for Quality Aspects in Service Oriented Architectures | null | EPTCS 2, 2009, pp. 51-65 | 10.4204/EPTCS.2.5 | null | cs.AI cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose the use of Soft Constraints as a natural way to model Service
Oriented Architecture. In the framework, constraints are used to model
components and connectors and constraint aggregation is used to represent their
interactions. The "quality of a service" is measured and considered when
performing queries to service providers. Some examples consist in the levels of
cost, performance and availability required by clients. In our framework, the
QoS scores are represented by the softness level of the constraint and the
measure of complex (web) services is computed by combining the levels of the
components.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 06:37:02 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Bistarelli",
"Stefano",
""
],
[
"Santini",
"Francesco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.3930 | EPTCS | Dessislava Petrova-Antonova, Sylvia Ilieva | Towards a Unifying View of QoS-Enhanced Web Service Description and
Discovery Approaches | null | EPTCS 2, 2009, pp. 99-113 | 10.4204/EPTCS.2.8 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The number of web services increased vastly in the last years. Various
providers offer web services with the same functionality, so for web service
consumers it is getting more complicated to select the web service, which best
fits their requirements. That is why a lot of the research efforts point to
discover semantic means for describing web services taking into account not
only functional characteristics of services, but also the quality of service
(QoS) properties such as availability, reliability, response time, trust, etc.
This motivated us to research current approaches presenting complete solutions
for QoS enabled web service description, publication and discovery. In this
paper we present comparative analysis of these approaches according to their
common principals. Based on such analysis we extract the essential aspects from
them and propose a pattern for the development of QoS-aware service-oriented
architectures.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 06:56:40 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Petrova-Antonova",
"Dessislava",
""
],
[
"Ilieva",
"Sylvia",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.3946 | Xueliang Li | Xueliang Li, Yuefang Sun | The rainbow $k$-connectivity of two classes of graphs | 9 pages | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A path in an edge-colored graph $G$, where adjacent edges may be colored the
same, is called a rainbow path if no two edges of $G$ are colored the same. For
a $\kappa$-connected graph $G$ and an integer $k$ with $1\leq k\leq \kappa$,
the rainbow $k$-connectivity $rc_k(G)$ of $G$ is defined as the minimum integer
$j$ for which there exists a $j$-edge-coloring of $G$ such that every two
distinct vertices of $G$ are connected by $k$ internally disjoint rainbow
paths. Let $G$ be a complete $(\ell+1)$-partite graph with $\ell$ parts of size
$r$ and one part of size $p$ where $0\leq p <r$ (in the case $p=0$, $G$ is a
complete $\ell$-partite graph with each part of size $r$). This paper is to
investigate the rainbow $k$-connectivity of $G$. We show that for every pair of
integers $k\geq 2$ and $r\geq 1$, there is an integer $f(k,r)$ such that if
$\ell\geq f(k,r)$, then $rc_k(G)=2$. As a consequence, we improve the upper
bound of $f(k)$ from $(k+1)^2$ to $ck^{{3/2}}+C$, where $0<c<1$,
$C=o(k^{{3/2}})$, and $f(k)$ is the integer such that if $n \geq f(k)$ then
$rc_k(K_n)=2$.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 08:20:23 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Li",
"Xueliang",
""
],
[
"Sun",
"Yuefang",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.3956 | R Doomun | Joe Prathap P M., V. Vasudevan | Analysis of the various key management algorithms and new proposal in
the secure multicast communications | 8 pages, International Journal of Computer Science and Information
Security | IJCSIS 2009, June Issue, Vol.2. No.1 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | With the evolution of the Internet, multicast communications seem
particularly well adapted for large scale commercial distribution applications,
for example, the pay TV channels and secure videoconferencing. Key management
for multicast remains an open topic in secure Communications today. Key
management mainly has to do with the distribution and update of keying material
during the group life. Several key tree based approach has been proposed by
various authors to create and distribute the multicast group key in effective
manner. There are different key management algorithms that facilitate efficient
distribution and rekeying of the group key. These protocols normally add
communication overhead as well as computation overhead at the group key
controller and at the group members. This paper explores the various algorithms
along with the performances and derives an improved method.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 08:55:33 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"M.",
"Joe Prathap P",
""
],
[
"Vasudevan",
"V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.3966 | R Doomun | K Pradheep Kumar, A P Shanthi | Application of non-uniform laxity to EDF for aperiodic tasks to improve
task utilisation on multicore platforms | 7 pages, Journal of Computer Science and Information Security | IJCSIS 2009, June Issue, Vol. 2, No. 1 | null | null | cs.PF cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes a new scheduler applying the concept of non-uniform
laxity to Earliest deadline first (EDF) approach for aperiodic tasks. This
scheduler improves task utilisation (Execution time / deadline) and also
increases the number of tasks that are being scheduled. Laxity is a measure of
the spare time permitted for the task before it misses its deadline, and is
computed using the expression (deadline - (current time + execution time)).
Weight decides the priority of the task and is defined by the expression
(quantum slice time / allocated time)*total core time for the task. Quantum
slice time is the time actually used, allocated time is the time allocated by
the scheduler, and total core time is the time actually reserved by the core
for execution of one quantum of the task. Non-uniform laxity enables scheduling
of tasks that have higher priority before the normal execution of other tasks
and is computed by multiplying the weight of the task with its laxity. The
algorithm presented in the paper has been simulated on Cheddar, a real time
scheduling tool and also on SESC, an architectural simulator for multicore
platforms, for upto 5000 random task sets, and upto 5000 cores. This scheduler
improves task utilisation by 35% and the number of tasks being scheduled by
36%, compared to conventional EDF.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 09:33:17 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Kumar",
"K Pradheep",
""
],
[
"Shanthi",
"A P",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.3988 | Sinan Gezici | Sinan Gezici, Hasari Celebi, Huseyin Arslan, H. Vincent Poor | Theoretical Limits on Time Delay Estimation for Ultra-Wideband Cognitive
Radios | IEEE ICUWB 2008 | null | 10.1109/ICUWB.2008.4653380 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, theoretical limits on time delay estimation are studied for
ultra-wideband (UWB) cognitive radio systems. For a generic UWB spectrum with
dispersed bands, the Cramer-Rao lower bound (CRLB) is derived for unknown
channel coefficients and carrier-frequency offsets (CFOs). Then, the effects of
unknown channel coefficients and CFOs are investigated for linearly and
non-linearly modulated training signals by obtaining specific CRLB expressions.
It is shown that for linear modulations with a constant envelope, the effects
of the unknown parameters can be mitigated. Finally, numerical results, which
support the theoretical analysis, are presented.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 12:31:02 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Gezici",
"Sinan",
""
],
[
"Celebi",
"Hasari",
""
],
[
"Arslan",
"Huseyin",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.3994 | Emmanuel Beffara | Emmanuel Beffara (IML) | Quantitative testing semantics for non-interleaving | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a non-interleaving denotational semantics for the
?-calculus. The basic idea is to define a notion of test where the outcome is
not only whether a given process passes a given test, but also in how many
different ways it can pass it. More abstractly, the set of possible outcomes
for tests forms a semiring, and the set of process interpretations appears as a
module over this semiring, in which basic syntactic constructs are affine
operators. This notion of test leads to a trace semantics in which traces are
partial orders, in the style of Mazurkiewicz traces, extended with readiness
information. Our construction has standard may- and must-testing as special
cases.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 13:02:27 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Beffara",
"Emmanuel",
"",
"IML"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4008 | Hakan Ozadam | Hakan Ozadam and Ferruh Ozbudak | Two generalizations on the minimum Hamming distance of repeated-root
constacyclic codes | We do not plan to publish the results of this paper on their own. We
have put this paper for referring purposes | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study constacyclic codes, of length $np^s$ and $2np^s$, that are generated
by the polynomials $(x^n + \gamma)^{\ell}$ and $(x^n - \xi)^i(x^n + \xi)^j$\
respectively, where $x^n + \gamma$, $x^n - \xi$ and $x^n + \xi$ are irreducible
over the alphabet $\F_{p^a}$. We generalize the results of [5], [6] and [7] by
computing the minimum Hamming distance of these codes. As a particular case, we
determine the minimum Hamming distance of cyclic and negacyclic codes, of
length $2p^s$, over a finite field of characteristic $p$.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 14:21:05 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Ozadam",
"Hakan",
""
],
[
"Ozbudak",
"Ferruh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4012 | Man-On Pun | Man-On Pun, Kyeong Jin Kim, Ronald Iltis and H. Vincent Poor | Reduced-Feedback Opportunistic Scheduling and Beamforming with GMD for
MIMO-OFDMA | Proc. Asilomar Conference on Signals, Systems, and Computers, Pacific
Grove, CA, Nov. 2008 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Opportunistic scheduling and beamforming schemes have been proposed
previously by the authors for reduced-feedback MIMO-OFDMA downlink systems
where the MIMO channel of each subcarrier is decomposed into layered spatial
subchannels. It has been demonstrated that significant feedback reduction can
be achieved by returning information about only one beamforming matrix (BFM)
for all subcarriers from each MT, compared to one BFM for each subcarrier in
the conventional schemes. However, since the previously proposed channel
decomposition was derived based on singular value decomposition, the resulting
system performance is impaired by the subchannels associated with the smallest
singular values. To circumvent this obstacle, this work proposes improved
opportunistic scheduling and beamforming schemes based on geometric mean
decomposition-based channel decomposition. In addition to the inherent
advantage in reduced feedback, the proposed schemes can achieve improved system
performance by decomposing the MIMO channels into spatial subchannels with more
evenly distributed channel gains. Numerical results confirm the effectiveness
of the proposed opportunistic scheduling and beamforming schemes.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 14:28:14 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Pun",
"Man-On",
""
],
[
"Kim",
"Kyeong Jin",
""
],
[
"Iltis",
"Ronald",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4019 | Vincent Lariviere | Vincent Lariviere, Yves Gingras | On the prevalence and scientific impact of duplicate publications in
different scientific fields (1980-2007) | 13 pages, 7 figures | null | null | null | physics.soc-ph cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The issue of duplicate publications has received a lot of attention in the
medical literature, but much less in the information science community. This
paper aims at analyzing the prevalence and scientific impact of duplicate
publications across all fields of research between 1980 and 2007, using a
definition of duplicate papers based on their metadata. It shows that in all
fields combined, the prevalence of duplicates is one out of two-thousand
papers, but is higher in the natural and medical sciences than in the social
sciences and humanities. A very high proportion (>85%) of these papers are
published the same year or one year apart, which suggest that most duplicate
papers were submitted simultaneously. Furthermore, duplicate papers are
generally published in journals with impact factors below the average of their
field and obtain a lower number of citations. This paper provides clear
evidence that the prevalence of duplicate papers is low and, more importantly,
that the scientific impact of such papers is below average.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 14:28:31 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Lariviere",
"Vincent",
""
],
[
"Gingras",
"Yves",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0906.4026 | Benjamin Piwowarski | B. Piwowarski, M. Lalmas | A Quantum-based Model for Interactive Information Retrieval (extended
version) | 14 pages, 1 figure | null | null | null | cs.IR cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Even the best information retrieval model cannot always identify the most
useful answers to a user query. This is in particular the case with web search
systems, where it is known that users tend to minimise their effort to access
relevant information. It is, however, believed that the interaction between
users and a retrieval system, such as a web search engine, can be exploited to
provide better answers to users. Interactive Information Retrieval (IR)
systems, in which users access information through a series of interactions
with the search system, are concerned with building models for IR, where
interaction plays a central role. There are many possible interactions between
a user and a search system, ranging from query (re)formulation to relevance
feedback. However, capturing them within a single framework is difficult and
previously proposed approaches have mostly focused on relevance feedback. In
this paper, we propose a general framework for interactive IR that is able to
capture the full interaction process in a principled way. Our approach relies
upon a generalisation of the probability framework of quantum physics, whose
strong geometric component can be a key towards a successful interactive IR
model.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 16:17:36 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jun 2009 09:11:19 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Piwowarski",
"B.",
""
],
[
"Lalmas",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0906.4032 | Karsten Borgwardt M. | Karsten M. Borgwardt, Zoubin Ghahramani | Bayesian two-sample tests | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present two classes of Bayesian approaches to the
two-sample problem. Our first class of methods extends the Bayesian t-test to
include all parametric models in the exponential family and their conjugate
priors. Our second class of methods uses Dirichlet process mixtures (DPM) of
such conjugate-exponential distributions as flexible nonparametric priors over
the unknown distributions.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 15:25:23 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Borgwardt",
"Karsten M.",
""
],
[
"Ghahramani",
"Zoubin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.4036 | Hongyu Lu | Hongyu Lu, Shanglian Bao | Physical Modeling Techniques in Active Contours for Image Segmentation | null | null | null | null | cs.CV cs.GR | http://creativecommons.org/licenses/by-nc-sa/3.0/ | Physical modeling method, represented by simulation and visualization of the
principles in physics, is introduced in the shape extraction of the active
contours. The objectives of adopting this concept are to address the several
major difficulties in the application of Active Contours. Primarily, a
technique is developed to realize the topological changes of Parametric Active
Contours (Snakes). The key strategy is to imitate the process of a balloon
expanding and filling in a closed space with several objects. After removing
the touched balloon surfaces, the objects can be identified by surrounded
remaining balloon surfaces. A burned region swept by Snakes is utilized to
trace the contour and to give a criterion for stopping the movement of Snake
curve. When the Snakes terminates evolution totally, through ignoring this
criterion, it can form a connected area by evolving the Snakes again and
continuing the region burning. The contours extracted from the boundaries of
the burned area can represent the child snake of each object respectively.
Secondly, a novel scheme is designed to solve the problems of leakage of the
contour from the large gaps, and the segmentation error in Geometric Active
Contours (GAC). It divides the segmentation procedure into two processing
stages. By simulating the wave propagating in the isotropic substance at the
final stage, it can significantly enhance the effect of image force in GAC
based on Level Set and give the satisfied solutions to the two problems.
Thirdly, to support the physical models for active contours above, we introduce
a general image force field created on a template plane over the image plane.
This force is more adaptable to noisy images with complicated geometric shapes.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 16:38:30 GMT"
},
{
"version": "v2",
"created": "Sun, 28 Jun 2009 03:03:04 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Jun 2009 15:53:02 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Lu",
"Hongyu",
""
],
[
"Bao",
"Shanglian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
]
|
0906.4044 | Don Conry | Don Conry, Yehuda Koren, Naren Ramakrishnan | Recommender Systems for the Conference Paper Assignment Problem | 8 pages, 5 figures, submitted to the ACM Conference on Recommender
Systems 2009 | null | null | null | cs.IR cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Conference paper assignment, i.e., the task of assigning paper submissions to
reviewers, presents multi-faceted issues for recommender systems research.
Besides the traditional goal of predicting `who likes what?', a conference
management system must take into account aspects such as: reviewer capacity
constraints, adequate numbers of reviews for papers, expertise modeling,
conflicts of interest, and an overall distribution of assignments that balances
reviewer preferences with conference objectives. Among these, issues of
modeling preferences and tastes in reviewing have traditionally been studied
separately from the optimization of paper-reviewer assignment. In this paper,
we present an integrated study of both these aspects. First, due to the paucity
of data per reviewer or per paper (relative to other recommender systems
applications) we show how we can integrate multiple sources of information to
learn paper-reviewer preference models. Second, our models are evaluated not
just in terms of prediction accuracy but in terms of the end-assignment
quality. Using a linear programming-based assignment optimization formulation,
we show how our approach better explores the space of unsupplied assignments to
maximize the overall affinities of papers assigned to reviewers. We demonstrate
our results on real reviewer preference data from the IEEE ICDM 2007
conference.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 17:26:24 GMT"
}
]
| 2009-06-23T00:00:00 | [
[
"Conry",
"Don",
""
],
[
"Koren",
"Yehuda",
""
],
[
"Ramakrishnan",
"Naren",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.4096 | Naveen Ashish | Naveen Ashish, Dmitri Kalashnikov, Sharad Mehrotra and Nalini
Venkatasubramanian | An Event Based Approach To Situational Representation | null | null | null | null | cs.DB cs.AI | http://creativecommons.org/licenses/by/3.0/ | Many application domains require representing interrelated real-world
activities and/or evolving physical phenomena. In the crisis response domain,
for instance, one may be interested in representing the state of the unfolding
crisis (e.g., forest fire), the progress of the response activities such as
evacuation and traffic control, and the state of the crisis site(s). Such a
situation representation can then be used to support a multitude of
applications including situation monitoring, analysis, and planning. In this
paper, we make a case for an event based representation of situations where
events are defined to be domain-specific significant occurrences in space and
time. We argue that events offer a unifying and powerful abstraction to
building situational awareness applications. We identify challenges in building
an Event Management System (EMS) for which traditional data and knowledge
management systems prove to be limited and suggest possible directions and
technologies to address the challenges.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 19:40:12 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Jun 2009 20:04:32 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Ashish",
"Naveen",
""
],
[
"Kalashnikov",
"Dmitri",
""
],
[
"Mehrotra",
"Sharad",
""
],
[
"Venkatasubramanian",
"Nalini",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.4121 | Mark Giesbrecht | Mark Giesbrecht and Myung Sub Kim | On computing the Hermite form of a matrix of differential polynomials | null | null | 10.1007/978-3-642-04103-7_12 | null | cs.SC cs.MS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Given an n x n matrix over the ring of differential polynomials
F(t)[\D;\delta], we show how to compute the Hermite form H of A, and a
unimodular matrix U such that UA=H. The algorithm requires a polynomial number
of operations in terms of n, deg_D(A), and deg_t(A). When F is the field of
rational numbers, it also requires time polynomial in the bit-length of the
coefficients.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 20:29:09 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Giesbrecht",
"Mark",
""
],
[
"Kim",
"Myung Sub",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
]
|
0906.4125 | Mauro Cherubini | Mauro Cherubini and Nuria Oliver | A Refined Experience Sampling Method to Capture Mobile User Experience | Cherubini, M., and Oliver, N. A refined experience sampling method to
capture mobile user experience. In Presented at the International Workshop of
Mobile User Experience Research part of CHI'2009 (Boston, MA, USA, April 4-9
2009), Y. Nakhimovsky, D. Eckles, and J. Riegelsberger, Eds. 12 pages, 5
figures | null | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper reviews research methods used to understand the user experience of
mobile technology. The paper presents an improvement of the Experience Sampling
Method and case studies supporting its design. The paper concludes with an
agenda of future work for improving research in this field.
Keywords: Research methods, topology, case study, contrasting graph,
Experience Sampling Method
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 20:31:45 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Cherubini",
"Mauro",
""
],
[
"Oliver",
"Nuria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0906.4131 | Josna Rao | Josna Rao, Ghassan Hamarneh, Rafeef Abugharbieh | Automatic Spatially-Adaptive Balancing of Energy Terms for Image
Segmentation | 12 pages, 7 figures | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Image segmentation techniques are predominately based on parameter-laden
optimization. The objective function typically involves weights for balancing
competing image fidelity and segmentation regularization cost terms. Setting
these weights suitably has been a painstaking, empirical process. Even if such
ideal weights are found for a novel image, most current approaches fix the
weight across the whole image domain, ignoring the spatially-varying properties
of object shape and image appearance. We propose a novel technique that
autonomously balances these terms in a spatially-adaptive manner through the
incorporation of image reliability in a graph-based segmentation framework. We
validate on synthetic data achieving a reduction in mean error of 47% (p-value
<< 0.05) when compared to the best fixed parameter segmentation. We also
present results on medical images (including segmentations of the corpus
callosum and brain tissue in MRI data) and on natural images.
| [
{
"version": "v1",
"created": "Mon, 22 Jun 2009 21:10:46 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Jun 2009 21:57:29 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Rao",
"Josna",
""
],
[
"Hamarneh",
"Ghassan",
""
],
[
"Abugharbieh",
"Rafeef",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.4149 | EPTCS | Massimiliano de Leoni | Adaptive Process Management in Highly Dynamic and Pervasive Scenarios | null | EPTCS 2, 2009, pp. 83-97 | 10.4204/EPTCS.2.7 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Process Management Systems (PMSs) are currently more and more used as a
supporting tool for cooperative processes in pervasive and highly dynamic
situations, such as emergency situations, pervasive healthcare or domotics/home
automation. But in all such situations, designed processes can be easily
invalidated since the execution environment may change continuously due to
frequent unforeseeable events. This paper aims at illustrating the theoretical
framework and the concrete implementation of SmartPM, a PMS that features a set
of sound and complete techniques to automatically cope with unplanned
exceptions. PMS SmartPM is based on a general framework which adopts the
Situation Calculus and Indigolog.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 01:34:37 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"de Leoni",
"Massimiliano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.4154 | Oliver Obst | Oliver Obst | Distributed Fault Detection in Sensor Networks using a Recurrent Neural
Network | 10 pages | null | null | null | cs.NE cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In long-term deployments of sensor networks, monitoring the quality of
gathered data is a critical issue. Over the time of deployment, sensors are
exposed to harsh conditions, causing some of them to fail or to deliver less
accurate data. If such a degradation remains undetected, the usefulness of a
sensor network can be greatly reduced. We present an approach that learns
spatio-temporal correlations between different sensors, and makes use of the
learned model to detect misbehaving sensors by using distributed computation
and only local communication between nodes. We introduce SODESN, a distributed
recurrent neural network architecture, and a learning method to train SODESN
for fault detection in a distributed scenario. Our approach is evaluated using
data from different types of sensors and is able to work well even with
less-than-perfect link qualities and more than 50% of failed nodes.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 01:54:55 GMT"
}
]
| 2009-12-05T00:00:00 | [
[
"Obst",
"Oliver",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.4162 | EPTCS | Jack H. Lutz | A Divergence Formula for Randomness and Dimension (Short Version) | null | EPTCS 1, 2009, pp. 149-152 | 10.4204/EPTCS.1.14 | null | cs.CC cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If $S$ is an infinite sequence over a finite alphabet $\Sigma$ and $\beta$ is
a probability measure on $\Sigma$, then the {\it dimension} of $ S$ with
respect to $\beta$, written $\dim^\beta(S)$, is a constructive version of
Billingsley dimension that coincides with the (constructive Hausdorff)
dimension $\dim(S)$ when $\beta$ is the uniform probability measure. This paper
shows that $\dim^\beta(S)$ and its dual $\Dim^\beta(S)$, the {\it strong
dimension} of $S$ with respect to $\beta$, can be used in conjunction with
randomness to measure the similarity of two probability measures $\alpha$ and
$\beta$ on $\Sigma$. Specifically, we prove that the {\it divergence formula}
$$\dim^\beta(R) = \Dim^\beta(R) =\CH(\alpha) / (\CH(\alpha) + \D(\alpha ||
\beta))$$ holds whenever $\alpha$ and $\beta$ are computable, positive
probability measures on $\Sigma$ and $R \in \Sigma^\infty$ is random with
respect to $\alpha$. In this formula, $\CH(\alpha)$ is the Shannon entropy of
$\alpha$, and $\D(\alpha||\beta)$ is the Kullback-Leibler divergence between
$\alpha$ and $\beta$.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 10:15:31 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Lutz",
"Jack H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4172 | R Doomun | Anjana Pandey, K.R.Pardasani | Rough Set Model for Discovering Hybrid Association Rules | 5 pages, International Journal of Computer Science and Information
Security | IJCSIS June 2009 Issue, Vol. 2 | null | null | cs.DB cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the mining of hybrid association rules with rough set approach
is investigated as the algorithm RSHAR.The RSHAR algorithm is constituted of
two steps mainly. At first, to join the participant tables into a general table
to generate the rules which is expressing the relationship between two or more
domains that belong to several different tables in a database. Then we apply
the mapping code on selected dimension, which can be added directly into the
information system as one certain attribute. To find the association rules,
frequent itemsets are generated in second step where candidate itemsets are
generated through equivalence classes and also transforming the mapping code in
to real dimensions. The searching method for candidate itemset is similar to
apriori algorithm. The analysis of the performance of algorithm has been
carried out.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 06:24:57 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Pandey",
"Anjana",
""
],
[
"Pardasani",
"K. R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.4173 | Frederic Blanqui | Fr\'ed\'eric Blanqui (LIAMA), Cody Roux (INRIA Lorraine - LORIA) | On the relation between size-based termination and semantic labelling | null | 18th EACSL Annual Conference on Computer Science Logic (2009) | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the relationship between two independently developed
termination techniques. On the one hand, sized-types based termination (SBT)
uses types annotated with size expressions and Girard's reducibility
candidates, and applies on systems using constructor matching only. On the
other hand, semantic labelling transforms a rewrite system by annotating each
function symbol with the semantics of its arguments, and applies to any rewrite
system. First, we introduce a simplified version of SBT for the simply-typed
lambda-calculus. Then, we give new proofs of the correctness of SBT using
semantic labelling, both in the first and in the higher-order case. As a
consequence, we show that SBT can be extended to systems using matching on
defined symbols (e.g. associative functions).
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 06:28:55 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Blanqui",
"Frédéric",
"",
"LIAMA"
],
[
"Roux",
"Cody",
"",
"INRIA Lorraine - LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4216 | Viswanath Kasturi | Venkata Rao Kuchibhotla, Viswanath Kasturi | On the Definition of Non-deterministic Mechanisms | 16 pages | null | null | null | cs.LO cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present here three different approaches to the problem of modeling
mathematically the concept of a non-deterministic mechanism. Each of these
three approaches leads to a mathematical definition. We then show that all the
three mathematical concepts are equivalent to one another. This insight gives
us the option of approaching the wp-formalism of Dijkstra from a different
viewpoint that is easier to understand and to teach.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 10:27:40 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Kuchibhotla",
"Venkata Rao",
""
],
[
"Kasturi",
"Viswanath",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.4217 | Krzysztof Szczypiorski | Krzysztof Szczypiorski | A Performance Analysis of HICCUPS - a Steganographic System for WLAN | 5 pages, 5 figures, 3 tables. Submitted to the First International
Workshop on Network Steganography - IWNS 2009, November 18-20, 2009, Wuhan
(China) | null | null | null | cs.CR cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper presents an analysis of performance features of the HICCUPS (HIdden
Communication system for CorrUPted networkS) including the efficiency and the
cost of the system in WLANs (Wireless Local Area Networks). The analysis relies
on the original CSMA/CA (Carrier Sense Multiple Access with Collision
Avoidance) 802.11 Markov chain-based model.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 14:43:07 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Szczypiorski",
"Krzysztof",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.4228 | Michael Meier | Michael Meier, Michael Schmidt, Georg Lausen | On Chase Termination Beyond Stratification | Technical Report of VLDB 2009 conference version | null | null | null | cs.DB cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the termination problem of the chase algorithm, a central tool in
various database problems such as the constraint implication problem,
Conjunctive Query optimization, rewriting queries using views, data exchange,
and data integration. The basic idea of the chase is, given a database instance
and a set of constraints as input, to fix constraint violations in the database
instance. It is well-known that, for an arbitrary set of constraints, the chase
does not necessarily terminate (in general, it is even undecidable if it does
or not). Addressing this issue, we review the limitations of existing
sufficient termination conditions for the chase and develop new techniques that
allow us to establish weaker sufficient conditions. In particular, we introduce
two novel termination conditions called safety and inductive restriction, and
use them to define the so-called T-hierarchy of termination conditions. We then
study the interrelations of our termination conditions with previous conditions
and the complexity of checking our conditions. This analysis leads to an
algorithm that checks membership in a level of the T-hierarchy and accounts for
the complexity of termination conditions. As another contribution, we study the
problem of data-dependent chase termination and present sufficient termination
conditions w.r.t. fixed instances. They might guarantee termination although
the chase does not terminate in the general case. As an application of our
techniques beyond those already mentioned, we transfer our results into the
field of query answering over knowledge bases where the chase on the underlying
database may not terminate, making existing algorithms applicable to broader
classes of constraints.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 11:46:43 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Sep 2009 14:38:04 GMT"
}
]
| 2009-09-17T00:00:00 | [
[
"Meier",
"Michael",
""
],
[
"Schmidt",
"Michael",
""
],
[
"Lausen",
"Georg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.4291 | Alexander A. Sherstov | Alexander A. Sherstov | The Pattern Matrix Method (Journal Version) | Revised and expanded version of the STOC'08 article. To appear in
SIAM J. Comput., 2009 | null | null | null | cs.CC quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a novel and powerful technique for communication lower bounds, the
pattern matrix method. Specifically, fix an arbitrary function f:{0,1}^n->{0,1}
and let A_f be the matrix whose columns are each an application of f to some
subset of the variables x_1,x_2,...,x_{4n}. We prove that A_f has bounded-error
communication complexity Omega(d), where d is the approximate degree of f. This
result remains valid in the quantum model, regardless of prior entanglement. In
particular, it gives a new and simple proof of Razborov's breakthrough quantum
lower bounds for disjointness and other symmetric predicates. We further
characterize the discrepancy, approximate rank, and approximate trace norm of
A_f in terms of well-studied analytic properties of f, broadly generalizing
several recent results on small-bias communication and agnostic learning. The
method of this paper has recently enabled important progress in multiparty
communication complexity.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 15:51:36 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Sherstov",
"Alexander A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0906.4302 | Ahmed Mihoob Mr | Ahmed Mihoob, Carlos Molina-Jimenez (School Of Computing Science,
University Of Newcastle, UK) | A Peer to Peer Protocol for Online Dispute Resolution over Storage
Consumption | 12 pages, 7 figures | EPTCS 2, 2009, pp. 3-14 | 10.4204/EPTCS.2.1 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In bilateral accounting of resource consumption both the consumer and
provider independently measure the amount of resources consumed by the
consumer. The problem here is that potential disparities between the provider's
and consumer's accountings, might lead to conflicts between the two parties
that need to be resolved. We argue that with the proper mechanisms available,
most of these conflicts can be solved online, as opposite to in court
resolution; the design of such mechanisms is still a research topic; to help
cover the gap, in this paper we propose a peer--to--peer protocol for online
dispute resolution over storage consumption. The protocol is peer--to--peer and
takes into consideration the possible causes (e.g, transmission delays,
unsynchronized metric collectors, etc.) of the disparity between the provider's
and consumer's accountings to make, if possible, the two results converge.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 16:30:51 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Mihoob",
"Ahmed",
"",
"School Of Computing Science,\n University Of Newcastle, UK"
],
[
"Molina-Jimenez",
"Carlos",
"",
"School Of Computing Science,\n University Of Newcastle, UK"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.4315 | Sabina Petride | Mark Bickford (Cornell University), Robert Constable (Cornell
University), Joseph Halpern (Cornell University), Sabina Petride (Cornell
University) | Knowledge-Based Synthesis of Distributed Systems Using Event Structures | A preliminary version of this paper appeared in Proceedings of the
11th International Conference on Logic for Programming, Artificial
Intelligence, and Reasoning LPAR 2004, pp. 449-465 | Logical Methods in Computer Science, Volume 7, Issue 2 (May 21,
2011) lmcs:804 | 10.2168/LMCS-7(2:14)2011 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To produce a program guaranteed to satisfy a given specification one can
synthesize it from a formal constructive proof that a computation satisfying
that specification exists. This process is particularly effective if the
specifications are written in a high-level language that makes it easy for
designers to specify their goals. We consider a high-level specification
language that results from adding knowledge to a fragment of Nuprl specifically
tailored for specifying distributed protocols, called event theory. We then
show how high-level knowledge-based programs can be synthesized from the
knowledge-based specifications using a proof development system such as Nuprl.
Methods of Halpern and Zuck then apply to convert these knowledge-based
protocols to ordinary protocols. These methods can be expressed as heuristic
transformation tactics in Nuprl.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 17:10:42 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jan 2011 19:30:13 GMT"
},
{
"version": "v3",
"created": "Thu, 19 May 2011 07:14:28 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Bickford",
"Mark",
"",
"Cornell University"
],
[
"Constable",
"Robert",
"",
"Cornell\n University"
],
[
"Halpern",
"Joseph",
"",
"Cornell University"
],
[
"Petride",
"Sabina",
"",
"Cornell\n University"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4316 | Joseph Y. Halpern | Lawrence Blume, David Easley, and Joseph Y. Halpern | Constructive Decision Theory | A preliminary version of paper, with the title "Redoing the
Foundations of Decision Theory" appeared in the Tenth International
Conference on Principles of Knowledge Representation and Reasoning. The paper
will appear in "Journal of Economic Theory" | null | null | null | cs.GT cs.AI econ.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In most contemporary approaches to decision making, a decision problem is
described by a sets of states and set of outcomes, and a rich set of acts,
which are functions from states to outcomes over which the decision maker (DM)
has preferences. Most interesting decision problems, however, do not come with
a state space and an outcome space. Indeed, in complex problems it is often far
from clear what the state and outcome spaces would be. We present an
alternative foundation for decision making, in which the primitive objects of
choice are syntactic programs. A representation theorem is proved in the spirit
of standard representation theorems, showing that if the DM's preference
relation on objects of choice satisfies appropriate axioms, then there exist a
set S of states, a set O of outcomes, a way of interpreting the objects of
choice as functions from S to O, a probability on S, and a utility function on
O, such that the DM prefers choice a to choice b if and only if the expected
utility of a is higher than that of b. Thus, the state space and outcome space
are subjective, just like the probability and utility; they are not part of the
description of the problem. In principle, a modeler can test for SEU behavior
without having access to states or outcomes. We illustrate the power of our
approach by showing that it can capture decision makers who are subject to
framing effects.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 18:22:45 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Jul 2021 16:28:50 GMT"
}
]
| 2021-09-07T00:00:00 | [
[
"Blume",
"Lawrence",
""
],
[
"Easley",
"David",
""
],
[
"Halpern",
"Joseph Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Economics",
"code": "econ.TH",
"description": "Includes theoretical contributions to Contract Theory, Decision Theory, Game Theory, General Equilibrium, Growth, Learning and Evolution, Macroeconomics, Market and Mechanism Design, and Social Choice.",
"span": "(Theoretical Economics)"
}
]
|
0906.4321 | Joseph Y. Halpern | Joseph Y. Halpern and Leandro Rego | Reasoning About Knowledge of Unawareness Revisited | In Proceedings of Twelfth Conference on Theoretical Aspects of
Rationality and Knowledge, 2009, pp. 166-173 | null | null | null | cs.AI cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In earlier work, we proposed a logic that extends the Logic of General
Awareness of Fagin and Halpern [1988] by allowing quantification over primitive
propositions. This makes it possible to express the fact that an agent knows
that there are some facts of which he is unaware. In that logic, it is not
possible to model an agent who is uncertain about whether he is aware of all
formulas. To overcome this problem, we keep the syntax of the earlier paper,
but allow models where, with each world, a possibly different language is
associated. We provide a sound and complete axiomatization for this logic and
show that, under natural assumptions, the quantifier-free fragment of the logic
is characterized by exactly the same axioms as the logic of Heifetz, Meier, and
Schipper [2008].
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 17:34:16 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Rego",
"Leandro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4326 | Joseph Y. Halpern | Joseph Y. Halpern and Rafael Pass | A Logical Characterization of Iterated Admissibility | In Proceedings of Twelfth Conference on Theoretical Aspects of
Rationality and Knowledge, 2009, pp. 146-155 | null | null | null | cs.AI cs.GT cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Brandenburger, Friedenberg, and Keisler provide an epistemic characterization
of iterated admissibility (i.e., iterated deletion of weakly dominated
strategies) where uncertainty is represented using LPSs (lexicographic
probability sequences). Their characterization holds in a rich structure called
a complete structure, where all types are possible. Here, a logical
charaacterization of iterated admisibility is given that involves only standard
probability and holds in all structures, not just complete structures. A
stronger notion of strong admissibility is then defined. Roughly speaking,
strong admissibility is meant to capture the intuition that "all the agent
knows" is that the other agents satisfy the appropriate rationality
assumptions. Strong admissibility makes it possible to relate admissibility,
canonical structures (as typically considered in completeness proofs in modal
logic), complete structures, and the notion of ``all I know''.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 18:04:05 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Pass",
"Rafael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4327 | R Doomun | Jigyasa Bisaria, Namita Shrivastava, K.R. Pardasani | A Rough Sets Partitioning Model for Mining Sequential Patterns with Time
Constraint | 9 pages, International Journal of Computer Science and Information
Security, IJCSIS 2009 | IJCSIS, June 2009 Issue, Vol. 2, No.1 | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Now a days, data mining and knowledge discovery methods are applied to a
variety of enterprise and engineering disciplines to uncover interesting
patterns from databases. The study of Sequential patterns is an important data
mining problem due to its wide applications to real world time dependent
databases. Sequential patterns are inter-event patterns ordered over a
time-period associated with specific objects under study. Analysis and
discovery of frequent sequential patterns over a predetermined time-period are
interesting data mining results, and can aid in decision support in many
enterprise applications. The problem of sequential pattern mining poses
computational challenges as a long frequent sequence contains enormous number
of frequent subsequences. Also useful results depend on the right choice of
event window. In this paper, we have studied the problem of sequential pattern
mining through two perspectives, one the computational aspect of the problem
and the other is incorporation and adjustability of time constraint. We have
used Indiscernibility relation from theory of rough sets to partition the
search space of sequential patterns and have proposed a novel algorithm that
allows previsualization of patterns and allows adjustment of time constraint
prior to execution of mining task. The algorithm Rough Set Partitioning is at
least ten times faster than the naive time constraint based sequential pattern
mining algorithm GSP. Besides this an additional knowledge of time interval of
sequential patterns is also determined with the method.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 18:29:06 GMT"
}
]
| 2009-06-24T00:00:00 | [
[
"Bisaria",
"Jigyasa",
""
],
[
"Shrivastava",
"Namita",
""
],
[
"Pardasani",
"K. R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0906.4332 | Joseph Y. Halpern | Adam J. Grove and Joseph Y. Halpern | Updating Sets of Probabilities | In Proceedings of the Fourteenth Conference on Uncertainty in AI,
1998, pp. 173-182 | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are several well-known justifications for conditioning as the
appropriate method for updating a single probability measure, given an
observation. However, there is a significant body of work arguing for sets of
probability measures, rather than single measures, as a more realistic model of
uncertainty. Conditioning still makes sense in this context--we can simply
condition each measure in the set individually, then combine the results--and,
indeed, it seems to be the preferred updating procedure in the literature. But
how justified is conditioning in this richer setting? Here we show, by
considering an axiomatic account of conditioning given by van Fraassen, that
the single-measure and sets-of-measures cases are very different. We show that
van Fraassen's axiomatization for the former case is nowhere near sufficient
for updating sets of measures. We give a considerably longer (and not as
compelling) list of axioms that together force conditioning in this setting,
and describe other update methods that are allowed once any of these axioms is
dropped.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 19:34:47 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Aug 2014 01:47:19 GMT"
}
]
| 2014-08-12T00:00:00 | [
[
"Grove",
"Adam J.",
""
],
[
"Halpern",
"Joseph Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.4377 | Daniel Perrucci | Gabriela Jeronimo, Daniel Perrucci | On the minimum of a positive polynomial over the standard simplex | null | null | null | null | math.AG cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a new positive lower bound for the minimum value taken by a
polynomial P with integer coefficients in k variables over the standard simplex
of R^k, assuming that P is positive on the simplex. This bound depends only on
the number of variables, the degree and the bitsize of the coefficients of P
and improves all previous bounds for arbitrary polynomials which are positive
over the simplex.
| [
{
"version": "v1",
"created": "Tue, 23 Jun 2009 23:40:34 GMT"
}
]
| 2009-06-25T00:00:00 | [
[
"Jeronimo",
"Gabriela",
""
],
[
"Perrucci",
"Daniel",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0906.4415 | Gaurav Bhatnagar Mr. | Gaurav Bhatnagar and Balasubramanian Raman | Robust Watermarking in Multiresolution Walsh-Hadamard Transform | 6 Pages, 16 Figure, 2 Tables | Proc. of IEEE International Advance Computing Conference (IACC
2009), Patiala, India, 6-7 March 2009, pp. 894-899 | 10.1109/IADCC.2009.4809134 | null | cs.CR cs.IT cs.MM math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a newer version of Walsh-Hadamard Transform namely
multiresolution Walsh-Hadamard Transform (MR-WHT) is proposed for images.
Further, a robust watermarking scheme is proposed for copyright protection
using MRWHT and singular value decomposition. The core idea of the proposed
scheme is to decompose an image using MR-WHT and then middle singular values of
high frequency sub-band at the coarsest and the finest level are modified with
the singular values of the watermark. Finally, a reliable watermark extraction
scheme is developed for the extraction of the watermark from the distorted
image. The experimental results show better visual imperceptibility and
resiliency of the proposed scheme against intentional or un-intentional variety
of attacks.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 07:23:51 GMT"
}
]
| 2009-06-25T00:00:00 | [
[
"Bhatnagar",
"Gaurav",
""
],
[
"Raman",
"Balasubramanian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4431 | Joerg Rothe | Daniel Binkele-Raible, G\'abor Erd\'elyi, Henning Fernau, Judy
Goldsmith, Nicholas Mattei, and J\"org Rothe | The Complexity of Probabilistic Lobbying | 35 pages | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose models for lobbying in a probabilistic environment, in which an
actor (called "The Lobby") seeks to influence voters' preferences of voting for
or against multiple issues when the voters' preferences are represented in
terms of probabilities. In particular, we provide two evaluation criteria and
two bribery methods to formally describe these models, and we consider the
resulting forms of lobbying with and without issue weighting. We provide a
formal analysis for these problems of lobbying in a stochastic environment, and
determine their classical and parameterized complexity depending on the given
bribery/evaluation criteria and on various natural parameterizations.
Specifically, we show that some of these problems can be solved in polynomial
time, some are NP-complete but fixed-parameter tractable, and some are
W[2]-complete. Finally, we provide approximability and inapproximability
results for these problems and several variants.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 10:14:13 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2009 22:10:34 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Nov 2009 12:11:55 GMT"
},
{
"version": "v4",
"created": "Sat, 26 Feb 2011 21:29:30 GMT"
}
]
| 2011-03-01T00:00:00 | [
[
"Binkele-Raible",
"Daniel",
""
],
[
"Erdélyi",
"Gábor",
""
],
[
"Fernau",
"Henning",
""
],
[
"Goldsmith",
"Judy",
""
],
[
"Mattei",
"Nicholas",
""
],
[
"Rothe",
"Jörg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.4454 | Patrick Coquillard | Patrick Coquillard (IBSV), Alexandre Muzy (LISA), Eric Wajnberg (IBSV) | Activatability for simulation tractability of NP problems: Application
to Ecology | Complex Systems: Activity-Based Modeling and Simulation, Cargese
Interdisciplinary Seminar, Corsica, France., France (2009) | null | null | null | q-bio.QM cs.CE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dynamics of biological-ecological systems is strongly depending on spatial
dimensions. Most of powerful simulators in ecology take into account for system
spatiality thus embedding stochastic processes. Due to the difficulty of
researching particular trajectories, biologists and computer scientists aim at
predicting the most probable trajectories of systems under study. Doing that,
they considerably reduce computation times. However, because of the largeness
of space, the execution time remains usually polynomial in time. In order to
reduce execution times we propose an activatability-based search cycle through
the process space. This cycle eliminates the redundant processes on a
statistical basis (Generalized Linear Model), and converges to the minimal
number of processes required to match simulation objectives.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 11:59:29 GMT"
}
]
| 2009-09-04T00:00:00 | [
[
"Coquillard",
"Patrick",
"",
"IBSV"
],
[
"Muzy",
"Alexandre",
"",
"LISA"
],
[
"Wajnberg",
"Eric",
"",
"IBSV"
]
]
| [
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
]
|
0906.4474 | Jon Sneyers | Jon Sneyers, Peter Van Weert, Tom Schrijvers, Leslie De Koninck | As time goes by: Constraint Handling Rules - A survey of CHR research
from 1998 to 2007 | 49 pages. To appear in Theory and Practice of Logic Programming | null | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Constraint Handling Rules (CHR) is a high-level programming language based on
multi-headed multiset rewrite rules. Originally designed for writing
user-defined constraint solvers, it is now recognized as an elegant general
purpose language. CHR-related research has surged during the decade following
the previous survey by Fruehwirth. Covering more than 180 publications, this
new survey provides an overview of recent results in a wide range of research
areas, from semantics and analysis to systems, extensions and applications.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 13:54:41 GMT"
},
{
"version": "v2",
"created": "Thu, 25 Jun 2009 13:17:41 GMT"
}
]
| 2009-06-25T00:00:00 | [
[
"Sneyers",
"Jon",
""
],
[
"Van Weert",
"Peter",
""
],
[
"Schrijvers",
"Tom",
""
],
[
"De Koninck",
"Leslie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.