id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0707.2934
Christine Michel
Christine Michel (LIESP), Elise Garrot (LIESP), Sebastien George (LIESP)
Instrumented Collective Learning Situations (ICLS): the Gap between Theoretical Research and Observed Practices
null
18th Internationale Conference on Society for Information Technology and Teacher Education (SITE 2007) Proceddings (26/03/2007) 895-901
null
null
cs.CY
null
According to socio-constructivism approach, collective situations are promoted to favor learning in classroom, at a distance or in a blended educational context. So, many Information and Communication Technologies (ICT) are provided to teachers but there are no clear studies about the way they are used and perceived. Our research is based on the hypothesis that practices of educational actors (instructional designers and tutors) are far away from theoretical results of research in education technologies. In this paper, we consider a precise kind of situation: Instrumented Collective Learning Situations (ICLS). By a survey on 13 fields in higher education in France, Switzerland and Canada, we present how ICLS are designed and how teachers used them. Conclusions give an indication on the gap between the way information technologies are prescribed and the way they are actually used and perceived by teachers.
[ { "version": "v1", "created": "Thu, 19 Jul 2007 16:18:54 GMT" } ]
2007-07-20T00:00:00
[ [ "Michel", "Christine", "", "LIESP" ], [ "Garrot", "Elise", "", "LIESP" ], [ "George", "Sebastien", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0707.2998
Patrick Murphy
Patrick Murphy, Ashutosh Sabharwal and Behnaam Aazhang
Building a Cooperative Communications System
null
null
null
null
cs.IT math.IT
null
In this paper, we present the results from over-the-air experiments of a complete implementation of an amplify and forward cooperative communications system. Our custom OFDM-based physical layer uses a distributed version of the Alamouti block code, where the relay sends one branch of Alamouti encoded symbols. First we show analytically and experimentally that amplify and forward protocols are unaffected by carrier frequency offsets at the relay. This result allows us to use a conventional Alamouti receiver without change for the distributed relay system. Our full system implementation shows gains up to 5.5dB in peak power constrained networks. Thus, we can conclusively state that even the simplest form of relaying can lead to significant gains in practical implementations.
[ { "version": "v1", "created": "Fri, 20 Jul 2007 05:38:07 GMT" } ]
2007-07-23T00:00:00
[ [ "Murphy", "Patrick", "" ], [ "Sabharwal", "Ashutosh", "" ], [ "Aazhang", "Behnaam", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3014
Christine Michel
Christine Michel (LIESP), Elise Garrot (LIESP), Sebastien George (LIESP)
Situations d'apprentissage collectives instrument\'ees : \'etude de pratiques dans l'enseignement sup\'erieur
null
Actes de la Conf\'erence en EIAH 2007 (27/06/2007) 185-196
null
null
cs.CY
null
Currently, educational platforms propose many tools of communication, production, labour division or collective work management in order to support collective activities. But it is not guaranteed that actors (instructional designers, tutors or learner) are really using them. Our work, describe characteristics of instrumented learning situations (ICLS) in the higher education. Our intention is to determine: if ICLS are really existing; which form they take (in terms of scenario, tools, type of activity...) ; if recommendations resulting from research tasks are taken into account by instructional designers and if the instructional designer prescribed activities are really follow by learners or tutors? To answer these questions, we have made a survey about ICLS actors uses.
[ { "version": "v1", "created": "Fri, 20 Jul 2007 08:28:00 GMT" } ]
2007-07-23T00:00:00
[ [ "Michel", "Christine", "", "LIESP" ], [ "Garrot", "Elise", "", "LIESP" ], [ "George", "Sebastien", "", "LIESP" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0707.3030
Matthias Brust R.
Gregoire Danoy, Pascal Bouvry, Matthias R. Brust, Enrique Alba
Optimal Design of Ad Hoc Injection Networks by Using Genetic Algorithms
1 page, 1 figure
Genetic and Evolutionary Computation Conference (GECCO 2007), ISBN 978-1-59593-697-4
null
null
cs.NE cs.AI cs.NI
null
This work aims at optimizing injection networks, which consist in adding a set of long-range links (called bypass links) in mobile multi-hop ad hoc networks so as to improve connectivity and overcome network partitioning. To this end, we rely on small-world network properties, that comprise a high clustering coefficient and a low characteristic path length. We investigate the use of two genetic algorithms (generational and steady-state) to optimize three instances of this topology control problem and present results that show initial evidence of their capacity to solve it.
[ { "version": "v1", "created": "Fri, 20 Jul 2007 10:07:27 GMT" } ]
2007-07-23T00:00:00
[ [ "Danoy", "Gregoire", "" ], [ "Bouvry", "Pascal", "" ], [ "Brust", "Matthias R.", "" ], [ "Alba", "Enrique", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0707.3043
Branko Dragovich
Branko Dragovich and Alexandra Dragovich
p-Adic Modelling of the Genome and the Genetic Code
26 pages. Submitted to the Computer Journal for a special issue
The Computer Journal 53 (2010) 432-442
10.1093/comjnl/bxm083
null
q-bio.OT cs.IT math.IT physics.bio-ph
null
The present paper is devoted to foundations of p-adic modelling in genomics. Considering nucleotides, codons, DNA and RNA sequences, amino acids, and proteins as information systems, we have formulated the corresponding p-adic formalisms for their investigations. Each of these systems has its characteristic prime number used for construction of the related information space. Relevance of this approach is illustrated by some examples. In particular, it is shown that degeneration of the genetic code is a p-adic phenomenon. We have also put forward a hypothesis on evolution of the genetic code assuming that primitive code was based on single nucleotides and chronologically first four amino acids. This formalism of p-adic genomic information systems can be implemented in computer programs and applied to various concrete cases.
[ { "version": "v1", "created": "Fri, 20 Jul 2007 11:20:34 GMT" } ]
2010-12-01T00:00:00
[ [ "Dragovich", "Branko", "" ], [ "Dragovich", "Alexandra", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.OT", "description": "Work in quantitative biology that does not fit into the other q-bio classifications", "span": "(Other Quantitative Biology)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" } ]
0707.3087
Ciamac Moallemi
Vivek F. Farias, Ciamac C. Moallemi, Tsachy Weissman, Benjamin Van Roy
Universal Reinforcement Learning
null
null
null
null
cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider an agent interacting with an unmodeled environment. At each time, the agent makes an observation, takes an action, and incurs a cost. Its actions can influence future observations and costs. The goal is to minimize the long-term average cost. We propose a novel algorithm, known as the active LZ algorithm, for optimal control based on ideas from the Lempel-Ziv scheme for universal data compression and prediction. We establish that, under the active LZ algorithm, if there exists an integer $K$ such that the future is conditionally independent of the past given a window of $K$ consecutive actions and observations, then the average cost converges to the optimum. Experimental results involving the game of Rock-Paper-Scissors illustrate merits of the algorithm.
[ { "version": "v1", "created": "Fri, 20 Jul 2007 14:51:39 GMT" }, { "version": "v2", "created": "Tue, 9 Jun 2009 19:41:57 GMT" }, { "version": "v3", "created": "Wed, 22 Jul 2009 00:58:34 GMT" } ]
2009-07-22T00:00:00
[ [ "Farias", "Vivek F.", "" ], [ "Moallemi", "Ciamac C.", "" ], [ "Weissman", "Tsachy", "" ], [ "Van Roy", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3095
{\O}yvind Ryan
{\O}yvind Ryan, Merouane Debbah
Channel Capacity Estimation using Free Probability Theory
Submitted to IEEE Transactions on Signal Processing. 12 pages, 9 figures
null
10.1109/TSP.2008.927074
null
cs.IT math.IT
null
In many channel measurement applications, one needs to estimate some characteristics of the channels based on a limited set of measurements. This is mainly due to the highly time varying characteristics of the channel. In this contribution, it will be shown how free probability can be used for channel capacity estimation in MIMO systems. Free probability has already been applied in various application fields such as digital communications, nuclear physics and mathematical finance, and has been shown to be an invaluable tool for describing the asymptotic behaviour of many large-dimensional systems. In particular, using the concept of free deconvolution, we provide an asymptotically (w.r.t. the number of observations) unbiased capacity estimator for MIMO channels impaired with noise called the free probability based estimator. Another estimator, called the Gaussian matrix mean based estimator, is also introduced by slightly modifying the free probability based estimator. This estimator is shown to give unbiased estimation of the moments of the channel matrix for any number of observations. Also, the estimator has this property when we extend to MIMO channels with phase off-set and frequency drift, for which no estimator has been provided so far in the literature. It is also shown that both the free probability based and the Gaussian matrix mean based estimator are asymptotically unbiased capacity estimators as the number of transmit antennas go to infinity, regardless of whether phase off-set and frequency drift are present. The limitations in the two estimators are also explained. Simulations are run to assess the performance of the estimators for a low number of antennas and samples to confirm the usefulness of the asymptotic results.
[ { "version": "v1", "created": "Fri, 20 Jul 2007 15:43:15 GMT" }, { "version": "v2", "created": "Fri, 14 Dec 2007 19:10:14 GMT" }, { "version": "v3", "created": "Fri, 7 Mar 2008 12:44:46 GMT" }, { "version": "v4", "created": "Thu, 15 May 2008 19:03:43 GMT" } ]
2009-11-13T00:00:00
[ [ "Ryan", "Øyvind", "" ], [ "Debbah", "Merouane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3170
Vladimir Sazonov
Vladimir Sazonov
Inductive Definition and Domain Theoretic Properties of Fully Abstract
50 pages
Logical Methods in Computer Science, Volume 3, Issue 3 (September 10, 2007) lmcs:914
10.2168/LMCS-3(3:7)2007
null
cs.LO
null
A construction of fully abstract typed models for PCF and PCF^+ (i.e., PCF + "parallel conditional function"), respectively, is presented. It is based on general notions of sequential computational strategies and wittingly consistent non-deterministic strategies introduced by the author in the seventies. Although these notions of strategies are old, the definition of the fully abstract models is new, in that it is given level-by-level in the finite type hierarchy. To prove full abstraction and non-dcpo domain theoretic properties of these models, a theory of computational strategies is developed. This is also an alternative and, in a sense, an analogue to the later game strategy semantics approaches of Abramsky, Jagadeesan, and Malacaria; Hyland and Ong; and Nickau. In both cases of PCF and PCF^+ there are definable universal (surjective) functionals from numerical functions to any given type, respectively, which also makes each of these models unique up to isomorphism. Although such models are non-omega-complete and therefore not continuous in the traditional terminology, they are also proved to be sequentially complete (a weakened form of omega-completeness), "naturally" continuous (with respect to existing directed "pointwise", or "natural" lubs) and also "naturally" omega-algebraic and "naturally" bounded complete -- appropriate generalisation of the ordinary notions of domain theory to the case of non-dcpos.
[ { "version": "v1", "created": "Sat, 21 Jul 2007 00:29:38 GMT" }, { "version": "v2", "created": "Fri, 7 Sep 2007 09:41:43 GMT" }, { "version": "v3", "created": "Mon, 10 Sep 2007 08:54:16 GMT" } ]
2015-07-01T00:00:00
[ [ "Sazonov", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.3175
Aydin Sezgin
Aydin Sezgin and Oliver Henkel
Stacked OSTBC: Error Performance and Rate Analysis
IEEE Transactions on Signal Processing, accepted
null
10.1109/TSP.2007.896025
null
cs.IT math.IT
null
It is well known, that the Alamouti scheme is the only space-time code from orthogonal design achieving the capacity of a multiple-input multiple-output (MIMO) wireless communication system with n_T=2 transmit antennas and n_R=1 receive antenna. In this work, we propose the n-times stacked Alamouti scheme for n_T=2n transmit antennas and show that this scheme achieves the capacity in the case of n_R=1 receive antenna. This result may regarded as an extension of the Alamouti case. For the more general case of more than one receive antenna, we show that if the number of transmit antennas is higher than the number of receive antennas we achieve a high portion of the capacity with this scheme. Further, we show that the MIMO capacity is at most twice the rate achieved with the proposed scheme for all SNR. We derive lower and upper bounds for the rate achieved with this scheme and compare it with upper and lower bounds for the capacity. In addition to the capacity analysis based on the assumption of a coherent channel, we analyze the error rate performance of the stacked OSTBC with the optimal ML detector and with the suboptimal lattice-reduction (LR) aided zero-forcing detector. We compare the error rate performance of the stacked OSTBC with spatial multiplexing (SM) and full-diversity achieving schemes. Finally, we illustrate the theoretical results by numerical simulations.
[ { "version": "v1", "created": "Sat, 21 Jul 2007 01:09:00 GMT" } ]
2009-11-13T00:00:00
[ [ "Sezgin", "Aydin", "" ], [ "Henkel", "Oliver", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3186
Damien Chablat
Anatoly Pashkevich (Robotic Laboratory), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Kinematic and stiffness analysis of the Orthoglide, a PKM with simple, regular workspace and homogeneous performances
null
Dans International Conference On Robotics And Automation ICRA, Rome : Italie (04/2007)
null
null
cs.RO
null
The Orthoglide is a Delta-type PKM dedicated to 3-axis rapid machining applications that was originally developed at IRCCyN in 2000-2001 to meet the advantages of both serial 3-axis machines (regular workspace and homogeneous performances) and parallel kinematic architectures (good dynamic performances and stiffness). This machine has three fixed parallel linear joints that are mounted orthogonally. The geometric parameters of the Orthoglide were defined as function of the size of a prescribed cubic Cartesian workspace that is free of singularities and internal collision. The interesting features of the Orthoglide are a regular Cartesian workspace shape, uniform performances in all directions and good compactness. In this paper, a new method is proposed to analyze the stiffness of overconstrained Delta-type manipulators, such as the Orthoglide. The Orthoglide is then benchmarked according to geometric, kinematic and stiffness criteria: workspace to footprint ratio, velocity and force transmission factors, sensitivity to geometric errors, torsional stiffness and translational stiffness.
[ { "version": "v1", "created": "Sat, 21 Jul 2007 05:24:17 GMT" } ]
2007-07-24T00:00:00
[ [ "Pashkevich", "Anatoly", "", "Robotic Laboratory" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3205
Andrew Schumann
Andrew Schumann, Florentin Smarandache
Neutrality and Many-Valued Logics
119 pages
A. Schumann, F. Smarandache, Neutrality and Many-Valued Logics. American Research Press, 2007
null
null
cs.LO cs.AI
null
In this book, we consider various many-valued logics: standard, linear, hyperbolic, parabolic, non-Archimedean, p-adic, interval, neutrosophic, etc. We survey also results which show the tree different proof-theoretic frameworks for many-valued logics, e.g. frameworks of the following deductive calculi: Hilbert's style, sequent, and hypersequent. We present a general way that allows to construct systematically analytic calculi for a large family of non-Archimedean many-valued logics: hyperrational-valued, hyperreal-valued, and p-adic valued logics characterized by a special format of semantics with an appropriate rejection of Archimedes' axiom. These logics are built as different extensions of standard many-valued logics (namely, Lukasiewicz's, Goedel's, Product, and Post's logics). The informal sense of Archimedes' axiom is that anything can be measured by a ruler. Also logical multiple-validity without Archimedes' axiom consists in that the set of truth values is infinite and it is not well-founded and well-ordered. On the base of non-Archimedean valued logics, we construct non-Archimedean valued interval neutrosophic logic INL by which we can describe neutrality phenomena.
[ { "version": "v1", "created": "Sat, 21 Jul 2007 10:35:37 GMT" } ]
2007-07-24T00:00:00
[ [ "Schumann", "Andrew", "" ], [ "Smarandache", "Florentin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0707.3231
Rico Zenklusen
Marco Laumanns and Rico Zenklusen
Estimation of Small s-t Reliabilities in Acyclic Networks
null
null
null
null
cs.DM
null
In the classical s-t network reliability problem a fixed network G is given including two designated vertices s and t (called terminals). The edges are subject to independent random failure, and the task is to compute the probability that s and t are connected in the resulting network, which is known to be #P-complete. In this paper we are interested in approximating the s-t reliability in case of a directed acyclic original network G. We introduce and analyze a specialized version of the Monte-Carlo algorithm given by Karp and Luby. For the case of uniform edge failure probabilities, we give a worst-case bound on the number of samples that have to be drawn to obtain an epsilon-delta approximation, being sharper than the original upper bound. We also derive a variance reduction of the estimator which reduces the expected number of iterations to perform to achieve the desired accuracy when applied in conjunction with different stopping rules. Initial computational results on two types of random networks (directed acyclic Delaunay graphs and a slightly modified version of a classical random graph) with up to one million vertices are presented. These results show the advantage of the introduced Monte-Carlo approach compared to direct simulation when small reliabilities have to be estimated and demonstrate its applicability on large-scale instances.
[ { "version": "v1", "created": "Sat, 21 Jul 2007 21:50:36 GMT" } ]
2007-07-24T00:00:00
[ [ "Laumanns", "Marco", "" ], [ "Zenklusen", "Rico", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.3236
Vladimir Tskhvaradze
Vladimir Tskhvaradze
RS-232 Led Board
null
null
null
null
cs.OH
null
This article demonstrates how to develop a Microchip PIC16F84 based device that supports RS-232 interface with PC. Circuit (LED Board) design and software development will be discussed. PicBasic Pro Compiler from microEngineering Labs, Inc. is used for PIC programming. Development of LED Board Control Console using C/C++ is also briefly discussed. The project requires basic work experience with Microchip PICs, serial communication and programming.
[ { "version": "v1", "created": "Sun, 22 Jul 2007 02:31:09 GMT" } ]
2011-11-10T00:00:00
[ [ "Tskhvaradze", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.3248
Rajesh Sundaresan
Leena Zacharias, Rajesh Sundaresan
Decentralized sequential change detection using physical layer fusion
10 pages, two-column, 10 figures, revised based on feedback from reviewers, accepted for publication in IEEE Trans. on Wireless Communications
IEEE Trans. Wireless Commun., vol. 7, no. 12, pp. 4999-5008, Dec. 2008
10.1109/T-WC.2008.070808
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of decentralized sequential detection with conditionally independent observations is studied. The sensors form a star topology with a central node called fusion center as the hub. The sensors make noisy observations of a parameter that changes from an initial state to a final state at a random time where the random change time has a geometric distribution. The sensors amplify and forward the observations over a wireless Gaussian multiple access channel and operate under either a power constraint or an energy constraint. The optimal transmission strategy at each stage is shown to be the one that maximizes a certain Ali-Silvey distance between the distributions for the hypotheses before and after the change. Simulations demonstrate that the proposed analog technique has lower detection delays when compared with existing schemes. Simulations further demonstrate that the energy-constrained formulation enables better use of the total available energy than the power-constrained formulation in the change detection problem.
[ { "version": "v1", "created": "Sun, 22 Jul 2007 10:07:33 GMT" }, { "version": "v2", "created": "Sat, 18 Aug 2007 15:05:59 GMT" }, { "version": "v3", "created": "Mon, 4 Aug 2008 07:29:21 GMT" } ]
2008-12-29T00:00:00
[ [ "Zacharias", "Leena", "" ], [ "Sundaresan", "Rajesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3263
Wojciech Wislicki
Wojciech Wislicki
Autonomous tools for Grid management, monitoring and optimization
The original version of this proposal was created on 22nd March 2006, published as the ICM UW preprint and registered in the bibliographic database of the University of Warsaw on the following Internet address: http://bibliografia.icm.edu.pl/g2/main.pl?mod=p&id=51470&t=1&tytul=Autonomous&lim=100&ord=1
null
null
null
cs.DC cs.CE hep-ex
null
We outline design and lines of development of autonomous tools for the computing Grid management, monitoring and optimization. The management is proposed to be based on the notion of utility. Grid optimization is considered to be application-oriented. A generic Grid simulator is proposed as an optimization tool for Grid structure and functionality.
[ { "version": "v1", "created": "Sun, 22 Jul 2007 14:02:21 GMT" } ]
2009-07-09T00:00:00
[ [ "Wislicki", "Wojciech", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" } ]
0707.3269
Laurent Romary
Laurent Romary (INRIA Lorraine - LORIA), Nancy Ide (INRIA Lorraine - LORIA)
International Standard for a Linguistic Annotation Framework
null
Natural Language Engineering 10, 3-4 (09/2004) 211-225
null
null
cs.CL
null
This paper describes the Linguistic Annotation Framework under development within ISO TC37 SC4 WG1. The Linguistic Annotation Framework is intended to serve as a basis for harmonizing existing language resources as well as developing new ones.
[ { "version": "v1", "created": "Sun, 22 Jul 2007 15:24:48 GMT" } ]
2007-07-24T00:00:00
[ [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ], [ "Ide", "Nancy", "", "INRIA Lorraine -\n LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0707.3270
Laurent Romary
Laurent Romary (INRIA Lorraine - LORIA), Nancy Ide, Adam Kilgarriff
A Formal Model of Dictionary Structure and Content
null
Dans Euralex 2000 Euralex 2000, Stuttgart : Allemagne (2000)
null
null
cs.CL
null
We show that a general model of lexical information conforms to an abstract model that reflects the hierarchy of information found in a typical dictionary entry. We show that this model can be mapped into a well-formed XML document, and how the XSL transformation language can be used to implement a semantics defined over the abstract model to enable extraction and manipulation of the information in any format.
[ { "version": "v1", "created": "Sun, 22 Jul 2007 15:25:27 GMT" } ]
2007-07-24T00:00:00
[ [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ], [ "Ide", "Nancy", "" ], [ "Kilgarriff", "Adam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0707.3336
Koujin Takeda
Koujin Takeda, Atsushi Hatabu, Yoshiyuki Kabashima
Statistical mechanical analysis of the linear vector channel in digital communication
15 pages, 2 figures
J. Phys. A40 (2007) 14085-14098
10.1088/1751-8113/40/47/004
null
cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT
null
A statistical mechanical framework to analyze linear vector channel models in digital wireless communication is proposed for a large system. The framework is a generalization of that proposed for code-division multiple-access systems in Europhys. Lett. 76 (2006) 1193 and enables the analysis of the system in which the elements of the channel transfer matrix are statistically correlated with each other. The significance of the proposed scheme is demonstrated by assessing the performance of an existing model of multi-input multi-output communication systems.
[ { "version": "v1", "created": "Mon, 23 Jul 2007 08:35:39 GMT" }, { "version": "v2", "created": "Tue, 6 Nov 2007 13:52:44 GMT" } ]
2007-11-06T00:00:00
[ [ "Takeda", "Koujin", "" ], [ "Hatabu", "Atsushi", "" ], [ "Kabashima", "Yoshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3390
Francis Bach
Francis Bach (WILLOW Project - Inria/Ens)
Consistency of the group Lasso and multiple kernel learning
null
null
null
null
cs.LG
null
We consider the least-square regression problem with regularization by a block 1-norm, i.e., a sum of Euclidean norms over spaces of dimensions larger than one. This problem, referred to as the group Lasso, extends the usual regularization by the 1-norm where all spaces have dimension one, where it is commonly referred to as the Lasso. In this paper, we study the asymptotic model consistency of the group Lasso. We derive necessary and sufficient conditions for the consistency of group Lasso under practical assumptions, such as model misspecification. When the linear predictors and Euclidean norms are replaced by functions and reproducing kernel Hilbert norms, the problem is usually referred to as multiple kernel learning and is commonly used for learning from heterogeneous data sources and for non linear variable selection. Using tools from functional analysis, and in particular covariance operators, we extend the consistency results to this infinite dimensional case and also propose an adaptive scheme to obtain a consistent model estimate, even when the necessary condition required for the non adaptive scheme is not satisfied.
[ { "version": "v1", "created": "Mon, 23 Jul 2007 14:35:20 GMT" }, { "version": "v2", "created": "Mon, 28 Jan 2008 10:10:31 GMT" } ]
2008-01-28T00:00:00
[ [ "Bach", "Francis", "", "WILLOW Project - Inria/Ens" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0707.3407
Alexander Tiskin
Alexander Tiskin
Faster subsequence recognition in compressed strings
null
null
null
null
cs.DS cs.CC cs.DM
null
Computation on compressed strings is one of the key approaches to processing massive data sets. We consider local subsequence recognition problems on strings compressed by straight-line programs (SLP), which is closely related to Lempel--Ziv compression. For an SLP-compressed text of length $\bar m$, and an uncompressed pattern of length $n$, C{\'e}gielski et al. gave an algorithm for local subsequence recognition running in time $O(\bar mn^2 \log n)$. We improve the running time to $O(\bar mn^{1.5})$. Our algorithm can also be used to compute the longest common subsequence between a compressed text and an uncompressed pattern in time $O(\bar mn^{1.5})$; the same problem with a compressed pattern is known to be NP-hard.
[ { "version": "v1", "created": "Mon, 23 Jul 2007 16:26:24 GMT" }, { "version": "v2", "created": "Tue, 6 Nov 2007 14:16:07 GMT" }, { "version": "v3", "created": "Fri, 11 Jan 2008 21:54:54 GMT" }, { "version": "v4", "created": "Fri, 18 Jan 2008 10:20:48 GMT" } ]
2011-11-10T00:00:00
[ [ "Tiskin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.3409
Alexander Tiskin
Alexander Tiskin
Faster exon assembly by sparse spliced alignment
null
null
null
null
cs.DS cs.CC cs.CE q-bio.QM
null
Assembling a gene from candidate exons is an important problem in computational biology. Among the most successful approaches to this problem is \emph{spliced alignment}, proposed by Gelfand et al., which scores different candidate exon chains within a DNA sequence of length $m$ by comparing them to a known related gene sequence of length n, $m = \Theta(n)$. Gelfand et al.\ gave an algorithm for spliced alignment running in time O(n^3). Kent et al.\ considered sparse spliced alignment, where the number of candidate exons is O(n), and proposed an algorithm for this problem running in time O(n^{2.5}). We improve on this result, by proposing an algorithm for sparse spliced alignment running in time O(n^{2.25}). Our approach is based on a new framework of \emph{quasi-local string comparison}.
[ { "version": "v1", "created": "Mon, 23 Jul 2007 16:35:54 GMT" } ]
2007-07-24T00:00:00
[ [ "Tiskin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0707.3435
Joseph Y. Halpern
Joseph Y. Halpern and Sabina Petride
A Knowledge-Based Analysis of Global Function Computation
null
null
null
null
cs.DC cs.LO
null
Consider a distributed system N in which each agent has an input value and each communication link has a weight. Given a global function, that is, a function f whose value depends on the whole network, the goal is for every agent to eventually compute the value f(N). We call this problem global function computation. Various solutions for instances of this problem, such as Boolean function computation, leader election, (minimum) spanning tree construction, and network determination, have been proposed, each under particular assumptions about what processors know about the system and how this knowledge can be acquired. We give a necessary and sufficient condition for the problem to be solvable that generalizes a number of well-known results. We then provide a knowledge-based (kb) program (like those of Fagin, Halpern, Moses, and Vardi) that solves global function computation whenever possible. Finally, we improve the message overhead inherent in our initial kb program by giving a counterfactual belief-based program that also solves the global function computation whenever possible, but where agents send messages only when they believe it is necessary to do so. The latter program is shown to be implemented by a number of well-known algorithms for solving leader election.
[ { "version": "v1", "created": "Mon, 23 Jul 2007 18:49:28 GMT" } ]
2007-08-08T00:00:00
[ [ "Halpern", "Joseph Y.", "" ], [ "Petride", "Sabina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.3449
Jean Mairesse
Thu-Ha Dao-Thi (LIAFA), Jean Mairesse (LIAFA)
Zero-automatic queues and product form
null
Advances in Applied Probability 39, 2 (2007) 429-461
null
null
cs.DM
null
We introduce and study a new model: 0-automatic queues. Roughly, 0-automatic queues are characterized by a special buffering mechanism evolving like a random walk on some infinite group or monoid. The salient result is that all stable 0-automatic queues have a product form stationary distribution and a Poisson output process. When considering the two simplest and extremal cases of 0-automatic queues, we recover the simple M/M/1 queue, and Gelenbe's G-queue with positive and negative customers.
[ { "version": "v1", "created": "Mon, 23 Jul 2007 20:41:43 GMT" } ]
2007-07-25T00:00:00
[ [ "Dao-Thi", "Thu-Ha", "", "LIAFA" ], [ "Mairesse", "Jean", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.3457
Chenguang Lu
Chenguang Lu
A Generalized Information Formula as the Bridge between Shannon and Popper
8 pages, 5 figures
null
null
null
cs.IT cs.AI math.IT
null
A generalized information formula related to logical probability and fuzzy set is deduced from the classical information formula. The new information measure accords with to Popper's criterion for knowledge evolution very much. In comparison with square error criterion, the information criterion does not only reflect error of a proposition, but also reflects the particularity of the event described by the proposition. It gives a proposition with less logical probability higher evaluation. The paper introduces how to select a prediction or sentence from many for forecasts and language translations according to the generalized information criterion. It also introduces the rate fidelity theory, which comes from the improvement of the rate distortion theory in the classical information theory by replacing distortion (i.e. average error) criterion with the generalized mutual information criterion, for data compression and communication efficiency. Some interesting conclusions are obtained from the rate-fidelity function in relation to image communication. It also discusses how to improve Popper's theory.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 00:04:32 GMT" } ]
2007-07-25T00:00:00
[ [ "Lu", "Chenguang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3461
Dinesh Krithivasan
D. Krithivasan and S. S. Pradhan
Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function
33 pages, 7 figures
null
null
null
cs.IT math.IT
null
Consider a pair of correlated Gaussian sources (X1,X2). Two separate encoders observe the two components and communicate compressed versions of their observations to a common decoder. The decoder is interested in reconstructing a linear combination of X1 and X2 to within a mean-square distortion of D. We obtain an inner bound to the optimal rate-distortion region for this problem. A portion of this inner bound is achieved by a scheme that reconstructs the linear function directly rather than reconstructing the individual components X1 and X2 first. This results in a better rate region for certain parameter values. Our coding scheme relies on lattice coding techniques in contrast to more prevalent random coding arguments used to demonstrate achievable rate regions in information theory. We then consider the case of linear reconstruction of K sources and provide an inner bound to the optimal rate-distortion region. Some parts of the inner bound are achieved using the following coding structure: lattice vector quantization followed by "correlated" lattice-structured binning.
[ { "version": "v1", "created": "Mon, 23 Jul 2007 22:55:43 GMT" } ]
2007-07-25T00:00:00
[ [ "Krithivasan", "D.", "" ], [ "Pradhan", "S. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3462
Noah Stein
Noah D. Stein, Asuman Ozdaglar, Pablo A. Parrilo
Separable and Low-Rank Continuous Games
null
International Journal of Game Theory, Vol. 37, No. 4, pp. 457-474, 2008.
10.1007/s00182-008-0129-2
null
cs.GT math.OC
null
In this paper, we study nonzero-sum separable games, which are continuous games whose payoffs take a sum-of-products form. Included in this subclass are all finite games and polynomial games. We investigate the structure of equilibria in separable games. We show that these games admit finitely supported Nash equilibria. Motivated by the bounds on the supports of mixed equilibria in two-player finite games in terms of the ranks of the payoff matrices, we define the notion of the rank of an n-player continuous game and use this to provide bounds on the cardinality of the support of equilibrium strategies. We present a general characterization theorem that states that a continuous game has finite rank if and only if it is separable. Using our rank results, we present an efficient algorithm for computing approximate equilibria of two-player separable games with fixed strategy spaces in time polynomial in the rank of the game.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 16:20:59 GMT" } ]
2010-04-26T00:00:00
[ [ "Stein", "Noah D.", "" ], [ "Ozdaglar", "Asuman", "" ], [ "Parrilo", "Pablo A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0707.3479
Alp Atici
Alp Atici, Rocco A. Servedio
Quantum Algorithms for Learning and Testing Juntas
15 pages, 1 figure. Uses synttree package. To appear in Quantum Information Processing
Quantum Information Processing, Vol. 6, No. 5, 323 - 348 (2007)
10.1007/s11128-007-0061-6
null
quant-ph cs.LG
null
In this article we develop quantum algorithms for learning and testing juntas, i.e. Boolean functions which depend only on an unknown set of k out of n input variables. Our aim is to develop efficient algorithms: - whose sample complexity has no dependence on n, the dimension of the domain the Boolean functions are defined over; - with no access to any classical or quantum membership ("black-box") queries. Instead, our algorithms use only classical examples generated uniformly at random and fixed quantum superpositions of such classical examples; - which require only a few quantum examples but possibly many classical random examples (which are considered quite "cheap" relative to quantum examples). Our quantum algorithms are based on a subroutine FS which enables sampling according to the Fourier spectrum of f; the FS subroutine was used in earlier work of Bshouty and Jackson on quantum learning. Our results are as follows: - We give an algorithm for testing k-juntas to accuracy $\epsilon$ that uses $O(k/\epsilon)$ quantum examples. This improves on the number of examples used by the best known classical algorithm. - We establish the following lower bound: any FS-based k-junta testing algorithm requires $\Omega(\sqrt{k})$ queries. - We give an algorithm for learning $k$-juntas to accuracy $\epsilon$ that uses $O(\epsilon^{-1} k\log k)$ quantum examples and $O(2^k \log(1/\epsilon))$ random examples. We show that this learning algorithms is close to optimal by giving a related lower bound.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 13:17:55 GMT" } ]
2007-10-16T00:00:00
[ [ "Atici", "Alp", "" ], [ "Servedio", "Rocco A.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0707.3482
Kenton K. Yee
Kenton K. Yee
A Bayesian Framework for Combining Valuation Estimates
Citations at http://papers.ssrn.com/sol3/cf_dev/AbsByAuth.cfm?per_id=240309 Review of Quantitative Finance and Accounting, 30.3 (2008) forthcoming
null
null
null
q-fin.ST cs.CE nlin.AO nlin.CD nlin.SI physics.pop-ph physics.soc-ph stat.AP
null
Obtaining more accurate equity value estimates is the starting point for stock selection, value-based indexing in a noisy market, and beating benchmark indices through tactical style rotation. Unfortunately, discounted cash flow, method of comparables, and fundamental analysis typically yield discrepant valuation estimates. Moreover, the valuation estimates typically disagree with market price. Can one form a superior valuation estimate by averaging over the individual estimates, including market price? This article suggests a Bayesian framework for combining two or more estimates into a superior valuation estimate. The framework justifies the common practice of averaging over several estimates to arrive at a final point estimate.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 05:04:53 GMT" } ]
2008-12-02T00:00:00
[ [ "Yee", "Kenton K.", "" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.ST", "description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data", "span": "(Statistical Finance)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Physics", "code": "nlin.SI", "description": "Exactly solvable systems, integrable PDEs, integrable ODEs, Painleve analysis, integrable discrete maps, solvable lattice models, integrable quantum systems", "span": "(Exactly Solvable and Integrable Systems)" }, { "class": "Physics", "code": "physics.pop-ph", "description": "Description coming soon", "span": "(Popular Physics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0707.3507
Damien Chablat
Daniel Kanaan (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Workspace and Kinematic Analysis of the VERNE machine
null
Dans International Conference on Advanced Intelligent Mechatronics - AIM, Z\"urich : Suisse (09/2007)
null
null
cs.RO
null
This paper describes the workspace and the inverse and direct kinematic analysis of the VERNE machine, a serial/parallel 5-axis machine tool designed by Fatronik for IRCCyN. This machine is composed of a three-degree-of-freedom (DOF) parallel module and a two-DOF serial tilting table. The parallel module consists of a moving platform that is connected to a fixed base by three non-identical legs. This feature involves (i) a simultaneous combination of rotation and translation for the moving platform, which is balanced by the tilting table and (ii) workspace whose shape and volume vary as a function of the tool length. This paper summarizes results obtained in the context of the European projects NEXT ("Next Generation of Productions Systems").
[ { "version": "v1", "created": "Tue, 24 Jul 2007 09:13:22 GMT" } ]
2007-07-25T00:00:00
[ [ "Kanaan", "Daniel", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3509
Laurent Decreusefond
Laurent Decreusefond (LTCI), Eduardo Ferraz (LTCI), Philippe Martins (LTCI)
Upper bound of loss probability in an OFDMA system with randomly located users
null
null
null
null
math.PR cs.IT cs.NI math.IT
null
For OFDMA systems, we find a rough but easily computed upper bound for the probability of loosing communications by insufficient number of sub-channels on downlink. We consider as random the positions of receiving users in the system as well as the number of sub-channels dedicated to each one. We use recent results of the theory of point processes which reduce our calculations to the first and second moments of the total required number of sub-carriers.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 15:12:13 GMT" } ]
2007-07-25T00:00:00
[ [ "Decreusefond", "Laurent", "", "LTCI" ], [ "Ferraz", "Eduardo", "", "LTCI" ], [ "Martins", "Philippe", "", "LTCI" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3531
Luis Nunez A
J. L. Chaves, G. Diaz, V. Hamar, R. Isea, F. Rojas, N. Ruiz, R. Torrens, M. Uzcategui, J. Florez-Lopez, H. Hoeger, C. Mendoza, L. A. Nunez
e-Science initiatives in Venezuela
9 pages, 4 figures
Procceedings Spanish Conference on e-Science Grid Computing, J. Casado, R. Mayo y R. Munoz (Editors) CIEMAT, Madrid Spain (2007), pp 45 - 52
null
null
cs.CE cs.DC
null
Within the context of the nascent e-Science infrastructure in Venezuela, we describe several web-based scientific applications developed at the Centro Nacional de Calculo Cientifico Universidad de Los Andes (CeCalCULA), Merida, and at the Instituto Venezolano de Investigaciones Cientificas (IVIC), Caracas. The different strategies that have been followed for implementing quantum chemistry and atomic physics applications are presented. We also briefly discuss a damage portal based on dynamic, nonlinear, finite elements of lumped damage mechanics and a biomedical portal developed within the framework of the \textit{E-Infrastructure shared between Europe and Latin America} (EELA) initiative for searching common sequences and inferring their functions in parasitic diseases such as leishmaniasis, chagas and malaria.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 12:00:43 GMT" } ]
2007-07-25T00:00:00
[ [ "Chaves", "J. L.", "" ], [ "Diaz", "G.", "" ], [ "Hamar", "V.", "" ], [ "Isea", "R.", "" ], [ "Rojas", "F.", "" ], [ "Ruiz", "N.", "" ], [ "Torrens", "R.", "" ], [ "Uzcategui", "M.", "" ], [ "Florez-Lopez", "J.", "" ], [ "Hoeger", "H.", "" ], [ "Mendoza", "C.", "" ], [ "Nunez", "L. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.3534
Damien Chablat
Damien Chablat (IRCCyN), St\'ephane Caro (IRCCyN)
The Kinetostatic Optimization of a Novel Prismatic Drive
null
Dans 12th World Congress in Mechanism and Machine Science - 12th World Congress in Mechanism and Machine Science, Besan\c{c}on : France (06/2007)
null
null
cs.RO
null
The design of a mechanical transmission taking into account the transmitted forces is reported in this paper. This transmission is based on Slide-o-Cam, a cam mechanism with multiple rollers mounted on a common translating follower. The design of Slide-o-Cam, a transmission intended to produce a sliding motion from a turning drive, or vice versa, was reported elsewhere. This transmission provides pure-rolling motion, thereby reducing the friction of rack-and-pinions and linear drives. The pressure angle is a suitable performance index for this transmission because it determines the amount of force transmitted to the load vs. that transmitted to the machine frame. To assess the transmission capability of the mechanism, the Hertz formula is introduced to calculate the stresses on the rollers and on the cams. The final transmission is intended to replace the current ball-screws in the Orthoglide, a three-DOF parallel robot for the production of translational motions, currently under development for machining applications at Ecole Centrale de Nantes.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 12:18:05 GMT" } ]
2007-07-25T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Caro", "Stéphane", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3540
Patrick Erik Bradley
Patrick Erik Bradley
Mumford dendrograms
16 pages, 7 figures; Incorporating Special Issue: Ultrametric and p-Adic Applications in Computer Science
The Computer Journal, Vol. 53, No. 4 (2010), 393-404
10.1093/comjnl/bxm088
null
cs.DM
null
An effective $p$-adic encoding of dendrograms is presented through an explicit embedding into the Bruhat-Tits tree for a $p$-adic number field. This field depends on the number of children of a vertex and is a finite extension of the field of $p$-adic numbers. It is shown that fixing $p$-adic representatives of the residue field allows a natural way of encoding strings by identifying a given alphabet with such representatives. A simple $p$-adic hierarchic classification algorithm is derived for $p$-adic numbers, and is applied to strings over finite alphabets. Examples of DNA coding are presented and discussed. Finally, new geometric and combinatorial invariants of time series of $p$-adic dendrograms are developped.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 13:00:17 GMT" } ]
2010-05-18T00:00:00
[ [ "Bradley", "Patrick Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.3550
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
A Six Degree-Of-Freedom Haptic Device Based On The Orthoglide And A Hybrid Agile Eye
null
Dans Proceedings of IDETC 2006: 30th Mechanisms & Robotics Conference (MR) - IDETC, Philadelphie : \'Etats-Unis d'Am\'erique (2006)
null
null
cs.RO
null
This paper is devoted to the kinematic design of a new six degree-of-freedom haptic device using two parallel mechanisms. The first one, called orthoglide, provides the translation motions and the second one, called agile eye, produces the rotational motions. These two motions are decoupled to simplify the direct and inverse kinematics, as it is needed for real-time control. To reduce the inertial load, the motors are fixed on the base and a transmission with two universal joints is used to transmit the rotational motions from the base to the end-effector. Two alternative wrists are proposed (i), the agile eye with three degrees of freedom or (ii) a hybrid wrist made by the assembly of a two-dof agile eye with a rotary motor. The last one is optimized to increase its stiffness and to decrease the number of moving parts.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 13:42:08 GMT" } ]
2007-07-25T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3552
Damien Chablat
Maher Baili (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Analyse Comparative des Manipulateurs 3R \`a Axes Orthogonaux
null
Dans Congr\`es international Conception et Mod\'elisation des Syst\`emes M\'ecaniques - Congr\`es international Conception et Mod\'elisation des Syst\`emes M\'ecaniques, Hammamet : Tunisie (03/2005)
null
null
cs.RO
null
A family of 3R orthogonal manipulators without offset on the third body can be divided into exactly nine workspace topologies. The workspace is characterized in a half-cross section by the singular curves. The workspace topology is defined by the number of cusps and nodes that appear on these singular curves. Based on this classification, we evaluate theses manipulators by the condition number related to the joint space and the proportion of the region with four inverse kinematic solutions compared to a sphere containing all the workspace. This second performance number is in relation with the workspace. We determine finally le topology of workspace to which belong manipulators having the best performance number values.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 13:46:22 GMT" } ]
2007-07-25T00:00:00
[ [ "Baili", "Maher", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3553
Damien Chablat
Mazen Zein (IRCCyN), Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
An Exhaustive Study of the Workspace Topologies of all 3R Orthogonal Manipulators with Geometric Simplifications
null
Dans Proceedings of CK2005 - Proceedings of CK2005, International Workshop on Computational Kinematics, Cassino : Italie (05/2005)
null
null
cs.RO
null
This paper analyses the workspace of the three-revolute orthogonal manipulators that have at least one of their DH parameters equal to zero. These manipulators are classified into different groups with similar kinematic properties. The classification criteria are based on the topology of the workspace. Each group is evaluated according to interesting kinematic properties such as the size of the workspace subregion reachable with four inverse kinematic solutions, the existence and the size of voids, and the size of the regions of feasible paths in the workspace.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 13:49:51 GMT" } ]
2007-07-25T00:00:00
[ [ "Zein", "Mazen", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3559
Wilson Wong
Wilson Wong
Practical Approach to Knowledge-based Question Answering with Natural Language Understanding and Advanced Reasoning
Master of Science thesis, National Technical University College of Malaysia, 2005
null
null
null
cs.CL cs.AI cs.HC cs.IR
null
This research hypothesized that a practical approach in the form of a solution framework known as Natural Language Understanding and Reasoning for Intelligence (NaLURI), which combines full-discourse natural language understanding, powerful representation formalism capable of exploiting ontological information and reasoning approach with advanced features, will solve the following problems without compromising practicality factors: 1) restriction on the nature of question and response, and 2) limitation to scale across domains and to real-life natural language text.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 14:30:27 GMT" } ]
2007-07-25T00:00:00
[ [ "Wong", "Wilson", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0707.3560
Damien Chablat
Antoine Rennuit (IRCCyN), Alain Micaelli (CEA/LIST), Xavier Merlhiot (CEA/LIST), Claude Andriot (CEA/LIST), Fran\c{c}ois Guillaume, Nicolas Chevassus, Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN)
Integration of a Balanced Virtual Manikin in a Virtual Reality Platform aimed at Virtual Prototyping
null
Dans Proceedings of Virtual Concept 2005 - Virtual Concept, Biarritz : France (11/2005)
null
null
cs.RO
null
The work presented here is aimed at introducing a virtual human controller in a virtual prototyping framework. After a brief introduction describing the problem solved in the paper, we describe the interest as for digital humans in the context of concurrent engineering. This leads us to draw a control architecture enabling to drive virtual humans in a real-time immersed way, and to interact with the product, through motion capture. Unfortunately, we show this control scheme can lead to unfeasible movements because of the lack of balance control. Introducing such a controller is a problem that was never addressed in the context of real-time. We propose an implementation of a balance controller, that we insert into the previously described control scheme. Next section is dedicated to show the results we obtained. Finally, we propose a virtual reality platform into which the digital character controller is integrated.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 14:23:37 GMT" } ]
2007-07-25T00:00:00
[ [ "Rennuit", "Antoine", "", "IRCCyN" ], [ "Micaelli", "Alain", "", "CEA/LIST" ], [ "Merlhiot", "Xavier", "", "CEA/LIST" ], [ "Andriot", "Claude", "", "CEA/LIST" ], [ "Guillaume", "François", "", "IRCCyN" ], [ "Chevassus", "Nicolas", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Chedmail", "Patrick", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3562
Damien Chablat
Antoine Rennuit (IRCCyN), Alain Micaelli (CEA/LIST), Xavier Merlhiot (CEA/LIST), Claude Andriot (CEA/LIST), Fran\c{c}ois Guillaume, Nicolas Chevassus, Damien Chablat (IRCCyN), Patrick Chedmail (IRCCyN)
Balanced Virtual Humans Interacting with their Environment
null
Dans Summer Computer Simulation Conference - Summer Computer Simulation Conference, France (08/2005)
null
null
cs.RO
null
The animation of human avatars seems very successful; the computer graphics industry shows outstanding results in films everyday, the game industry achieves exploits... Nevertheless, the animation and control processes of such manikins are very painful. It takes days to a specialist to build such animated sequences, and it is not adaptive to any type of modifications. Our main purpose is the virtual human for engineering, especially virtual prototyping. As for this domain of activity, such amounts of time are prohibitive.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 14:26:28 GMT" } ]
2007-07-25T00:00:00
[ [ "Rennuit", "Antoine", "", "IRCCyN" ], [ "Micaelli", "Alain", "", "CEA/LIST" ], [ "Merlhiot", "Xavier", "", "CEA/LIST" ], [ "Andriot", "Claude", "", "CEA/LIST" ], [ "Guillaume", "François", "", "IRCCyN" ], [ "Chevassus", "Nicolas", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Chedmail", "Patrick", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3563
Damien Chablat
Fouad Bennis (IRCCyN), Damien Chablat (IRCCyN), Philippe D\'epinc\'e
Virtual reality: A human centered tool for improving Manufacturing
null
Dans Proceedings of Virtual Concept 2005 - Virtual Concept, Biarritz : France (11/2005)
null
null
cs.RO
null
Manufacturing is using Virtual Reality tools to enhance the product life cycle. Their definitions are still in flux and it is necessary to define their connections. Thus, firstly, we will introduce more closely some definitions where we will find that, if the Virtual manufacturing concepts originate from machining operations and evolve in this manufacturing area, there exist a lot of applications in different fields such as casting, forging, sheet metalworking and robotics (mechanisms). From the recent projects in Europe or in USA, we notice that the human perception or the simulation of mannequin is more and more needed in both fields. In this context, we have isolated some applications as ergonomic studies, assembly and maintenance simulation, design or training where the virtual reality tools can be applied. Thus, we find out a family of applications where the virtual reality tools give the engineers the main role in the optimization process. We will illustrate our paper by several examples where virtual reality interfaces are used and combined with optimization tools as multi-agent systems.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 14:28:01 GMT" } ]
2007-07-25T00:00:00
[ [ "Bennis", "Fouad", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Dépincé", "Philippe", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3564
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
A New Six Degree-of-Freedom Haptic Device based on the Orthoglide and the Agile Eye
null
Dans Proceedings of Virtual Concept 2005 - Virtual Concept, France (11/2005)
null
null
cs.RO
null
The aim of this paper is to present a new six degree-of-freedom (dof) haptic device using two parallel mechanisms. The first one, called orthoglide, provides the translation motions and the second one produces the rotational motions. These two motions are decoupled to simplify the direct and inverse kinematics, as it is needed for real-times control. To reduce the inertial load, the motors are fixed on the base and a transmission with two universal joints is used to transmit the rotational motions from the base to the end-effector. The main feature of the orthoglide and of the agile eye mechanism is the existence of an isotropic configuration. The length of the legs and the range limits of the orthoglide are optimized to have homogeneous performance throughout the Cartesian workspace, which has a nearly cubic workspace. These properties permit to have a high stiffness throughout the workspace and workspace limits that are easily understandable by the user.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 14:29:41 GMT" } ]
2007-07-25T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3574
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN), F\'elix Majou (IRCCyN)
L'orthoglide : une machine-outil rapide d'architecture parall\`ele isotrope
null
Dans 2\`eme Assises Machines et Usinage \`a Grande Vitesse - 2\`eme Assises Machines et Usinage \`a Grande Vitesse, France (03/2002)
null
null
cs.RO
null
This article presents the Orthoglide project. The purpose of this project is the realization of a prototype of machine tool to three degrees of translation. The characteristic of this machine is a parallel kinematic architecture optimized to obtain a compact workspace with homogeneous performance. For that, the principal criterion of design which was used is the isotropy.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 15:14:38 GMT" } ]
2007-07-25T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Majou", "Félix", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3575
Philipp Mayr
Philipp Mayr, Anne-Kathrin Walter
An exploratory study of Google Scholar
16 pages, 4 figures
null
10.1108/14684520710841784
null
cs.DL cs.IR
null
The paper discusses and analyzes the scientific search service Google Scholar (GS). The focus is on an exploratory study which investigates the coverage of scientific serials in GS. The study shows deficiencies in the coverage and up-to-dateness of the GS index. Furthermore, the study points up which Web servers are the most important data providers for this search service and which information sources are highly represented. We can show that there is a relatively large gap in Google Scholars coverage of German literature as well as weaknesses in the accessibility of Open Access content. Keywords: Search engines, Digital libraries, Worldwide Web, Serials, Electronic journals
[ { "version": "v1", "created": "Tue, 24 Jul 2007 19:19:36 GMT" } ]
2019-01-15T00:00:00
[ [ "Mayr", "Philipp", "" ], [ "Walter", "Anne-Kathrin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0707.3584
Nihar Jindal
Steven Weber, Jeffrey G. Andrews, Nihar Jindal
The effect of fading, channel inversion, and threshold scheduling on ad hoc networks
Accepted for publication in IEEE Trans. Inform. Theory, 24 pages
IEEE Trans. Information Theory, Vol. 53, No. 11, pp. 4127-4149, Nov. 2007
null
null
cs.IT math.IT
null
This paper addresses three issues in the field of ad hoc network capacity: the impact of i)channel fading, ii) channel inversion power control, and iii) threshold-based scheduling on capacity. Channel inversion and threshold scheduling may be viewed as simple ways to exploit channel state information (CSI) without requiring cooperation across transmitters. We use the transmission capacity (TC) as our metric, defined as the maximum spatial intensity of successful simultaneous transmissions subject to a constraint on the outage probability (OP). By assuming the nodes are located on the infinite plane according to a Poisson process, we are able to employ tools from stochastic geometry to obtain asymptotically tight bounds on the distribution of the signal-to-interference (SIR) level, yielding in turn tight bounds on the OP (relative to a given SIR threshold) and the TC. We demonstrate that in the absence of CSI, fading can significantly reduce the TC and somewhat surprisingly, channel inversion only makes matters worse. We develop a threshold-based transmission rule where transmitters are active only if the channel to their receiver is acceptably strong, obtain expressions for the optimal threshold, and show that this simple, fully distributed scheme can significantly reduce the effect of fading.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 16:01:48 GMT" } ]
2011-11-10T00:00:00
[ [ "Weber", "Steven", "" ], [ "Andrews", "Jeffrey G.", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3619
Alexander Tiskin
Alexander Tiskin
Semi-local string comparison: algorithmic techniques and applications
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A classical measure of string comparison is given by the longest common subsequence (LCS) problem on a pair of strings. We consider its generalisation, called the semi-local LCS problem, which arises naturally in many string-related problems. The semi-local LCS problem asks for the LCS scores for each of the input strings against every substring of the other input string, and for every prefix of each input string against every suffix of the other input string. Such a comparison pattern provides a much more detailed picture of string similarity than a single LCS score; it also arises naturally in many string-related problems. In fact, the semi-local LCS problem turns out to be fundamental for string comparison, providing a powerful and flexible alternative to classical dynamic programming. It is especially useful when the input to a string comparison problem may not be available all at once: for example, comparison of dynamically changing strings; comparison of compressed strings; parallel string comparison. The same approach can also be applied to permutation strings, providing efficient solutions for local versions of the longest increasing subsequence (LIS) problem, and for the problem of computing a maximum clique in a circle graph. Furthermore, the semi-local LCS problem turns out to have surprising connections in a few seemingly unrelated fields, such as computational geometry and algebra of semigroups. This work is devoted to exploring the structure of the semi-local LCS problem, its efficient solutions, and its applications in string comparison and other related areas, including computational molecular biology.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 19:12:23 GMT" }, { "version": "v10", "created": "Wed, 5 Aug 2009 16:07:43 GMT" }, { "version": "v11", "created": "Thu, 20 Aug 2009 22:16:33 GMT" }, { "version": "v12", "created": "Mon, 31 Aug 2009 13:08:55 GMT" }, { "version": "v13", "created": "Mon, 19 Oct 2009 14:48:06 GMT" }, { "version": "v14", "created": "Fri, 11 Dec 2009 20:34:12 GMT" }, { "version": "v15", "created": "Sat, 9 Jan 2010 16:22:30 GMT" }, { "version": "v16", "created": "Tue, 11 May 2010 11:43:57 GMT" }, { "version": "v17", "created": "Tue, 21 Feb 2012 22:50:39 GMT" }, { "version": "v18", "created": "Thu, 20 Sep 2012 12:52:02 GMT" }, { "version": "v19", "created": "Mon, 28 Jan 2013 02:37:21 GMT" }, { "version": "v2", "created": "Mon, 8 Oct 2007 13:29:39 GMT" }, { "version": "v20", "created": "Wed, 20 Nov 2013 20:54:28 GMT" }, { "version": "v21", "created": "Sat, 23 Nov 2013 23:30:05 GMT" }, { "version": "v3", "created": "Tue, 6 Nov 2007 14:09:50 GMT" }, { "version": "v4", "created": "Thu, 21 Aug 2008 15:17:48 GMT" }, { "version": "v5", "created": "Mon, 17 Nov 2008 22:31:37 GMT" }, { "version": "v6", "created": "Wed, 10 Dec 2008 19:46:02 GMT" }, { "version": "v7", "created": "Mon, 12 Jan 2009 17:49:28 GMT" }, { "version": "v8", "created": "Sun, 22 Mar 2009 16:36:29 GMT" }, { "version": "v9", "created": "Mon, 6 Jul 2009 15:59:42 GMT" } ]
2015-03-13T00:00:00
[ [ "Tiskin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.3622
Yaoyun Shi
Igor Markov (University of Michigan) and Yaoyun Shi (University of Michigan)
Constant-degree graph expansions that preserve the treewidth
12 pages, 6 figures, the main result used by quant-ph/0511070
Algorithmica, Volume 59, Number 4, 461-470,2011
10.1007/s00453-009-9312-5
null
cs.DM cs.DS math.CO quant-ph
null
Many hard algorithmic problems dealing with graphs, circuits, formulas and constraints admit polynomial-time upper bounds if the underlying graph has small treewidth. The same problems often encourage reducing the maximal degree of vertices to simplify theoretical arguments or address practical concerns. Such degree reduction can be performed through a sequence of splittings of vertices, resulting in an _expansion_ of the original graph. We observe that the treewidth of a graph may increase dramatically if the splittings are not performed carefully. In this context we address the following natural question: is it possible to reduce the maximum degree to a constant without substantially increasing the treewidth? Our work answers the above question affirmatively. We prove that any simple undirected graph G=(V, E) admits an expansion G'=(V', E') with the maximum degree <= 3 and treewidth(G') <= treewidth(G)+1. Furthermore, such an expansion will have no more than 2|E|+|V| vertices and 3|E| edges; it can be computed efficiently from a tree-decomposition of G. We also construct a family of examples for which the increase by 1 in treewidth cannot be avoided.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 19:56:27 GMT" } ]
2011-11-04T00:00:00
[ [ "Markov", "Igor", "", "University of Michigan" ], [ "Shi", "Yaoyun", "", "University of\n Michigan" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0707.3638
Vita Hinze-Hoare
V. Hinze-Hoare
The Review and Analysis of Human Computer Interaction (HCI) Principles
null
null
null
null
cs.HC
null
The History of HCI is briefly reviewed together with three HCI models and structure including CSCW, CSCL and CSCR. It is shown that a number of authorities consider HCI to be a fragmented discipline with no agreed set of unifying design principles. An analysis of usability criteria based upon citation frequency of authors is performed in order to discover the eight most recognised HCI principles.
[ { "version": "v1", "created": "Tue, 24 Jul 2007 20:19:47 GMT" } ]
2007-07-26T00:00:00
[ [ "Hinze-Hoare", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0707.3665
Damien Chablat
Philippe Wenger (IRCCyN), Cl\'ement Gosselin (ROBOTICS Laboratory), Damien Chablat (IRCCyN)
A Comparative Study of Parallel Kinematic Architectures for Machining Applications
null
Dans 2nd Workshop on Computational Kinematics - WCK, S\'eoul : Cor\'ee, R\'epublique de (05/2001)
null
null
cs.RO
null
Parallel kinematic mechanisms are interesting alternative designs for machining applications. Three 2-DOF parallel mechanism architectures dedicated to machining applications are studied in this paper. The three mechanisms have two constant length struts gliding along fixed linear actuated joints with different relative orientation. The comparative study is conducted on the basis of a same prescribed Cartesian workspace for the three mechanisms. The common desired workspace properties are a rectangular shape and given kinetostatic performances. The machine size of each resulting design is used as a comparative criterion. The 2-DOF machine mechanisms analyzed in this paper can be extended to 3-axis machines by adding a third joint.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 04:40:01 GMT" } ]
2007-07-26T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Gosselin", "Clément", "", "ROBOTICS Laboratory" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3666
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Kinematic Analysis of a New Parallel Machine Tool: the Orthoglide
null
Dans 7th International Symposium on Advances in Robot Kinematics - ARK, France (2000)
null
null
cs.RO
null
This paper describes a new parallel kinematic architecture for machining applications: the orthoglide. This machine features three fixed parallel linear joints which are mounted orthogonally and a mobile platform which moves in the Cartesian x-y-z space with fixed orientation. The main interest of the orthoglide is that it takes benefit from the advantages of the popular PPP serial machines (regular Cartesian workspace shape and uniform performances) as well as from the parallel kinematic arrangement of the links (less inertia and better dynamic performances), which makes the orthoglide well suited to high-speed machining applications. Possible extension of the orthoglide to 5-axis machining is also investigated.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 04:42:19 GMT" } ]
2007-07-26T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3670
Xu Cheng
Xu Cheng and Cameron Dale and Jiangchuan Liu
Understanding the Characteristics of Internet Short Video Sharing: YouTube as a Case Study
IEEE format, 9 pages, 16 figures
null
null
null
cs.NI cs.MM
null
Established in 2005, YouTube has become the most successful Internet site providing a new generation of short video sharing service. Today, YouTube alone comprises approximately 20% of all HTTP traffic, or nearly 10% of all traffic on the Internet. Understanding the features of YouTube and similar video sharing sites is thus crucial to their sustainable development and to network traffic engineering. In this paper, using traces crawled in a 3-month period, we present an in-depth and systematic measurement study on the characteristics of YouTube videos. We find that YouTube videos have noticeably different statistics compared to traditional streaming videos, ranging from length and access pattern, to their active life span, ratings, and comments. The series of datasets also allows us to identify the growth trend of this fast evolving Internet site in various aspects, which has seldom been explored before. We also look closely at the social networking aspect of YouTube, as this is a key driving force toward its success. In particular, we find that the links to related videos generated by uploaders' choices form a small-world network. This suggests that the videos have strong correlations with each other, and creates opportunities for developing novel caching or peer-to-peer distribution schemes to efficiently deliver videos to end users.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 05:39:44 GMT" } ]
2007-07-26T00:00:00
[ [ "Cheng", "Xu", "" ], [ "Dale", "Cameron", "" ], [ "Liu", "Jiangchuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0707.3672
Jean Mairesse
Jean Mairesse (INRIA Sophia Antipolis)
Products of irreducible random matrices in the (Max,+) Algebra
null
Advances in Applied Probability 29, 2 (1997) 444-477
null
null
cs.OH
null
We consider the recursive equation ``x(n+1)=A(n)x(n)'' where x(n+1) and x(n) are column vectors of size k and where A(n) is an irreducible random matrix of size k x k. The matrix-vector multiplication in the (max,+) algebra is defined by (A(n)x(n))_i= max_j [ A(n)_{ij} +x(n)_j ]. This type of equation can be used to represent the evolution of Stochastic Event Graphs which include cyclic Jackson Networks, some manufacturing models and models with general blocking (such as Kanban). Let us assume that the sequence (A(n))_n is i.i.d or more generally stationary and ergodic. The main result of the paper states that the system couples in finite time with a unique stationary regime if and only if there exists a set of matrices C such that P {A(0) in C} > 0, and the matrices in C have a unique periodic regime.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 06:49:11 GMT" } ]
2007-07-26T00:00:00
[ [ "Mairesse", "Jean", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.3673
Damien Chablat
Damien Chablat (IRCCyN), Jorge Angeles (CIM)
The Computation of All 4R Serial Spherical Wrists With an Isotropic Architecture
null
Dans 2nd Workshop on Computational Kinematics - WCK, S\'eoul : Cor\'ee, R\'epublique de (05/2001)
null
WCK-2001
cs.RO
null
A spherical wrist of the serial type is said to be isotropic if it can attain a posture whereby the singular values of its Jacobian matrix are all identical and nonzero. What isotropy brings about is robustness to manufacturing, assembly, and measurement errors, thereby guaranteeing a maximum orientation accuracy. In this paper we investigate the existence of redundant isotropic architectures, which should add to the dexterity of the wrist under design by virtue of its extra degree of freedom. The problem formulation leads to a system of eight quadratic equations with eight unknowns. The Bezout number of this system is thus 2^8 = 256, its BKK bound being 192. However, the actual number of solutions is shown to be 32. We list all solutions of the foregoing algebraic problem. All these solutions are real, but distinct solutions do not necessarily lead to distinct manipulators. Upon discarding those algebraic solutions that yield no new wrists, we end up with exactly eight distinct architectures, the eight corresponding manipulators being displayed at their isotropic posture.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 06:51:53 GMT" } ]
2007-07-26T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Angeles", "Jorge", "", "CIM" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0707.3717
Yann Busnel
Yann Busnel (IRISA, DIT), Marin Bertier (IRISA), Eric Fleury (INRIA Rh\^one-Alpes), Anne-Marie Kermarrec (IRISA)
GCP: Gossip-based Code Propagation for Large-scale Mobile Wireless Sensor Networks
null
null
null
null
cs.NI
null
Wireless sensor networks (WSN) have recently received an increasing interest. They are now expected to be deployed for long periods of time, thus requiring software updates. Updating the software code automatically on a huge number of sensors is a tremendous task, as ''by hand'' updates can obviously not be considered, especially when all participating sensors are embedded on mobile entities. In this paper, we investigate an approach to automatically update software in mobile sensor-based application when no localization mechanism is available. We leverage the peer-to-peer cooperation paradigm to achieve a good trade-off between reliability and scalability of code propagation. More specifically, we present the design and evaluation of GCP ({\emph Gossip-based Code Propagation}), a distributed software update algorithm for mobile wireless sensor networks. GCP relies on two different mechanisms (piggy-backing and forwarding control) to improve significantly the load balance without sacrificing on the propagation speed. We compare GCP against traditional dissemination approaches. Simulation results based on both synthetic and realistic workloads show that GCP achieves a good convergence speed while balancing the load evenly between sensors.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 11:52:09 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 12:21:45 GMT" } ]
2007-07-30T00:00:00
[ [ "Busnel", "Yann", "", "IRISA, DIT" ], [ "Bertier", "Marin", "", "IRISA" ], [ "Fleury", "Eric", "", "INRIA\n Rhône-Alpes" ], [ "Kermarrec", "Anne-Marie", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0707.3732
Jean-Luc Beuchat
Jean-Luc Beuchat
Further Comments on "Residue-to-Binary Converters Based on New Chinese Remainder Theorems"
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ananda Mohan suggested that the first New Chinese Remainder Theorem introduced by Wang can be derived from the constructive proof of the well-known Chinese Remainder Theorem (CRT) and claimed that Wang's approach is the same as the one proposed earlier by Huang. Ananda Mohan's proof is however erroneous and we show here that Wang's New CRT I is a rewriting of an algorithm previously sketched by Hitz and Kaltofen.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 13:08:50 GMT" }, { "version": "v2", "created": "Mon, 23 Mar 2009 04:24:57 GMT" } ]
2009-03-23T00:00:00
[ [ "Beuchat", "Jean-Luc", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.3750
Guillaume Collet
Rumen Andonov (IRISA), Guillaume Collet (IRISA), Jean-Fran\c{c}ois Gibrat (MIG), Antoine Marin (MIG), Vincent Poirriez (LAMIH), Nikola Yanev (IRISA)
Recent Advances in Solving the Protein Threading Problem
null
null
null
null
q-bio.QM cs.DC
null
The fold recognition methods are promissing tools for capturing the structure of a protein by its amino acid residues sequence but their use is still restricted by the needs of huge computational resources and suitable efficient algorithms as well. In the recent version of FROST (Fold Recognition Oriented Search Tool) package the most efficient algorithm for solving the Protein Threading Problem (PTP) is implemented due to the strong collaboration between the SYMBIOSE group in IRISA and MIG in Jouy-en-Josas. In this paper, we present the diverse components of FROST, emphasizing on the recent advances in formulating and solving new versions of the PTP and on the way of solving on a computer cluster a million of instances in a easonable time.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 14:05:59 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 12:45:26 GMT" } ]
2007-07-30T00:00:00
[ [ "Andonov", "Rumen", "", "IRISA" ], [ "Collet", "Guillaume", "", "IRISA" ], [ "Gibrat", "Jean-François", "", "MIG" ], [ "Marin", "Antoine", "", "MIG" ], [ "Poirriez", "Vincent", "", "LAMIH" ], [ "Yanev", "Nikola", "", "IRISA" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0707.3781
Paolo Liberatore
Paolo Liberatore
Bijective Faithful Translations among Default Logics
Removed one useless section
null
10.1093/logcom/ext073
null
cs.AI cs.LO
null
In this article, we study translations between variants of defaults logics such that the extensions of the theories that are the input and the output of the translation are in a bijective correspondence. We assume that a translation can introduce new variables and that the result of translating a theory can either be produced in time polynomial in the size of the theory or its output is polynomial in that size; we however restrict to the case in which the original theory has extensions. This study fills a gap between two previous pieces of work, one studying bijective translations among restrictions of default logics, and the other one studying non-bijective translations between default logics variants.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 17:03:57 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 13:46:43 GMT" } ]
2021-04-12T00:00:00
[ [ "Liberatore", "Paolo", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.3782
Andreas Blass
Andreas Blass, Yuri Gurevich, Dean Rosenzweig, and Benjamin Rossman
Interactive Small-Step Algorithms I: Axiomatization
null
Logical Methods in Computer Science, Volume 3, Issue 4 (November 5, 2007) lmcs:1200
10.2168/LMCS-3(4:3)2007
null
cs.LO
null
In earlier work, the Abstract State Machine Thesis -- that arbitrary algorithms are behaviorally equivalent to abstract state machines -- was established for several classes of algorithms, including ordinary, interactive, small-step algorithms. This was accomplished on the basis of axiomatizations of these classes of algorithms. Here we extend the axiomatization and, in a companion paper, the proof, to cover interactive small-step algorithms that are not necessarily ordinary. This means that the algorithms (1) can complete a step without necessarily waiting for replies to all queries from that step and (2) can use not only the environment's replies but also the order in which the replies were received.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 17:04:26 GMT" }, { "version": "v2", "created": "Mon, 5 Nov 2007 10:56:47 GMT" } ]
2015-07-01T00:00:00
[ [ "Blass", "Andreas", "" ], [ "Gurevich", "Yuri", "" ], [ "Rosenzweig", "Dean", "" ], [ "Rossman", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.3789
Andreas Blass
Andreas Blass, Yuri Gurevich, Dean Rosenzweig, and Benjamin Rossman
Interactive Small-Step Algorithms II: Abstract State Machines and the<br> Characterization Theorem
null
Logical Methods in Computer Science, Volume 3, Issue 4 (November 5, 2007) lmcs:1201
10.2168/LMCS-3(4:4)2007
null
cs.LO
null
In earlier work, the Abstract State Machine Thesis -- that arbitrary algorithms are behaviorally equivalent to abstract state machines -- was established for several classes of algorithms, including ordinary, interactive, small-step algorithms. This was accomplished on the basis of axiomatizations of these classes of algorithms. In Part I (Interactive Small-Step Algorithms I: Axiomatization), the axiomatization was extended to cover interactive small-step algorithms that are not necessarily ordinary. This means that the algorithms (1) can complete a step without necessarily waiting for replies to all queries from that step and (2) can use not only the environment's replies but also the order in which the replies were received. In order to prove the thesis for algorithms of this generality, we extend here the definition of abstract state machines to incorporate explicit attention to the relative timing of replies and to the possible absence of replies. We prove the characterization theorem for extended abstract state machines with respect to general algorithms as axiomatized in Part I.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 17:35:46 GMT" }, { "version": "v2", "created": "Mon, 5 Nov 2007 10:59:16 GMT" } ]
2015-07-01T00:00:00
[ [ "Blass", "Andreas", "" ], [ "Gurevich", "Yuri", "" ], [ "Rosenzweig", "Dean", "" ], [ "Rossman", "Benjamin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.3807
Catherine Recanati
Catherine Recanati (LIPN)
How to be correct, lazy and efficient ?
21 pages
null
null
null
cs.PL
null
This paper is an introduction to Lambdix, a lazy Lisp interpreter implemented at the Research Laboratory of Paris XI University (Laboratoire de Recherche en Informatique, Orsay). Lambdix was devised in the course of an investigation into the relationship between the semantics of programming languages and their implementation; it was used to demonstrate that in the Lisp domain, semantic correctness is consistent with efficiency, contrary to what has often been claimed. The first part of the paper is an overview of well-known semantic difficulties encountered by Lisp as well as an informal presentation of Lambdix; it is shown that the difficulties which Lisp encouters do not arise in Lambdix. The second part is about efficiency in implementation models. It explains why Lambdix is better suited for lazy evaluation than previous models. The section ends by giving comparative execution time tables.
[ { "version": "v1", "created": "Wed, 25 Jul 2007 19:33:07 GMT" } ]
2007-07-26T00:00:00
[ [ "Recanati", "Catherine", "", "LIPN" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0707.3878
Joaquim Borges
Joaquim Borges, Cristina Fernandez
Plotkin construction: rank and kernel
null
null
null
null
cs.IT math.IT
null
Given two binary codes of length n, using Plotkin construction we obtain a code of length 2n. The construction works for linear and nonlinear codes. For the linear case, it is straightforward to see that the dimension of the final code is the sum of the dimensions of the starting codes. For nonlinear codes, the rank and the dimension of the kernel are standard mesures of linearity. In this report, we prove that both parameters are also the sum of the corresponding ones of the starting codes.
[ { "version": "v1", "created": "Thu, 26 Jul 2007 08:44:05 GMT" } ]
2007-07-27T00:00:00
[ [ "Borges", "Joaquim", "" ], [ "Fernandez", "Cristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3925
Andries Hekstra
Andries P. Hekstra
Use of a $d$-Constraint During LDPC Decoding in a Bliss Scheme
null
null
null
null
cs.IT math.IT
null
Bliss schemes of a run length limited (RLL) codec in combination with an LDPC codec, generate LDPC parity bits over a systematic sequence of RLL channel bits that are inherently redundant as they satisfy e.g. a $d=1$ minimum run length constraint. That is the subsequences consisting of runs of length $d=1$, viz. $...010...$ and $...101...$, cannot occur. We propose to use this redundancy during LDPC decoding in a Bliss scheme by introducing additional $d$-constraint nodes in the factor graph used by the LDPC decoder. The messages sent from these new nodes to the variable or codeword bit nodes exert a ``force'' on the resulting soft-bit vector coming out of the LDPC decoding that give it a tendency to comply with the $d$-constraints. This way, we can significantly reduce the probability of decoding error.
[ { "version": "v1", "created": "Thu, 26 Jul 2007 14:08:07 GMT" } ]
2007-07-27T00:00:00
[ [ "Hekstra", "Andries P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3936
Konstantin Avrachenkov
Eitan Altman (INRIA Sophia Antipolis), Konstantin Avrachenkov (INRIA Sophia Antipolis), Andrey Garnaev
Closed form solutions for symmetric water filling games
null
null
null
null
cs.NI cs.GT
null
We study power control in optimization and game frameworks. In the optimization framework there is a single decision maker who assigns network resources and in the game framework users share the network resources according to Nash equilibrium. The solution of these problems is based on so-called water-filling technique, which in turn uses bisection method for solution of non-linear equations for Lagrange multiplies. Here we provide a closed form solution to the water-filling problem, which allows us to solve it in a finite number of operations. Also, we produce a closed form solution for the Nash equilibrium in symmetric Gaussian interference game with an arbitrary number of users. Even though the game is symmetric, there is an intrinsic hierarchical structure induced by the quantity of the resources available to the users. We use this hierarchical structure to perform a successive reduction of the game. In addition, to its mathematical beauty, the explicit solution allows one to study limiting cases when the crosstalk coefficient is either small or large. We provide an alternative simple proof of the convergence of the Iterative Water Filling Algorithm. Furthermore, it turns out that the convergence of Iterative Water Filling Algorithm slows down when the crosstalk coefficient is large. Using the closed form solution, we can avoid this problem. Finally, we compare the non-cooperative approach with the cooperative approach and show that the non-cooperative approach results in a more fair resource distribution.
[ { "version": "v1", "created": "Thu, 26 Jul 2007 14:30:50 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2007 12:40:05 GMT" } ]
2009-09-29T00:00:00
[ [ "Altman", "Eitan", "", "INRIA Sophia Antipolis" ], [ "Avrachenkov", "Konstantin", "", "INRIA\n Sophia Antipolis" ], [ "Garnaev", "Andrey", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0707.3959
Dung Dao
Dung Ngoc Dao, Chau Yuen, Chintha Tellambura, Yong Liang Guan and Tjeng Thiang Tjhung
Four-Group Decodable Space-Time Block Codes
1 figure. Accepted for publication in IEEE Trans. on Signal Processing
null
10.1109/TSP.2007.906729
null
cs.IT math.IT
null
Two new rate-one full-diversity space-time block codes (STBC) are proposed. They are characterized by the \emph{lowest decoding complexity} among the known rate-one STBC, arising due to the complete separability of the transmitted symbols into four groups for maximum likelihood detection. The first and the second codes are delay-optimal if the number of transmit antennas is a power of 2 and even, respectively. The exact pair-wise error probability is derived to allow for the performance optimization of the two codes. Compared with existing low-decoding complexity STBC, the two new codes offer several advantages such as higher code rate, lower encoding/decoding delay and complexity, lower peak-to-average power ratio, and better performance.
[ { "version": "v1", "created": "Thu, 26 Jul 2007 16:14:33 GMT" } ]
2016-11-17T00:00:00
[ [ "Dao", "Dung Ngoc", "" ], [ "Yuen", "Chau", "" ], [ "Tellambura", "Chintha", "" ], [ "Guan", "Yong Liang", "" ], [ "Tjhung", "Tjeng Thiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.3972
Ted Pedersen
Ted Pedersen
Learning Probabilistic Models of Word Sense Disambiguation
195 pages
PhD dissertation, May 1998, Department of Computer Science and Engineering, Southern Methodist University
null
null
cs.CL cs.AI
null
This dissertation presents several new methods of supervised and unsupervised learning of word sense disambiguation models. The supervised methods focus on performing model searches through a space of probabilistic models, and the unsupervised methods rely on the use of Gibbs Sampling and the Expectation Maximization (EM) algorithm. In both the supervised and unsupervised case, the Naive Bayesian model is found to perform well. An explanation for this success is presented in terms of learning rates and bias-variance decompositions.
[ { "version": "v1", "created": "Thu, 26 Jul 2007 17:02:40 GMT" } ]
2009-09-29T00:00:00
[ [ "Pedersen", "Ted", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0707.3979
Refugio Vallejo
Isidro B. Nieto and J. Refugio Vallejo
Clifford Algebra of the Vector Space of Conics for decision boundary Hyperplanes in m-Euclidean Space
12 pages, 2 figures, 1 table
null
null
null
cs.NE cs.CG
null
In this paper we embed $m$-dimensional Euclidean space in the geometric algebra $Cl_m $ to extend the operators of incidence in ${R^m}$ to operators of incidence in the geometric algebra to generalize the notion of separator to a decision boundary hyperconic in the Clifford algebra of hyperconic sections denoted as ${Cl}({Co}_{2})$. This allows us to extend the concept of a linear perceptron or the spherical perceptron in conformal geometry and introduce the more general conic perceptron, namely the {elliptical perceptron}. Using Clifford duality a vector orthogonal to the decision boundary hyperplane is determined. Experimental results are shown in 2-dimensional Euclidean space where we separate data that are naturally separated by some typical plane conic separators by this procedure. This procedure is more general in the sense that it is independent of the dimension of the input data and hence we can speak of the hyperconic elliptic perceptron.
[ { "version": "v1", "created": "Thu, 26 Jul 2007 18:03:23 GMT" } ]
2007-07-27T00:00:00
[ [ "Nieto", "Isidro B.", "" ], [ "Vallejo", "J. Refugio", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0707.4032
Shiguo Lian
Shiguo Lian, Jinsheng Sun, Zhiquan Wang
One-way Hash Function Based on Neural Network
7 pages,5 figures,submitted
null
null
null
cs.CR cs.NE
null
A hash function is constructed based on a three-layer neural network. The three neuron-layers are used to realize data confusion, diffusion and compression respectively, and the multi-block hash mode is presented to support the plaintext with variable length. Theoretical analysis and experimental results show that this hash function is one-way, with high key sensitivity and plaintext sensitivity, and secure against birthday attacks or meet-in-the-middle attacks. Additionally, the neural network's property makes it practical to realize in a parallel way. These properties make it a suitable choice for data signature or authentication.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 02:38:56 GMT" } ]
2007-07-30T00:00:00
[ [ "Lian", "Shiguo", "" ], [ "Sun", "Jinsheng", "" ], [ "Wang", "Zhiquan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0707.4081
Ricardo Lopez-Ruiz
Ricardo Lopez-Ruiz, Jaime Sanudo and Xavier Calbet
Geometrical derivation of the Boltzmann factor
7 pages, 0 figures
null
10.1119/1.2907776
null
nlin.CD cond-mat.stat-mech cs.MA physics.soc-ph
null
We show that the Boltzmann factor has a geometrical origin. Its derivation follows from the microcanonical picture. The Maxwell-Boltzmann distribution or the wealth distribution in human society are some direct applications of this new interpretation.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 10:54:41 GMT" } ]
2009-11-13T00:00:00
[ [ "Lopez-Ruiz", "Ricardo", "" ], [ "Sanudo", "Jaime", "" ], [ "Calbet", "Xavier", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0707.4083
Bezzateev Sergey Valentinovich
Sergey Bezzateev and Natalia Shekhunova
Chain of Separable Binary Goppa Codes and their Minimal Distance
7 pages, 1 figure
null
null
null
cs.IT math.IT
null
It is shown that subclasses of separable binary Goppa codes, $\Gamma(L,G)$ - codes, with $L=\{\alpha \in GF(2^{2l}):G(\alpha)\neq 0 \}$ and special Goppa polynomials G(x) can be presented as a chain of embedded codes. The true minimal distance has been obtained for all codes of the chain.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 10:57:39 GMT" } ]
2007-07-30T00:00:00
[ [ "Bezzateev", "Sergey", "" ], [ "Shekhunova", "Natalia", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4104
Jean Mairesse
Moez Draief (LIAFA), Jean Mairesse (LIAFA), Neil O'Connell (WMI)
Queues, stores, and tableaux
Conference version of the paper: "Joint Burke's theorem and RSK representation for a queue and a store" (with M. Draief and N. O'Connell). In Discrete Random Walks 2003. DMTCS vol. AC, p. 69-82, 2003
Journal of Applied Probability 42, 4 (2005) 1145-1167
null
null
cs.DM math.CO
null
Consider the single server queue with an infinite buffer and a FIFO discipline, either of type M/M/1 or Geom/Geom/1. Denote by A the arrival process and by s the services. Assume the stability condition to be satisfied. Denote by D the departure process in equilibrium and by r the time spent by the customers at the very back of the queue. We prove that (D,r) has the same law as (A,s) which is an extension of the classical Burke Theorem. In fact, r can be viewed as the departures from a dual storage model. This duality between the two models also appears when studying the transient behavior of a tandem by means of the RSK algorithm: the first and last row of the resulting semi-standard Young tableau are respectively the last instant of departure in the queue and the total number of departures in the store.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 14:17:10 GMT" } ]
2007-07-31T00:00:00
[ [ "Draief", "Moez", "", "LIAFA" ], [ "Mairesse", "Jean", "", "LIAFA" ], [ "O'Connell", "Neil", "", "WMI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0707.4124
Jean Mairesse
Moez Draief (LIAFA), Jean Mairesse (LIAFA)
Services within a busy period of an M/M/1 queue and Dyck paths
null
Queueing Systems / Queueing Systems Theory Appl 49, 1 (2005) 73-84
10.1007/s11134-004-5556-6
null
cs.DM
null
We analyze the service times of customers in a stable M/M/1 queue in equilibrium depending on their position in a busy period. We give the law of the service of a customer at the beginning, at the end, or in the middle of the busy period. It enables as a by-product to prove that the process of instants of beginning of services is not Poisson. We then proceed to a more precise analysis. We consider a family of polynomial generating series associated with Dyck paths of length 2n and we show that they provide the correlation function of the successive services in a busy period with (n+1) customers.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 14:10:12 GMT" } ]
2007-07-30T00:00:00
[ [ "Draief", "Moez", "", "LIAFA" ], [ "Mairesse", "Jean", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.4133
Chao Tian
Chao Tian, Jun Chen and Suhas Diggavi
Multiuser Successive Refinement and Multiple Description Coding
10 pages, 5 figures. To appear in IEEE Transaction on Information Theory. References updated and typos corrected
null
null
null
cs.IT math.IT
null
We consider the multiuser successive refinement (MSR) problem, where the users are connected to a central server via links with different noiseless capacities, and each user wishes to reconstruct in a successive-refinement fashion. An achievable region is given for the two-user two-layer case and it provides the complete rate-distortion region for the Gaussian source under the MSE distortion measure. The key observation is that this problem includes the multiple description (MD) problem (with two descriptions) as a subsystem, and the techniques useful in the MD problem can be extended to this case. We show that the coding scheme based on the universality of random binning is sub-optimal, because multiple Gaussian side informations only at the decoders do incur performance loss, in contrast to the case of single side information at the decoder. We further show that unlike the single user case, when there are multiple users, the loss of performance by a multistage coding approach can be unbounded for the Gaussian source. The result suggests that in such a setting, the benefit of using successive refinement is not likely to justify the accompanying performance loss. The MSR problem is also related to the source coding problem where each decoder has its individual side information, while the encoder has the complete set of the side informations. The MSR problem further includes several variations of the MD problem, for which the specialization of the general result is investigated and the implication is discussed.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 15:21:48 GMT" }, { "version": "v2", "created": "Tue, 13 Nov 2007 14:45:55 GMT" } ]
2007-11-13T00:00:00
[ [ "Tian", "Chao", "" ], [ "Chen", "Jun", "" ], [ "Diggavi", "Suhas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4166
Todd Veldhuizen
Todd L. Veldhuizen
Parsimony Principles for Software Components and Metalanguages
Generative Programming and Component Engineering 2007
null
null
null
cs.SE
null
Software is a communication system. The usual topic of communication is program behavior, as encoded by programs. Domain-specific libraries are codebooks, domain-specific languages are coding schemes, and so forth. To turn metaphor into method, we adapt toolsfrom information theory--the study of efficient communication--to probe the efficiency with which languages and libraries let us communicate programs. In previous work we developed an information-theoretic analysis of software reuse in problem domains. This new paper uses information theory to analyze tradeoffs in the design of components, generators, and metalanguages. We seek answers to two questions: (1) How can we judge whether a component is over- or under-generalized? Drawing on minimum description length principles, we propose that the best component yields the most succinct representation of the use cases. (2) If we view a programming language as an assemblage of metalanguages, each providing a complementary style of abstraction, how can these metalanguages aid or hinder us in efficiently describing software? We describe a complex triangle of interactions between the power of an abstraction mechanism, the amount of reuse it enables, and the cognitive difficulty of its use.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 19:29:29 GMT" } ]
2007-07-30T00:00:00
[ [ "Veldhuizen", "Todd L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0707.4198
Russ Abbott
Russ Abbott
Reductionism, emergence, and levels of abstractions
This piece is to be submitted to CACM as a Viewpoint article. It is only 1200 word because that's the word limit on such pieces. Updates (if any) will be available at http://cs.calstatela.edu/wiki/images/e/e2/Reductionism%2C_emergence%2C_and_levels_of_abstractions.doc
null
null
null
cs.OH
null
Can there be independent higher level laws of nature if everything is reducible to the fundamental laws of physics? The computer science notion of level of abstraction explains why there can -- illustrating how computational thinking can solve one of philosophy's most vexing problems.
[ { "version": "v1", "created": "Fri, 27 Jul 2007 23:52:32 GMT" } ]
2008-05-24T00:00:00
[ [ "Abbott", "Russ", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.4255
Iddo Tzameret
Nachum Dershowitz and Iddo Tzameret
Complexity of Propositional Proofs under a Promise
32 pages; a preliminary version appeared in the Proceedings of ICALP'07
ACM Transactions on Computational Logic, 11(3):1-29, 2010;
null
null
cs.CC cs.LO
null
We study -- within the framework of propositional proof complexity -- the problem of certifying unsatisfiability of CNF formulas under the promise that any satisfiable formula has many satisfying assignments, where ``many'' stands for an explicitly specified function $\Lam$ in the number of variables $n$. To this end, we develop propositional proof systems under different measures of promises (that is, different $\Lam$) as extensions of resolution. This is done by augmenting resolution with axioms that, roughly, can eliminate sets of truth assignments defined by Boolean circuits. We then investigate the complexity of such systems, obtaining an exponential separation in the average-case between resolution under different size promises: 1. Resolution has polynomial-size refutations for all unsatisfiable 3CNF formulas when the promise is $\eps\cd2^n$, for any constant $0<\eps<1$. 2. There are no sub-exponential size resolution refutations for random 3CNF formulas, when the promise is $2^{\delta n}$ (and the number of clauses is $o(n^{3/2})$), for any constant $0<\delta<1$.
[ { "version": "v1", "created": "Sat, 28 Jul 2007 18:36:01 GMT" } ]
2010-04-19T00:00:00
[ [ "Dershowitz", "Nachum", "" ], [ "Tzameret", "Iddo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0707.4258
Joseph O'Rourke
Jin-ichi Itoh, Joseph O'Rourke, Costin V\^ilcu
Star Unfolding Convex Polyhedra via Quasigeodesic Loops
10 pages, 7 figures. v2 improves the description of cut locus, and adds references. v3 improves two figures and their captions. New version v4 offers a completely different proof of non-overlap in the quasigeodesic loop case, and contains several other substantive improvements. This version is 23 pages long, with 15 figures
null
null
Smith College Computer Science Technical Report 084
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the notion of star unfolding to be based on a quasigeodesic loop Q rather than on a point. This gives a new general method to unfold the surface of any convex polyhedron P to a simple (non-overlapping), planar polygon: cut along one shortest path from each vertex of P to Q, and cut all but one segment of Q.
[ { "version": "v1", "created": "Sat, 28 Jul 2007 20:02:05 GMT" }, { "version": "v2", "created": "Tue, 31 Jul 2007 20:09:50 GMT" }, { "version": "v3", "created": "Mon, 8 Oct 2007 17:40:06 GMT" }, { "version": "v4", "created": "Wed, 24 Jun 2009 17:18:46 GMT" } ]
2009-06-24T00:00:00
[ [ "Itoh", "Jin-ichi", "" ], [ "O'Rourke", "Joseph", "" ], [ "Vîlcu", "Costin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.4289
Sheng Bao
Stephen Gang Wu, Forrest Sheng Bao, Eric You Xu, Yu-Xuan Wang, Yi-Fan Chang and Qiao-Liang Xiang
A Leaf Recognition Algorithm for Plant Classification Using Probabilistic Neural Network
6 pages, 3 figures, 2 tables
null
null
null
cs.AI
null
In this paper, we employ Probabilistic Neural Network (PNN) with image and data processing techniques to implement a general purpose automated leaf recognition algorithm. 12 leaf features are extracted and orthogonalized into 5 principal variables which consist the input vector of the PNN. The PNN is trained by 1800 leaves to classify 32 kinds of plants with an accuracy greater than 90%. Compared with other approaches, our algorithm is an accurate artificial intelligence approach which is fast in execution and easy in implementation.
[ { "version": "v1", "created": "Sun, 29 Jul 2007 12:31:40 GMT" } ]
2007-07-31T00:00:00
[ [ "Wu", "Stephen Gang", "" ], [ "Bao", "Forrest Sheng", "" ], [ "Xu", "Eric You", "" ], [ "Wang", "Yu-Xuan", "" ], [ "Chang", "Yi-Fan", "" ], [ "Xiang", "Qiao-Liang", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0707.4298
Shlomo Reisner
M. A. Lopez, S. Reisner
A note on equipartition
Some misprints in earlier versions are corrected, one reference is added with remarks concerning it
null
null
null
cs.CG math.FA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of the existence of an equi-partition of a curve in $\R^n$ has recently been raised in the context of computational geometry. The problem is to show that for a (continuous) curve $\Gamma : [0,1] \to \R^n$ and for any positive integer N, there exist points $t_0=0<t_1<...<t_{N-1}<1=t_N$, such that $d(\Gamma(t_{i-1}),\Gamma(t_i))=d(\Gamma(t_{i}),\Gamma(t_{i+1}))$ for all $i=1,...,N$, where d is a metric or even a semi-metric (a weaker notion) on $\R^n$. We show here that the existence of such points, in a broader context, is a consequence of Brower's fixed point theorem.
[ { "version": "v1", "created": "Sun, 29 Jul 2007 15:46:53 GMT" }, { "version": "v2", "created": "Tue, 8 Jul 2008 13:28:41 GMT" }, { "version": "v3", "created": "Tue, 15 Jul 2008 16:21:55 GMT" } ]
2008-07-15T00:00:00
[ [ "Lopez", "M. A.", "" ], [ "Reisner", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" } ]
0707.4304
Alejandro Vaisman Prof.
Leticia Gomez, Sofie Haesevoets, Bart Kuijpers and Alejandro Vaisman
Spatial Aggregation: Data Model and Implementation
56 pages, 28 figures
null
null
null
cs.DB
null
Data aggregation in Geographic Information Systems (GIS) is only marginally present in commercial systems nowadays, mostly through ad-hoc solutions. In this paper, we first present a formal model for representing spatial data. This model integrates geographic data and information contained in data warehouses external to the GIS. We define the notion of geometric aggregation, a general framework for aggregate queries in a GIS setting. We also identify the class of summable queries, which can be efficiently evaluated by precomputing the overlay of two or more of the thematic layers involved in the query. We also sketch a language, denoted GISOLAP-QL, for expressing queries that involve GIS and OLAP features. In addition, we introduce Piet, an implementation of our proposal, that makes use of overlay precomputation for answering spatial queries (aggregate or not). Our experimental evaluation showed that for a certain class of geometric queries with or without aggregation, overlay precomputation outperforms R-tree-based techniques. Finally, as a particular application of our proposal, we study topological queries.
[ { "version": "v1", "created": "Sun, 29 Jul 2007 21:46:50 GMT" } ]
2007-07-31T00:00:00
[ [ "Gomez", "Leticia", "" ], [ "Haesevoets", "Sofie", "" ], [ "Kuijpers", "Bart", "" ], [ "Vaisman", "Alejandro", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0707.4311
Sanket Dusad
S. Dusad, S. N. Diggavi and A. R. Calderbank
Embedded Rank Distance Codes for ISI channels
Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2008.929960
null
cs.IT math.IT
null
Designs for transmit alphabet constrained space-time codes naturally lead to questions about the design of rank distance codes. Recently, diversity embedded multi-level space-time codes for flat fading channels have been designed from sets of binary matrices with rank distance guarantees over the binary field by mapping them onto QAM and PSK constellations. In this paper we demonstrate that diversity embedded space-time codes for fading Inter-Symbol Interference (ISI) channels can be designed with provable rank distance guarantees. As a corollary we obtain an asymptotic characterization of the fixed transmit alphabet rate-diversity trade-off for multiple antenna fading ISI channels. The key idea is to construct and analyze properties of binary matrices with a particular structure induced by ISI channels.
[ { "version": "v1", "created": "Sun, 29 Jul 2007 20:47:57 GMT" } ]
2016-11-18T00:00:00
[ [ "Dusad", "S.", "" ], [ "Diggavi", "S. N.", "" ], [ "Calderbank", "A. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4360
Vitaly Skachek
Mark F. Flanagan, Vitaly Skachek, Eimear Byrne, Marcus Greferath
Linear-programming Decoding of Non-binary Linear Codes
6 pages, 1 figure, 7-th International ITG Conference on Source and Channel Coding (SCC'08)
null
null
null
cs.IT math.IT
null
We develop a framework for linear-programming (LP) decoding of non-binary linear codes over rings. We prove that the resulting LP decoder has the `maximum likelihood certificate' property, and we show that the decoder output is the lowest cost pseudocodeword. Equivalence between pseudocodewords of the linear program and pseudocodewords of graph covers is proved. LP decoding performance is illustrated for the (11,6,5) ternary Golay code with ternary PSK modulation over AWGN, and in this case it is shown that the LP decoder performance is comparable to codeword-error-rate-optimum hard-decision based decoding.
[ { "version": "v1", "created": "Mon, 30 Jul 2007 15:31:30 GMT" }, { "version": "v2", "created": "Wed, 10 Oct 2007 17:29:46 GMT" } ]
2007-10-10T00:00:00
[ [ "Flanagan", "Mark F.", "" ], [ "Skachek", "Vitaly", "" ], [ "Byrne", "Eimear", "" ], [ "Greferath", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4372
Jean Mairesse
Bruno Gaujal (LIP), Stefan Haar (IRISA), Jean Mairesse (LIAFA)
Blocking a transition in a Free Choice net and what it tells about its throughput
null
Journal of Computer and System Sciences 66, 3 (2003) 515-548
10.1016/S0022-0000(03)00039-4
null
cs.OH
null
In a live and bounded Free Choice Petri net, pick a non-conflicting transition. Then there exists a unique reachable marking in which no transition is enabled except the selected one. For a routed live and bounded Free Choice net, this property is true for any transition of the net. Consider now a live and bounded stochastic routed Free Choice net, and assume that the routings and the firing times are independent and identically distributed. Using the above results, we prove the existence of asymptotic firing throughputs for all transitions in the net. Furthermore the vector of the throughputs at the different transitions is explicitly computable up to a multiplicative constant.
[ { "version": "v1", "created": "Mon, 30 Jul 2007 10:46:07 GMT" } ]
2007-07-31T00:00:00
[ [ "Gaujal", "Bruno", "", "LIP" ], [ "Haar", "Stefan", "", "IRISA" ], [ "Mairesse", "Jean", "", "LIAFA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0707.4389
Sandrine Blazy
Andrew W. Appel (INRIA Rocquencourt), Sandrine Blazy (CEDRIC, INRIA Rocquencourt)
Separation Logic for Small-step Cminor
Version courte du rapport de recherche RR-6138
Dans 20th Int. Conference on Theorem Proving in Higher Order Logics (TPHOLs 2007) 4732 (2007) 5-21
null
null
cs.PL
null
Cminor is a mid-level imperative programming language; there are proved-correct optimizing compilers from C to Cminor and from Cminor to machine language. We have redesigned Cminor so that it is suitable for Hoare Logic reasoning and we have designed a Separation Logic for Cminor. In this paper, we give a small-step semantics (instead of the big-step of the proved-correct compiler) that is motivated by the need to support future concurrent extensions. We detail a machine-checked proof of soundness of our Separation Logic. This is the first large-scale machine-checked proof of a Separation Logic w.r.t. a small-step semantics. The work presented in this paper has been carried out in the Coq proof assistant. It is a first step towards an environment in which concurrent Cminor programs can be verified using Separation Logic and also compiled by a proved-correct compiler with formal end-to-end correctness guarantees.
[ { "version": "v1", "created": "Mon, 30 Jul 2007 12:09:16 GMT" } ]
2007-07-31T00:00:00
[ [ "Appel", "Andrew W.", "", "INRIA Rocquencourt" ], [ "Blazy", "Sandrine", "", "CEDRIC, INRIA\n Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0707.4448
Mohamed-Ali Belabbas
Mohamed-Ali Belabbas and Patrick J. Wolfe
On sparse representations of linear operators and the approximation of matrix products
6 pages, 3 figures; presented at the 42nd Annual Conference on Information Sciences and Systems (CISS 2008)
null
10.1109/CISS.2008.4558532
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Thus far, sparse representations have been exploited largely in the context of robustly estimating functions in a noisy environment from a few measurements. In this context, the existence of a basis in which the signal class under consideration is sparse is used to decrease the number of necessary measurements while controlling the approximation error. In this paper, we instead focus on applications in numerical analysis, by way of sparse representations of linear operators with the objective of minimizing the number of operations needed to perform basic operations (here, multiplication) on these operators. We represent a linear operator by a sum of rank-one operators, and show how a sparse representation that guarantees a low approximation error for the product can be obtained from analyzing an induced quadratic form. This construction in turn yields new algorithms for computing approximate matrix products.
[ { "version": "v1", "created": "Mon, 30 Jul 2007 17:20:23 GMT" }, { "version": "v2", "created": "Fri, 26 Jun 2009 12:04:44 GMT" } ]
2009-06-26T00:00:00
[ [ "Belabbas", "Mohamed-Ali", "" ], [ "Wolfe", "Patrick J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0707.4489
Turlough Neary
Turlough Neary and Damien Woods
Small weakly universal Turing machines
null
null
null
null
cs.CC
null
We give small universal Turing machines with state-symbol pairs of (6, 2), (3, 3) and (2, 4). These machines are weakly universal, which means that they have an infinitely repeated word to the left of their input and another to the right. They simulate Rule 110 and are currently the smallest known weakly universal Turing machines.
[ { "version": "v1", "created": "Mon, 30 Jul 2007 21:40:55 GMT" } ]
2007-08-01T00:00:00
[ [ "Neary", "Turlough", "" ], [ "Woods", "Damien", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0707.4507
Neri Merhav
Yaniv Akirav and Neri Merhav
Competitive minimax universal decoding for several ensembles of random codes
41 pages; submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Universally achievable error exponents pertaining to certain families of channels (most notably, discrete memoryless channels (DMC's)), and various ensembles of random codes, are studied by combining the competitive minimax approach, proposed by Feder and Merhav, with Chernoff bound and Gallager's techniques for the analysis of error exponents. In particular, we derive a single--letter expression for the largest, universally achievable fraction $\xi$ of the optimum error exponent pertaining to the optimum ML decoding. Moreover, a simpler single--letter expression for a lower bound to $\xi$ is presented. To demonstrate the tightness of this lower bound, we use it to show that $\xi=1$, for the binary symmetric channel (BSC), when the random coding distribution is uniform over: (i) all codes (of a given rate), and (ii) all linear codes, in agreement with well--known results. We also show that $\xi=1$ for the uniform ensemble of systematic linear codes, and for that of time--varying convolutional codes in the bit-error--rate sense. For the latter case, we also show how the corresponding universal decoder can be efficiently implemented using a slightly modified version of the Viterbi algorithm which em employs two trellises.
[ { "version": "v1", "created": "Mon, 30 Jul 2007 23:57:35 GMT" } ]
2007-08-01T00:00:00
[ [ "Akirav", "Yaniv", "" ], [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4518
Awlok Josan
Enrique J. Duarte-Melo, Awlok Josan, Mingyan Liu, David L. Neuhoff and Sandeep Pradhan
On Throughput Scaling of Wireless Networks: Effect of Node Density and Propagation Model
28 pages, 4 figures
null
null
null
cs.IT math.IT
null
This paper derives a lower bound to the per-node throughput achievable by a wireless network when n source-destination pairs are randomly distributed throughout a disk of radius $n^\gamma$, $ \gamma \geq 0$, propagation is modeled by attenuation of the form $1/(1+d)^\alpha$, $\alpha >2$, and successful transmission occurs at a fixed rate W when received signal to noise and interference ratio is greater than some threshold $\beta$, and at rate 0 otherwise. The lower bound has the form $n^{1-\gamma}$ when $\gamma < 1/2$, and $(n \ln n)^{-1/2}$ when $\gamma \geq 1/2$. The methods are similar to, but somewhat simpler than, those in the seminal paper by Gupta and Kumar.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 01:15:59 GMT" } ]
2007-08-01T00:00:00
[ [ "Duarte-Melo", "Enrique J.", "" ], [ "Josan", "Awlok", "" ], [ "Liu", "Mingyan", "" ], [ "Neuhoff", "David L.", "" ], [ "Pradhan", "Sandeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4524
Shiguo Lian
Shiguo Lian
Image Authentication Based on Neural Networks
16 pages,10 figures, submitted
null
null
null
cs.MM cs.NE
null
Neural network has been attracting more and more researchers since the past decades. The properties, such as parameter sensitivity, random similarity, learning ability, etc., make it suitable for information protection, such as data encryption, data authentication, intrusion detection, etc. In this paper, by investigating neural networks' properties, the low-cost authentication method based on neural networks is proposed and used to authenticate images or videos. The authentication method can detect whether the images or videos are modified maliciously. Firstly, this chapter introduces neural networks' properties, such as parameter sensitivity, random similarity, diffusion property, confusion property, one-way property, etc. Secondly, the chapter gives an introduction to neural network based protection methods. Thirdly, an image or video authentication scheme based on neural networks is presented, and its performances, including security, robustness and efficiency, are analyzed. Finally, conclusions are drawn, and some open issues in this field are presented.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 02:27:10 GMT" } ]
2007-08-01T00:00:00
[ [ "Lian", "Shiguo", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0707.4565
Christian Hoffmann
Markus Bl\"aser, Christian Hoffmann
On the Complexity of the Interlace Polynomial
18 pages, 1 figure; new graph transformation (adding cycles) solves some unknown points, error in the statement of the inapproximability result fixed; a previous version has appeared in the proceedings of STACS 2008
null
null
null
cs.CC math.CO
null
We consider the two-variable interlace polynomial introduced by Arratia, Bollobas and Sorkin (2004). We develop graph transformations which allow us to derive point-to-point reductions for the interlace polynomial. Exploiting these reductions we obtain new results concerning the computational complexity of evaluating the interlace polynomial at a fixed point. Regarding exact evaluation, we prove that the interlace polynomial is #P-hard to evaluate at every point of the plane, except on one line, where it is trivially polynomial time computable, and four lines, where the complexity is still open. This solves a problem posed by Arratia, Bollobas and Sorkin (2004). In particular, three specializations of the two-variable interlace polynomial, the vertex-nullity interlace polynomial, the vertex-rank interlace polynomial and the independent set polynomial, are almost everywhere #P-hard to evaluate, too. For the independent set polynomial, our reductions allow us to prove that it is even hard to approximate at any point except at 0.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 12:23:13 GMT" }, { "version": "v2", "created": "Wed, 19 Dec 2007 09:34:17 GMT" }, { "version": "v3", "created": "Wed, 16 Apr 2008 13:51:09 GMT" } ]
2008-04-16T00:00:00
[ [ "Bläser", "Markus", "" ], [ "Hoffmann", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0707.4580
Gregory Gutin
Gregory Gutin
Note on edge-colored graphs and digraphs without properly colored cycles
null
null
null
null
cs.DM
null
We study the following two functions: d(n,c) and $\vec{d}(n,c)$; d(n,c) ($\vec{d}(n,c)$) is the minimum number k such that every c-edge-colored undirected (directed) graph of order n and minimum monochromatic degree (out-degree) at least k has a properly colored cycle. Abouelaoualim et al. (2007) stated a conjecture which implies that d(n,c)=1. Using a recursive construction of c-edge-colored graphs with minimum monochromatic degree p and without properly colored cycles, we show that $d(n,c)\ge {1 \over c}(\log_cn -\log_c\log_cn)$ and, thus, the conjecture does not hold. In particular, this inequality significantly improves a lower bound on $\vec{d}(n,2)$ obtained by Gutin, Sudakov and Yeo in 1998.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 17:36:54 GMT" } ]
2007-08-01T00:00:00
[ [ "Gutin", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0707.4597
Chao Tian
Chao Tian and Suhas N. Diggavi
Side-information Scalable Source Coding
35 pages, submitted to IEEE Transaction on Information Theory
null
null
null
cs.IT math.IT
null
The problem of side-information scalable (SI-scalable) source coding is considered in this work, where the encoder constructs a progressive description, such that the receiver with high quality side information will be able to truncate the bitstream and reconstruct in the rate distortion sense, while the receiver with low quality side information will have to receive further data in order to decode. We provide inner and outer bounds for general discrete memoryless sources. The achievable region is shown to be tight for the case that either of the decoders requires a lossless reconstruction, as well as the case with degraded deterministic distortion measures. Furthermore we show that the gap between the achievable region and the outer bounds can be bounded by a constant when square error distortion measure is used. The notion of perfectly scalable coding is introduced as both the stages operate on the Wyner-Ziv bound, and necessary and sufficient conditions are given for sources satisfying a mild support condition. Using SI-scalable coding and successive refinement Wyner-Ziv coding as basic building blocks, a complete characterization is provided for the important quadratic Gaussian source with multiple jointly Gaussian side-informations, where the side information quality does not have to be monotonic along the scalable coding order. Partial result is provided for the doubly symmetric binary source with Hamming distortion when the worse side information is a constant, for which one of the outer bound is strictly tighter than the other one.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 12:02:53 GMT" } ]
2007-08-01T00:00:00
[ [ "Tian", "Chao", "" ], [ "Diggavi", "Suhas N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4618
Shmuel Onn
Yael Berstein, Jon Lee, Hugo Maruri-Aguilar, Shmuel Onn, Eva Riccomagno, Robert Weismantel, Henry Wynn
Nonlinear Matroid Optimization and Experimental Design
null
SIAM Journal on Discrete Mathematics, 22:901--919, 2008
null
null
math.CO cs.CC cs.DM math.OC
null
We study the problem of optimizing nonlinear objective functions over matroids presented by oracles or explicitly. Such functions can be interpreted as the balancing of multi-criteria optimization. We provide a combinatorial polynomial time algorithm for arbitrary oracle-presented matroids, that makes repeated use of matroid intersection, and an algebraic algorithm for vectorial matroids. Our work is partly motivated by applications to minimum-aberration model-fitting in experimental design in statistics, which we discuss and demonstrate in detail.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 13:54:07 GMT" } ]
2008-07-24T00:00:00
[ [ "Berstein", "Yael", "" ], [ "Lee", "Jon", "" ], [ "Maruri-Aguilar", "Hugo", "" ], [ "Onn", "Shmuel", "" ], [ "Riccomagno", "Eva", "" ], [ "Weismantel", "Robert", "" ], [ "Wynn", "Henry", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0707.4651
Alan Rufty
Alan Rufty
Comments on the Reliability of Lawson and Hanson's Linear Distance Programming Algorithm: Subroutine LDP
5 pages
null
null
null
cs.MS
null
This brief paper: (1) Discusses strategies to generate random test cases that can be used to extensively test any Linear Distance Program (LDP) software. (2) Gives three numerical examples of input cases generated by this strategy that cause problems in the Lawson and Hanson LDP module. (3) Proposes, as a standard matter of acceptable implementation procedures, that (unless it is done internally in the software itself, but, in general, this seems to be much rarer than one would expect) all users should test the returned output from any LDP module for self-consistency since it incurs only a small amount of added computational overhead and it is not hard to do.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 17:04:34 GMT" } ]
2007-08-01T00:00:00
[ [ "Rufty", "Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0707.4656
Aslan Tchamkerten
Aslan Tchamkerten, Venkat Chandar, Gregory Wornell
Communication under Strong Asynchronism
26 pages
null
null
null
cs.IT math.IT
null
We consider asynchronous communication over point-to-point discrete memoryless channels. The transmitter starts sending one block codeword at an instant that is uniformly distributed within a certain time period, which represents the level of asynchronism. The receiver, by means of a sequential decoder, must isolate the message without knowing when the codeword transmission starts but being cognizant of the asynchronism level A. We are interested in how quickly can the receiver isolate the sent message, particularly in the regime where A is exponentially larger than the codeword length N, which we refer to as `strong asynchronism.' This model of sparse communication may represent the situation of a sensor that remains idle most of the time and, only occasionally, transmits information to a remote base station which needs to quickly take action. The first result shows that vanishing error probability can be guaranteed as N tends to infinity while A grows as Exp(N*k) if and only if k does not exceed the `synchronization threshold,' a constant that admits a simple closed form expression, and is at least as large as the capacity of the synchronized channel. The second result is the characterization of a set of achievable strictly positive rates in the regime where A is exponential in N, and where the rate is defined with respect to the expected delay between the time information starts being emitted until the time the receiver makes a decision. As an application of the first result we consider antipodal signaling over a Gaussian channel and derive a simple necessary condition between A, N, and SNR for achieving reliable communication.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 18:51:11 GMT" } ]
2007-08-01T00:00:00
[ [ "Tchamkerten", "Aslan", "" ], [ "Chandar", "Venkat", "" ], [ "Wornell", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0707.4659
Johannes Bluemlein
I. Bierenbaum, J. Bl\"umlein, S. Klein, and C. Schneider
Difference Equations in Massive Higher Order Calculations
15 pages latex, Proceedings ACAT 2007
PoSACAT2007:082,2007
null
DESY 07-111, SFB/CPP-07-041
math-ph cs.MS hep-ph math.MP
null
The calculation of massive 2--loop operator matrix elements, required for the higher order Wilson coefficients for heavy flavor production in deeply inelastic scattering, leads to new types of multiple infinite sums over harmonic sums and related functions, which depend on the Mellin parameter $N$. We report on the solution of these sums through higher order difference equations using the summation package {\tt Sigma}.
[ { "version": "v1", "created": "Tue, 31 Jul 2007 16:54:33 GMT" } ]
2008-12-18T00:00:00
[ [ "Bierenbaum", "I.", "" ], [ "Blümlein", "J.", "" ], [ "Klein", "S.", "" ], [ "Schneider", "C.", "" ] ]
[ { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Physics", "code": "hep-ph", "description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.", "span": "(High Energy Physics - Phenomenology)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" } ]
0708.0053
Dragomir Z. Djokovic
Dragomir Z. Djokovic
Periodic complementary sets of binary sequences
10 pages, 1 table. Substantial revision and simplification. Submitted to IEEE Trans. Inform. Theory
International Mathematical Forum 4 (2009), no. 15, 717-725.
null
null
cs.IT math.CO math.IT
null
Let PCS_p^N denote a set of p binary sequences of length N such that the sum of their periodic auto-correlation functions is a delta-function. In the 1990, Boemer and Antweiler addressed the problem of constructing such sequences. They presented a table covering the range p <= 12, N <= 50 and showing in which cases it was known at that time whether such sequences exist, do not exist, or the question of existence is undecided. The number of undecided cases was rather large. Subsequently the number of undecided cases was reduced to 26 by the author. In the present note, several cyclic difference families are constructed and used to obtain new sets of periodic binary sequences. Thereby the original problem of Boemer and Antweiler is completely solved.
[ { "version": "v1", "created": "Wed, 1 Aug 2007 00:40:12 GMT" }, { "version": "v2", "created": "Sun, 13 Apr 2008 16:20:25 GMT" } ]
2009-09-01T00:00:00
[ [ "Djokovic", "Dragomir Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0171
Jean-Philippe Vert
Pierre Mah\'e (XRCE), Jean-Philippe Vert (CB)
Virtual screening with support vector machines and structure kernels
null
null
null
null
q-bio.QM cs.LG
null
Support vector machines and kernel methods have recently gained considerable attention in chemoinformatics. They offer generally good performance for problems of supervised classification or regression, and provide a flexible and computationally efficient framework to include relevant information and prior knowledge about the data and problems to be handled. In particular, with kernel methods molecules do not need to be represented and stored explicitly as vectors or fingerprints, but only to be compared to each other through a comparison function technically called a kernel. While classical kernels can be used to compare vector or fingerprint representations of molecules, completely new kernels were developed in the recent years to directly compare the 2D or 3D structures of molecules, without the need for an explicit vectorization step through the extraction of molecular descriptors. While still in their infancy, these approaches have already demonstrated their relevance on several toxicity prediction and structure-activity relationship problems.
[ { "version": "v1", "created": "Wed, 1 Aug 2007 19:13:52 GMT" } ]
2007-08-02T00:00:00
[ [ "Mahé", "Pierre", "", "XRCE" ], [ "Vert", "Jean-Philippe", "", "CB" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0708.0200
Morten Heine S{\o}rensen
Morten Heine S{\o}rensen
A Note on Shortest Developments
null
Logical Methods in Computer Science, Volume 3, Issue 4 (November 5, 2007) lmcs:838
10.2168/LMCS-3(4:2)2007
null
cs.LO
null
De Vrijer has presented a proof of the finite developments theorem which, in addition to showing that all developments are finite, gives an effective reduction strategy computing longest developments as well as a simple formula computing their length. We show that by applying a rather simple and intuitive principle of duality to de Vrijer's approach one arrives at a proof that some developments are finite which in addition yields an effective reduction strategy computing shortest developments as well as a simple formula computing their length. The duality fails for general beta-reduction. Our results simplify previous work by Khasidashvili.
[ { "version": "v1", "created": "Wed, 1 Aug 2007 17:22:48 GMT" }, { "version": "v2", "created": "Mon, 5 Nov 2007 09:48:05 GMT" } ]
2015-07-01T00:00:00
[ [ "Sørensen", "Morten Heine", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0708.0224
Savas Dayanik
Savas Dayanik, H. Vincent Poor, Semih O. Sezer
Multisource Bayesian sequential change detection
Published in at http://dx.doi.org/10.1214/07-AAP463 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org)
Annals of Applied Probability 2008, Vol. 18, No. 2, 552-590
10.1214/07-AAP463
IMS-AAP-AAP463
math.ST cs.IT math.IT math.PR stat.TH
null
Suppose that local characteristics of several independent compound Poisson and Wiener processes change suddenly and simultaneously at some unobservable disorder time. The problem is to detect the disorder time as quickly as possible after it happens and minimize the rate of false alarms at the same time. These problems arise, for example, from managing product quality in manufacturing systems and preventing the spread of infectious diseases. The promptness and accuracy of detection rules improve greatly if multiple independent information sources are available. Earlier work on sequential change detection in continuous time does not provide optimal rules for situations in which several marked count data and continuously changing signals are simultaneously observable. In this paper, optimal Bayesian sequential detection rules are developed for such problems when the marked count data is in the form of independent compound Poisson processes, and the continuously changing signals form a multi-dimensional Wiener process. An auxiliary optimal stopping problem for a jump-diffusion process is solved by transforming it first into a sequence of optimal stopping problems for a pure diffusion by means of a jump operator. This method is new and can be very useful in other applications as well, because it allows the use of the powerful optimal stopping theory for diffusions.
[ { "version": "v1", "created": "Wed, 1 Aug 2007 20:25:14 GMT" }, { "version": "v2", "created": "Fri, 3 Aug 2007 19:46:36 GMT" }, { "version": "v3", "created": "Tue, 1 Apr 2008 12:58:00 GMT" } ]
2008-04-01T00:00:00
[ [ "Dayanik", "Savas", "" ], [ "Poor", "H. Vincent", "" ], [ "Sezer", "Semih O.", "" ] ]
[ { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0708.0242
Usman Khan
Usman A. Khan and Jose M. F. Moura
Distributing the Kalman Filter for Large-Scale Systems
null
U. A. Khan and J. M. F. Moura, "Distributing the Kalman filter for large-scale systems," IEEE Transactions on Signal Processing, vol. 56, Part 1, no. 10, pp. 4919-4935, Oct. 2008
10.1109/TSP.2008.927480
null
cs.IT math.IT
null
This paper derives a \emph{distributed} Kalman filter to estimate a sparsely connected, large-scale, $n-$dimensional, dynamical system monitored by a network of $N$ sensors. Local Kalman filters are implemented on the ($n_l-$dimensional, where $n_l\ll n$) sub-systems that are obtained after spatially decomposing the large-scale system. The resulting sub-systems overlap, which along with an assimilation procedure on the local Kalman filters, preserve an $L$th order Gauss-Markovian structure of the centralized error processes. The information loss due to the $L$th order Gauss-Markovian approximation is controllable as it can be characterized by a divergence that decreases as $L\uparrow$. The order of the approximation, $L$, leads to a lower bound on the dimension of the sub-systems, hence, providing a criterion for sub-system selection. The assimilation procedure is carried out on the local error covariances with a distributed iterate collapse inversion (DICI) algorithm that we introduce. The DICI algorithm computes the (approximated) centralized Riccati and Lyapunov equations iteratively with only local communication and low-order computation. We fuse the observations that are common among the local Kalman filters using bipartite fusion graphs and consensus averaging algorithms. The proposed algorithm achieves full distribution of the Kalman filter that is coherent with the centralized Kalman filter with an $L$th order Gaussian-Markovian structure on the centralized error processes. Nowhere storage, communication, or computation of $n-$dimensional vectors and matrices is needed; only $n_l \ll n$ dimensional vectors and matrices are communicated or used in the computation at the sensors.
[ { "version": "v1", "created": "Wed, 1 Aug 2007 22:47:10 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2008 07:15:39 GMT" } ]
2013-12-19T00:00:00
[ [ "Khan", "Usman A.", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0271
Haim Permuter Henry
Haim Permuter, Tsachy Weissman
Capacity Region of the Finite-State Multiple Access Channel with and without Feedback
null
null
null
null
cs.IT math.IT
null
The capacity region of the Finite-State Multiple Access Channel (FS-MAC) with feedback that may be an arbitrary time-invariant function of the channel output samples is considered. We characterize both an inner and an outer bound for this region, using Masseys's directed information. These bounds are shown to coincide, and hence yield the capacity region, of FS-MACs where the state process is stationary and ergodic and not affected by the inputs. Though `multi-letter' in general, our results yield explicit conclusions when applied to specific scenarios of interest. E.g., our results allow us to: - Identify a large class of FS-MACs, that includes the additive mod-2 noise MAC where the noise may have memory, for which feedback does not enlarge the capacity region. - Deduce that, for a general FS-MAC with states that are not affected by the input, if the capacity (region) without feedback is zero, then so is the capacity (region) with feedback. - Deduce that the capacity region of a MAC that can be decomposed into a `multiplexer' concatenated by a point-to-point channel (with, without, or with partial feedback), the capacity region is given by $\sum_{m} R_m \leq C$, where C is the capacity of the point to point channel and m indexes the encoders. Moreover, we show that for this family of channels source-channel coding separation holds.
[ { "version": "v1", "created": "Thu, 2 Aug 2007 05:38:13 GMT" } ]
2009-11-23T00:00:00
[ [ "Permuter", "Haim", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]