id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0707.2934 | Christine Michel | Christine Michel (LIESP), Elise Garrot (LIESP), Sebastien George
(LIESP) | Instrumented Collective Learning Situations (ICLS): the Gap between
Theoretical Research and Observed Practices | null | 18th Internationale Conference on Society for Information
Technology and Teacher Education (SITE 2007) Proceddings (26/03/2007) 895-901 | null | null | cs.CY | null | According to socio-constructivism approach, collective situations are
promoted to favor learning in classroom, at a distance or in a blended
educational context. So, many Information and Communication Technologies (ICT)
are provided to teachers but there are no clear studies about the way they are
used and perceived. Our research is based on the hypothesis that practices of
educational actors (instructional designers and tutors) are far away from
theoretical results of research in education technologies. In this paper, we
consider a precise kind of situation: Instrumented Collective Learning
Situations (ICLS). By a survey on 13 fields in higher education in France,
Switzerland and Canada, we present how ICLS are designed and how teachers used
them. Conclusions give an indication on the gap between the way information
technologies are prescribed and the way they are actually used and perceived by
teachers.
| [
{
"version": "v1",
"created": "Thu, 19 Jul 2007 16:18:54 GMT"
}
] | 2007-07-20T00:00:00 | [
[
"Michel",
"Christine",
"",
"LIESP"
],
[
"Garrot",
"Elise",
"",
"LIESP"
],
[
"George",
"Sebastien",
"",
"LIESP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0707.2998 | Patrick Murphy | Patrick Murphy, Ashutosh Sabharwal and Behnaam Aazhang | Building a Cooperative Communications System | null | null | null | null | cs.IT math.IT | null | In this paper, we present the results from over-the-air experiments of a
complete implementation of an amplify and forward cooperative communications
system. Our custom OFDM-based physical layer uses a distributed version of the
Alamouti block code, where the relay sends one branch of Alamouti encoded
symbols. First we show analytically and experimentally that amplify and forward
protocols are unaffected by carrier frequency offsets at the relay. This result
allows us to use a conventional Alamouti receiver without change for the
distributed relay system. Our full system implementation shows gains up to
5.5dB in peak power constrained networks. Thus, we can conclusively state that
even the simplest form of relaying can lead to significant gains in practical
implementations.
| [
{
"version": "v1",
"created": "Fri, 20 Jul 2007 05:38:07 GMT"
}
] | 2007-07-23T00:00:00 | [
[
"Murphy",
"Patrick",
""
],
[
"Sabharwal",
"Ashutosh",
""
],
[
"Aazhang",
"Behnaam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3014 | Christine Michel | Christine Michel (LIESP), Elise Garrot (LIESP), Sebastien George
(LIESP) | Situations d'apprentissage collectives instrument\'ees : \'etude de
pratiques dans l'enseignement sup\'erieur | null | Actes de la Conf\'erence en EIAH 2007 (27/06/2007) 185-196 | null | null | cs.CY | null | Currently, educational platforms propose many tools of communication,
production, labour division or collective work management in order to support
collective activities. But it is not guaranteed that actors (instructional
designers, tutors or learner) are really using them. Our work, describe
characteristics of instrumented learning situations (ICLS) in the higher
education. Our intention is to determine: if ICLS are really existing; which
form they take (in terms of scenario, tools, type of activity...) ; if
recommendations resulting from research tasks are taken into account by
instructional designers and if the instructional designer prescribed activities
are really follow by learners or tutors? To answer these questions, we have
made a survey about ICLS actors uses.
| [
{
"version": "v1",
"created": "Fri, 20 Jul 2007 08:28:00 GMT"
}
] | 2007-07-23T00:00:00 | [
[
"Michel",
"Christine",
"",
"LIESP"
],
[
"Garrot",
"Elise",
"",
"LIESP"
],
[
"George",
"Sebastien",
"",
"LIESP"
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0707.3030 | Matthias Brust R. | Gregoire Danoy, Pascal Bouvry, Matthias R. Brust, Enrique Alba | Optimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms | 1 page, 1 figure | Genetic and Evolutionary Computation Conference (GECCO 2007), ISBN
978-1-59593-697-4 | null | null | cs.NE cs.AI cs.NI | null | This work aims at optimizing injection networks, which consist in adding a
set of long-range links (called bypass links) in mobile multi-hop ad hoc
networks so as to improve connectivity and overcome network partitioning. To
this end, we rely on small-world network properties, that comprise a high
clustering coefficient and a low characteristic path length. We investigate the
use of two genetic algorithms (generational and steady-state) to optimize three
instances of this topology control problem and present results that show
initial evidence of their capacity to solve it.
| [
{
"version": "v1",
"created": "Fri, 20 Jul 2007 10:07:27 GMT"
}
] | 2007-07-23T00:00:00 | [
[
"Danoy",
"Gregoire",
""
],
[
"Bouvry",
"Pascal",
""
],
[
"Brust",
"Matthias R.",
""
],
[
"Alba",
"Enrique",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0707.3043 | Branko Dragovich | Branko Dragovich and Alexandra Dragovich | p-Adic Modelling of the Genome and the Genetic Code | 26 pages. Submitted to the Computer Journal for a special issue | The Computer Journal 53 (2010) 432-442 | 10.1093/comjnl/bxm083 | null | q-bio.OT cs.IT math.IT physics.bio-ph | null | The present paper is devoted to foundations of p-adic modelling in genomics.
Considering nucleotides, codons, DNA and RNA sequences, amino acids, and
proteins as information systems, we have formulated the corresponding p-adic
formalisms for their investigations. Each of these systems has its
characteristic prime number used for construction of the related information
space. Relevance of this approach is illustrated by some examples. In
particular, it is shown that degeneration of the genetic code is a p-adic
phenomenon. We have also put forward a hypothesis on evolution of the genetic
code assuming that primitive code was based on single nucleotides and
chronologically first four amino acids. This formalism of p-adic genomic
information systems can be implemented in computer programs and applied to
various concrete cases.
| [
{
"version": "v1",
"created": "Fri, 20 Jul 2007 11:20:34 GMT"
}
] | 2010-12-01T00:00:00 | [
[
"Dragovich",
"Branko",
""
],
[
"Dragovich",
"Alexandra",
""
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.OT",
"description": "Work in quantitative biology that does not fit into the other q-bio classifications",
"span": "(Other Quantitative Biology)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
}
] |
0707.3087 | Ciamac Moallemi | Vivek F. Farias, Ciamac C. Moallemi, Tsachy Weissman, Benjamin Van Roy | Universal Reinforcement Learning | null | null | null | null | cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider an agent interacting with an unmodeled environment. At each time,
the agent makes an observation, takes an action, and incurs a cost. Its actions
can influence future observations and costs. The goal is to minimize the
long-term average cost. We propose a novel algorithm, known as the active LZ
algorithm, for optimal control based on ideas from the Lempel-Ziv scheme for
universal data compression and prediction. We establish that, under the active
LZ algorithm, if there exists an integer $K$ such that the future is
conditionally independent of the past given a window of $K$ consecutive actions
and observations, then the average cost converges to the optimum. Experimental
results involving the game of Rock-Paper-Scissors illustrate merits of the
algorithm.
| [
{
"version": "v1",
"created": "Fri, 20 Jul 2007 14:51:39 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Jun 2009 19:41:57 GMT"
},
{
"version": "v3",
"created": "Wed, 22 Jul 2009 00:58:34 GMT"
}
] | 2009-07-22T00:00:00 | [
[
"Farias",
"Vivek F.",
""
],
[
"Moallemi",
"Ciamac C.",
""
],
[
"Weissman",
"Tsachy",
""
],
[
"Van Roy",
"Benjamin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3095 | {\O}yvind Ryan | {\O}yvind Ryan, Merouane Debbah | Channel Capacity Estimation using Free Probability Theory | Submitted to IEEE Transactions on Signal Processing. 12 pages, 9
figures | null | 10.1109/TSP.2008.927074 | null | cs.IT math.IT | null | In many channel measurement applications, one needs to estimate some
characteristics of the channels based on a limited set of measurements. This is
mainly due to the highly time varying characteristics of the channel. In this
contribution, it will be shown how free probability can be used for channel
capacity estimation in MIMO systems. Free probability has already been applied
in various application fields such as digital communications, nuclear physics
and mathematical finance, and has been shown to be an invaluable tool for
describing the asymptotic behaviour of many large-dimensional systems. In
particular, using the concept of free deconvolution, we provide an
asymptotically (w.r.t. the number of observations) unbiased capacity estimator
for MIMO channels impaired with noise called the free probability based
estimator. Another estimator, called the Gaussian matrix mean based estimator,
is also introduced by slightly modifying the free probability based estimator.
This estimator is shown to give unbiased estimation of the moments of the
channel matrix for any number of observations. Also, the estimator has this
property when we extend to MIMO channels with phase off-set and frequency
drift, for which no estimator has been provided so far in the literature. It is
also shown that both the free probability based and the Gaussian matrix mean
based estimator are asymptotically unbiased capacity estimators as the number
of transmit antennas go to infinity, regardless of whether phase off-set and
frequency drift are present. The limitations in the two estimators are also
explained. Simulations are run to assess the performance of the estimators for
a low number of antennas and samples to confirm the usefulness of the
asymptotic results.
| [
{
"version": "v1",
"created": "Fri, 20 Jul 2007 15:43:15 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Dec 2007 19:10:14 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Mar 2008 12:44:46 GMT"
},
{
"version": "v4",
"created": "Thu, 15 May 2008 19:03:43 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Ryan",
"Øyvind",
""
],
[
"Debbah",
"Merouane",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3170 | Vladimir Sazonov | Vladimir Sazonov | Inductive Definition and Domain Theoretic Properties of Fully Abstract | 50 pages | Logical Methods in Computer Science, Volume 3, Issue 3 (September
10, 2007) lmcs:914 | 10.2168/LMCS-3(3:7)2007 | null | cs.LO | null | A construction of fully abstract typed models for PCF and PCF^+ (i.e., PCF +
"parallel conditional function"), respectively, is presented. It is based on
general notions of sequential computational strategies and wittingly consistent
non-deterministic strategies introduced by the author in the seventies.
Although these notions of strategies are old, the definition of the fully
abstract models is new, in that it is given level-by-level in the finite type
hierarchy. To prove full abstraction and non-dcpo domain theoretic properties
of these models, a theory of computational strategies is developed. This is
also an alternative and, in a sense, an analogue to the later game strategy
semantics approaches of Abramsky, Jagadeesan, and Malacaria; Hyland and Ong;
and Nickau. In both cases of PCF and PCF^+ there are definable universal
(surjective) functionals from numerical functions to any given type,
respectively, which also makes each of these models unique up to isomorphism.
Although such models are non-omega-complete and therefore not continuous in the
traditional terminology, they are also proved to be sequentially complete (a
weakened form of omega-completeness), "naturally" continuous (with respect to
existing directed "pointwise", or "natural" lubs) and also "naturally"
omega-algebraic and "naturally" bounded complete -- appropriate generalisation
of the ordinary notions of domain theory to the case of non-dcpos.
| [
{
"version": "v1",
"created": "Sat, 21 Jul 2007 00:29:38 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Sep 2007 09:41:43 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Sep 2007 08:54:16 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Sazonov",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.3175 | Aydin Sezgin | Aydin Sezgin and Oliver Henkel | Stacked OSTBC: Error Performance and Rate Analysis | IEEE Transactions on Signal Processing, accepted | null | 10.1109/TSP.2007.896025 | null | cs.IT math.IT | null | It is well known, that the Alamouti scheme is the only space-time code from
orthogonal design achieving the capacity of a multiple-input multiple-output
(MIMO) wireless communication system with n_T=2 transmit antennas and n_R=1
receive antenna. In this work, we propose the n-times stacked Alamouti scheme
for n_T=2n transmit antennas and show that this scheme achieves the capacity in
the case of n_R=1 receive antenna. This result may regarded as an extension of
the Alamouti case. For the more general case of more than one receive antenna,
we show that if the number of transmit antennas is higher than the number of
receive antennas we achieve a high portion of the capacity with this scheme.
Further, we show that the MIMO capacity is at most twice the rate achieved with
the proposed scheme for all SNR. We derive lower and upper bounds for the rate
achieved with this scheme and compare it with upper and lower bounds for the
capacity. In addition to the capacity analysis based on the assumption of a
coherent channel, we analyze the error rate performance of the stacked OSTBC
with the optimal ML detector and with the suboptimal lattice-reduction (LR)
aided zero-forcing detector. We compare the error rate performance of the
stacked OSTBC with spatial multiplexing (SM) and full-diversity achieving
schemes. Finally, we illustrate the theoretical results by numerical
simulations.
| [
{
"version": "v1",
"created": "Sat, 21 Jul 2007 01:09:00 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Sezgin",
"Aydin",
""
],
[
"Henkel",
"Oliver",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3186 | Damien Chablat | Anatoly Pashkevich (Robotic Laboratory), Philippe Wenger (IRCCyN),
Damien Chablat (IRCCyN) | Kinematic and stiffness analysis of the Orthoglide, a PKM with simple,
regular workspace and homogeneous performances | null | Dans International Conference On Robotics And Automation ICRA,
Rome : Italie (04/2007) | null | null | cs.RO | null | The Orthoglide is a Delta-type PKM dedicated to 3-axis rapid machining
applications that was originally developed at IRCCyN in 2000-2001 to meet the
advantages of both serial 3-axis machines (regular workspace and homogeneous
performances) and parallel kinematic architectures (good dynamic performances
and stiffness). This machine has three fixed parallel linear joints that are
mounted orthogonally. The geometric parameters of the Orthoglide were defined
as function of the size of a prescribed cubic Cartesian workspace that is free
of singularities and internal collision. The interesting features of the
Orthoglide are a regular Cartesian workspace shape, uniform performances in all
directions and good compactness. In this paper, a new method is proposed to
analyze the stiffness of overconstrained Delta-type manipulators, such as the
Orthoglide. The Orthoglide is then benchmarked according to geometric,
kinematic and stiffness criteria: workspace to footprint ratio, velocity and
force transmission factors, sensitivity to geometric errors, torsional
stiffness and translational stiffness.
| [
{
"version": "v1",
"created": "Sat, 21 Jul 2007 05:24:17 GMT"
}
] | 2007-07-24T00:00:00 | [
[
"Pashkevich",
"Anatoly",
"",
"Robotic Laboratory"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3205 | Andrew Schumann | Andrew Schumann, Florentin Smarandache | Neutrality and Many-Valued Logics | 119 pages | A. Schumann, F. Smarandache, Neutrality and Many-Valued Logics.
American Research Press, 2007 | null | null | cs.LO cs.AI | null | In this book, we consider various many-valued logics: standard, linear,
hyperbolic, parabolic, non-Archimedean, p-adic, interval, neutrosophic, etc. We
survey also results which show the tree different proof-theoretic frameworks
for many-valued logics, e.g. frameworks of the following deductive calculi:
Hilbert's style, sequent, and hypersequent. We present a general way that
allows to construct systematically analytic calculi for a large family of
non-Archimedean many-valued logics: hyperrational-valued, hyperreal-valued, and
p-adic valued logics characterized by a special format of semantics with an
appropriate rejection of Archimedes' axiom. These logics are built as different
extensions of standard many-valued logics (namely, Lukasiewicz's, Goedel's,
Product, and Post's logics). The informal sense of Archimedes' axiom is that
anything can be measured by a ruler. Also logical multiple-validity without
Archimedes' axiom consists in that the set of truth values is infinite and it
is not well-founded and well-ordered. On the base of non-Archimedean valued
logics, we construct non-Archimedean valued interval neutrosophic logic INL by
which we can describe neutrality phenomena.
| [
{
"version": "v1",
"created": "Sat, 21 Jul 2007 10:35:37 GMT"
}
] | 2007-07-24T00:00:00 | [
[
"Schumann",
"Andrew",
""
],
[
"Smarandache",
"Florentin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0707.3231 | Rico Zenklusen | Marco Laumanns and Rico Zenklusen | Estimation of Small s-t Reliabilities in Acyclic Networks | null | null | null | null | cs.DM | null | In the classical s-t network reliability problem a fixed network G is given
including two designated vertices s and t (called terminals). The edges are
subject to independent random failure, and the task is to compute the
probability that s and t are connected in the resulting network, which is known
to be #P-complete. In this paper we are interested in approximating the s-t
reliability in case of a directed acyclic original network G. We introduce and
analyze a specialized version of the Monte-Carlo algorithm given by Karp and
Luby. For the case of uniform edge failure probabilities, we give a worst-case
bound on the number of samples that have to be drawn to obtain an epsilon-delta
approximation, being sharper than the original upper bound. We also derive a
variance reduction of the estimator which reduces the expected number of
iterations to perform to achieve the desired accuracy when applied in
conjunction with different stopping rules. Initial computational results on two
types of random networks (directed acyclic Delaunay graphs and a slightly
modified version of a classical random graph) with up to one million vertices
are presented. These results show the advantage of the introduced Monte-Carlo
approach compared to direct simulation when small reliabilities have to be
estimated and demonstrate its applicability on large-scale instances.
| [
{
"version": "v1",
"created": "Sat, 21 Jul 2007 21:50:36 GMT"
}
] | 2007-07-24T00:00:00 | [
[
"Laumanns",
"Marco",
""
],
[
"Zenklusen",
"Rico",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.3236 | Vladimir Tskhvaradze | Vladimir Tskhvaradze | RS-232 Led Board | null | null | null | null | cs.OH | null | This article demonstrates how to develop a Microchip PIC16F84 based device
that supports RS-232 interface with PC. Circuit (LED Board) design and software
development will be discussed. PicBasic Pro Compiler from microEngineering
Labs, Inc. is used for PIC programming. Development of LED Board Control
Console using C/C++ is also briefly discussed. The project requires basic work
experience with Microchip PICs, serial communication and programming.
| [
{
"version": "v1",
"created": "Sun, 22 Jul 2007 02:31:09 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Tskhvaradze",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.3248 | Rajesh Sundaresan | Leena Zacharias, Rajesh Sundaresan | Decentralized sequential change detection using physical layer fusion | 10 pages, two-column, 10 figures, revised based on feedback from
reviewers, accepted for publication in IEEE Trans. on Wireless Communications | IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4999-5008, Dec.
2008 | 10.1109/T-WC.2008.070808 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of decentralized sequential detection with conditionally
independent observations is studied. The sensors form a star topology with a
central node called fusion center as the hub. The sensors make noisy
observations of a parameter that changes from an initial state to a final state
at a random time where the random change time has a geometric distribution. The
sensors amplify and forward the observations over a wireless Gaussian multiple
access channel and operate under either a power constraint or an energy
constraint. The optimal transmission strategy at each stage is shown to be the
one that maximizes a certain Ali-Silvey distance between the distributions for
the hypotheses before and after the change. Simulations demonstrate that the
proposed analog technique has lower detection delays when compared with
existing schemes. Simulations further demonstrate that the energy-constrained
formulation enables better use of the total available energy than the
power-constrained formulation in the change detection problem.
| [
{
"version": "v1",
"created": "Sun, 22 Jul 2007 10:07:33 GMT"
},
{
"version": "v2",
"created": "Sat, 18 Aug 2007 15:05:59 GMT"
},
{
"version": "v3",
"created": "Mon, 4 Aug 2008 07:29:21 GMT"
}
] | 2008-12-29T00:00:00 | [
[
"Zacharias",
"Leena",
""
],
[
"Sundaresan",
"Rajesh",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3263 | Wojciech Wislicki | Wojciech Wislicki | Autonomous tools for Grid management, monitoring and optimization | The original version of this proposal was created on 22nd March 2006,
published as the ICM UW preprint and registered in the bibliographic database
of the University of Warsaw on the following Internet address:
http://bibliografia.icm.edu.pl/g2/main.pl?mod=p&id=51470&t=1&tytul=Autonomous&lim=100&ord=1 | null | null | null | cs.DC cs.CE hep-ex | null | We outline design and lines of development of autonomous tools for the
computing Grid management, monitoring and optimization. The management is
proposed to be based on the notion of utility. Grid optimization is considered
to be application-oriented. A generic Grid simulator is proposed as an
optimization tool for Grid structure and functionality.
| [
{
"version": "v1",
"created": "Sun, 22 Jul 2007 14:02:21 GMT"
}
] | 2009-07-09T00:00:00 | [
[
"Wislicki",
"Wojciech",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
}
] |
0707.3269 | Laurent Romary | Laurent Romary (INRIA Lorraine - LORIA), Nancy Ide (INRIA Lorraine -
LORIA) | International Standard for a Linguistic Annotation Framework | null | Natural Language Engineering 10, 3-4 (09/2004) 211-225 | null | null | cs.CL | null | This paper describes the Linguistic Annotation Framework under development
within ISO TC37 SC4 WG1. The Linguistic Annotation Framework is intended to
serve as a basis for harmonizing existing language resources as well as
developing new ones.
| [
{
"version": "v1",
"created": "Sun, 22 Jul 2007 15:24:48 GMT"
}
] | 2007-07-24T00:00:00 | [
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
],
[
"Ide",
"Nancy",
"",
"INRIA Lorraine -\n LORIA"
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0707.3270 | Laurent Romary | Laurent Romary (INRIA Lorraine - LORIA), Nancy Ide, Adam Kilgarriff | A Formal Model of Dictionary Structure and Content | null | Dans Euralex 2000 Euralex 2000, Stuttgart : Allemagne (2000) | null | null | cs.CL | null | We show that a general model of lexical information conforms to an abstract
model that reflects the hierarchy of information found in a typical dictionary
entry. We show that this model can be mapped into a well-formed XML document,
and how the XSL transformation language can be used to implement a semantics
defined over the abstract model to enable extraction and manipulation of the
information in any format.
| [
{
"version": "v1",
"created": "Sun, 22 Jul 2007 15:25:27 GMT"
}
] | 2007-07-24T00:00:00 | [
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
],
[
"Ide",
"Nancy",
""
],
[
"Kilgarriff",
"Adam",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0707.3336 | Koujin Takeda | Koujin Takeda, Atsushi Hatabu, Yoshiyuki Kabashima | Statistical mechanical analysis of the linear vector channel in digital
communication | 15 pages, 2 figures | J. Phys. A40 (2007) 14085-14098 | 10.1088/1751-8113/40/47/004 | null | cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT | null | A statistical mechanical framework to analyze linear vector channel models in
digital wireless communication is proposed for a large system. The framework is
a generalization of that proposed for code-division multiple-access systems in
Europhys. Lett. 76 (2006) 1193 and enables the analysis of the system in which
the elements of the channel transfer matrix are statistically correlated with
each other. The significance of the proposed scheme is demonstrated by
assessing the performance of an existing model of multi-input multi-output
communication systems.
| [
{
"version": "v1",
"created": "Mon, 23 Jul 2007 08:35:39 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Nov 2007 13:52:44 GMT"
}
] | 2007-11-06T00:00:00 | [
[
"Takeda",
"Koujin",
""
],
[
"Hatabu",
"Atsushi",
""
],
[
"Kabashima",
"Yoshiyuki",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3390 | Francis Bach | Francis Bach (WILLOW Project - Inria/Ens) | Consistency of the group Lasso and multiple kernel learning | null | null | null | null | cs.LG | null | We consider the least-square regression problem with regularization by a
block 1-norm, i.e., a sum of Euclidean norms over spaces of dimensions larger
than one. This problem, referred to as the group Lasso, extends the usual
regularization by the 1-norm where all spaces have dimension one, where it is
commonly referred to as the Lasso. In this paper, we study the asymptotic model
consistency of the group Lasso. We derive necessary and sufficient conditions
for the consistency of group Lasso under practical assumptions, such as model
misspecification. When the linear predictors and Euclidean norms are replaced
by functions and reproducing kernel Hilbert norms, the problem is usually
referred to as multiple kernel learning and is commonly used for learning from
heterogeneous data sources and for non linear variable selection. Using tools
from functional analysis, and in particular covariance operators, we extend the
consistency results to this infinite dimensional case and also propose an
adaptive scheme to obtain a consistent model estimate, even when the necessary
condition required for the non adaptive scheme is not satisfied.
| [
{
"version": "v1",
"created": "Mon, 23 Jul 2007 14:35:20 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Jan 2008 10:10:31 GMT"
}
] | 2008-01-28T00:00:00 | [
[
"Bach",
"Francis",
"",
"WILLOW Project - Inria/Ens"
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0707.3407 | Alexander Tiskin | Alexander Tiskin | Faster subsequence recognition in compressed strings | null | null | null | null | cs.DS cs.CC cs.DM | null | Computation on compressed strings is one of the key approaches to processing
massive data sets. We consider local subsequence recognition problems on
strings compressed by straight-line programs (SLP), which is closely related to
Lempel--Ziv compression. For an SLP-compressed text of length $\bar m$, and an
uncompressed pattern of length $n$, C{\'e}gielski et al. gave an algorithm for
local subsequence recognition running in time $O(\bar mn^2 \log n)$. We improve
the running time to $O(\bar mn^{1.5})$. Our algorithm can also be used to
compute the longest common subsequence between a compressed text and an
uncompressed pattern in time $O(\bar mn^{1.5})$; the same problem with a
compressed pattern is known to be NP-hard.
| [
{
"version": "v1",
"created": "Mon, 23 Jul 2007 16:26:24 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Nov 2007 14:16:07 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Jan 2008 21:54:54 GMT"
},
{
"version": "v4",
"created": "Fri, 18 Jan 2008 10:20:48 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Tiskin",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.3409 | Alexander Tiskin | Alexander Tiskin | Faster exon assembly by sparse spliced alignment | null | null | null | null | cs.DS cs.CC cs.CE q-bio.QM | null | Assembling a gene from candidate exons is an important problem in
computational biology. Among the most successful approaches to this problem is
\emph{spliced alignment}, proposed by Gelfand et al., which scores different
candidate exon chains within a DNA sequence of length $m$ by comparing them to
a known related gene sequence of length n, $m = \Theta(n)$. Gelfand et al.\
gave an algorithm for spliced alignment running in time O(n^3). Kent et al.\
considered sparse spliced alignment, where the number of candidate exons is
O(n), and proposed an algorithm for this problem running in time O(n^{2.5}). We
improve on this result, by proposing an algorithm for sparse spliced alignment
running in time O(n^{2.25}). Our approach is based on a new framework of
\emph{quasi-local string comparison}.
| [
{
"version": "v1",
"created": "Mon, 23 Jul 2007 16:35:54 GMT"
}
] | 2007-07-24T00:00:00 | [
[
"Tiskin",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0707.3435 | Joseph Y. Halpern | Joseph Y. Halpern and Sabina Petride | A Knowledge-Based Analysis of Global Function Computation | null | null | null | null | cs.DC cs.LO | null | Consider a distributed system N in which each agent has an input value and
each communication link has a weight. Given a global function, that is, a
function f whose value depends on the whole network, the goal is for every
agent to eventually compute the value f(N). We call this problem global
function computation. Various solutions for instances of this problem, such as
Boolean function computation, leader election, (minimum) spanning tree
construction, and network determination, have been proposed, each under
particular assumptions about what processors know about the system and how this
knowledge can be acquired. We give a necessary and sufficient condition for the
problem to be solvable that generalizes a number of well-known results. We then
provide a knowledge-based (kb) program (like those of Fagin, Halpern, Moses,
and Vardi) that solves global function computation whenever possible. Finally,
we improve the message overhead inherent in our initial kb program by giving a
counterfactual belief-based program that also solves the global function
computation whenever possible, but where agents send messages only when they
believe it is necessary to do so. The latter program is shown to be implemented
by a number of well-known algorithms for solving leader election.
| [
{
"version": "v1",
"created": "Mon, 23 Jul 2007 18:49:28 GMT"
}
] | 2007-08-08T00:00:00 | [
[
"Halpern",
"Joseph Y.",
""
],
[
"Petride",
"Sabina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.3449 | Jean Mairesse | Thu-Ha Dao-Thi (LIAFA), Jean Mairesse (LIAFA) | Zero-automatic queues and product form | null | Advances in Applied Probability 39, 2 (2007) 429-461 | null | null | cs.DM | null | We introduce and study a new model: 0-automatic queues. Roughly, 0-automatic
queues are characterized by a special buffering mechanism evolving like a
random walk on some infinite group or monoid. The salient result is that all
stable 0-automatic queues have a product form stationary distribution and a
Poisson output process. When considering the two simplest and extremal cases of
0-automatic queues, we recover the simple M/M/1 queue, and Gelenbe's G-queue
with positive and negative customers.
| [
{
"version": "v1",
"created": "Mon, 23 Jul 2007 20:41:43 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Dao-Thi",
"Thu-Ha",
"",
"LIAFA"
],
[
"Mairesse",
"Jean",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.3457 | Chenguang Lu | Chenguang Lu | A Generalized Information Formula as the Bridge between Shannon and
Popper | 8 pages, 5 figures | null | null | null | cs.IT cs.AI math.IT | null | A generalized information formula related to logical probability and fuzzy
set is deduced from the classical information formula. The new information
measure accords with to Popper's criterion for knowledge evolution very much.
In comparison with square error criterion, the information criterion does not
only reflect error of a proposition, but also reflects the particularity of the
event described by the proposition. It gives a proposition with less logical
probability higher evaluation. The paper introduces how to select a prediction
or sentence from many for forecasts and language translations according to the
generalized information criterion. It also introduces the rate fidelity theory,
which comes from the improvement of the rate distortion theory in the classical
information theory by replacing distortion (i.e. average error) criterion with
the generalized mutual information criterion, for data compression and
communication efficiency. Some interesting conclusions are obtained from the
rate-fidelity function in relation to image communication. It also discusses
how to improve Popper's theory.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 00:04:32 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Lu",
"Chenguang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3461 | Dinesh Krithivasan | D. Krithivasan and S. S. Pradhan | Lattices for Distributed Source Coding: Jointly Gaussian Sources and
Reconstruction of a Linear Function | 33 pages, 7 figures | null | null | null | cs.IT math.IT | null | Consider a pair of correlated Gaussian sources (X1,X2). Two separate encoders
observe the two components and communicate compressed versions of their
observations to a common decoder. The decoder is interested in reconstructing a
linear combination of X1 and X2 to within a mean-square distortion of D. We
obtain an inner bound to the optimal rate-distortion region for this problem. A
portion of this inner bound is achieved by a scheme that reconstructs the
linear function directly rather than reconstructing the individual components
X1 and X2 first. This results in a better rate region for certain parameter
values. Our coding scheme relies on lattice coding techniques in contrast to
more prevalent random coding arguments used to demonstrate achievable rate
regions in information theory. We then consider the case of linear
reconstruction of K sources and provide an inner bound to the optimal
rate-distortion region. Some parts of the inner bound are achieved using the
following coding structure: lattice vector quantization followed by
"correlated" lattice-structured binning.
| [
{
"version": "v1",
"created": "Mon, 23 Jul 2007 22:55:43 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Krithivasan",
"D.",
""
],
[
"Pradhan",
"S. S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3462 | Noah Stein | Noah D. Stein, Asuman Ozdaglar, Pablo A. Parrilo | Separable and Low-Rank Continuous Games | null | International Journal of Game Theory, Vol. 37, No. 4, pp. 457-474,
2008. | 10.1007/s00182-008-0129-2 | null | cs.GT math.OC | null | In this paper, we study nonzero-sum separable games, which are continuous
games whose payoffs take a sum-of-products form. Included in this subclass are
all finite games and polynomial games. We investigate the structure of
equilibria in separable games. We show that these games admit finitely
supported Nash equilibria. Motivated by the bounds on the supports of mixed
equilibria in two-player finite games in terms of the ranks of the payoff
matrices, we define the notion of the rank of an n-player continuous game and
use this to provide bounds on the cardinality of the support of equilibrium
strategies. We present a general characterization theorem that states that a
continuous game has finite rank if and only if it is separable. Using our rank
results, we present an efficient algorithm for computing approximate equilibria
of two-player separable games with fixed strategy spaces in time polynomial in
the rank of the game.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 16:20:59 GMT"
}
] | 2010-04-26T00:00:00 | [
[
"Stein",
"Noah D.",
""
],
[
"Ozdaglar",
"Asuman",
""
],
[
"Parrilo",
"Pablo A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0707.3479 | Alp Atici | Alp Atici, Rocco A. Servedio | Quantum Algorithms for Learning and Testing Juntas | 15 pages, 1 figure. Uses synttree package. To appear in Quantum
Information Processing | Quantum Information Processing, Vol. 6, No. 5, 323 - 348 (2007) | 10.1007/s11128-007-0061-6 | null | quant-ph cs.LG | null | In this article we develop quantum algorithms for learning and testing
juntas, i.e. Boolean functions which depend only on an unknown set of k out of
n input variables. Our aim is to develop efficient algorithms:
- whose sample complexity has no dependence on n, the dimension of the domain
the Boolean functions are defined over;
- with no access to any classical or quantum membership ("black-box")
queries. Instead, our algorithms use only classical examples generated
uniformly at random and fixed quantum superpositions of such classical
examples;
- which require only a few quantum examples but possibly many classical
random examples (which are considered quite "cheap" relative to quantum
examples).
Our quantum algorithms are based on a subroutine FS which enables sampling
according to the Fourier spectrum of f; the FS subroutine was used in earlier
work of Bshouty and Jackson on quantum learning. Our results are as follows:
- We give an algorithm for testing k-juntas to accuracy $\epsilon$ that uses
$O(k/\epsilon)$ quantum examples. This improves on the number of examples used
by the best known classical algorithm.
- We establish the following lower bound: any FS-based k-junta testing
algorithm requires $\Omega(\sqrt{k})$ queries.
- We give an algorithm for learning $k$-juntas to accuracy $\epsilon$ that
uses $O(\epsilon^{-1} k\log k)$ quantum examples and $O(2^k \log(1/\epsilon))$
random examples. We show that this learning algorithms is close to optimal by
giving a related lower bound.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 13:17:55 GMT"
}
] | 2007-10-16T00:00:00 | [
[
"Atici",
"Alp",
""
],
[
"Servedio",
"Rocco A.",
""
]
] | [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0707.3482 | Kenton K. Yee | Kenton K. Yee | A Bayesian Framework for Combining Valuation Estimates | Citations at
http://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=240309 Review of
Quantitative Finance and Accounting, 30.3 (2008) forthcoming | null | null | null | q-fin.ST cs.CE nlin.AO nlin.CD nlin.SI physics.pop-ph physics.soc-ph stat.AP | null | Obtaining more accurate equity value estimates is the starting point for
stock selection, value-based indexing in a noisy market, and beating benchmark
indices through tactical style rotation. Unfortunately, discounted cash flow,
method of comparables, and fundamental analysis typically yield discrepant
valuation estimates. Moreover, the valuation estimates typically disagree with
market price. Can one form a superior valuation estimate by averaging over the
individual estimates, including market price? This article suggests a Bayesian
framework for combining two or more estimates into a superior valuation
estimate. The framework justifies the common practice of averaging over several
estimates to arrive at a final point estimate.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 05:04:53 GMT"
}
] | 2008-12-02T00:00:00 | [
[
"Yee",
"Kenton K.",
""
]
] | [
{
"class": "Quantitative Finance",
"code": "q-fin.ST",
"description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data",
"span": "(Statistical Finance)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Physics",
"code": "nlin.SI",
"description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems",
"span": "(Exactly Solvable and Integrable Systems)"
},
{
"class": "Physics",
"code": "physics.pop-ph",
"description": "Description coming soon",
"span": "(Popular Physics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0707.3507 | Damien Chablat | Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat
(IRCCyN) | Workspace and Kinematic Analysis of the VERNE machine | null | Dans International Conference on Advanced Intelligent Mechatronics
- AIM, Z\"urich : Suisse (09/2007) | null | null | cs.RO | null | This paper describes the workspace and the inverse and direct kinematic
analysis of the VERNE machine, a serial/parallel 5-axis machine tool designed
by Fatronik for IRCCyN. This machine is composed of a three-degree-of-freedom
(DOF) parallel module and a two-DOF serial tilting table. The parallel module
consists of a moving platform that is connected to a fixed base by three
non-identical legs. This feature involves (i) a simultaneous combination of
rotation and translation for the moving platform, which is balanced by the
tilting table and (ii) workspace whose shape and volume vary as a function of
the tool length. This paper summarizes results obtained in the context of the
European projects NEXT ("Next Generation of Productions Systems").
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 09:13:22 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Kanaan",
"Daniel",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3509 | Laurent Decreusefond | Laurent Decreusefond (LTCI), Eduardo Ferraz (LTCI), Philippe Martins
(LTCI) | Upper bound of loss probability in an OFDMA system with randomly located
users | null | null | null | null | math.PR cs.IT cs.NI math.IT | null | For OFDMA systems, we find a rough but easily computed upper bound for the
probability of loosing communications by insufficient number of sub-channels on
downlink. We consider as random the positions of receiving users in the system
as well as the number of sub-channels dedicated to each one. We use recent
results of the theory of point processes which reduce our calculations to the
first and second moments of the total required number of sub-carriers.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 15:12:13 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Decreusefond",
"Laurent",
"",
"LTCI"
],
[
"Ferraz",
"Eduardo",
"",
"LTCI"
],
[
"Martins",
"Philippe",
"",
"LTCI"
]
] | [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3531 | Luis Nunez A | J. L. Chaves, G. Diaz, V. Hamar, R. Isea, F. Rojas, N. Ruiz, R.
Torrens, M. Uzcategui, J. Florez-Lopez, H. Hoeger, C. Mendoza, L. A. Nunez | e-Science initiatives in Venezuela | 9 pages, 4 figures | Procceedings Spanish Conference on e-Science Grid Computing, J.
Casado, R. Mayo y R. Munoz (Editors) CIEMAT, Madrid Spain (2007), pp 45 - 52 | null | null | cs.CE cs.DC | null | Within the context of the nascent e-Science infrastructure in Venezuela, we
describe several web-based scientific applications developed at the Centro
Nacional de Calculo Cientifico Universidad de Los Andes (CeCalCULA), Merida,
and at the Instituto Venezolano de Investigaciones Cientificas (IVIC), Caracas.
The different strategies that have been followed for implementing quantum
chemistry and atomic physics applications are presented. We also briefly
discuss a damage portal based on dynamic, nonlinear, finite elements of lumped
damage mechanics and a biomedical portal developed within the framework of the
\textit{E-Infrastructure shared between Europe and Latin America} (EELA)
initiative for searching common sequences and inferring their functions in
parasitic diseases such as leishmaniasis, chagas and malaria.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 12:00:43 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Chaves",
"J. L.",
""
],
[
"Diaz",
"G.",
""
],
[
"Hamar",
"V.",
""
],
[
"Isea",
"R.",
""
],
[
"Rojas",
"F.",
""
],
[
"Ruiz",
"N.",
""
],
[
"Torrens",
"R.",
""
],
[
"Uzcategui",
"M.",
""
],
[
"Florez-Lopez",
"J.",
""
],
[
"Hoeger",
"H.",
""
],
[
"Mendoza",
"C.",
""
],
[
"Nunez",
"L. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.3534 | Damien Chablat | Damien Chablat (IRCCyN), St\'ephane Caro (IRCCyN) | The Kinetostatic Optimization of a Novel Prismatic Drive | null | Dans 12th World Congress in Mechanism and Machine Science - 12th
World Congress in Mechanism and Machine Science, Besan\c{c}on : France
(06/2007) | null | null | cs.RO | null | The design of a mechanical transmission taking into account the transmitted
forces is reported in this paper. This transmission is based on Slide-o-Cam, a
cam mechanism with multiple rollers mounted on a common translating follower.
The design of Slide-o-Cam, a transmission intended to produce a sliding motion
from a turning drive, or vice versa, was reported elsewhere. This transmission
provides pure-rolling motion, thereby reducing the friction of rack-and-pinions
and linear drives. The pressure angle is a suitable performance index for this
transmission because it determines the amount of force transmitted to the load
vs. that transmitted to the machine frame. To assess the transmission
capability of the mechanism, the Hertz formula is introduced to calculate the
stresses on the rollers and on the cams. The final transmission is intended to
replace the current ball-screws in the Orthoglide, a three-DOF parallel robot
for the production of translational motions, currently under development for
machining applications at Ecole Centrale de Nantes.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 12:18:05 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Caro",
"Stéphane",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3540 | Patrick Erik Bradley | Patrick Erik Bradley | Mumford dendrograms | 16 pages, 7 figures; Incorporating Special Issue: Ultrametric and
p-Adic Applications in Computer Science | The Computer Journal, Vol. 53, No. 4 (2010), 393-404 | 10.1093/comjnl/bxm088 | null | cs.DM | null | An effective $p$-adic encoding of dendrograms is presented through an
explicit embedding into the Bruhat-Tits tree for a $p$-adic number field. This
field depends on the number of children of a vertex and is a finite extension
of the field of $p$-adic numbers. It is shown that fixing $p$-adic
representatives of the residue field allows a natural way of encoding strings
by identifying a given alphabet with such representatives. A simple $p$-adic
hierarchic classification algorithm is derived for $p$-adic numbers, and is
applied to strings over finite alphabets. Examples of DNA coding are presented
and discussed. Finally, new geometric and combinatorial invariants of time
series of $p$-adic dendrograms are developped.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 13:00:17 GMT"
}
] | 2010-05-18T00:00:00 | [
[
"Bradley",
"Patrick Erik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.3550 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | A Six Degree-Of-Freedom Haptic Device Based On The Orthoglide And A
Hybrid Agile Eye | null | Dans Proceedings of IDETC 2006: 30th Mechanisms & Robotics
Conference (MR) - IDETC, Philadelphie : \'Etats-Unis d'Am\'erique (2006) | null | null | cs.RO | null | This paper is devoted to the kinematic design of a new six degree-of-freedom
haptic device using two parallel mechanisms. The first one, called orthoglide,
provides the translation motions and the second one, called agile eye, produces
the rotational motions. These two motions are decoupled to simplify the direct
and inverse kinematics, as it is needed for real-time control. To reduce the
inertial load, the motors are fixed on the base and a transmission with two
universal joints is used to transmit the rotational motions from the base to
the end-effector. Two alternative wrists are proposed (i), the agile eye with
three degrees of freedom or (ii) a hybrid wrist made by the assembly of a
two-dof agile eye with a rotary motor. The last one is optimized to increase
its stiffness and to decrease the number of moving parts.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 13:42:08 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3552 | Damien Chablat | Maher Baili (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger
(IRCCyN) | Analyse Comparative des Manipulateurs 3R \`a Axes Orthogonaux | null | Dans Congr\`es international Conception et Mod\'elisation des
Syst\`emes M\'ecaniques - Congr\`es international Conception et
Mod\'elisation des Syst\`emes M\'ecaniques, Hammamet : Tunisie (03/2005) | null | null | cs.RO | null | A family of 3R orthogonal manipulators without offset on the third body can
be divided into exactly nine workspace topologies. The workspace is
characterized in a half-cross section by the singular curves. The workspace
topology is defined by the number of cusps and nodes that appear on these
singular curves. Based on this classification, we evaluate theses manipulators
by the condition number related to the joint space and the proportion of the
region with four inverse kinematic solutions compared to a sphere containing
all the workspace. This second performance number is in relation with the
workspace. We determine finally le topology of workspace to which belong
manipulators having the best performance number values.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 13:46:22 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Baili",
"Maher",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3553 | Damien Chablat | Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | An Exhaustive Study of the Workspace Topologies of all 3R Orthogonal
Manipulators with Geometric Simplifications | null | Dans Proceedings of CK2005 - Proceedings of CK2005, International
Workshop on Computational Kinematics, Cassino : Italie (05/2005) | null | null | cs.RO | null | This paper analyses the workspace of the three-revolute orthogonal
manipulators that have at least one of their DH parameters equal to zero. These
manipulators are classified into different groups with similar kinematic
properties. The classification criteria are based on the topology of the
workspace. Each group is evaluated according to interesting kinematic
properties such as the size of the workspace subregion reachable with four
inverse kinematic solutions, the existence and the size of voids, and the size
of the regions of feasible paths in the workspace.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 13:49:51 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Zein",
"Mazen",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3559 | Wilson Wong | Wilson Wong | Practical Approach to Knowledge-based Question Answering with Natural
Language Understanding and Advanced Reasoning | Master of Science thesis, National Technical University College of
Malaysia, 2005 | null | null | null | cs.CL cs.AI cs.HC cs.IR | null | This research hypothesized that a practical approach in the form of a
solution framework known as Natural Language Understanding and Reasoning for
Intelligence (NaLURI), which combines full-discourse natural language
understanding, powerful representation formalism capable of exploiting
ontological information and reasoning approach with advanced features, will
solve the following problems without compromising practicality factors: 1)
restriction on the nature of question and response, and 2) limitation to scale
across domains and to real-life natural language text.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 14:30:27 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Wong",
"Wilson",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0707.3560 | Damien Chablat | Antoine Rennuit (IRCCyN), Alain Micaelli (CEA/LIST), Xavier Merlhiot
(CEA/LIST), Claude Andriot (CEA/LIST), Fran\c{c}ois Guillaume, Nicolas
Chevassus, Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN) | Integration of a Balanced Virtual Manikin in a Virtual Reality Platform
aimed at Virtual Prototyping | null | Dans Proceedings of Virtual Concept 2005 - Virtual Concept,
Biarritz : France (11/2005) | null | null | cs.RO | null | The work presented here is aimed at introducing a virtual human controller in
a virtual prototyping framework. After a brief introduction describing the
problem solved in the paper, we describe the interest as for digital humans in
the context of concurrent engineering. This leads us to draw a control
architecture enabling to drive virtual humans in a real-time immersed way, and
to interact with the product, through motion capture. Unfortunately, we show
this control scheme can lead to unfeasible movements because of the lack of
balance control. Introducing such a controller is a problem that was never
addressed in the context of real-time. We propose an implementation of a
balance controller, that we insert into the previously described control
scheme. Next section is dedicated to show the results we obtained. Finally, we
propose a virtual reality platform into which the digital character controller
is integrated.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 14:23:37 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Rennuit",
"Antoine",
"",
"IRCCyN"
],
[
"Micaelli",
"Alain",
"",
"CEA/LIST"
],
[
"Merlhiot",
"Xavier",
"",
"CEA/LIST"
],
[
"Andriot",
"Claude",
"",
"CEA/LIST"
],
[
"Guillaume",
"François",
"",
"IRCCyN"
],
[
"Chevassus",
"Nicolas",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Chedmail",
"Patrick",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3562 | Damien Chablat | Antoine Rennuit (IRCCyN), Alain Micaelli (CEA/LIST), Xavier Merlhiot
(CEA/LIST), Claude Andriot (CEA/LIST), Fran\c{c}ois Guillaume, Nicolas
Chevassus, Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN) | Balanced Virtual Humans Interacting with their Environment | null | Dans Summer Computer Simulation Conference - Summer Computer
Simulation Conference, France (08/2005) | null | null | cs.RO | null | The animation of human avatars seems very successful; the computer graphics
industry shows outstanding results in films everyday, the game industry
achieves exploits... Nevertheless, the animation and control processes of such
manikins are very painful. It takes days to a specialist to build such animated
sequences, and it is not adaptive to any type of modifications. Our main
purpose is the virtual human for engineering, especially virtual prototyping.
As for this domain of activity, such amounts of time are prohibitive.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 14:26:28 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Rennuit",
"Antoine",
"",
"IRCCyN"
],
[
"Micaelli",
"Alain",
"",
"CEA/LIST"
],
[
"Merlhiot",
"Xavier",
"",
"CEA/LIST"
],
[
"Andriot",
"Claude",
"",
"CEA/LIST"
],
[
"Guillaume",
"François",
"",
"IRCCyN"
],
[
"Chevassus",
"Nicolas",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Chedmail",
"Patrick",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3563 | Damien Chablat | Fouad Bennis (IRCCyN), Damien Chablat (IRCCyN), Philippe D\'epinc\'e | Virtual reality: A human centered tool for improving Manufacturing | null | Dans Proceedings of Virtual Concept 2005 - Virtual Concept,
Biarritz : France (11/2005) | null | null | cs.RO | null | Manufacturing is using Virtual Reality tools to enhance the product life
cycle. Their definitions are still in flux and it is necessary to define their
connections. Thus, firstly, we will introduce more closely some definitions
where we will find that, if the Virtual manufacturing concepts originate from
machining operations and evolve in this manufacturing area, there exist a lot
of applications in different fields such as casting, forging, sheet
metalworking and robotics (mechanisms). From the recent projects in Europe or
in USA, we notice that the human perception or the simulation of mannequin is
more and more needed in both fields. In this context, we have isolated some
applications as ergonomic studies, assembly and maintenance simulation, design
or training where the virtual reality tools can be applied. Thus, we find out a
family of applications where the virtual reality tools give the engineers the
main role in the optimization process. We will illustrate our paper by several
examples where virtual reality interfaces are used and combined with
optimization tools as multi-agent systems.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 14:28:01 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Bennis",
"Fouad",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Dépincé",
"Philippe",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3564 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN) | A New Six Degree-of-Freedom Haptic Device based on the Orthoglide and
the Agile Eye | null | Dans Proceedings of Virtual Concept 2005 - Virtual Concept, France
(11/2005) | null | null | cs.RO | null | The aim of this paper is to present a new six degree-of-freedom (dof) haptic
device using two parallel mechanisms. The first one, called orthoglide,
provides the translation motions and the second one produces the rotational
motions. These two motions are decoupled to simplify the direct and inverse
kinematics, as it is needed for real-times control. To reduce the inertial
load, the motors are fixed on the base and a transmission with two universal
joints is used to transmit the rotational motions from the base to the
end-effector. The main feature of the orthoglide and of the agile eye mechanism
is the existence of an isotropic configuration. The length of the legs and the
range limits of the orthoglide are optimized to have homogeneous performance
throughout the Cartesian workspace, which has a nearly cubic workspace. These
properties permit to have a high stiffness throughout the workspace and
workspace limits that are easily understandable by the user.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 14:29:41 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3574 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), F\'elix Majou
(IRCCyN) | L'orthoglide : une machine-outil rapide d'architecture parall\`ele
isotrope | null | Dans 2\`eme Assises Machines et Usinage \`a Grande Vitesse -
2\`eme Assises Machines et Usinage \`a Grande Vitesse, France (03/2002) | null | null | cs.RO | null | This article presents the Orthoglide project. The purpose of this project is
the realization of a prototype of machine tool to three degrees of translation.
The characteristic of this machine is a parallel kinematic architecture
optimized to obtain a compact workspace with homogeneous performance. For that,
the principal criterion of design which was used is the isotropy.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 15:14:38 GMT"
}
] | 2007-07-25T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Majou",
"Félix",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3575 | Philipp Mayr | Philipp Mayr, Anne-Kathrin Walter | An exploratory study of Google Scholar | 16 pages, 4 figures | null | 10.1108/14684520710841784 | null | cs.DL cs.IR | null | The paper discusses and analyzes the scientific search service Google Scholar
(GS). The focus is on an exploratory study which investigates the coverage of
scientific serials in GS. The study shows deficiencies in the coverage and
up-to-dateness of the GS index. Furthermore, the study points up which Web
servers are the most important data providers for this search service and which
information sources are highly represented. We can show that there is a
relatively large gap in Google Scholars coverage of German literature as well
as weaknesses in the accessibility of Open Access content.
Keywords: Search engines, Digital libraries, Worldwide Web, Serials,
Electronic journals
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 19:19:36 GMT"
}
] | 2019-01-15T00:00:00 | [
[
"Mayr",
"Philipp",
""
],
[
"Walter",
"Anne-Kathrin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0707.3584 | Nihar Jindal | Steven Weber, Jeffrey G. Andrews, Nihar Jindal | The effect of fading, channel inversion, and threshold scheduling on ad
hoc networks | Accepted for publication in IEEE Trans. Inform. Theory, 24 pages | IEEE Trans. Information Theory, Vol. 53, No. 11, pp. 4127-4149,
Nov. 2007 | null | null | cs.IT math.IT | null | This paper addresses three issues in the field of ad hoc network capacity:
the impact of i)channel fading, ii) channel inversion power control, and iii)
threshold-based scheduling on capacity. Channel inversion and threshold
scheduling may be viewed as simple ways to exploit channel state information
(CSI) without requiring cooperation across transmitters. We use the
transmission capacity (TC) as our metric, defined as the maximum spatial
intensity of successful simultaneous transmissions subject to a constraint on
the outage probability (OP). By assuming the nodes are located on the infinite
plane according to a Poisson process, we are able to employ tools from
stochastic geometry to obtain asymptotically tight bounds on the distribution
of the signal-to-interference (SIR) level, yielding in turn tight bounds on the
OP (relative to a given SIR threshold) and the TC. We demonstrate that in the
absence of CSI, fading can significantly reduce the TC and somewhat
surprisingly, channel inversion only makes matters worse. We develop a
threshold-based transmission rule where transmitters are active only if the
channel to their receiver is acceptably strong, obtain expressions for the
optimal threshold, and show that this simple, fully distributed scheme can
significantly reduce the effect of fading.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 16:01:48 GMT"
}
] | 2011-11-10T00:00:00 | [
[
"Weber",
"Steven",
""
],
[
"Andrews",
"Jeffrey G.",
""
],
[
"Jindal",
"Nihar",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3619 | Alexander Tiskin | Alexander Tiskin | Semi-local string comparison: algorithmic techniques and applications | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A classical measure of string comparison is given by the longest common
subsequence (LCS) problem on a pair of strings. We consider its generalisation,
called the semi-local LCS problem, which arises naturally in many
string-related problems. The semi-local LCS problem asks for the LCS scores for
each of the input strings against every substring of the other input string,
and for every prefix of each input string against every suffix of the other
input string. Such a comparison pattern provides a much more detailed picture
of string similarity than a single LCS score; it also arises naturally in many
string-related problems. In fact, the semi-local LCS problem turns out to be
fundamental for string comparison, providing a powerful and flexible
alternative to classical dynamic programming. It is especially useful when the
input to a string comparison problem may not be available all at once: for
example, comparison of dynamically changing strings; comparison of compressed
strings; parallel string comparison. The same approach can also be applied to
permutation strings, providing efficient solutions for local versions of the
longest increasing subsequence (LIS) problem, and for the problem of computing
a maximum clique in a circle graph. Furthermore, the semi-local LCS problem
turns out to have surprising connections in a few seemingly unrelated fields,
such as computational geometry and algebra of semigroups. This work is devoted
to exploring the structure of the semi-local LCS problem, its efficient
solutions, and its applications in string comparison and other related areas,
including computational molecular biology.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 19:12:23 GMT"
},
{
"version": "v10",
"created": "Wed, 5 Aug 2009 16:07:43 GMT"
},
{
"version": "v11",
"created": "Thu, 20 Aug 2009 22:16:33 GMT"
},
{
"version": "v12",
"created": "Mon, 31 Aug 2009 13:08:55 GMT"
},
{
"version": "v13",
"created": "Mon, 19 Oct 2009 14:48:06 GMT"
},
{
"version": "v14",
"created": "Fri, 11 Dec 2009 20:34:12 GMT"
},
{
"version": "v15",
"created": "Sat, 9 Jan 2010 16:22:30 GMT"
},
{
"version": "v16",
"created": "Tue, 11 May 2010 11:43:57 GMT"
},
{
"version": "v17",
"created": "Tue, 21 Feb 2012 22:50:39 GMT"
},
{
"version": "v18",
"created": "Thu, 20 Sep 2012 12:52:02 GMT"
},
{
"version": "v19",
"created": "Mon, 28 Jan 2013 02:37:21 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Oct 2007 13:29:39 GMT"
},
{
"version": "v20",
"created": "Wed, 20 Nov 2013 20:54:28 GMT"
},
{
"version": "v21",
"created": "Sat, 23 Nov 2013 23:30:05 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Nov 2007 14:09:50 GMT"
},
{
"version": "v4",
"created": "Thu, 21 Aug 2008 15:17:48 GMT"
},
{
"version": "v5",
"created": "Mon, 17 Nov 2008 22:31:37 GMT"
},
{
"version": "v6",
"created": "Wed, 10 Dec 2008 19:46:02 GMT"
},
{
"version": "v7",
"created": "Mon, 12 Jan 2009 17:49:28 GMT"
},
{
"version": "v8",
"created": "Sun, 22 Mar 2009 16:36:29 GMT"
},
{
"version": "v9",
"created": "Mon, 6 Jul 2009 15:59:42 GMT"
}
] | 2015-03-13T00:00:00 | [
[
"Tiskin",
"Alexander",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.3622 | Yaoyun Shi | Igor Markov (University of Michigan) and Yaoyun Shi (University of
Michigan) | Constant-degree graph expansions that preserve the treewidth | 12 pages, 6 figures, the main result used by quant-ph/0511070 | Algorithmica, Volume 59, Number 4, 461-470,2011 | 10.1007/s00453-009-9312-5 | null | cs.DM cs.DS math.CO quant-ph | null | Many hard algorithmic problems dealing with graphs, circuits, formulas and
constraints admit polynomial-time upper bounds if the underlying graph has
small treewidth. The same problems often encourage reducing the maximal degree
of vertices to simplify theoretical arguments or address practical concerns.
Such degree reduction can be performed through a sequence of splittings of
vertices, resulting in an _expansion_ of the original graph. We observe that
the treewidth of a graph may increase dramatically if the splittings are not
performed carefully. In this context we address the following natural question:
is it possible to reduce the maximum degree to a constant without substantially
increasing the treewidth?
Our work answers the above question affirmatively. We prove that any simple
undirected graph G=(V, E) admits an expansion G'=(V', E') with the maximum
degree <= 3 and treewidth(G') <= treewidth(G)+1. Furthermore, such an expansion
will have no more than 2|E|+|V| vertices and 3|E| edges; it can be computed
efficiently from a tree-decomposition of G. We also construct a family of
examples for which the increase by 1 in treewidth cannot be avoided.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 19:56:27 GMT"
}
] | 2011-11-04T00:00:00 | [
[
"Markov",
"Igor",
"",
"University of Michigan"
],
[
"Shi",
"Yaoyun",
"",
"University of\n Michigan"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0707.3638 | Vita Hinze-Hoare | V. Hinze-Hoare | The Review and Analysis of Human Computer Interaction (HCI) Principles | null | null | null | null | cs.HC | null | The History of HCI is briefly reviewed together with three HCI models and
structure including CSCW, CSCL and CSCR. It is shown that a number of
authorities consider HCI to be a fragmented discipline with no agreed set of
unifying design principles. An analysis of usability criteria based upon
citation frequency of authors is performed in order to discover the eight most
recognised HCI principles.
| [
{
"version": "v1",
"created": "Tue, 24 Jul 2007 20:19:47 GMT"
}
] | 2007-07-26T00:00:00 | [
[
"Hinze-Hoare",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0707.3665 | Damien Chablat | Philippe Wenger (IRCCyN), Cl\'ement Gosselin (ROBOTICS Laboratory),
Damien Chablat (IRCCyN) | A Comparative Study of Parallel Kinematic Architectures for Machining
Applications | null | Dans 2nd Workshop on Computational Kinematics - WCK, S\'eoul :
Cor\'ee, R\'epublique de (05/2001) | null | null | cs.RO | null | Parallel kinematic mechanisms are interesting alternative designs for
machining applications. Three 2-DOF parallel mechanism architectures dedicated
to machining applications are studied in this paper. The three mechanisms have
two constant length struts gliding along fixed linear actuated joints with
different relative orientation. The comparative study is conducted on the basis
of a same prescribed Cartesian workspace for the three mechanisms. The common
desired workspace properties are a rectangular shape and given kinetostatic
performances. The machine size of each resulting design is used as a
comparative criterion. The 2-DOF machine mechanisms analyzed in this paper can
be extended to 3-axis machines by adding a third joint.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 04:40:01 GMT"
}
] | 2007-07-26T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Gosselin",
"Clément",
"",
"ROBOTICS Laboratory"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3666 | Damien Chablat | Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN) | Kinematic Analysis of a New Parallel Machine Tool: the Orthoglide | null | Dans 7th International Symposium on Advances in Robot Kinematics -
ARK, France (2000) | null | null | cs.RO | null | This paper describes a new parallel kinematic architecture for machining
applications: the orthoglide. This machine features three fixed parallel linear
joints which are mounted orthogonally and a mobile platform which moves in the
Cartesian x-y-z space with fixed orientation. The main interest of the
orthoglide is that it takes benefit from the advantages of the popular PPP
serial machines (regular Cartesian workspace shape and uniform performances) as
well as from the parallel kinematic arrangement of the links (less inertia and
better dynamic performances), which makes the orthoglide well suited to
high-speed machining applications. Possible extension of the orthoglide to
5-axis machining is also investigated.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 04:42:19 GMT"
}
] | 2007-07-26T00:00:00 | [
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3670 | Xu Cheng | Xu Cheng and Cameron Dale and Jiangchuan Liu | Understanding the Characteristics of Internet Short Video Sharing:
YouTube as a Case Study | IEEE format, 9 pages, 16 figures | null | null | null | cs.NI cs.MM | null | Established in 2005, YouTube has become the most successful Internet site
providing a new generation of short video sharing service. Today, YouTube alone
comprises approximately 20% of all HTTP traffic, or nearly 10% of all traffic
on the Internet. Understanding the features of YouTube and similar video
sharing sites is thus crucial to their sustainable development and to network
traffic engineering. In this paper, using traces crawled in a 3-month period,
we present an in-depth and systematic measurement study on the characteristics
of YouTube videos. We find that YouTube videos have noticeably different
statistics compared to traditional streaming videos, ranging from length and
access pattern, to their active life span, ratings, and comments. The series of
datasets also allows us to identify the growth trend of this fast evolving
Internet site in various aspects, which has seldom been explored before. We
also look closely at the social networking aspect of YouTube, as this is a key
driving force toward its success. In particular, we find that the links to
related videos generated by uploaders' choices form a small-world network. This
suggests that the videos have strong correlations with each other, and creates
opportunities for developing novel caching or peer-to-peer distribution schemes
to efficiently deliver videos to end users.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 05:39:44 GMT"
}
] | 2007-07-26T00:00:00 | [
[
"Cheng",
"Xu",
""
],
[
"Dale",
"Cameron",
""
],
[
"Liu",
"Jiangchuan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0707.3672 | Jean Mairesse | Jean Mairesse (INRIA Sophia Antipolis) | Products of irreducible random matrices in the (Max,+) Algebra | null | Advances in Applied Probability 29, 2 (1997) 444-477 | null | null | cs.OH | null | We consider the recursive equation ``x(n+1)=A(n)x(n)'' where x(n+1) and x(n)
are column vectors of size k and where A(n) is an irreducible random matrix of
size k x k. The matrix-vector multiplication in the (max,+) algebra is defined
by (A(n)x(n))_i= max_j [ A(n)_{ij} +x(n)_j ]. This type of equation can be used
to represent the evolution of Stochastic Event Graphs which include cyclic
Jackson Networks, some manufacturing models and models with general blocking
(such as Kanban). Let us assume that the sequence (A(n))_n is i.i.d or more
generally stationary and ergodic. The main result of the paper states that the
system couples in finite time with a unique stationary regime if and only if
there exists a set of matrices C such that P {A(0) in C} > 0, and the matrices
in C have a unique periodic regime.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 06:49:11 GMT"
}
] | 2007-07-26T00:00:00 | [
[
"Mairesse",
"Jean",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.3673 | Damien Chablat | Damien Chablat (IRCCyN), Jorge Angeles (CIM) | The Computation of All 4R Serial Spherical Wrists With an Isotropic
Architecture | null | Dans 2nd Workshop on Computational Kinematics - WCK, S\'eoul :
Cor\'ee, R\'epublique de (05/2001) | null | WCK-2001 | cs.RO | null | A spherical wrist of the serial type is said to be isotropic if it can attain
a posture whereby the singular values of its Jacobian matrix are all identical
and nonzero. What isotropy brings about is robustness to manufacturing,
assembly, and measurement errors, thereby guaranteeing a maximum orientation
accuracy. In this paper we investigate the existence of redundant isotropic
architectures, which should add to the dexterity of the wrist under design by
virtue of its extra degree of freedom. The problem formulation leads to a
system of eight quadratic equations with eight unknowns. The Bezout number of
this system is thus 2^8 = 256, its BKK bound being 192. However, the actual
number of solutions is shown to be 32. We list all solutions of the foregoing
algebraic problem. All these solutions are real, but distinct solutions do not
necessarily lead to distinct manipulators. Upon discarding those algebraic
solutions that yield no new wrists, we end up with exactly eight distinct
architectures, the eight corresponding manipulators being displayed at their
isotropic posture.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 06:51:53 GMT"
}
] | 2007-07-26T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Angeles",
"Jorge",
"",
"CIM"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0707.3717 | Yann Busnel | Yann Busnel (IRISA, DIT), Marin Bertier (IRISA), Eric Fleury (INRIA
Rh\^one-Alpes), Anne-Marie Kermarrec (IRISA) | GCP: Gossip-based Code Propagation for Large-scale Mobile Wireless
Sensor Networks | null | null | null | null | cs.NI | null | Wireless sensor networks (WSN) have recently received an increasing interest.
They are now expected to be deployed for long periods of time, thus requiring
software updates. Updating the software code automatically on a huge number of
sensors is a tremendous task, as ''by hand'' updates can obviously not be
considered, especially when all participating sensors are embedded on mobile
entities. In this paper, we investigate an approach to automatically update
software in mobile sensor-based application when no localization mechanism is
available. We leverage the peer-to-peer cooperation paradigm to achieve a good
trade-off between reliability and scalability of code propagation. More
specifically, we present the design and evaluation of GCP ({\emph Gossip-based
Code Propagation}), a distributed software update algorithm for mobile wireless
sensor networks. GCP relies on two different mechanisms (piggy-backing and
forwarding control) to improve significantly the load balance without
sacrificing on the propagation speed. We compare GCP against traditional
dissemination approaches. Simulation results based on both synthetic and
realistic workloads show that GCP achieves a good convergence speed while
balancing the load evenly between sensors.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 11:52:09 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 12:21:45 GMT"
}
] | 2007-07-30T00:00:00 | [
[
"Busnel",
"Yann",
"",
"IRISA, DIT"
],
[
"Bertier",
"Marin",
"",
"IRISA"
],
[
"Fleury",
"Eric",
"",
"INRIA\n Rhône-Alpes"
],
[
"Kermarrec",
"Anne-Marie",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0707.3732 | Jean-Luc Beuchat | Jean-Luc Beuchat | Further Comments on "Residue-to-Binary Converters Based on New Chinese
Remainder Theorems" | null | null | null | null | cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ananda Mohan suggested that the first New Chinese Remainder Theorem
introduced by Wang can be derived from the constructive proof of the well-known
Chinese Remainder Theorem (CRT) and claimed that Wang's approach is the same as
the one proposed earlier by Huang. Ananda Mohan's proof is however erroneous
and we show here that Wang's New CRT I is a rewriting of an algorithm
previously sketched by Hitz and Kaltofen.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 13:08:50 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Mar 2009 04:24:57 GMT"
}
] | 2009-03-23T00:00:00 | [
[
"Beuchat",
"Jean-Luc",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.3750 | Guillaume Collet | Rumen Andonov (IRISA), Guillaume Collet (IRISA), Jean-Fran\c{c}ois
Gibrat (MIG), Antoine Marin (MIG), Vincent Poirriez (LAMIH), Nikola Yanev
(IRISA) | Recent Advances in Solving the Protein Threading Problem | null | null | null | null | q-bio.QM cs.DC | null | The fold recognition methods are promissing tools for capturing the structure
of a protein by its amino acid residues sequence but their use is still
restricted by the needs of huge computational resources and suitable efficient
algorithms as well. In the recent version of FROST (Fold Recognition Oriented
Search Tool) package the most efficient algorithm for solving the Protein
Threading Problem (PTP) is implemented due to the strong collaboration between
the SYMBIOSE group in IRISA and MIG in Jouy-en-Josas. In this paper, we present
the diverse components of FROST, emphasizing on the recent advances in
formulating and solving new versions of the PTP and on the way of solving on a
computer cluster a million of instances in a easonable time.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 14:05:59 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 12:45:26 GMT"
}
] | 2007-07-30T00:00:00 | [
[
"Andonov",
"Rumen",
"",
"IRISA"
],
[
"Collet",
"Guillaume",
"",
"IRISA"
],
[
"Gibrat",
"Jean-François",
"",
"MIG"
],
[
"Marin",
"Antoine",
"",
"MIG"
],
[
"Poirriez",
"Vincent",
"",
"LAMIH"
],
[
"Yanev",
"Nikola",
"",
"IRISA"
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0707.3781 | Paolo Liberatore | Paolo Liberatore | Bijective Faithful Translations among Default Logics | Removed one useless section | null | 10.1093/logcom/ext073 | null | cs.AI cs.LO | null | In this article, we study translations between variants of defaults logics
such that the extensions of the theories that are the input and the output of
the translation are in a bijective correspondence. We assume that a translation
can introduce new variables and that the result of translating a theory can
either be produced in time polynomial in the size of the theory or its output
is polynomial in that size; we however restrict to the case in which the
original theory has extensions. This study fills a gap between two previous
pieces of work, one studying bijective translations among restrictions of
default logics, and the other one studying non-bijective translations between
default logics variants.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 17:03:57 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 13:46:43 GMT"
}
] | 2021-04-12T00:00:00 | [
[
"Liberatore",
"Paolo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.3782 | Andreas Blass | Andreas Blass, Yuri Gurevich, Dean Rosenzweig, and Benjamin Rossman | Interactive Small-Step Algorithms I: Axiomatization | null | Logical Methods in Computer Science, Volume 3, Issue 4 (November
5, 2007) lmcs:1200 | 10.2168/LMCS-3(4:3)2007 | null | cs.LO | null | In earlier work, the Abstract State Machine Thesis -- that arbitrary
algorithms are behaviorally equivalent to abstract state machines -- was
established for several classes of algorithms, including ordinary, interactive,
small-step algorithms. This was accomplished on the basis of axiomatizations of
these classes of algorithms. Here we extend the axiomatization and, in a
companion paper, the proof, to cover interactive small-step algorithms that are
not necessarily ordinary. This means that the algorithms (1) can complete a
step without necessarily waiting for replies to all queries from that step and
(2) can use not only the environment's replies but also the order in which the
replies were received.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 17:04:26 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Nov 2007 10:56:47 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Blass",
"Andreas",
""
],
[
"Gurevich",
"Yuri",
""
],
[
"Rosenzweig",
"Dean",
""
],
[
"Rossman",
"Benjamin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.3789 | Andreas Blass | Andreas Blass, Yuri Gurevich, Dean Rosenzweig, and Benjamin Rossman | Interactive Small-Step Algorithms II: Abstract State Machines and
the<br> Characterization Theorem | null | Logical Methods in Computer Science, Volume 3, Issue 4 (November
5, 2007) lmcs:1201 | 10.2168/LMCS-3(4:4)2007 | null | cs.LO | null | In earlier work, the Abstract State Machine Thesis -- that arbitrary
algorithms are behaviorally equivalent to abstract state machines -- was
established for several classes of algorithms, including ordinary, interactive,
small-step algorithms. This was accomplished on the basis of axiomatizations of
these classes of algorithms. In Part I (Interactive Small-Step Algorithms I:
Axiomatization), the axiomatization was extended to cover interactive
small-step algorithms that are not necessarily ordinary. This means that the
algorithms (1) can complete a step without necessarily waiting for replies to
all queries from that step and (2) can use not only the environment's replies
but also the order in which the replies were received. In order to prove the
thesis for algorithms of this generality, we extend here the definition of
abstract state machines to incorporate explicit attention to the relative
timing of replies and to the possible absence of replies. We prove the
characterization theorem for extended abstract state machines with respect to
general algorithms as axiomatized in Part I.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 17:35:46 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Nov 2007 10:59:16 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Blass",
"Andreas",
""
],
[
"Gurevich",
"Yuri",
""
],
[
"Rosenzweig",
"Dean",
""
],
[
"Rossman",
"Benjamin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.3807 | Catherine Recanati | Catherine Recanati (LIPN) | How to be correct, lazy and efficient ? | 21 pages | null | null | null | cs.PL | null | This paper is an introduction to Lambdix, a lazy Lisp interpreter implemented
at the Research Laboratory of Paris XI University (Laboratoire de Recherche en
Informatique, Orsay). Lambdix was devised in the course of an investigation
into the relationship between the semantics of programming languages and their
implementation; it was used to demonstrate that in the Lisp domain, semantic
correctness is consistent with efficiency, contrary to what has often been
claimed. The first part of the paper is an overview of well-known semantic
difficulties encountered by Lisp as well as an informal presentation of
Lambdix; it is shown that the difficulties which Lisp encouters do not arise in
Lambdix. The second part is about efficiency in implementation models. It
explains why Lambdix is better suited for lazy evaluation than previous models.
The section ends by giving comparative execution time tables.
| [
{
"version": "v1",
"created": "Wed, 25 Jul 2007 19:33:07 GMT"
}
] | 2007-07-26T00:00:00 | [
[
"Recanati",
"Catherine",
"",
"LIPN"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0707.3878 | Joaquim Borges | Joaquim Borges, Cristina Fernandez | Plotkin construction: rank and kernel | null | null | null | null | cs.IT math.IT | null | Given two binary codes of length n, using Plotkin construction we obtain a
code of length 2n. The construction works for linear and nonlinear codes. For
the linear case, it is straightforward to see that the dimension of the final
code is the sum of the dimensions of the starting codes. For nonlinear codes,
the rank and the dimension of the kernel are standard mesures of linearity. In
this report, we prove that both parameters are also the sum of the
corresponding ones of the starting codes.
| [
{
"version": "v1",
"created": "Thu, 26 Jul 2007 08:44:05 GMT"
}
] | 2007-07-27T00:00:00 | [
[
"Borges",
"Joaquim",
""
],
[
"Fernandez",
"Cristina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3925 | Andries Hekstra | Andries P. Hekstra | Use of a $d$-Constraint During LDPC Decoding in a Bliss Scheme | null | null | null | null | cs.IT math.IT | null | Bliss schemes of a run length limited (RLL) codec in combination with an LDPC
codec, generate LDPC parity bits over a systematic sequence of RLL channel bits
that are inherently redundant as they satisfy e.g. a $d=1$ minimum run length
constraint. That is the subsequences consisting of runs of length $d=1$, viz.
$...010...$ and $...101...$, cannot occur. We propose to use this redundancy
during LDPC decoding in a Bliss scheme by introducing additional $d$-constraint
nodes in the factor graph used by the LDPC decoder. The messages sent from
these new nodes to the variable or codeword bit nodes exert a ``force'' on the
resulting soft-bit vector coming out of the LDPC decoding that give it a
tendency to comply with the $d$-constraints. This way, we can significantly
reduce the probability of decoding error.
| [
{
"version": "v1",
"created": "Thu, 26 Jul 2007 14:08:07 GMT"
}
] | 2007-07-27T00:00:00 | [
[
"Hekstra",
"Andries P.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3936 | Konstantin Avrachenkov | Eitan Altman (INRIA Sophia Antipolis), Konstantin Avrachenkov (INRIA
Sophia Antipolis), Andrey Garnaev | Closed form solutions for symmetric water filling games | null | null | null | null | cs.NI cs.GT | null | We study power control in optimization and game frameworks. In the
optimization framework there is a single decision maker who assigns network
resources and in the game framework users share the network resources according
to Nash equilibrium. The solution of these problems is based on so-called
water-filling technique, which in turn uses bisection method for solution of
non-linear equations for Lagrange multiplies. Here we provide a closed form
solution to the water-filling problem, which allows us to solve it in a finite
number of operations. Also, we produce a closed form solution for the Nash
equilibrium in symmetric Gaussian interference game with an arbitrary number of
users. Even though the game is symmetric, there is an intrinsic hierarchical
structure induced by the quantity of the resources available to the users. We
use this hierarchical structure to perform a successive reduction of the game.
In addition, to its mathematical beauty, the explicit solution allows one to
study limiting cases when the crosstalk coefficient is either small or large.
We provide an alternative simple proof of the convergence of the Iterative
Water Filling Algorithm. Furthermore, it turns out that the convergence of
Iterative Water Filling Algorithm slows down when the crosstalk coefficient is
large. Using the closed form solution, we can avoid this problem. Finally, we
compare the non-cooperative approach with the cooperative approach and show
that the non-cooperative approach results in a more fair resource distribution.
| [
{
"version": "v1",
"created": "Thu, 26 Jul 2007 14:30:50 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 12:40:05 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Altman",
"Eitan",
"",
"INRIA Sophia Antipolis"
],
[
"Avrachenkov",
"Konstantin",
"",
"INRIA\n Sophia Antipolis"
],
[
"Garnaev",
"Andrey",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0707.3959 | Dung Dao | Dung Ngoc Dao, Chau Yuen, Chintha Tellambura, Yong Liang Guan and
Tjeng Thiang Tjhung | Four-Group Decodable Space-Time Block Codes | 1 figure. Accepted for publication in IEEE Trans. on Signal
Processing | null | 10.1109/TSP.2007.906729 | null | cs.IT math.IT | null | Two new rate-one full-diversity space-time block codes (STBC) are proposed.
They are characterized by the \emph{lowest decoding complexity} among the known
rate-one STBC, arising due to the complete separability of the transmitted
symbols into four groups for maximum likelihood detection. The first and the
second codes are delay-optimal if the number of transmit antennas is a power of
2 and even, respectively. The exact pair-wise error probability is derived to
allow for the performance optimization of the two codes. Compared with existing
low-decoding complexity STBC, the two new codes offer several advantages such
as higher code rate, lower encoding/decoding delay and complexity, lower
peak-to-average power ratio, and better performance.
| [
{
"version": "v1",
"created": "Thu, 26 Jul 2007 16:14:33 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Dao",
"Dung Ngoc",
""
],
[
"Yuen",
"Chau",
""
],
[
"Tellambura",
"Chintha",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"Tjeng Thiang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.3972 | Ted Pedersen | Ted Pedersen | Learning Probabilistic Models of Word Sense Disambiguation | 195 pages | PhD dissertation, May 1998, Department of Computer Science and
Engineering, Southern Methodist University | null | null | cs.CL cs.AI | null | This dissertation presents several new methods of supervised and unsupervised
learning of word sense disambiguation models. The supervised methods focus on
performing model searches through a space of probabilistic models, and the
unsupervised methods rely on the use of Gibbs Sampling and the Expectation
Maximization (EM) algorithm. In both the supervised and unsupervised case, the
Naive Bayesian model is found to perform well. An explanation for this success
is presented in terms of learning rates and bias-variance decompositions.
| [
{
"version": "v1",
"created": "Thu, 26 Jul 2007 17:02:40 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Pedersen",
"Ted",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0707.3979 | Refugio Vallejo | Isidro B. Nieto and J. Refugio Vallejo | Clifford Algebra of the Vector Space of Conics for decision boundary
Hyperplanes in m-Euclidean Space | 12 pages, 2 figures, 1 table | null | null | null | cs.NE cs.CG | null | In this paper we embed $m$-dimensional Euclidean space in the geometric
algebra $Cl_m $ to extend the operators of incidence in ${R^m}$ to operators of
incidence in the geometric algebra to generalize the notion of separator to a
decision boundary hyperconic in the Clifford algebra of hyperconic sections
denoted as ${Cl}({Co}_{2})$. This allows us to extend the concept of a linear
perceptron or the spherical perceptron in conformal geometry and introduce the
more general conic perceptron, namely the {elliptical perceptron}. Using
Clifford duality a vector orthogonal to the decision boundary hyperplane is
determined. Experimental results are shown in 2-dimensional Euclidean space
where we separate data that are naturally separated by some typical plane conic
separators by this procedure. This procedure is more general in the sense that
it is independent of the dimension of the input data and hence we can speak of
the hyperconic elliptic perceptron.
| [
{
"version": "v1",
"created": "Thu, 26 Jul 2007 18:03:23 GMT"
}
] | 2007-07-27T00:00:00 | [
[
"Nieto",
"Isidro B.",
""
],
[
"Vallejo",
"J. Refugio",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0707.4032 | Shiguo Lian | Shiguo Lian, Jinsheng Sun, Zhiquan Wang | One-way Hash Function Based on Neural Network | 7 pages,5 figures,submitted | null | null | null | cs.CR cs.NE | null | A hash function is constructed based on a three-layer neural network. The
three neuron-layers are used to realize data confusion, diffusion and
compression respectively, and the multi-block hash mode is presented to support
the plaintext with variable length. Theoretical analysis and experimental
results show that this hash function is one-way, with high key sensitivity and
plaintext sensitivity, and secure against birthday attacks or
meet-in-the-middle attacks. Additionally, the neural network's property makes
it practical to realize in a parallel way. These properties make it a suitable
choice for data signature or authentication.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 02:38:56 GMT"
}
] | 2007-07-30T00:00:00 | [
[
"Lian",
"Shiguo",
""
],
[
"Sun",
"Jinsheng",
""
],
[
"Wang",
"Zhiquan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0707.4081 | Ricardo Lopez-Ruiz | Ricardo Lopez-Ruiz, Jaime Sanudo and Xavier Calbet | Geometrical derivation of the Boltzmann factor | 7 pages, 0 figures | null | 10.1119/1.2907776 | null | nlin.CD cond-mat.stat-mech cs.MA physics.soc-ph | null | We show that the Boltzmann factor has a geometrical origin. Its derivation
follows from the microcanonical picture. The Maxwell-Boltzmann distribution or
the wealth distribution in human society are some direct applications of this
new interpretation.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 10:54:41 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Lopez-Ruiz",
"Ricardo",
""
],
[
"Sanudo",
"Jaime",
""
],
[
"Calbet",
"Xavier",
""
]
] | [
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0707.4083 | Bezzateev Sergey Valentinovich | Sergey Bezzateev and Natalia Shekhunova | Chain of Separable Binary Goppa Codes and their Minimal Distance | 7 pages, 1 figure | null | null | null | cs.IT math.IT | null | It is shown that subclasses of separable binary Goppa codes, $\Gamma(L,G)$ -
codes, with $L=\{\alpha \in GF(2^{2l}):G(\alpha)\neq 0 \}$ and special Goppa
polynomials G(x) can be presented as a chain of embedded codes. The true
minimal distance has been obtained for all codes of the chain.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 10:57:39 GMT"
}
] | 2007-07-30T00:00:00 | [
[
"Bezzateev",
"Sergey",
""
],
[
"Shekhunova",
"Natalia",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4104 | Jean Mairesse | Moez Draief (LIAFA), Jean Mairesse (LIAFA), Neil O'Connell (WMI) | Queues, stores, and tableaux | Conference version of the paper: "Joint Burke's theorem and RSK
representation for a queue and a store" (with M. Draief and N. O'Connell). In
Discrete Random Walks 2003. DMTCS vol. AC, p. 69-82, 2003 | Journal of Applied Probability 42, 4 (2005) 1145-1167 | null | null | cs.DM math.CO | null | Consider the single server queue with an infinite buffer and a FIFO
discipline, either of type M/M/1 or Geom/Geom/1. Denote by A the arrival
process and by s the services. Assume the stability condition to be satisfied.
Denote by D the departure process in equilibrium and by r the time spent by the
customers at the very back of the queue. We prove that (D,r) has the same law
as (A,s) which is an extension of the classical Burke Theorem. In fact, r can
be viewed as the departures from a dual storage model. This duality between the
two models also appears when studying the transient behavior of a tandem by
means of the RSK algorithm: the first and last row of the resulting
semi-standard Young tableau are respectively the last instant of departure in
the queue and the total number of departures in the store.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 14:17:10 GMT"
}
] | 2007-07-31T00:00:00 | [
[
"Draief",
"Moez",
"",
"LIAFA"
],
[
"Mairesse",
"Jean",
"",
"LIAFA"
],
[
"O'Connell",
"Neil",
"",
"WMI"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0707.4124 | Jean Mairesse | Moez Draief (LIAFA), Jean Mairesse (LIAFA) | Services within a busy period of an M/M/1 queue and Dyck paths | null | Queueing Systems / Queueing Systems Theory Appl 49, 1 (2005) 73-84 | 10.1007/s11134-004-5556-6 | null | cs.DM | null | We analyze the service times of customers in a stable M/M/1 queue in
equilibrium depending on their position in a busy period. We give the law of
the service of a customer at the beginning, at the end, or in the middle of the
busy period. It enables as a by-product to prove that the process of instants
of beginning of services is not Poisson. We then proceed to a more precise
analysis. We consider a family of polynomial generating series associated with
Dyck paths of length 2n and we show that they provide the correlation function
of the successive services in a busy period with (n+1) customers.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 14:10:12 GMT"
}
] | 2007-07-30T00:00:00 | [
[
"Draief",
"Moez",
"",
"LIAFA"
],
[
"Mairesse",
"Jean",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.4133 | Chao Tian | Chao Tian, Jun Chen and Suhas Diggavi | Multiuser Successive Refinement and Multiple Description Coding | 10 pages, 5 figures. To appear in IEEE Transaction on Information
Theory. References updated and typos corrected | null | null | null | cs.IT math.IT | null | We consider the multiuser successive refinement (MSR) problem, where the
users are connected to a central server via links with different noiseless
capacities, and each user wishes to reconstruct in a successive-refinement
fashion. An achievable region is given for the two-user two-layer case and it
provides the complete rate-distortion region for the Gaussian source under the
MSE distortion measure. The key observation is that this problem includes the
multiple description (MD) problem (with two descriptions) as a subsystem, and
the techniques useful in the MD problem can be extended to this case. We show
that the coding scheme based on the universality of random binning is
sub-optimal, because multiple Gaussian side informations only at the decoders
do incur performance loss, in contrast to the case of single side information
at the decoder. We further show that unlike the single user case, when there
are multiple users, the loss of performance by a multistage coding approach can
be unbounded for the Gaussian source. The result suggests that in such a
setting, the benefit of using successive refinement is not likely to justify
the accompanying performance loss. The MSR problem is also related to the
source coding problem where each decoder has its individual side information,
while the encoder has the complete set of the side informations. The MSR
problem further includes several variations of the MD problem, for which the
specialization of the general result is investigated and the implication is
discussed.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 15:21:48 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Nov 2007 14:45:55 GMT"
}
] | 2007-11-13T00:00:00 | [
[
"Tian",
"Chao",
""
],
[
"Chen",
"Jun",
""
],
[
"Diggavi",
"Suhas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4166 | Todd Veldhuizen | Todd L. Veldhuizen | Parsimony Principles for Software Components and Metalanguages | Generative Programming and Component Engineering 2007 | null | null | null | cs.SE | null | Software is a communication system. The usual topic of communication is
program behavior, as encoded by programs. Domain-specific libraries are
codebooks, domain-specific languages are coding schemes, and so forth. To turn
metaphor into method, we adapt toolsfrom information theory--the study of
efficient communication--to probe the efficiency with which languages and
libraries let us communicate programs. In previous work we developed an
information-theoretic analysis of software reuse in problem domains. This new
paper uses information theory to analyze tradeoffs in the design of components,
generators, and metalanguages. We seek answers to two questions: (1) How can we
judge whether a component is over- or under-generalized? Drawing on minimum
description length principles, we propose that the best component yields the
most succinct representation of the use cases. (2) If we view a programming
language as an assemblage of metalanguages, each providing a complementary
style of abstraction, how can these metalanguages aid or hinder us in
efficiently describing software? We describe a complex triangle of interactions
between the power of an abstraction mechanism, the amount of reuse it enables,
and the cognitive difficulty of its use.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 19:29:29 GMT"
}
] | 2007-07-30T00:00:00 | [
[
"Veldhuizen",
"Todd L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0707.4198 | Russ Abbott | Russ Abbott | Reductionism, emergence, and levels of abstractions | This piece is to be submitted to CACM as a Viewpoint article. It is
only 1200 word because that's the word limit on such pieces. Updates (if any)
will be available at
http://cs.calstatela.edu/wiki/images/e/e2/Reductionism%2C_emergence%2C_and_levels_of_abstractions.doc | null | null | null | cs.OH | null | Can there be independent higher level laws of nature if everything is
reducible to the fundamental laws of physics? The computer science notion of
level of abstraction explains why there can -- illustrating how computational
thinking can solve one of philosophy's most vexing problems.
| [
{
"version": "v1",
"created": "Fri, 27 Jul 2007 23:52:32 GMT"
}
] | 2008-05-24T00:00:00 | [
[
"Abbott",
"Russ",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.4255 | Iddo Tzameret | Nachum Dershowitz and Iddo Tzameret | Complexity of Propositional Proofs under a Promise | 32 pages; a preliminary version appeared in the Proceedings of
ICALP'07 | ACM Transactions on Computational Logic, 11(3):1-29, 2010; | null | null | cs.CC cs.LO | null | We study -- within the framework of propositional proof complexity -- the
problem of certifying unsatisfiability of CNF formulas under the promise that
any satisfiable formula has many satisfying assignments, where ``many'' stands
for an explicitly specified function $\Lam$ in the number of variables $n$. To
this end, we develop propositional proof systems under different measures of
promises (that is, different $\Lam$) as extensions of resolution. This is done
by augmenting resolution with axioms that, roughly, can eliminate sets of truth
assignments defined by Boolean circuits. We then investigate the complexity of
such systems, obtaining an exponential separation in the average-case between
resolution under different size promises:
1. Resolution has polynomial-size refutations for all unsatisfiable 3CNF
formulas when the promise is $\eps\cd2^n$, for any constant $0<\eps<1$.
2. There are no sub-exponential size resolution refutations for random 3CNF
formulas, when the promise is $2^{\delta n}$ (and the number of clauses is
$o(n^{3/2})$), for any constant $0<\delta<1$.
| [
{
"version": "v1",
"created": "Sat, 28 Jul 2007 18:36:01 GMT"
}
] | 2010-04-19T00:00:00 | [
[
"Dershowitz",
"Nachum",
""
],
[
"Tzameret",
"Iddo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0707.4258 | Joseph O'Rourke | Jin-ichi Itoh, Joseph O'Rourke, Costin V\^ilcu | Star Unfolding Convex Polyhedra via Quasigeodesic Loops | 10 pages, 7 figures. v2 improves the description of cut locus, and
adds references. v3 improves two figures and their captions. New version v4
offers a completely different proof of non-overlap in the quasigeodesic loop
case, and contains several other substantive improvements. This version is 23
pages long, with 15 figures | null | null | Smith College Computer Science Technical Report 084 | cs.CG cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We extend the notion of star unfolding to be based on a quasigeodesic loop Q
rather than on a point. This gives a new general method to unfold the surface
of any convex polyhedron P to a simple (non-overlapping), planar polygon: cut
along one shortest path from each vertex of P to Q, and cut all but one segment
of Q.
| [
{
"version": "v1",
"created": "Sat, 28 Jul 2007 20:02:05 GMT"
},
{
"version": "v2",
"created": "Tue, 31 Jul 2007 20:09:50 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Oct 2007 17:40:06 GMT"
},
{
"version": "v4",
"created": "Wed, 24 Jun 2009 17:18:46 GMT"
}
] | 2009-06-24T00:00:00 | [
[
"Itoh",
"Jin-ichi",
""
],
[
"O'Rourke",
"Joseph",
""
],
[
"Vîlcu",
"Costin",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.4289 | Sheng Bao | Stephen Gang Wu, Forrest Sheng Bao, Eric You Xu, Yu-Xuan Wang, Yi-Fan
Chang and Qiao-Liang Xiang | A Leaf Recognition Algorithm for Plant Classification Using
Probabilistic Neural Network | 6 pages, 3 figures, 2 tables | null | null | null | cs.AI | null | In this paper, we employ Probabilistic Neural Network (PNN) with image and
data processing techniques to implement a general purpose automated leaf
recognition algorithm. 12 leaf features are extracted and orthogonalized into 5
principal variables which consist the input vector of the PNN. The PNN is
trained by 1800 leaves to classify 32 kinds of plants with an accuracy greater
than 90%. Compared with other approaches, our algorithm is an accurate
artificial intelligence approach which is fast in execution and easy in
implementation.
| [
{
"version": "v1",
"created": "Sun, 29 Jul 2007 12:31:40 GMT"
}
] | 2007-07-31T00:00:00 | [
[
"Wu",
"Stephen Gang",
""
],
[
"Bao",
"Forrest Sheng",
""
],
[
"Xu",
"Eric You",
""
],
[
"Wang",
"Yu-Xuan",
""
],
[
"Chang",
"Yi-Fan",
""
],
[
"Xiang",
"Qiao-Liang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0707.4298 | Shlomo Reisner | M. A. Lopez, S. Reisner | A note on equipartition | Some misprints in earlier versions are corrected, one reference is
added with remarks concerning it | null | null | null | cs.CG math.FA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of the existence of an equi-partition of a curve in $\R^n$ has
recently been raised in the context of computational geometry. The problem is
to show that for a (continuous) curve $\Gamma : [0,1] \to \R^n$ and for any
positive integer N, there exist points $t_0=0<t_1<...<t_{N-1}<1=t_N$, such that
$d(\Gamma(t_{i-1}),\Gamma(t_i))=d(\Gamma(t_{i}),\Gamma(t_{i+1}))$ for all
$i=1,...,N$, where d is a metric or even a semi-metric (a weaker notion) on
$\R^n$. We show here that the existence of such points, in a broader context,
is a consequence of Brower's fixed point theorem.
| [
{
"version": "v1",
"created": "Sun, 29 Jul 2007 15:46:53 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Jul 2008 13:28:41 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Jul 2008 16:21:55 GMT"
}
] | 2008-07-15T00:00:00 | [
[
"Lopez",
"M. A.",
""
],
[
"Reisner",
"S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
}
] |
0707.4304 | Alejandro Vaisman Prof. | Leticia Gomez, Sofie Haesevoets, Bart Kuijpers and Alejandro Vaisman | Spatial Aggregation: Data Model and Implementation | 56 pages, 28 figures | null | null | null | cs.DB | null | Data aggregation in Geographic Information Systems (GIS) is only marginally
present in commercial systems nowadays, mostly through ad-hoc solutions. In
this paper, we first present a formal model for representing spatial data. This
model integrates geographic data and information contained in data warehouses
external to the GIS. We define the notion of geometric aggregation, a general
framework for aggregate queries in a GIS setting. We also identify the class of
summable queries, which can be efficiently evaluated by precomputing the
overlay of two or more of the thematic layers involved in the query. We also
sketch a language, denoted GISOLAP-QL, for expressing queries that involve GIS
and OLAP features. In addition, we introduce Piet, an implementation of our
proposal, that makes use of overlay precomputation for answering spatial
queries (aggregate or not). Our experimental evaluation showed that for a
certain class of geometric queries with or without aggregation, overlay
precomputation outperforms R-tree-based techniques. Finally, as a particular
application of our proposal, we study topological queries.
| [
{
"version": "v1",
"created": "Sun, 29 Jul 2007 21:46:50 GMT"
}
] | 2007-07-31T00:00:00 | [
[
"Gomez",
"Leticia",
""
],
[
"Haesevoets",
"Sofie",
""
],
[
"Kuijpers",
"Bart",
""
],
[
"Vaisman",
"Alejandro",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0707.4311 | Sanket Dusad | S. Dusad, S. N. Diggavi and A. R. Calderbank | Embedded Rank Distance Codes for ISI channels | Submitted to IEEE Transactions on Information Theory | null | 10.1109/TIT.2008.929960 | null | cs.IT math.IT | null | Designs for transmit alphabet constrained space-time codes naturally lead to
questions about the design of rank distance codes. Recently, diversity embedded
multi-level space-time codes for flat fading channels have been designed from
sets of binary matrices with rank distance guarantees over the binary field by
mapping them onto QAM and PSK constellations. In this paper we demonstrate that
diversity embedded space-time codes for fading Inter-Symbol Interference (ISI)
channels can be designed with provable rank distance guarantees. As a corollary
we obtain an asymptotic characterization of the fixed transmit alphabet
rate-diversity trade-off for multiple antenna fading ISI channels. The key idea
is to construct and analyze properties of binary matrices with a particular
structure induced by ISI channels.
| [
{
"version": "v1",
"created": "Sun, 29 Jul 2007 20:47:57 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Dusad",
"S.",
""
],
[
"Diggavi",
"S. N.",
""
],
[
"Calderbank",
"A. R.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4360 | Vitaly Skachek | Mark F. Flanagan, Vitaly Skachek, Eimear Byrne, Marcus Greferath | Linear-programming Decoding of Non-binary Linear Codes | 6 pages, 1 figure, 7-th International ITG Conference on Source and
Channel Coding (SCC'08) | null | null | null | cs.IT math.IT | null | We develop a framework for linear-programming (LP) decoding of non-binary
linear codes over rings. We prove that the resulting LP decoder has the
`maximum likelihood certificate' property, and we show that the decoder output
is the lowest cost pseudocodeword. Equivalence between pseudocodewords of the
linear program and pseudocodewords of graph covers is proved. LP decoding
performance is illustrated for the (11,6,5) ternary Golay code with ternary PSK
modulation over AWGN, and in this case it is shown that the LP decoder
performance is comparable to codeword-error-rate-optimum hard-decision based
decoding.
| [
{
"version": "v1",
"created": "Mon, 30 Jul 2007 15:31:30 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Oct 2007 17:29:46 GMT"
}
] | 2007-10-10T00:00:00 | [
[
"Flanagan",
"Mark F.",
""
],
[
"Skachek",
"Vitaly",
""
],
[
"Byrne",
"Eimear",
""
],
[
"Greferath",
"Marcus",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4372 | Jean Mairesse | Bruno Gaujal (LIP), Stefan Haar (IRISA), Jean Mairesse (LIAFA) | Blocking a transition in a Free Choice net and what it tells about its
throughput | null | Journal of Computer and System Sciences 66, 3 (2003) 515-548 | 10.1016/S0022-0000(03)00039-4 | null | cs.OH | null | In a live and bounded Free Choice Petri net, pick a non-conflicting
transition. Then there exists a unique reachable marking in which no transition
is enabled except the selected one. For a routed live and bounded Free Choice
net, this property is true for any transition of the net. Consider now a live
and bounded stochastic routed Free Choice net, and assume that the routings and
the firing times are independent and identically distributed. Using the above
results, we prove the existence of asymptotic firing throughputs for all
transitions in the net. Furthermore the vector of the throughputs at the
different transitions is explicitly computable up to a multiplicative constant.
| [
{
"version": "v1",
"created": "Mon, 30 Jul 2007 10:46:07 GMT"
}
] | 2007-07-31T00:00:00 | [
[
"Gaujal",
"Bruno",
"",
"LIP"
],
[
"Haar",
"Stefan",
"",
"IRISA"
],
[
"Mairesse",
"Jean",
"",
"LIAFA"
]
] | [
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0707.4389 | Sandrine Blazy | Andrew W. Appel (INRIA Rocquencourt), Sandrine Blazy (CEDRIC, INRIA
Rocquencourt) | Separation Logic for Small-step Cminor | Version courte du rapport de recherche RR-6138 | Dans 20th Int. Conference on Theorem Proving in Higher Order
Logics (TPHOLs 2007) 4732 (2007) 5-21 | null | null | cs.PL | null | Cminor is a mid-level imperative programming language; there are
proved-correct optimizing compilers from C to Cminor and from Cminor to machine
language. We have redesigned Cminor so that it is suitable for Hoare Logic
reasoning and we have designed a Separation Logic for Cminor. In this paper, we
give a small-step semantics (instead of the big-step of the proved-correct
compiler) that is motivated by the need to support future concurrent
extensions. We detail a machine-checked proof of soundness of our Separation
Logic. This is the first large-scale machine-checked proof of a Separation
Logic w.r.t. a small-step semantics. The work presented in this paper has been
carried out in the Coq proof assistant. It is a first step towards an
environment in which concurrent Cminor programs can be verified using
Separation Logic and also compiled by a proved-correct compiler with formal
end-to-end correctness guarantees.
| [
{
"version": "v1",
"created": "Mon, 30 Jul 2007 12:09:16 GMT"
}
] | 2007-07-31T00:00:00 | [
[
"Appel",
"Andrew W.",
"",
"INRIA Rocquencourt"
],
[
"Blazy",
"Sandrine",
"",
"CEDRIC, INRIA\n Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0707.4448 | Mohamed-Ali Belabbas | Mohamed-Ali Belabbas and Patrick J. Wolfe | On sparse representations of linear operators and the approximation of
matrix products | 6 pages, 3 figures; presented at the 42nd Annual Conference on
Information Sciences and Systems (CISS 2008) | null | 10.1109/CISS.2008.4558532 | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Thus far, sparse representations have been exploited largely in the context
of robustly estimating functions in a noisy environment from a few
measurements. In this context, the existence of a basis in which the signal
class under consideration is sparse is used to decrease the number of necessary
measurements while controlling the approximation error. In this paper, we
instead focus on applications in numerical analysis, by way of sparse
representations of linear operators with the objective of minimizing the number
of operations needed to perform basic operations (here, multiplication) on
these operators. We represent a linear operator by a sum of rank-one operators,
and show how a sparse representation that guarantees a low approximation error
for the product can be obtained from analyzing an induced quadratic form. This
construction in turn yields new algorithms for computing approximate matrix
products.
| [
{
"version": "v1",
"created": "Mon, 30 Jul 2007 17:20:23 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Jun 2009 12:04:44 GMT"
}
] | 2009-06-26T00:00:00 | [
[
"Belabbas",
"Mohamed-Ali",
""
],
[
"Wolfe",
"Patrick J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0707.4489 | Turlough Neary | Turlough Neary and Damien Woods | Small weakly universal Turing machines | null | null | null | null | cs.CC | null | We give small universal Turing machines with state-symbol pairs of (6, 2),
(3, 3) and (2, 4). These machines are weakly universal, which means that they
have an infinitely repeated word to the left of their input and another to the
right. They simulate Rule 110 and are currently the smallest known weakly
universal Turing machines.
| [
{
"version": "v1",
"created": "Mon, 30 Jul 2007 21:40:55 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Neary",
"Turlough",
""
],
[
"Woods",
"Damien",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0707.4507 | Neri Merhav | Yaniv Akirav and Neri Merhav | Competitive minimax universal decoding for several ensembles of random
codes | 41 pages; submitted to IEEE Transactions on Information Theory | null | null | null | cs.IT math.IT | null | Universally achievable error exponents pertaining to certain families of
channels (most notably, discrete memoryless channels (DMC's)), and various
ensembles of random codes, are studied by combining the competitive minimax
approach, proposed by Feder and Merhav, with Chernoff bound and Gallager's
techniques for the analysis of error exponents. In particular, we derive a
single--letter expression for the largest, universally achievable fraction
$\xi$ of the optimum error exponent pertaining to the optimum ML decoding.
Moreover, a simpler single--letter expression for a lower bound to $\xi$ is
presented. To demonstrate the tightness of this lower bound, we use it to show
that $\xi=1$, for the binary symmetric channel (BSC), when the random coding
distribution is uniform over: (i) all codes (of a given rate), and (ii) all
linear codes, in agreement with well--known results. We also show that $\xi=1$
for the uniform ensemble of systematic linear codes, and for that of
time--varying convolutional codes in the bit-error--rate sense. For the latter
case, we also show how the corresponding universal decoder can be efficiently
implemented using a slightly modified version of the Viterbi algorithm which em
employs two trellises.
| [
{
"version": "v1",
"created": "Mon, 30 Jul 2007 23:57:35 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Akirav",
"Yaniv",
""
],
[
"Merhav",
"Neri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4518 | Awlok Josan | Enrique J. Duarte-Melo, Awlok Josan, Mingyan Liu, David L. Neuhoff and
Sandeep Pradhan | On Throughput Scaling of Wireless Networks: Effect of Node Density and
Propagation Model | 28 pages, 4 figures | null | null | null | cs.IT math.IT | null | This paper derives a lower bound to the per-node throughput achievable by a
wireless network when n source-destination pairs are randomly distributed
throughout a disk of radius $n^\gamma$, $ \gamma \geq 0$, propagation is
modeled by attenuation of the form $1/(1+d)^\alpha$, $\alpha >2$, and
successful transmission occurs at a fixed rate W when received signal to noise
and interference ratio is greater than some threshold $\beta$, and at rate 0
otherwise. The lower bound has the form $n^{1-\gamma}$ when $\gamma < 1/2$, and
$(n \ln n)^{-1/2}$ when $\gamma \geq 1/2$. The methods are similar to, but
somewhat simpler than, those in the seminal paper by Gupta and Kumar.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 01:15:59 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Duarte-Melo",
"Enrique J.",
""
],
[
"Josan",
"Awlok",
""
],
[
"Liu",
"Mingyan",
""
],
[
"Neuhoff",
"David L.",
""
],
[
"Pradhan",
"Sandeep",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4524 | Shiguo Lian | Shiguo Lian | Image Authentication Based on Neural Networks | 16 pages,10 figures, submitted | null | null | null | cs.MM cs.NE | null | Neural network has been attracting more and more researchers since the past
decades. The properties, such as parameter sensitivity, random similarity,
learning ability, etc., make it suitable for information protection, such as
data encryption, data authentication, intrusion detection, etc. In this paper,
by investigating neural networks' properties, the low-cost authentication
method based on neural networks is proposed and used to authenticate images or
videos. The authentication method can detect whether the images or videos are
modified maliciously. Firstly, this chapter introduces neural networks'
properties, such as parameter sensitivity, random similarity, diffusion
property, confusion property, one-way property, etc. Secondly, the chapter
gives an introduction to neural network based protection methods. Thirdly, an
image or video authentication scheme based on neural networks is presented, and
its performances, including security, robustness and efficiency, are analyzed.
Finally, conclusions are drawn, and some open issues in this field are
presented.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 02:27:10 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Lian",
"Shiguo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0707.4565 | Christian Hoffmann | Markus Bl\"aser, Christian Hoffmann | On the Complexity of the Interlace Polynomial | 18 pages, 1 figure; new graph transformation (adding cycles) solves
some unknown points, error in the statement of the inapproximability result
fixed; a previous version has appeared in the proceedings of STACS 2008 | null | null | null | cs.CC math.CO | null | We consider the two-variable interlace polynomial introduced by Arratia,
Bollobas and Sorkin (2004). We develop graph transformations which allow us to
derive point-to-point reductions for the interlace polynomial. Exploiting these
reductions we obtain new results concerning the computational complexity of
evaluating the interlace polynomial at a fixed point. Regarding exact
evaluation, we prove that the interlace polynomial is #P-hard to evaluate at
every point of the plane, except on one line, where it is trivially polynomial
time computable, and four lines, where the complexity is still open. This
solves a problem posed by Arratia, Bollobas and Sorkin (2004). In particular,
three specializations of the two-variable interlace polynomial, the
vertex-nullity interlace polynomial, the vertex-rank interlace polynomial and
the independent set polynomial, are almost everywhere #P-hard to evaluate, too.
For the independent set polynomial, our reductions allow us to prove that it is
even hard to approximate at any point except at 0.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 12:23:13 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Dec 2007 09:34:17 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Apr 2008 13:51:09 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Bläser",
"Markus",
""
],
[
"Hoffmann",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0707.4580 | Gregory Gutin | Gregory Gutin | Note on edge-colored graphs and digraphs without properly colored cycles | null | null | null | null | cs.DM | null | We study the following two functions: d(n,c) and $\vec{d}(n,c)$; d(n,c)
($\vec{d}(n,c)$) is the minimum number k such that every c-edge-colored
undirected (directed) graph of order n and minimum monochromatic degree
(out-degree) at least k has a properly colored cycle. Abouelaoualim et al.
(2007) stated a conjecture which implies that d(n,c)=1. Using a recursive
construction of c-edge-colored graphs with minimum monochromatic degree p and
without properly colored cycles, we show that $d(n,c)\ge {1 \over c}(\log_cn
-\log_c\log_cn)$ and, thus, the conjecture does not hold. In particular, this
inequality significantly improves a lower bound on $\vec{d}(n,2)$ obtained by
Gutin, Sudakov and Yeo in 1998.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 17:36:54 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Gutin",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0707.4597 | Chao Tian | Chao Tian and Suhas N. Diggavi | Side-information Scalable Source Coding | 35 pages, submitted to IEEE Transaction on Information Theory | null | null | null | cs.IT math.IT | null | The problem of side-information scalable (SI-scalable) source coding is
considered in this work, where the encoder constructs a progressive
description, such that the receiver with high quality side information will be
able to truncate the bitstream and reconstruct in the rate distortion sense,
while the receiver with low quality side information will have to receive
further data in order to decode. We provide inner and outer bounds for general
discrete memoryless sources. The achievable region is shown to be tight for the
case that either of the decoders requires a lossless reconstruction, as well as
the case with degraded deterministic distortion measures. Furthermore we show
that the gap between the achievable region and the outer bounds can be bounded
by a constant when square error distortion measure is used. The notion of
perfectly scalable coding is introduced as both the stages operate on the
Wyner-Ziv bound, and necessary and sufficient conditions are given for sources
satisfying a mild support condition. Using SI-scalable coding and successive
refinement Wyner-Ziv coding as basic building blocks, a complete
characterization is provided for the important quadratic Gaussian source with
multiple jointly Gaussian side-informations, where the side information quality
does not have to be monotonic along the scalable coding order. Partial result
is provided for the doubly symmetric binary source with Hamming distortion when
the worse side information is a constant, for which one of the outer bound is
strictly tighter than the other one.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 12:02:53 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Tian",
"Chao",
""
],
[
"Diggavi",
"Suhas N.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4618 | Shmuel Onn | Yael Berstein, Jon Lee, Hugo Maruri-Aguilar, Shmuel Onn, Eva
Riccomagno, Robert Weismantel, Henry Wynn | Nonlinear Matroid Optimization and Experimental Design | null | SIAM Journal on Discrete Mathematics, 22:901--919, 2008 | null | null | math.CO cs.CC cs.DM math.OC | null | We study the problem of optimizing nonlinear objective functions over
matroids presented by oracles or explicitly. Such functions can be interpreted
as the balancing of multi-criteria optimization. We provide a combinatorial
polynomial time algorithm for arbitrary oracle-presented matroids, that makes
repeated use of matroid intersection, and an algebraic algorithm for vectorial
matroids.
Our work is partly motivated by applications to minimum-aberration
model-fitting in experimental design in statistics, which we discuss and
demonstrate in detail.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 13:54:07 GMT"
}
] | 2008-07-24T00:00:00 | [
[
"Berstein",
"Yael",
""
],
[
"Lee",
"Jon",
""
],
[
"Maruri-Aguilar",
"Hugo",
""
],
[
"Onn",
"Shmuel",
""
],
[
"Riccomagno",
"Eva",
""
],
[
"Weismantel",
"Robert",
""
],
[
"Wynn",
"Henry",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0707.4651 | Alan Rufty | Alan Rufty | Comments on the Reliability of Lawson and Hanson's Linear Distance
Programming Algorithm: Subroutine LDP | 5 pages | null | null | null | cs.MS | null | This brief paper: (1) Discusses strategies to generate random test cases that
can be used to extensively test any Linear Distance Program (LDP) software. (2)
Gives three numerical examples of input cases generated by this strategy that
cause problems in the Lawson and Hanson LDP module. (3) Proposes, as a standard
matter of acceptable implementation procedures, that (unless it is done
internally in the software itself, but, in general, this seems to be much rarer
than one would expect) all users should test the returned output from any LDP
module for self-consistency since it incurs only a small amount of added
computational overhead and it is not hard to do.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 17:04:34 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Rufty",
"Alan",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0707.4656 | Aslan Tchamkerten | Aslan Tchamkerten, Venkat Chandar, Gregory Wornell | Communication under Strong Asynchronism | 26 pages | null | null | null | cs.IT math.IT | null | We consider asynchronous communication over point-to-point discrete
memoryless channels. The transmitter starts sending one block codeword at an
instant that is uniformly distributed within a certain time period, which
represents the level of asynchronism. The receiver, by means of a sequential
decoder, must isolate the message without knowing when the codeword
transmission starts but being cognizant of the asynchronism level A. We are
interested in how quickly can the receiver isolate the sent message,
particularly in the regime where A is exponentially larger than the codeword
length N, which we refer to as `strong asynchronism.'
This model of sparse communication may represent the situation of a sensor
that remains idle most of the time and, only occasionally, transmits
information to a remote base station which needs to quickly take action.
The first result shows that vanishing error probability can be guaranteed as
N tends to infinity while A grows as Exp(N*k) if and only if k does not exceed
the `synchronization threshold,' a constant that admits a simple closed form
expression, and is at least as large as the capacity of the synchronized
channel. The second result is the characterization of a set of achievable
strictly positive rates in the regime where A is exponential in N, and where
the rate is defined with respect to the expected delay between the time
information starts being emitted until the time the receiver makes a decision.
As an application of the first result we consider antipodal signaling over a
Gaussian channel and derive a simple necessary condition between A, N, and SNR
for achieving reliable communication.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 18:51:11 GMT"
}
] | 2007-08-01T00:00:00 | [
[
"Tchamkerten",
"Aslan",
""
],
[
"Chandar",
"Venkat",
""
],
[
"Wornell",
"Gregory",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0707.4659 | Johannes Bluemlein | I. Bierenbaum, J. Bl\"umlein, S. Klein, and C. Schneider | Difference Equations in Massive Higher Order Calculations | 15 pages latex, Proceedings ACAT 2007 | PoSACAT2007:082,2007 | null | DESY 07-111, SFB/CPP-07-041 | math-ph cs.MS hep-ph math.MP | null | The calculation of massive 2--loop operator matrix elements, required for the
higher order Wilson coefficients for heavy flavor production in deeply
inelastic scattering, leads to new types of multiple infinite sums over
harmonic sums and related functions, which depend on the Mellin parameter $N$.
We report on the solution of these sums through higher order difference
equations using the summation package {\tt Sigma}.
| [
{
"version": "v1",
"created": "Tue, 31 Jul 2007 16:54:33 GMT"
}
] | 2008-12-18T00:00:00 | [
[
"Bierenbaum",
"I.",
""
],
[
"Blümlein",
"J.",
""
],
[
"Klein",
"S.",
""
],
[
"Schneider",
"C.",
""
]
] | [
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
}
] |
0708.0053 | Dragomir Z. Djokovic | Dragomir Z. Djokovic | Periodic complementary sets of binary sequences | 10 pages, 1 table. Substantial revision and simplification. Submitted
to IEEE Trans. Inform. Theory | International Mathematical Forum 4 (2009), no. 15, 717-725. | null | null | cs.IT math.CO math.IT | null | Let PCS_p^N denote a set of p binary sequences of length N such that the sum
of their periodic auto-correlation functions is a delta-function. In the 1990,
Boemer and Antweiler addressed the problem of constructing such sequences. They
presented a table covering the range p <= 12, N <= 50 and showing in which
cases it was known at that time whether such sequences exist, do not exist, or
the question of existence is undecided. The number of undecided cases was
rather large.
Subsequently the number of undecided cases was reduced to 26 by the author.
In the present note, several cyclic difference families are constructed and
used to obtain new sets of periodic binary sequences. Thereby the original
problem of Boemer and Antweiler is completely solved.
| [
{
"version": "v1",
"created": "Wed, 1 Aug 2007 00:40:12 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Apr 2008 16:20:25 GMT"
}
] | 2009-09-01T00:00:00 | [
[
"Djokovic",
"Dragomir Z.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0171 | Jean-Philippe Vert | Pierre Mah\'e (XRCE), Jean-Philippe Vert (CB) | Virtual screening with support vector machines and structure kernels | null | null | null | null | q-bio.QM cs.LG | null | Support vector machines and kernel methods have recently gained considerable
attention in chemoinformatics. They offer generally good performance for
problems of supervised classification or regression, and provide a flexible and
computationally efficient framework to include relevant information and prior
knowledge about the data and problems to be handled. In particular, with kernel
methods molecules do not need to be represented and stored explicitly as
vectors or fingerprints, but only to be compared to each other through a
comparison function technically called a kernel. While classical kernels can be
used to compare vector or fingerprint representations of molecules, completely
new kernels were developed in the recent years to directly compare the 2D or 3D
structures of molecules, without the need for an explicit vectorization step
through the extraction of molecular descriptors. While still in their infancy,
these approaches have already demonstrated their relevance on several toxicity
prediction and structure-activity relationship problems.
| [
{
"version": "v1",
"created": "Wed, 1 Aug 2007 19:13:52 GMT"
}
] | 2007-08-02T00:00:00 | [
[
"Mahé",
"Pierre",
"",
"XRCE"
],
[
"Vert",
"Jean-Philippe",
"",
"CB"
]
] | [
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0708.0200 | Morten Heine S{\o}rensen | Morten Heine S{\o}rensen | A Note on Shortest Developments | null | Logical Methods in Computer Science, Volume 3, Issue 4 (November
5, 2007) lmcs:838 | 10.2168/LMCS-3(4:2)2007 | null | cs.LO | null | De Vrijer has presented a proof of the finite developments theorem which, in
addition to showing that all developments are finite, gives an effective
reduction strategy computing longest developments as well as a simple formula
computing their length.
We show that by applying a rather simple and intuitive principle of duality
to de Vrijer's approach one arrives at a proof that some developments are
finite which in addition yields an effective reduction strategy computing
shortest developments as well as a simple formula computing their length. The
duality fails for general beta-reduction.
Our results simplify previous work by Khasidashvili.
| [
{
"version": "v1",
"created": "Wed, 1 Aug 2007 17:22:48 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Nov 2007 09:48:05 GMT"
}
] | 2015-07-01T00:00:00 | [
[
"Sørensen",
"Morten Heine",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.0224 | Savas Dayanik | Savas Dayanik, H. Vincent Poor, Semih O. Sezer | Multisource Bayesian sequential change detection | Published in at http://dx.doi.org/10.1214/07-AAP463 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org) | Annals of Applied Probability 2008, Vol. 18, No. 2, 552-590 | 10.1214/07-AAP463 | IMS-AAP-AAP463 | math.ST cs.IT math.IT math.PR stat.TH | null | Suppose that local characteristics of several independent compound Poisson
and Wiener processes change suddenly and simultaneously at some unobservable
disorder time. The problem is to detect the disorder time as quickly as
possible after it happens and minimize the rate of false alarms at the same
time. These problems arise, for example, from managing product quality in
manufacturing systems and preventing the spread of infectious diseases. The
promptness and accuracy of detection rules improve greatly if multiple
independent information sources are available. Earlier work on sequential
change detection in continuous time does not provide optimal rules for
situations in which several marked count data and continuously changing signals
are simultaneously observable. In this paper, optimal Bayesian sequential
detection rules are developed for such problems when the marked count data is
in the form of independent compound Poisson processes, and the continuously
changing signals form a multi-dimensional Wiener process. An auxiliary optimal
stopping problem for a jump-diffusion process is solved by transforming it
first into a sequence of optimal stopping problems for a pure diffusion by
means of a jump operator. This method is new and can be very useful in other
applications as well, because it allows the use of the powerful optimal
stopping theory for diffusions.
| [
{
"version": "v1",
"created": "Wed, 1 Aug 2007 20:25:14 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Aug 2007 19:46:36 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Apr 2008 12:58:00 GMT"
}
] | 2008-04-01T00:00:00 | [
[
"Dayanik",
"Savas",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Sezer",
"Semih O.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0708.0242 | Usman Khan | Usman A. Khan and Jose M. F. Moura | Distributing the Kalman Filter for Large-Scale Systems | null | U. A. Khan and J. M. F. Moura, "Distributing the Kalman filter for
large-scale systems," IEEE Transactions on Signal Processing, vol. 56, Part
1, no. 10, pp. 4919-4935, Oct. 2008 | 10.1109/TSP.2008.927480 | null | cs.IT math.IT | null | This paper derives a \emph{distributed} Kalman filter to estimate a sparsely
connected, large-scale, $n-$dimensional, dynamical system monitored by a
network of $N$ sensors. Local Kalman filters are implemented on the
($n_l-$dimensional, where $n_l\ll n$) sub-systems that are obtained after
spatially decomposing the large-scale system. The resulting sub-systems
overlap, which along with an assimilation procedure on the local Kalman
filters, preserve an $L$th order Gauss-Markovian structure of the centralized
error processes. The information loss due to the $L$th order Gauss-Markovian
approximation is controllable as it can be characterized by a divergence that
decreases as $L\uparrow$. The order of the approximation, $L$, leads to a lower
bound on the dimension of the sub-systems, hence, providing a criterion for
sub-system selection. The assimilation procedure is carried out on the local
error covariances with a distributed iterate collapse inversion (DICI)
algorithm that we introduce. The DICI algorithm computes the (approximated)
centralized Riccati and Lyapunov equations iteratively with only local
communication and low-order computation. We fuse the observations that are
common among the local Kalman filters using bipartite fusion graphs and
consensus averaging algorithms. The proposed algorithm achieves full
distribution of the Kalman filter that is coherent with the centralized Kalman
filter with an $L$th order Gaussian-Markovian structure on the centralized
error processes. Nowhere storage, communication, or computation of
$n-$dimensional vectors and matrices is needed; only $n_l \ll n$ dimensional
vectors and matrices are communicated or used in the computation at the
sensors.
| [
{
"version": "v1",
"created": "Wed, 1 Aug 2007 22:47:10 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Feb 2008 07:15:39 GMT"
}
] | 2013-12-19T00:00:00 | [
[
"Khan",
"Usman A.",
""
],
[
"Moura",
"Jose M. F.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0271 | Haim Permuter Henry | Haim Permuter, Tsachy Weissman | Capacity Region of the Finite-State Multiple Access Channel with and
without Feedback | null | null | null | null | cs.IT math.IT | null | The capacity region of the Finite-State Multiple Access Channel (FS-MAC) with
feedback that may be an arbitrary time-invariant function of the channel output
samples is considered. We characterize both an inner and an outer bound for
this region, using Masseys's directed information. These bounds are shown to
coincide, and hence yield the capacity region, of FS-MACs where the state
process is stationary and ergodic and not affected by the inputs.
Though `multi-letter' in general, our results yield explicit conclusions when
applied to specific scenarios of interest. E.g., our results allow us to:
- Identify a large class of FS-MACs, that includes the additive mod-2 noise
MAC where the noise may have memory, for which feedback does not enlarge the
capacity region.
- Deduce that, for a general FS-MAC with states that are not affected by the
input, if the capacity (region) without feedback is zero, then so is the
capacity (region) with feedback.
- Deduce that the capacity region of a MAC that can be decomposed into a
`multiplexer' concatenated by a point-to-point channel (with, without, or with
partial feedback), the capacity region is given by $\sum_{m} R_m \leq C$, where
C is the capacity of the point to point channel and m indexes the encoders.
Moreover, we show that for this family of channels source-channel coding
separation holds.
| [
{
"version": "v1",
"created": "Thu, 2 Aug 2007 05:38:13 GMT"
}
] | 2009-11-23T00:00:00 | [
[
"Permuter",
"Haim",
""
],
[
"Weissman",
"Tsachy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits