id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0906.4481
Pankaj Kohli
Pankaj Kohli
Coarse-grained Dynamic Taint Analysis for Defeating Control and Non-control Data Attacks
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Memory corruption attacks remain the primary threat for computer security. Information flow tracking or taint analysis has been proven to be effective against most memory corruption attacks. However, there are two shortcomings with current taint analysis based techniques. First, these techniques cause application slowdown by about 76% thereby limiting their practicality. Second, these techniques cannot handle non-control data attacks i.e., attacks that do not overwrite control data such as return address, but instead overwrite critical application configuration data or user identity data. In this work, to address these problems, we describe a coarse-grained taint analysis technique that uses information flow tracking at the level of application data objects. We propagate a one-bit taint over each application object that is modified by untrusted data thereby reducing the taint management overhead considerably. We performed extensive experimental evaluation of our approach and show that it can detect all critical attacks such as buffer overflows, and format string attacks, including non-control data attacks. Unlike the currently known approaches that can detect such a wide range of attacks, our approach does not require the source code or any hardware extensions. Run-time performance overhead evaluation shows that, on an average, our approach causes application slowdown by only 37% which is an order of magnitude improvement over existing approaches. Finally, since our approach performs run-time binary instrumentation, it is easier to integrate it with existing applications and systems.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 14:07:35 GMT" }, { "version": "v2", "created": "Wed, 1 Jul 2009 07:18:43 GMT" } ]
2015-03-13T00:00:00
[ [ "Kohli", "Pankaj", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.4492
Alberto Griggio
Alessandro Cimatti, Alberto Griggio, Roberto Sebastiani
Efficient Generation of Craig Interpolants in Satisfiability Modulo Theories
submitted to ACM Transactions on Computational Logic (TOCL)
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of computing Craig Interpolants has recently received a lot of interest. In this paper, we address the problem of efficient generation of interpolants for some important fragments of first order logic, which are amenable for effective decision procedures, called Satisfiability Modulo Theory solvers. We make the following contributions. First, we provide interpolation procedures for several basic theories of interest: the theories of linear arithmetic over the rationals, difference logic over rationals and integers, and UTVPI over rationals and integers. Second, we define a novel approach to interpolate combinations of theories, that applies to the Delayed Theory Combination approach. Efficiency is ensured by the fact that the proposed interpolation algorithms extend state of the art algorithms for Satisfiability Modulo Theories. Our experimental evaluation shows that the MathSAT SMT solver can produce interpolants with minor overhead in search, and much more efficiently than other competitor solvers.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 14:47:01 GMT" } ]
2009-06-25T00:00:00
[ [ "Cimatti", "Alessandro", "" ], [ "Griggio", "Alberto", "" ], [ "Sebastiani", "Roberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4539
Michael Mahoney
Michael W. Mahoney and Hariharan Narayanan
Learning with Spectral Kernels and Heavy-Tailed Data
21 pages. Substantially revised and extended relative to the first version
null
null
null
cs.LG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two ubiquitous aspects of large-scale data analysis are that the data often have heavy-tailed properties and that diffusion-based or spectral-based methods are often used to identify and extract structure of interest. Perhaps surprisingly, popular distribution-independent methods such as those based on the VC dimension fail to provide nontrivial results for even simple learning problems such as binary classification in these two settings. In this paper, we develop distribution-dependent learning methods that can be used to provide dimension-independent sample complexity bounds for the binary classification problem in these two popular settings. In particular, we provide bounds on the sample complexity of maximum margin classifiers when the magnitude of the entries in the feature vector decays according to a power law and also when learning is performed with the so-called Diffusion Maps kernel. Both of these results rely on bounding the annealed entropy of gap-tolerant classifiers in a Hilbert space. We provide such a bound, and we demonstrate that our proof technique generalizes to the case when the margin is measured with respect to more general Banach space norms. The latter result is of potential interest in cases where modeling the relationship between data elements as a dot product in a Hilbert space is too restrictive.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 18:38:31 GMT" }, { "version": "v2", "created": "Mon, 10 May 2010 17:19:30 GMT" } ]
2010-05-11T00:00:00
[ [ "Mahoney", "Michael W.", "" ], [ "Narayanan", "Hariharan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.4560
Edith Cohen
Edith Cohen, Haim Kaplan, Subhabrata Sen
Coordinated Weighted Sampling for Estimating Aggregates Over Multiple Weight Assignments
This is an updated full version of the PVLDB 2009 conference version
null
null
null
cs.DB cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many data sources are naturally modeled by multiple weight assignments over a set of keys: snapshots of an evolving database at multiple points in time, measurements collected over multiple time periods, requests for resources served at multiple locations, and records with multiple numeric attributes. Over such vector-weighted data we are interested in aggregates with respect to one set of weights, such as weighted sums, and aggregates over multiple sets of weights such as the $L_1$ difference. Sample-based summarization is highly effective for data sets that are too large to be stored or manipulated. The summary facilitates approximate processing queries that may be specified after the summary was generated. Current designs, however, are geared for data sets where a single {\em scalar} weight is associated with each key. We develop a sampling framework based on {\em coordinated weighted samples} that is suited for multiple weight assignments and obtain estimators that are {\em orders of magnitude tighter} than previously possible. We demonstrate the power of our methods through an extensive empirical evaluation on diverse data sets ranging from IP network to stock quotes data.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 20:09:00 GMT" }, { "version": "v2", "created": "Tue, 9 Nov 2010 23:13:19 GMT" } ]
2010-11-11T00:00:00
[ [ "Cohen", "Edith", "" ], [ "Kaplan", "Haim", "" ], [ "Sen", "Subhabrata", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0906.4567
Pu Wang
P. Wang, M. Gonzalez, C. A. Hidalgo, A.-L. Barabasi
Understanding the spreading patterns of mobile phone viruses
13 pages, 4 figures
Science 324, 1071-1076 (2009)
10.1126/science.1167053
null
physics.data-an cs.NI physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We model the mobility of mobile phone users to study the fundamental spreading patterns characterizing a mobile virus outbreak. We find that while Bluetooth viruses can reach all susceptible handsets with time, they spread slowly due to human mobility, offering ample opportunities to deploy antiviral software. In contrast, viruses utilizing multimedia messaging services could infect all users in hours, but currently a phase transition on the underlying call graph limits them to only a small fraction of the susceptible users. These results explain the lack of a major mobile virus breakout so far and predict that once a mobile operating system's market share reaches the phase transition point, viruses will pose a serious threat to mobile communications.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 20:50:10 GMT" } ]
2009-06-26T00:00:00
[ [ "Wang", "P.", "" ], [ "Gonzalez", "M.", "" ], [ "Hidalgo", "C. A.", "" ], [ "Barabasi", "A. -L.", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0906.4570
Luca Vigan\`o
Michele Barletta, Silvio Ranise, Luca Vigan\`o
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures (Full version)
16 pages, 4 figures, full version of paper at Symposium on Secure Computing (SecureCom09)
null
null
null
cs.CR cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A widespread design approach in distributed applications based on the service-oriented paradigm, such as web-services, consists of clearly separating the enforcement of authorization policies and the workflow of the applications, so that the interplay between the policy level and the workflow level is abstracted away. While such an approach is attractive because it is quite simple and permits one to reason about crucial properties of the policies under consideration, it does not provide the right level of abstraction to specify and reason about the way the workflow may interfere with the policies, and vice versa. For example, the creation of a certificate as a side effect of a workflow operation may enable a policy rule to fire and grant access to a certain resource; without executing the operation, the policy rule should remain inactive. Similarly, policy queries may be used as guards for workflow transitions. In this paper, we present a two-level formal verification framework to overcome these problems and formally reason about the interplay of authorization policies and workflow in service-oriented architectures. This allows us to define and investigate some verification problems for SO applications and give sufficient conditions for their decidability.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 16:31:42 GMT" } ]
2009-06-26T00:00:00
[ [ "Barletta", "Michele", "" ], [ "Ranise", "Silvio", "" ], [ "Viganò", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4582
Patrick J. Wolfe
Mohamed-Ali Belabbas and Patrick J. Wolfe
On landmark selection and sampling in high-dimensional data analysis
18 pages, 6 figures, submitted for publication
Philosophical Transactions of the Royal Society, Series A, vol. 367, pp. 4295-4312, 2009
10.1098/rsta.2009.0161
null
stat.ML cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, the spectral analysis of appropriately defined kernel matrices has emerged as a principled way to extract the low-dimensional structure often prevalent in high-dimensional data. Here we provide an introduction to spectral methods for linear and nonlinear dimension reduction, emphasizing ways to overcome the computational limitations currently faced by practitioners with massive datasets. In particular, a data subsampling or landmark selection process is often employed to construct a kernel based on partial information, followed by an approximate spectral analysis termed the Nystrom extension. We provide a quantitative framework to analyse this procedure, and use it to demonstrate algorithmic performance bounds on a range of practical approaches designed to optimize the landmark selection process. We compare the practical implications of these bounds by way of real-world examples drawn from the field of computer vision, whereby low-dimensional manifold structure is shown to emerge from high-dimensional video data streams.
[ { "version": "v1", "created": "Wed, 24 Jun 2009 23:40:22 GMT" } ]
2010-04-20T00:00:00
[ [ "Belabbas", "Mohamed-Ali", "" ], [ "Wolfe", "Patrick J.", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.4589
Dong Huang
Dong Huang, Zhiqi Shen, Chunyan Miao, Zhihong Man, Cyril Leung
Further Analysis on Resource Allocation in Wireless Communications Under Imperfect Channel State Information
This paper has been withdrawn
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn by the author due to some errors.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 01:55:03 GMT" }, { "version": "v2", "created": "Fri, 26 Feb 2010 07:38:56 GMT" } ]
2010-02-26T00:00:00
[ [ "Huang", "Dong", "" ], [ "Shen", "Zhiqi", "" ], [ "Miao", "Chunyan", "" ], [ "Man", "Zhihong", "" ], [ "Leung", "Cyril", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4597
Bilal Sadiq
Bilal Sadiq and Gustavo de Veciana
Large deviations sum-queue optimality of a radial sum-rate monotone opportunistic scheduler
Revised version. Major changes include addition of details/intermediate steps in various proofs, a summary of technical steps in Table 1, and correction of typos.
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A centralized wireless system is considered that is serving a fixed set of users with time varying channel capacities. An opportunistic scheduling rule in this context selects a user (or users) to serve based on the current channel state and user queues. Unless the user traffic is symmetric and/or the underlying capacity region a polymatroid, little is known concerning how performance optimal schedulers should tradeoff "maximizing current service rate" (being opportunistic) versus "balancing unequal queues" (enhancing user-diversity to enable future high service rate opportunities). By contrast with currently proposed opportunistic schedulers, e.g., MaxWeight and Exp Rule, a radial sum-rate monotone (RSM) scheduler de-emphasizes queue-balancing in favor of greedily maximizing the system service rate as the queue-lengths are scaled up linearly. In this paper it is shown that an RSM opportunistic scheduler, p-Log Rule, is not only throughput-optimal, but also maximizes the asymptotic exponential decay rate of the sum-queue distribution for a two-queue system. The result complements existing optimality results for opportunistic scheduling and point to RSM schedulers as a good design choice given the need for robustness in wireless systems with both heterogeneity and high degree of uncertainty.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 03:29:28 GMT" }, { "version": "v2", "created": "Fri, 12 Mar 2010 21:17:00 GMT" } ]
2015-03-13T00:00:00
[ [ "Sadiq", "Bilal", "" ], [ "de Veciana", "Gustavo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4602
Margreta Kuijper
M. Kuijper and K. Schindelar
Minimal Gr\"obner bases and the predictable leading monomial property
14 pages, submitted, shortened version
Linear Algebra and its Applications, vol. 434, pages 104-116, 2011
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We focus on Gr\"obner bases for modules of univariate polynomial vectors over a ring. We identify a useful property, the "predictable leading monomial (PLM) property" that is shared by minimal Gr\"{o}bner bases of modules in F[x]^q, no matter what positional term order is used. The PLM property is useful in a range of applications and can be seen as a strengthening of the wellknown predictable degree property (= row reducedness), a terminology introduced by Forney in the 70's. Because of the presence of zero divisors, minimal Gr\"{o}bner bases over a finite ring of the type Z_p^r (where p is a prime integer and r is an integer >1) do not necessarily have the PLM property. In this paper we show how to derive, from an ordered minimal Gr\"{o}bner basis, a so-called "minimal Gr\"{o}bner p-basis" that does have a PLM property. We demonstrate that minimal Gr\"obner p-bases lend themselves particularly well to derive minimal realization parametrizations over Z_p^r. Applications are in coding and sequences over Z_p^r.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 04:08:54 GMT" }, { "version": "v2", "created": "Thu, 14 Jan 2010 00:59:30 GMT" }, { "version": "v3", "created": "Thu, 27 May 2010 01:53:58 GMT" } ]
2010-12-24T00:00:00
[ [ "Kuijper", "M.", "" ], [ "Schindelar", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4607
R Doomun
Sandeep. Kugali, S. S. Manvi, A. V. Sutagundar
A Bandwidth Characterization Tool For MPEG-2 File
10 pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS, June 2009 Issue, Vol. 2, No. 1
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes the design and development of MPEG 2 Video Decoder to offer flexible and effective utilization of bandwidth services. The decoder is capable of decoding the MPEG 2 bit stream on a single host machine. The present decoder is designed to be simple, but yet effectively reconstruct the video from MPEG 2 bit stream.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 05:40:46 GMT" } ]
2009-06-26T00:00:00
[ [ "Kugali", "Sandeep.", "" ], [ "Manvi", "S. S.", "" ], [ "Sutagundar", "A. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0906.4609
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
Critical independent sets and Konig--Egervary graphs
8 pages, 5 figures
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let alpha(G) be the cardinality of a independence set of maximum size in the graph G, while mu(G) is the size of a maximum matching. G is a Konig--Egervary graph if its order equals alpha(G) + mu(G). The set core(G) is the intersection of all maximum independent sets of G (Levit & Mandrescu, 2002). The number def(G)=|V(G)|-2*mu(G) is the deficiency of G (Lovasz & Plummer, 1986). The number d(G)=max{|S|-|N(S)|:S in Ind(G)} is the critical difference of G. An independent set A is critical if |A|-|N(A)|=d(G), where N(S) is the neighborhood of S (Zhang, 1990). In 2009, Larson showed that G is Konig--Egervary graph if and only if there exists a maximum independent set that is critical as well. In this paper we prove that: (i) d(G)=|core(G)|-|N(core(G))|=alpha(G)-mu(G)=def(G) for every Konig--Egervary graph G; (ii) G is Konig--Egervary graph if and only if every maximum independent set of G is critical.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 15:09:41 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 07:36:39 GMT" } ]
2011-01-25T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.4612
EPTCS
Turlough Neary, Damien Woods, Anthony K. Seda, Niall Murphy
Proceedings International Workshop on The Complexity of Simple Programs
null
EPTCS 1, 2009
10.4204/EPTCS.1
null
cs.CC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the first volume of Electronic Proceedings in Theoretical Computer Science (EPTCS), a free international refereed open access venue for the rapid electronic publication of the proceedings of workshops and conferences, and of festschriften, etc, in the general area of theoretical computer science, broadly construed. It contains the proceedings of the International Workshop on The Complexity of Simple Programs, which was hosted at University College Cork on the 6th and 7th of December, 2008. All speakers were invited and all of the papers went through a thorough peer-review process.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 16:32:39 GMT" } ]
2009-10-13T00:00:00
[ [ "Neary", "Turlough", "" ], [ "Woods", "Damien", "" ], [ "Seda", "Anthony K.", "" ], [ "Murphy", "Niall", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.4615
Melda Yuksel
Melda Yuksel and Elza Erkip
Diversity-Multiplexing Tradeoff for the Multiple-Antenna Wire-tap Channel
10 pages, 4 figures, to appear in IEEE Transactions on Wireless Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the fading multiple antenna (MIMO) wire-tap channel is investigated under short term power constraints. The secret diversity gain and the secret multiplexing gain are defined. Using these definitions, the secret diversitymultiplexing tradeoff (DMT) is calculated analytically for no transmitter side channel state information (CSI) and for full CSI. When there is no CSI at the transmitter, under the assumption of Gaussian codebooks, it is shown that the eavesdropper steals both transmitter and receiver antennas, and the secret DMT depends on the remaining degrees of freedom. When CSI is available at the transmitter (CSIT), the eavesdropper steals only transmitter antennas. This dependence on the availability of CSI is unlike the DMT results without secrecy constraints, where the DMT remains the same for no CSI and full CSI at the transmitter under short term power constraints. A zero-forcing type scheme is shown to achieve the secret DMT when CSIT is available.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 06:44:05 GMT" }, { "version": "v2", "created": "Fri, 10 Dec 2010 10:07:13 GMT" } ]
2015-03-13T00:00:00
[ [ "Yuksel", "Melda", "" ], [ "Erkip", "Elza", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4618
Pedro Peris-Lopez
Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis, Aikaterini Mitrokotsa, Juan M. E. Tapiador
Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud Attacks
31 pages, 10 figures, 1 table
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The vast majority of RFID authentication protocols assume the proximity between readers and tags due to the limited range of the radio channel. However, in real scenarios an intruder can be located between the prover (tag) and the verifier (reader) and trick this last one into thinking that the prover is in close proximity. This attack is generally known as a relay attack in which scope distance fraud, mafia fraud and terrorist attacks are included. Distance bounding protocols represent a promising countermeasure to hinder relay attacks. Several protocols have been proposed during the last years but vulnerabilities of major or minor relevance have been identified in most of them. In 2008, Kim et al. [1] proposed a new distance bounding protocol with the objective of being the best in terms of security, privacy, tag computational overhead and fault tolerance. In this paper, we analyze this protocol and we present a passive full disclosure attack, which allows an adversary to discover the long-term secret key of the tag. The presented attack is very relevant, since no security objectives are met in Kim et al.'s protocol. Then, design guidelines are introduced with the aim of facilitating protocol designers the stimulating task of designing secure and efficient schemes against relay attacks. Finally a new protocol, named Hitomi and inspired by [1], is designed conforming the guidelines proposed previously.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 07:12:26 GMT" }, { "version": "v2", "created": "Sun, 20 Jun 2010 19:35:19 GMT" } ]
2010-06-22T00:00:00
[ [ "Peris-Lopez", "Pedro", "" ], [ "Hernandez-Castro", "Julio C.", "" ], [ "Dimitrakakis", "Christos", "" ], [ "Mitrokotsa", "Aikaterini", "" ], [ "Tapiador", "Juan M. E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.4643
Ligong Wang
Shraga Bross, Amos Lapidoth and Ligong Wang
The Poisson Channel with Side Information
Final version to appear in the proceedings of Allerton 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The continuous-time, peak-limited, infinite-bandwidth Poisson channel with spurious counts is considered. It is shown that if the times at which the spurious counts occur are known noncausally to the transmitter but not to the receiver, then the capacity is equal to that of the Poisson channel with no spurious counts. Knowing the times at which the spurious counts occur only causally at the transmitter does not increase capacity.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 09:49:04 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 14:34:27 GMT" } ]
2009-10-05T00:00:00
[ [ "Bross", "Shraga", "" ], [ "Lapidoth", "Amos", "" ], [ "Wang", "Ligong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4663
R Doomun
Hafeez Ullah Amin, Abdur Rashid Khan
Acquiring Knowledge for Evaluation of Teachers Performance in Higher Education using a Questionnaire
7 pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS, June 2009 Issue, Vol. 2, No.1
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the step by step knowledge acquisition process by choosing a structured method through using a questionnaire as a knowledge acquisition tool. Here we want to depict the problem domain as, how to evaluate teachers performance in higher education through the use of expert system technology. The problem is how to acquire the specific knowledge for a selected problem efficiently and effectively from human experts and encode it in the suitable computer format. Acquiring knowledge from human experts in the process of expert systems development is one of the most common problems cited till yet. This questionnaire was sent to 87 domain experts within all public and private universities in Pakistani. Among them 25 domain experts sent their valuable opinions. Most of the domain experts were highly qualified, well experienced and highly responsible persons. The whole questionnaire was divided into 15 main groups of factors, which were further divided into 99 individual questions. These facts were analyzed further to give a final shape to the questionnaire. This knowledge acquisition technique may be used as a learning tool for further research work.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 11:09:39 GMT" } ]
2009-06-26T00:00:00
[ [ "Amin", "Hafeez Ullah", "" ], [ "Khan", "Abdur Rashid", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.4668
{\L}ukasz Chmielewski Mr.
{\L}ukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum
Client-Server Password Recovery (Extended Abstract)
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Human memory is not perfect - people constantly memorize new facts and forget old ones. One example is forgetting a password, a common problem raised at IT help desks. We present several protocols that allow a user to automatically recover a password from a server using partial knowledge of the password. These protocols can be easily adapted to the personal entropy setting, where a user can recover a password only if he can answer a large enough subset of personal questions. We introduce client-server password recovery methods, in which the recovery data are stored at the server, and the recovery procedures are integrated into the login procedures. These methods apply to two of the most common types of password based authentication systems. The security of these solutions is significantly better than the security of presently proposed password recovery schemes. Our protocols are based on a variation of threshold encryption that may be of independent interest.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 14:41:45 GMT" } ]
2009-06-26T00:00:00
[ [ "Chmielewski", "Łukasz", "" ], [ "Hoepman", "Jaap-Henk", "" ], [ "van Rossum", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.4675
Mariano Beguerisse D\'iaz
Mariano Beguerisse-Diaz, Mason A. Porter, Jukka-Pekka Onnela
Competition for Popularity in Bipartite Networks
13 Pages, 19 Figures
null
10.1063/1.3475411
null
physics.soc-ph cs.SI physics.data-an
http://creativecommons.org/licenses/by/3.0/
We present a dynamical model for rewiring and attachment in bipartite networks in which edges are added between nodes that belong to catalogs that can either be fixed in size or growing in size. The model is motivated by an empirical study of data from the video rental service Netflix, which invites its users to give ratings to the videos available in its catalog. We find that the distribution of the number of ratings given by users and that of the number of ratings received by videos both follow a power law with an exponential cutoff. We also examine the activity patterns of Netflix users and find bursts of intense video-rating activity followed by long periods of inactivity. We derive ordinary differential equations to model the acquisition of edges by the nodes over time and obtain the corresponding time-dependent degree distributions. We then compare our results with the Netflix data and find good agreement. We conclude with a discussion of how catalog models can be used to study systems in which agents are forced to choose, rate, or prioritize their interactions from a very large set of options.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 12:40:19 GMT" }, { "version": "v2", "created": "Thu, 27 May 2010 13:43:45 GMT" } ]
2013-09-10T00:00:00
[ [ "Beguerisse-Diaz", "Mariano", "" ], [ "Porter", "Mason A.", "" ], [ "Onnela", "Jukka-Pekka", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0906.4680
Olivier Passalacqua
Eric Benoit (LISTIC), Marc-Philippe Huget (LISTIC), Patrice Moreaux (LISTIC), Olivier Passalacqua (LISTIC)
Reconfiguration of Distributed Information Fusion System ? A case study
6 pages - Preprint version
Workshop on Dependable Control of Discrete Systems, Bari : Italie (2009)
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information Fusion Systems are now widely used in different fusion contexts, like scientific processing, sensor networks, video and image processing. One of the current trends in this area is to cope with distributed systems. In this context, we have defined and implemented a Dynamic Distributed Information Fusion System runtime model. It allows us to cope with dynamic execution supports while trying to maintain the functionalities of a given Dynamic Distributed Information Fusion System. The paper presents our system, the reconfiguration problems we are faced with and our solutions.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 12:35:57 GMT" } ]
2009-06-26T00:00:00
[ [ "Benoit", "Eric", "", "LISTIC" ], [ "Huget", "Marc-Philippe", "", "LISTIC" ], [ "Moreaux", "Patrice", "", "LISTIC" ], [ "Passalacqua", "Olivier", "", "LISTIC" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0906.4690
R Doomun
Ladda Suanmali, Naomie Salim and Mohammed Salem Binwahlan
Fuzzy Logic Based Method for Improving Text Summarization
6 pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Text summarization can be classified into two approaches: extraction and abstraction. This paper focuses on extraction approach. The goal of text summarization based on extraction approach is sentence selection. One of the methods to obtain the suitable sentences is to assign some numerical measure of a sentence for the summary called sentence weighting and then select the best ones. The first step in summarization by extraction is the identification of important features. In our experiment, we used 125 test documents in DUC2002 data set. Each document is prepared by preprocessing process: sentence segmentation, tokenization, removing stop word, and word stemming. Then, we use 8 important features and calculate their score for each sentence. We propose text summarization based on fuzzy logic to improve the quality of the summary created by the general statistic method. We compare our results with the baseline summarizer and Microsoft Word 2007 summarizers. The results show that the best average precision, recall, and f-measure for the summaries were obtained by fuzzy method.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 13:19:07 GMT" } ]
2009-06-26T00:00:00
[ [ "Suanmali", "Ladda", "" ], [ "Salim", "Naomie", "" ], [ "Binwahlan", "Mohammed Salem", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.4692
Rossano Venturini
Paolo Ferragina and Igor Nitto and Rossano Venturini
On optimally partitioning a text to improve its compression
null
null
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the problem of partitioning an input string T in such a way that compressing individually its parts via a base-compressor C gets a compressed output that is shorter than applying C over the entire T at once. This problem was introduced in the context of table compression, and then further elaborated and extended to strings and trees. Unfortunately, the literature offers poor solutions: namely, we know either a cubic-time algorithm for computing the optimal partition based on dynamic programming, or few heuristics that do not guarantee any bounds on the efficacy of their computed partition, or algorithms that are efficient but work in some specific scenarios (such as the Burrows-Wheeler Transform) and achieve compression performance that might be worse than the optimal-partitioning by a $\Omega(\sqrt{\log n})$ factor. Therefore, computing efficiently the optimal solution is still open. In this paper we provide the first algorithm which is guaranteed to compute in $O(n \log_{1+\eps}n)$ time a partition of T whose compressed output is guaranteed to be no more than $(1+\epsilon)$-worse the optimal one, where $\epsilon$ may be any positive constant.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 13:36:24 GMT" } ]
2009-06-26T00:00:00
[ [ "Ferragina", "Paolo", "" ], [ "Nitto", "Igor", "" ], [ "Venturini", "Rossano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4706
Yves Brise
Yves Brise and Bernd G\"artner
Clarksons Algorithm for Violator Spaces
21 pages
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clarksons algorithm is a two-staged randomized algorithm for solving linear programs. This algorithm has been simplified and adapted to fit the framework of LP-type problems. In this framework we can tackle a number of non-linear problems such as computing the smallest enclosing ball of a set of points in R^d . In 2006, it has been shown that the algorithm in its original form works for violator spaces too, which are a proper general- ization of LP-type problems. It was not clear, however, whether previous simplifications of the algorithm carry over to the new setting. In this paper we show the following theoretical results: (a) It is shown, for the first time, that Clarksons second stage can be simplified. (b) The previous simplifications of Clarksons first stage carry over to the violator space setting. (c) Furthermore, we show the equivalence of violator spaces and partitions of the hypercube by hypercubes.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 14:54:45 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 09:59:51 GMT" } ]
2009-06-30T00:00:00
[ [ "Brise", "Yves", "" ], [ "Gärtner", "Bernd", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.4711
Carlo Alberto Furia
Carlo A. Furia and Paola Spoletini
On Relaxing Metric Information in Linear Temporal Logic
Minor changes
Proceedings of the 18th International Symposium on Temporal Representation and Reasoning (TIME'11). Pgg. 72--79, IEEE Computer Society, September 2011
10.1109/TIME.2011.9
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metric LTL formulas rely on the next operator to encode time distances, whereas qualitative LTL formulas use only the until operator. This paper shows how to transform any metric LTL formula M into a qualitative formula Q, such that Q is satisfiable if and only if M is satisfiable over words with variability bounded with respect to the largest distances used in M (i.e., occurrences of next), but the size of Q is independent of such distances. Besides the theoretical interest, this result can help simplify the verification of systems with time-granularity heterogeneity, where large distances are required to express the coarse-grain dynamics in terms of fine-grain time units.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 15:04:50 GMT" }, { "version": "v2", "created": "Wed, 21 Apr 2010 07:08:25 GMT" }, { "version": "v3", "created": "Sat, 23 Apr 2011 08:53:19 GMT" }, { "version": "v4", "created": "Fri, 17 Jun 2011 13:42:24 GMT" } ]
2013-08-14T00:00:00
[ [ "Furia", "Carlo A.", "" ], [ "Spoletini", "Paola", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.4725
Ross Duncan
Bob Coecke and Ross Duncan
Interacting Quantum Observables: Categorical Algebra and Diagrammatics
81 pages, many figures. Significant changes from previous version. The first sections contain a gentle introduction for physicists to the graphical language, and its use in quantum computation
New J. Phys. 13 (2011) 043016
10.1088/1367-2630/13/4/043016
null
quant-ph cs.LO math.CT math.QA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has two tightly intertwined aims: (i) To introduce an intuitive and universal graphical calculus for multi-qubit systems, the ZX-calculus, which greatly simplifies derivations in the area of quantum computation and information. (ii) To axiomatise complementarity of quantum observables within a general framework for physical theories in terms of dagger symmetric monoidal categories. We also axiomatize phase shifts within this framework. Using the well-studied canonical correspondence between graphical calculi and symmetric monoidal categories, our results provide a purely graphical formalisation of complementarity for quantum observables. Each individual observable, represented by a commutative special dagger Frobenius algebra, gives rise to an abelian group of phase shifts, which we call the phase group. We also identify a strong form of complementarity, satisfied by the Z and X spin observables, which yields a scaled variant of a bialgebra.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 15:58:11 GMT" }, { "version": "v2", "created": "Mon, 31 Jan 2011 13:49:04 GMT" }, { "version": "v3", "created": "Thu, 21 Apr 2011 14:18:07 GMT" } ]
2015-03-13T00:00:00
[ [ "Coecke", "Bob", "" ], [ "Duncan", "Ross", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" } ]
0906.4747
Erik Demaine
Erik D. Demaine, Martin L. Demaine, Vi Hart, Gregory N. Price, Tomohiro Tachi
(Non)existence of Pleated Folds: How Paper Folds Between Creases
19 pages, 6 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the pleated hyperbolic paraboloid, a familiar origami model known since 1927, in fact cannot be folded with the standard crease pattern in the standard mathematical model of zero-thickness paper. In contrast, we show that the model can be folded with additional creases, suggesting that real paper "folds" into this model via small such creases. We conjecture that the circular version of this model, consisting simply of concentric circular creases, also folds without extra creases. At the heart of our results is a new structural theorem characterizing uncreased intrinsically flat surfaces--the portions of paper between the creases. Differential geometry has much to say about the local behavior of such surfaces when they are sufficiently smooth, e.g., that they are torsal ruled. But this classic result is simply false in the context of the whole surface. Our structural characterization tells the whole story, and even applies to surfaces with discontinuities in the second derivative. We use our theorem to prove fundamental properties about how paper folds, for example, that straight creases on the piece of paper must remain piecewise-straight (polygonal) by folding.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 17:03:21 GMT" } ]
2009-06-26T00:00:00
[ [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Hart", "Vi", "" ], [ "Price", "Gregory N.", "" ], [ "Tachi", "Tomohiro", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0906.4750
Gregory Kucherov
Roman Kolpakov, Gregory Kucherov, Pascal Ochem
On maximal repetitions of arbitrary exponent
8 pages, 1 figure
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The first two authors have shown [KK99,KK00] that the sum the exponent (and thus the number) of maximal repetitions of exponent at least 2 (also called runs) is linear in the length of the word. The exponent 2 in the definition of a run may seem arbitrary. In this paper, we consider maximal repetitions of exponent strictly greater than 1.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 16:59:17 GMT" } ]
2009-06-26T00:00:00
[ [ "Kolpakov", "Roman", "" ], [ "Kucherov", "Gregory", "" ], [ "Ochem", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.4762
Alin Suciu PhD
Cristian Klein, Octavian Cret, Alin Suciu
Design and Implementation of a High Quality and High Throughput TRNG in FPGA
5 pages, 5 figures, 1 table
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper focuses on the design and implementation of a high-quality and high-throughput true-random number generator (TRNG) in FPGA. Various practical issues which we encountered are highlighted and the influence of the various parameters on the functioning of the TRNG are discussed. We also propose a few values for the parameters which use the minimum amount of the resources but still pass common random number generator test batteries such as DieHard and TestU01.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 18:32:24 GMT" } ]
2009-06-26T00:00:00
[ [ "Klein", "Cristian", "" ], [ "Cret", "Octavian", "" ], [ "Suciu", "Alin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.4764
Chaitanya Nittala
Sriram Somanchi, Chaitanya Nittala, Narahari Yadati
A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative Game Theory
To be published in Proceedings of the 2009 IEEE/WIC/ACM International Conference on Intelligent Agent Technology. 2009
null
null
null
cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a bid optimizer for sponsored keyword search auctions which leads to better retention of advertisers by yielding attractive utilities to the advertisers without decreasing the revenue to the search engine. The bid optimizer is positioned as a key value added tool the search engine provides to the advertisers. The proposed bid optimizer algorithm transforms the reported values of the advertisers for a keyword into a correlated bid profile using many ideas from cooperative game theory. The algorithm is based on a characteristic form game involving the search engine and the advertisers. Ideas from Nash bargaining theory are used in formulating the characteristic form game to provide for a fair share of surplus among the players involved. The algorithm then computes the nucleolus of the characteristic form game since we find that the nucleolus is an apt way of allocating the gains of cooperation among the search engine and the advertisers. The algorithm next transforms the nucleolus into a correlated bid profile using a linear programming formulation. This bid profile is input to a standard generalized second price mechanism (GSP) for determining the allocation of sponsored slots and the prices to be be paid by the winners. The correlated bid profile that we determine is a locally envy-free equilibrium and also a correlated equilibrium of the underlying game. Through detailed simulation experiments, we show that the proposed bid optimizer retains more customers than a plain GSP mechanism and also yields better long-run utilities to the search engine and the advertisers.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 18:25:53 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 11:31:40 GMT" } ]
2009-06-30T00:00:00
[ [ "Somanchi", "Sriram", "" ], [ "Nittala", "Chaitanya", "" ], [ "Yadati", "Narahari", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0906.4779
Jascha Sohl-Dickstein
Jascha Sohl-Dickstein, Peter Battaglino and Michael R. DeWeese
Minimum Probability Flow Learning
Updated to match ICML conference proceedings
null
null
null
cs.LG physics.data-an stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fitting probabilistic models to data is often difficult, due to the general intractability of the partition function and its derivatives. Here we propose a new parameter estimation technique that does not require computing an intractable normalization factor or sampling from the equilibrium distribution of the model. This is achieved by establishing dynamics that would transform the observed data distribution into the model distribution, and then setting as the objective the minimization of the KL divergence between the data distribution and the distribution produced by running the dynamics for an infinitesimal time. Score matching, minimum velocity learning, and certain forms of contrastive divergence are shown to be special cases of this learning technique. We demonstrate parameter estimation in Ising models, deep belief networks and an independent component analysis model of natural scenes. In the Ising model case, current state of the art techniques are outperformed by at least an order of magnitude in learning time, with lower error in recovered coupling parameters.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 19:15:44 GMT" }, { "version": "v2", "created": "Wed, 16 Sep 2009 02:20:21 GMT" }, { "version": "v3", "created": "Mon, 7 Jun 2010 07:03:16 GMT" }, { "version": "v4", "created": "Sun, 25 Sep 2011 01:33:51 GMT" } ]
2015-03-13T00:00:00
[ [ "Sohl-Dickstein", "Jascha", "" ], [ "Battaglino", "Peter", "" ], [ "DeWeese", "Michael R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0906.4789
R Doomun
Amir Azizi, Hamid Reza Pourreza
Efficient IRIS Recognition through Improvement of Feature Extraction and subset Selection
10 pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS JUne 2009 Issue, Vol. 2, No. 1
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The selection of the optimal feature subset and the classification has become an important issue in the field of iris recognition. In this paper we propose several methods for iris feature subset selection and vector creation. The deterministic feature sequence is extracted from the iris image by using the contourlet transform technique. Contourlet transform captures the intrinsic geometrical structures of iris image. It decomposes the iris image into a set of directional sub-bands with texture details captured in different orientations at various scales so for reducing the feature vector dimensions we use the method for extract only significant bit and information from normalized iris images. In this method we ignore fragile bits. And finally we use SVM (Support Vector Machine) classifier for approximating the amount of people identification in our proposed system. Experimental result show that most proposed method reduces processing time and increase the classification accuracy and also the iris feature vector length is much smaller versus the other methods.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 20:14:42 GMT" } ]
2009-06-29T00:00:00
[ [ "Azizi", "Amir", "" ], [ "Pourreza", "Hamid Reza", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.4805
Suvrit Sra
Suvrit Sra
A Trivial Observation related to Sparse Recovery
Replaces previous correct but useless version with another correct, but hopefully somewhat less useless version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We make a trivial modification to the elegant analysis of Garg and Khandekar (\emph{Gradient Descent with Sparsification} ICML 2009) that replaces the standard Restricted Isometry Property (RIP), with another RIP-type property (which could be simpler than the RIP, but we are not sure; it could be as hard as the RIP to check, thereby rendering this little writeup totally worthless).
[ { "version": "v1", "created": "Fri, 26 Jun 2009 15:25:48 GMT" }, { "version": "v2", "created": "Sat, 27 Jun 2009 21:00:11 GMT" } ]
2009-06-29T00:00:00
[ [ "Sra", "Suvrit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4816
Assaf Naor
Subhash Khot and Assaf Naor
Sharp kernel clustering algorithms and their associated Grothendieck inequalities
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the kernel clustering problem we are given a (large) $n\times n$ symmetric positive semidefinite matrix $A=(a_{ij})$ with $\sum_{i=1}^n\sum_{j=1}^n a_{ij}=0$ and a (small) $k\times k$ symmetric positive semidefinite matrix $B=(b_{ij})$. The goal is to find a partition $\{S_1,...,S_k\}$ of $\{1,... n\}$ which maximizes $ \sum_{i=1}^k\sum_{j=1}^k (\sum_{(p,q)\in S_i\times S_j}a_{pq})b_{ij}$. We design a polynomial time approximation algorithm that achieves an approximation ratio of $\frac{R(B)^2}{C(B)}$, where $R(B)$ and $C(B)$ are geometric parameters that depend only on the matrix $B$, defined as follows: if $b_{ij} = < v_i, v_j>$ is the Gram matrix representation of $B$ for some $v_1,...,v_k\in \R^k$ then $R(B)$ is the minimum radius of a Euclidean ball containing the points $\{v_1, ..., v_k\}$. The parameter $C(B)$ is defined as the maximum over all measurable partitions $\{A_1,...,A_k\}$ of $\R^{k-1}$ of the quantity $\sum_{i=1}^k\sum_{j=1}^k b_{ij}< z_i,z_j>$, where for $i\in \{1,...,k\}$ the vector $z_i\in \R^{k-1}$ is the Gaussian moment of $A_i$, i.e., $z_i=\frac{1}{(2\pi)^{(k-1)/2}}\int_{A_i}xe^{-\|x\|_2^2/2}dx$. We also show that for every $\eps > 0$, achieving an approximation guarantee of $(1-\e)\frac{R(B)^2}{C(B)}$ is Unique Games hard.
[ { "version": "v1", "created": "Thu, 25 Jun 2009 23:10:44 GMT" } ]
2009-06-29T00:00:00
[ [ "Khot", "Subhash", "" ], [ "Naor", "Assaf", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.4827
Walid Saad
Walid Saad, Zhu Han, Tamer Basar, Merouane Debbah and Are Hj{\o}rungnes
Physical Layer Security: Coalitional Games for Distributed Cooperation
Best paper Award at Wiopt 2009
null
null
null
cs.IT cs.GT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperation between wireless network nodes is a promising technique for improving the physical layer security of wireless transmission, in terms of secrecy capacity, in the presence of multiple eavesdroppers. While existing physical layer security literature answered the question "what are the link-level secrecy capacity gains from cooperation?", this paper attempts to answer the question of "how to achieve those gains in a practical decentralized wireless network and in the presence of a secrecy capacity cost for information exchange?". For this purpose, we model the physical layer security cooperation problem as a coalitional game with non-transferable utility and propose a distributed algorithm for coalition formation. Through the proposed algorithm, the wireless users can autonomously cooperate and self-organize into disjoint independent coalitions, while maximizing their secrecy capacity taking into account the security costs during information exchange. We analyze the resulting coalitional structures, discuss their properties, and study how the users can self-adapt the network topology to environmental changes such as mobility. Simulation results show that the proposed algorithm allows the users to cooperate and self-organize while improving the average secrecy capacity per user up to 25.32% relative to the non-cooperative case.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 01:20:58 GMT" } ]
2009-06-29T00:00:00
[ [ "Saad", "Walid", "" ], [ "Han", "Zhu", "" ], [ "Basar", "Tamer", "" ], [ "Debbah", "Merouane", "" ], [ "Hjørungnes", "Are", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4834
R Doomun
B. Rezaie, MR. Jahed Motlagh, M. Analoui, S. Khorsandi
Global Stability Analysis for an Internet Congestion Control Model with a Time-Varying Link Capacity
5 pages, International Journal of Computer Science and Information Security, IJCSIS
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a global stability analysis is given for a rate-based congestion control system modeled by a nonlinear delayed differential equation. The model determines the dynamics of a single-source single-link network, with a time-varying capacity of link and a fixed communication delay. We obtain a sufficient delay-independent conditions on system parameters under which global asymptotic stability of the system is guarantied. The proof is based on an extension of Lyapunov-Krasovskii theorem for a class of nonlinear time-delay systems. The numerical simulations for a typical scenario justify the theoretical results.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 03:24:12 GMT" } ]
2009-06-29T00:00:00
[ [ "Rezaie", "B.", "" ], [ "Motlagh", "MR. Jahed", "" ], [ "Analoui", "M.", "" ], [ "Khorsandi", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.4837
Serguei Mokhov
Bin Han, Serguei A. Mokhov, and Joey Paquet
Advances in the Design and Implementation of a Multi-Tier Architecture in the GIPSY Environment
11 pages, 3 figures
null
10.1109/SERA.2010.40
null
cs.SE cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present advances in the software engineering design and implementation of the multi-tier run-time system for the General Intensional Programming System (GIPSY) by further unifying the distributed technologies used to implement the Demand Migration Framework (DMF) in order to streamline distributed execution of hybrid intensional-imperative programs using Java.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 04:08:05 GMT" } ]
2010-07-09T00:00:00
[ [ "Han", "Bin", "" ], [ "Mokhov", "Serguei A.", "" ], [ "Paquet", "Joey", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.4838
R Doomun
Siddhivinayak Kulkarni, Imad Haidar
Forecasting Model for Crude Oil Price Using Artificial Neural Networks and Commodity Futures Prices
8 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.NE q-fin.PM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a model based on multilayer feedforward neural network to forecast crude oil spot price direction in the short-term, up to three days ahead. A great deal of attention was paid on finding the optimal ANN model structure. In addition, several methods of data pre-processing were tested. Our approach is to create a benchmark based on lagged value of pre-processed spot price, then add pre-processed futures prices for 1, 2, 3,and four months to maturity, one by one and also altogether. The results on the benchmark suggest that a dynamic model of 13 lags is the optimal to forecast spot price direction for the short-term. Further, the forecast accuracy of the direction of the market was 78%, 66%, and 53% for one, two, and three days in future conclusively. For all the experiments, that include futures data as an input, the results show that on the short-term, futures prices do hold new information on the spot price direction. The results obtained will generate comprehensive understanding of the crude oil dynamic which help investors and individuals for risk managements.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 04:25:12 GMT" } ]
2009-06-29T00:00:00
[ [ "Kulkarni", "Siddhivinayak", "" ], [ "Haidar", "Imad", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Quantitative Finance", "code": "q-fin.PM", "description": "Security selection and optimization, capital allocation, investment strategies and performance measurement", "span": "(Portfolio Management)" } ]
0906.4846
Lorentz Jantschi
Lorentz Jantschi
A genetic algorithm for structure-activity relationships: software implementation
21 pages; 10 figures; 14 tables
null
null
null
cs.NE
http://creativecommons.org/licenses/publicdomain/
The design and the implementation of a genetic algorithm are described. The applicability domain is on structure-activity relationships expressed as multiple linear regressions and predictor variables are from families of structure-based molecular descriptors. An experiment to compare different selection and survival strategies was designed and realized. The genetic algorithm was run using the designed experiment on a set of 206 polychlorinated biphenyls searching on structure-activity relationships having known the measured octanol-water partition coefficients and a family of molecular descriptors. The experiment shows that different selection and survival strategies create different partitions on the entire population of all possible genotypes.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 06:25:07 GMT" } ]
2009-06-29T00:00:00
[ [ "Jantschi", "Lorentz", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0906.4900
EPTCS
Maurice H. ter Beek
Proceedings Fourth European Young Researchers Workshop on Service Oriented Computing
null
EPTCS 2, 2009
10.4204/EPTCS.2
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Service-Oriented Computing (SOC) is an emerging new paradigm for distributed and object-oriented computing by allowing autonomous, platform-independent computational entities (called services) to be built (described, discovered, composed, orchestrated) within and across organizational boundaries. Like no other computing paradigm before, SOC is destined to exert a lasting influence on the business domain, among others (e-commerce, e-government, e-business, e-learning, e-health, etc.). The Young Researchers workshop series on Service-Oriented Computing is meant to be a platform for junior researchers from industry and academics alike. Its core objectives are to exchange information regarding advancements in the state of the art and practice of SOC, as well as to identify emerging research topics and the future trends in this domain. Following the success of the previous three workshops, the 4th European Young Researchers Workshop on Service-Oriented Computing (YR-SOC 2009) introduced two novelties: it was organised outside of the UK and it saw the introduction of a number of tutorials, thus making the workshop a 3-day event. YR-SOC 2009 took place at the CNR Institute of Information Science and Technologies in Pisa, Italy, and was organised by Maurice ter Beek, Barry Norton, Stephan Reiff-Marganiec and Monika Solanki. The contributions in this volume cover aspects such as automated service composition, context-aware SOC, service-oriented programming, QoS-aware SOC, service-oriented architectures, SOC modelling and analysis, process management, web services, ontologies and the semantic web.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 10:52:52 GMT" } ]
2009-06-29T00:00:00
[ [ "ter Beek", "Maurice H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.4913
Nihar Shah B
K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar and Kannan Ramchandran
Explicit Construction of Optimal Exact Regenerating Codes for Distributed Storage
7 pages, 2 figures, in the Proceedings of Allerton Conference on Communication, Control and Computing, September 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Erasure coding techniques are used to increase the reliability of distributed storage systems while minimizing storage overhead. Also of interest is minimization of the bandwidth required to repair the system following a node failure. In a recent paper, Wu et al. characterize the tradeoff between the repair bandwidth and the amount of data stored per node. They also prove the existence of regenerating codes that achieve this tradeoff. In this paper, we introduce Exact Regenerating Codes, which are regenerating codes possessing the additional property of being able to duplicate the data stored at a failed node. Such codes require low processing and communication overheads, making the system practical and easy to maintain. Explicit construction of exact regenerating codes is provided for the minimum bandwidth point on the storage-repair bandwidth tradeoff, relevant to distributed-mail-server applications. A subspace based approach is provided and shown to yield necessary and sufficient conditions on a linear code to possess the exact regeneration property as well as prove the uniqueness of our construction. Also included in the paper, is an explicit construction of regenerating codes for the minimum storage point for parameters relevant to storage in peer-to-peer systems. This construction supports a variable number of nodes and can handle multiple, simultaneous node failures. All constructions given in the paper are of low complexity, requiring low field size in particular.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 19:20:51 GMT" }, { "version": "v2", "created": "Tue, 6 Oct 2009 17:11:35 GMT" } ]
2009-10-06T00:00:00
[ [ "Rashmi", "K. V.", "" ], [ "Shah", "Nihar B.", "" ], [ "Kumar", "P. Vijay", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.4917
Jing-wei Chen
Chen Jing-wei, Feng Yong, Qin Xiao-lin, and Zhang Jing-zhong
Simultaneous Integer Relation Detection and Its an Application
null
null
null
null
cs.SC cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\mathbf{x_1}, ..., \mathbf{x_t} \in \mathbb{R}^{n}$. A simultaneous integer relation (SIR) for $\mathbf{x_1}, ..., \mathbf{x_t}$ is a vector $\mathbf{m} \in \mathbb{Z}^{n}\setminus\{\textbf{0}\}$ such that $\mathbf{x_i}^T\mathbf{m} = 0$ for $i = 1, ..., t$. In this paper, we propose an algorithm SIRD to detect an SIR for real vectors, which constructs an SIR within $\mathcal {O}(n^4 + n^3 \log \lambda(X))$ arithmetic operations, where $\lambda(X)$ is the least Euclidean norm of SIRs for $\mathbf{x_1}, >..., \mathbf{x_t}$. One can easily generalize SIRD to complex number field. Experimental results show that SIRD is practical and better than another detecting algorithm in the literature. In its application, we present a new algorithm for finding the minimal polynomial of an arbitrary complex algebraic number from its an approximation, which is not based on LLL. We also provide a sufficient condition on the precision of the approximate value, which depends only on the height and the degree of the algebraic number.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 13:07:52 GMT" }, { "version": "v2", "created": "Mon, 25 Jan 2010 08:54:12 GMT" } ]
2010-01-25T00:00:00
[ [ "Jing-wei", "Chen", "" ], [ "Yong", "Feng", "" ], [ "Xiao-lin", "Qin", "" ], [ "Jing-zhong", "Zhang", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0906.4927
Lijun Chang
Lijun Chang, Jeffrey Xu Yu, Lu Qin
Fast Probabilistic Ranking under x-Relation Model
null
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The probabilistic top-k queries based on the interplay of score and probability, under the possible worlds semantic, become an important research issue that considers both score and uncertainty on the same basis. In the literature, many different probabilistic top-k queries are proposed. Almost all of them need to compute the probability of a tuple t_i to be ranked at the j-th position across the entire set of possible worlds. The cost of such computing is the dominant cost and is known as O(kn^2), where n is the size of dataset. In this paper, we propose a new novel algorithm that computes such probability in O(kn).
[ { "version": "v1", "created": "Fri, 26 Jun 2009 13:24:57 GMT" } ]
2009-06-29T00:00:00
[ [ "Chang", "Lijun", "" ], [ "Yu", "Jeffrey Xu", "" ], [ "Qin", "Lu", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0906.4936
R Doomun
Bechir Alaya, Claude Duvallet, Bruno Sadeg
A New Approach to Manage QoS in Distributed Multimedia Systems
10 pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.MM cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dealing with network congestion is a criterion used to enhance quality of service (QoS) in distributed multimedia systems. The existing solutions for the problem of network congestion ignore scalability considerations because they maintain a separate classification for each video stream. In this paper, we propose a new method allowing to control QoS provided to clients according to the network congestion, by discarding some frames when needed. The technique proposed, called (m,k)-frame, is scalable with little degradation in application performances. (m,k)-frame method is issued from the notion of (m,k)-firm realtime constraints which means that among k invocations of a task, m invocations must meet their deadline. Our simulation studies show the usefulness of (m,k)-frame method to adapt the QoS to the real conditions in a multimedia application, according to the current system load. Notably, the system must adjust the QoS provided to active clients1 when their number varies, i.e. dynamic arrival of clients.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 13:40:38 GMT" } ]
2009-06-29T00:00:00
[ [ "Alaya", "Bechir", "" ], [ "Duvallet", "Claude", "" ], [ "Sadeg", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0906.4973
Saqib Saeed
Rizwan A. Khan, M. Aasim Qureshi, Saqib Saeed
Vision Based Navigation for a Mobile Robot with Different Field of Views
This paper was published in Proceedings of Pak-US International Symposium on High Optical Networks and Enabling Technologies (HONET 2005) Islamabad, Pakistan
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The basic idea behind evolutionary robotics is to evolve a set of neural controllers for a particular task at hand. It involves use of various input parameters such as infrared sensors, light sensors and vision based methods. This paper aims to explore the evolution of vision based navigation in a mobile robot. It discusses in detail the effect of different field of views for a mobile robot. The individuals have been evolved using different FOV values and the results have been recorded and analyzed.The optimum values for FOV have been proposed after evaluating more than 100 different values. It has been observed that the optimum FOV value requires lesser number of generations for evolution and the mobile robot trained with that particular value is able to navigate well in the environment.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 16:15:09 GMT" } ]
2009-06-29T00:00:00
[ [ "Khan", "Rizwan A.", "" ], [ "Qureshi", "M. Aasim", "" ], [ "Saeed", "Saqib", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0906.4982
Dmitry Ignatov
Dmitry I. Ignatov, Sergei O. Kuznetsov
Concept-based Recommendations for Internet Advertisement
D.I.Ignatov, S.O. Kuznetsov. Concept-based Recommendations for Internet Advertisement//In proceedings of The Sixth International Conference Concept Lattices and Their Applications (CLA'08), Olomouc, Czech Republic, 2008 ISBN 978-80-244-2111-7
null
null
null
cs.AI cs.CY cs.IR stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of detecting terms that can be interesting to the advertiser is considered. If a company has already bought some advertising terms which describe certain services, it is reasonable to find out the terms bought by competing companies. A part of them can be recommended as future advertising terms to the company. The goal of this work is to propose better interpretable recommendations based on FCA and association rules.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 17:26:05 GMT" } ]
2013-12-03T00:00:00
[ [ "Ignatov", "Dmitry I.", "" ], [ "Kuznetsov", "Sergei O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0906.4995
Christine Michel
Christine Michel (LIESP, Ictt)
Dispositif de supervision pour les tuteurs impliqu\'es dans un apprentissage \`a la gestion de projets
11 pages
Workshop "Instrumentation des activit\'es du tuteur : Environnements de supervision, usages et ing\'enierie" de la conf\'erence EIAH2009, Le Mans : France (2009)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents results of the observation of a project management teaching-by-project course. It describe return of experience not only of student but also of tutors one years after the course. Many problems are identified like individual student evaluation, tutor distance, lake of coordination, lake of communication. We ask tutor about the pertinence of an instrumental solution, based upon dashboard, to solve problems of coordination and evaluation identified. We made the hypothese that a cognitive tool will improve too the knowledge construction and the learning process.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 18:52:53 GMT" } ]
2009-06-29T00:00:00
[ [ "Michel", "Christine", "", "LIESP, Ictt" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0906.5007
Ali Parandehgheibi
Daron Acemoglu, Asuman Ozdaglar, Ali ParandehGheibi
Spread of Misinformation in Social Networks
Submitted to Games and Economic Behavior
null
null
LIDS report 2812
cs.IT cs.DC math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a model to investigate the tension between information aggregation and spread of misinformation in large societies (conceptualized as networks of agents communicating with each other). Each individual holds a belief represented by a scalar. Individuals meet pairwise and exchange information, which is modeled as both individuals adopting the average of their pre-meeting beliefs. When all individuals engage in this type of information exchange, the society will be able to effectively aggregate the initial information held by all individuals. There is also the possibility of misinformation, however, because some of the individuals are "forceful," meaning that they influence the beliefs of (some) of the other individuals they meet, but do not change their own opinion. The paper characterizes how the presence of forceful agents interferes with information aggregation. Under the assumption that even forceful agents obtain some information (however infrequent) from some others (and additional weak regularity conditions), we first show that beliefs in this class of societies converge to a consensus among all individuals. This consensus value is a random variable, however, and we characterize its behavior. Our main results quantify the extent of misinformation in the society by either providing bounds or exact results (in some special cases) on how far the consensus value can be from the benchmark without forceful agents (where there is efficient information aggregation). The worst outcomes obtain when there are several forceful agents and forceful agents themselves update their beliefs only on the basis of information they obtain from individuals most likely to have received their own information previously.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 20:57:55 GMT" } ]
2009-06-30T00:00:00
[ [ "Acemoglu", "Daron", "" ], [ "Ozdaglar", "Asuman", "" ], [ "ParandehGheibi", "Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0906.5010
Seshadhri Comandur
C. Seshadhri
Testing cycle-freeness: Finding a certificate
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We deal with the problem of designing one-sided error property testers for cycle-freeness in bounded degree graphs. Such a property tester always accepts forests. Furthermore, when it rejects an input, it provides a short cycle as a certificate. The problem of testing cycle-freeness in this model was first considered by Goldreich and Ron \cite{GR97}. They give a constant time tester with two-sided error (it does not provide certificates for rejection) and prove a $\Omega(\sqrt{n})$ lower bound for testers with one-sided error. We design a property tester with one-sided error whose running time matches this lower bound (upto polylogarithmic factors). Interestingly, this has connections to a recent conjecture of Benjamini, Schramm, and Shapira \cite{BSS08}. The property of cycle-freeness is closed under the operation of taking minors. This is the first example of such a property that has an almost optimal $\otilde(\sqrt{n})$-time one-sided error tester, but has a constant time two-sided error tester. It was conjectured in \cite{BSS08} that this happens for a vast class of minor-closed properties, and this result can seen as the first indication towards that.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 21:06:04 GMT" } ]
2009-06-30T00:00:00
[ [ "Seshadhri", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.5017
Tao Zhou
Ming-Sheng Shang, Zi-Ke Zhang, Tao Zhou, Yi-Cheng Zhang
Collaborative filtering with diffusion-based similarity on tripartite graphs
8 pages, 4 figures, 1 table
Physica A 389 (2010) 1259-1264
10.1016/j.physa.2009.11.041
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collaborative tags are playing more and more important role for the organization of information systems. In this paper, we study a personalized recommendation model making use of the ternary relations among users, objects and tags. We propose a measure of user similarity based on his preference and tagging information. Two kinds of similarities between users are calculated by using a diffusion-based process, which are then integrated for recommendation. We test the proposed method in a standard collaborative filtering framework with three metrics: ranking score, Recall and Precision, and demonstrate that it performs better than the commonly used cosine similarity.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 23:01:47 GMT" }, { "version": "v2", "created": "Sat, 17 Oct 2009 14:50:14 GMT" } ]
2009-12-28T00:00:00
[ [ "Shang", "Ming-Sheng", "" ], [ "Zhang", "Zi-Ke", "" ], [ "Zhou", "Tao", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.5022
Tad Hogg
Tad Hogg and Robert A. Freitas Jr
Chemical Power for Microscopic Robots in Capillaries
28 pages, 7 figures
Nanomedicine: Nanotechnology, Biology, and Medicine 6:298-317 (2010)
10.1016/j.nano.2009.10.002
null
cs.RO physics.bio-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The power available to microscopic robots (nanorobots) that oxidize bloodstream glucose while aggregated in circumferential rings on capillary walls is evaluated with a numerical model using axial symmetry and time-averaged release of oxygen from passing red blood cells. Robots about one micron in size can produce up to several tens of picowatts, in steady-state, if they fully use oxygen reaching their surface from the blood plasma. Robots with pumps and tanks for onboard oxygen storage could collect oxygen to support burst power demands two to three orders of magnitude larger. We evaluate effects of oxygen depletion and local heating on surrounding tissue. These results give the power constraints when robots rely entirely on ambient available oxygen and identify aspects of the robot design significantly affecting available power. More generally, our numerical model provides an approach to evaluating robot design choices for nanomedicine treatments in and near capillaries.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 23:54:08 GMT" } ]
2010-04-09T00:00:00
[ [ "Hogg", "Tad", "" ], [ "Freitas", "Robert A.", "Jr" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" } ]
0906.5023
Tsuyoshi Miezaki
Masaaki Harada, Tsuyoshi Miezaki
An Upper Bound on the Minimum Weight of Type II $\ZZ_{2k}$-Codes
10 pages, 2 tables
J. Combin. Theory Ser. A 118 (2010), 190-196
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give a new upper bound on the minimum Euclidean weight of Type II $\ZZ_{2k}$-codes and the concept of extremality for the Euclidean weights when $k=3,4,5,6$. Together with the known result, we demonstrate that there is an extremal Type II $\ZZ_{2k}$-code of length $8m$ $(m \le 8)$ when $k=3,4,5,6$.
[ { "version": "v1", "created": "Fri, 26 Jun 2009 23:58:21 GMT" } ]
2012-05-28T00:00:00
[ [ "Harada", "Masaaki", "" ], [ "Miezaki", "Tsuyoshi", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.5031
R Doomun
Ram Kumar Singh, Prof. T. Ramajujam
Intrusion Detection System Using Advanced Honeypots
9 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The exponential growth of Internet traffic has made public servers increasingly vulnerable to unauthorized accesses and intrusions. In addition to maintaining low latency for the client, filtering unauthorized accesses has become one of the major concerns of a server maintainer. This implementation of an Intrusion Detection System distinguishes between the traffic coming from clients and the traffic originated from the attackers, in an attempt to simultaneously mitigate the problems of both latency and security. We then present the results of a series of stress and scalability tests, and suggest a number of potential uses for such a system. As computer attacks are becoming more and more difficult to identify the need for better and more efficient intrusion detection systems increases. The main problem with current intrusion detection systems is high rate of false alarms. Using honeypots provides effective solution to increase the security.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 03:34:28 GMT" } ]
2009-06-30T00:00:00
[ [ "Singh", "Ram Kumar", "" ], [ "Ramajujam", "Prof. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.5034
R Doomun
Anshika Pal, Deepak Singh Tomar, S.C. Shrivastava
Effective Focused Crawling Based on Content and Link Structure Analysis
5 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A focused crawler traverses the web selecting out relevant pages to a predefined topic and neglecting those out of concern. While surfing the internet it is difficult to deal with irrelevant pages and to predict which links lead to quality pages. In this paper a technique of effective focused crawling is implemented to improve the quality of web navigation. To check the similarity of web pages w.r.t. topic keywords a similarity function is used and the priorities of extracted out links are also calculated based on meta data and resultant pages generated from focused crawler. The proposed work also uses a method for traversing the irrelevant pages that met during crawling to improve the coverage of a specific topic.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 03:50:59 GMT" } ]
2009-06-30T00:00:00
[ [ "Pal", "Anshika", "" ], [ "Tomar", "Deepak Singh", "" ], [ "Shrivastava", "S. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.5038
R Doomun
Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan
A Novel Two-Stage Dynamic Decision Support based Optimal Threat Evaluation and Defensive Resource Scheduling Algorithm for Multi Air-borne threats
8 Pages, International Journal of Computer Science and Information Security, IJCSIS
IJCSIS June 2009 Issue, Vol.2, No. 1
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a novel two-stage flexible dynamic decision support based optimal threat evaluation and defensive resource scheduling algorithm for multi-target air-borne threats. The algorithm provides flexibility and optimality by swapping between two objective functions, i.e. the preferential and subtractive defense strategies as and when required. To further enhance the solution quality, it outlines and divides the critical parameters used in Threat Evaluation and Weapon Assignment (TEWA) into three broad categories (Triggering, Scheduling and Ranking parameters). Proposed algorithm uses a variant of many-to-many Stable Marriage Algorithm (SMA) to solve Threat Evaluation (TE) and Weapon Assignment (WA) problem. In TE stage, Threat Ranking and Threat-Asset pairing is done. Stage two is based on a new flexible dynamic weapon scheduling algorithm, allowing multiple engagements using shoot-look-shoot strategy, to compute near-optimal solution for a range of scenarios. Analysis part of this paper presents the strengths and weaknesses of the proposed algorithm over an alternative greedy algorithm as applied to different offline scenarios.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 04:24:59 GMT" } ]
2009-06-30T00:00:00
[ [ "Naeem", "Huma", "" ], [ "Masood", "Asif", "" ], [ "Hussain", "Mukhtar", "" ], [ "Khan", "Shoab A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.5039
R Doomun
Ahmed Ben Jmaa, Walid Mahdi, Yousra Ben Jemaa, Abdelmajid Ben Hamadou
A new approach for digit recognition based on hand gesture analysis
8 Pages, International Journal of Computer Science and Information Security
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present in this paper a new approach for hand gesture analysis that allows digit recognition. The analysis is based on extracting a set of features from a hand image and then combining them by using an induction graph. The most important features we extract from each image are the fingers locations, their heights and the distance between each pair of fingers. Our approach consists of three steps: (i) Hand detection and localization, (ii) fingers extraction and (iii) features identification and combination to digit recognition. Each input image is assumed to contain only one person, thus we apply a fuzzy classifier to identify the skin pixels. In the finger extraction step, we attempt to remove all the hand components except the fingers, this process is based on the hand anatomy properties. The final step consists on representing histogram of the detected fingers in order to extract features that will be used for digit recognition. The approach is invariant to scale, rotation and translation of the hand. Some experiments have been undertaken to show the effectiveness of the proposed approach.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 04:46:23 GMT" } ]
2009-06-30T00:00:00
[ [ "Jmaa", "Ahmed Ben", "" ], [ "Mahdi", "Walid", "" ], [ "Jemaa", "Yousra Ben", "" ], [ "Hamadou", "Abdelmajid Ben", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0906.5040
Chendong Li
Chendong Li
Towards the Patterns of Hard CSPs with Association Rule Mining
10 pages, 3 figures, submitted to ICDM'09
null
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The hardness of finite domain Constraint Satisfaction Problems (CSPs) is a very important research area in Constraint Programming (CP) community. However, this problem has not yet attracted much attention from the researchers in the association rule mining community. As a popular data mining technique, association rule mining has an extremely wide application area and it has already been successfully applied to many interdisciplines. In this paper, we study the association rule mining techniques and propose a cascaded approach to extract the interesting patterns of the hard CSPs. As far as we know, this problem is investigated with the data mining techniques for the first time. Specifically, we generate the random CSPs and collect their characteristics by solving all the CSP instances, and then apply the data mining techniques on the data set and further to discover the interesting patterns of the hardness of the randomly generated CSPs
[ { "version": "v1", "created": "Sat, 27 Jun 2009 05:11:48 GMT" } ]
2009-06-30T00:00:00
[ [ "Li", "Chendong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.5050
Leah Epstein
Leah Epstein and Asaf Levin
AFPTAS results for common variants of bin packing: A new method to handle the small items
null
SIAM Journal on Optimization 20(6): 3121-3145 (2010)
10.1137/090767613
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider two well-known natural variants of bin packing, and show that these packing problems admit asymptotic fully polynomial time approximation schemes (AFPTAS). In bin packing problems, a set of one-dimensional items of size at most 1 is to be assigned (packed) to subsets of sum at most 1 (bins). It has been known for a while that the most basic problem admits an AFPTAS. In this paper, we develop methods that allow to extend this result to other variants of bin packing. Specifically, the problems which we study in this paper, for which we design asymptotic fully polynomial time approximation schemes, are the following. The first problem is "Bin packing with cardinality constraints", where a parameter k is given, such that a bin may contain up to k items. The goal is to minimize the number of bins used. The second problem is "Bin packing with rejection", where every item has a rejection penalty associated with it. An item needs to be either packed to a bin or rejected, and the goal is to minimize the number of used bins plus the total rejection penalty of unpacked items. This resolves the complexity of two important variants of the bin packing problem. Our approximation schemes use a novel method for packing the small items. This new method is the core of the improved running times of our schemes over the running times of the previous results, which are only asymptotic polynomial time approximation schemes (APTAS).
[ { "version": "v1", "created": "Sat, 27 Jun 2009 08:39:18 GMT" } ]
2012-02-16T00:00:00
[ [ "Epstein", "Leah", "" ], [ "Levin", "Asaf", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.5051
Leah Epstein
Leah Epstein and Asaf Levin
Bin packing with general cost structures
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Following the work of Anily et al., we consider a variant of bin packing, called "bin packing with general cost structures" (GCBP) and design an asymptotic fully polynomial time approximation scheme (AFPTAS) for this problem. In the classic bin packing problem, a set of one-dimensional items is to be assigned to subsets of total size at most 1, that is, to be packed into unit sized bins. However, in GCBP, the cost of a bin is not 1 as in classic bin packing, but it is a non-decreasing and concave function of the number of items packed in it, where the cost of an empty bin is zero. The construction of the AFPTAS requires novel techniques for dealing with small items, which are developed in this work. In addition, we develop a fast approximation algorithm which acts identically for all non-decreasing and concave functions, and has an asymptotic approximation ratio of 1.5 for all functions simultaneously.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 19:48:10 GMT" } ]
2009-06-30T00:00:00
[ [ "Epstein", "Leah", "" ], [ "Levin", "Asaf", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.5060
R Doomun
Prof. Dhananjay R. Kalbande, Dr. G. T. Thampi, Mr. Manish Singh
Incidence Handling and Response System
8 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A computer network can be attacked in a number of ways. The security-related threats have become not only numerous but also diverse and they may also come in the form of blended attacks. It becomes difficult for any security system to block all types of attacks. This gives rise to the need of an incidence handling capability which is necessary for rapidly detecting incidents, minimizing loss and destruction, mitigating the weaknesses that were exploited and restoring the computing services. Incidence response has always been an important aspect of information security but it is often overlooked by security administrators. in this paper, we propose an automated system which will handle the security threats and make the computer network capable enough to withstand any kind of attack. we also present the state-of-the-art technology in computer, network and software which is required to build such a system.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 10:10:18 GMT" } ]
2009-06-30T00:00:00
[ [ "Kalbande", "Prof. Dhananjay R.", "" ], [ "Thampi", "Dr. G. T.", "" ], [ "Singh", "Mr. Manish", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.5062
Simant Dube
Simant Dube
Geometrical Interpretation of the Master Theorem for Divide-and-conquer Recurrences
11 pages, 6 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide geometrical interpretation of the Master Theorem to solve divide-and-conquer recurrences. We show how different cases of the recurrences correspond to different kinds of fractal images. Fractal dimension and Hausdorff measure are shown to be closely related to the solution of such recurrences.
[ { "version": "v1", "created": "Mon, 29 Jun 2009 04:43:17 GMT" }, { "version": "v2", "created": "Wed, 1 Jul 2009 10:34:53 GMT" } ]
2016-09-08T00:00:00
[ [ "Dube", "Simant", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.5070
R Doomun
R. Thamilselvan, Dr. P. Balasubramanie
Integrating Genetic Algorithm, Tabu Search Approach for Job Shop Scheduling
6 pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new algorithm based on integrating Genetic Algorithms and Tabu Search methods to solve the Job Shop Scheduling problem. The idea of the proposed algorithm is derived from Genetic Algorithms. Most of the scheduling problems require either exponential time or space to generate an optimal answer. Job Shop scheduling (JSS) is the general scheduling problem and it is a NP-complete problem, but it is difficult to find the optimal solution. This paper applies Genetic Algorithms and Tabu Search for Job Shop Scheduling problem and compares the results obtained by each. With the implementation of our approach the JSS problems reaches optimal solution and minimize the makespan.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 11:16:30 GMT" } ]
2009-06-30T00:00:00
[ [ "Thamilselvan", "R.", "" ], [ "Balasubramanie", "Dr. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0906.5073
R Doomun
R. Avudaiammal, R. SivaSubramanian, R.Pandian, P. Seethalakshmi
TTSS Packet Classification Algorithm to enhance Multimedia Applications in Network Processor based Router
6 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objective of this paper is to implement the Trie based Tuple Space Search(TTSS) packet classification algorithm for Network Processor(NP) based router to enhance multimedia applications. The performance is evaluated using Intel IXP2400 NP Simulator. The results demonstrate that, TTSS has better performance than Tuple Space Search algorithm and is well suited to achieve high speed packet classification to support multimedia applications.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 11:59:15 GMT" } ]
2009-06-30T00:00:00
[ [ "Avudaiammal", "R.", "" ], [ "SivaSubramanian", "R.", "" ], [ "Pandian", "R.", "" ], [ "Seethalakshmi", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0906.5089
David Fern\'andez-Baca
Mukul S. Bansal, Jianrong Dong, David Fern\'andez-Baca
Comparing and Aggregating Partially Resolved Trees
34 pages
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define, analyze, and give efficient algorithms for two kinds of distance measures for rooted and unrooted phylogenies. For rooted trees, our measures are based on the topologies the input trees induce on triplets; that is, on three-element subsets of the set of species. For unrooted trees, the measures are based on quartets (four-element subsets). Triplet and quartet-based distances provide a robust and fine-grained measure of the similarities between trees. The distinguishing feature of our distance measures relative to traditional quartet and triplet distances is their ability to deal cleanly with the presence of unresolved nodes, also called polytomies. For rooted trees, these are nodes with more than two children; for unrooted trees, they are nodes of degree greater than three. Our first class of measures are parametric distances, where there is a parameter that weighs the difference between an unresolved triplet/quartet topology and a resolved one. Our second class of measures are based on Hausdorff distance. Each tree is viewed as a set of all possible ways in which the tree could be refined to eliminate unresolved nodes. The distance between the original (unresolved) trees is then taken to be the Hausdorff distance between the associated sets of fully resolved trees, where the distance between trees in the sets is the triplet or quartet distance, as appropriate.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 15:56:42 GMT" } ]
2009-06-30T00:00:00
[ [ "Bansal", "Mukul S.", "" ], [ "Dong", "Jianrong", "" ], [ "Fernández-Baca", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0906.5106
Shmuel Onn
Raymond Hemmecke, Shmuel Onn, Robert Weismantel
Multicommodity Flow in Polynomial Time
null
Optimization Letters, 5:13--25, 2011
null
null
math.CO cs.DM cs.DS math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The multicommodity flow problem is NP-hard already for two commodities over bipartite graphs. Nonetheless, using our recent theory of n-fold integer programming and extensions developed herein, we are able to establish the surprising polynomial time solvability of the problem in two broad situations.
[ { "version": "v1", "created": "Sun, 28 Jun 2009 23:56:05 GMT" }, { "version": "v2", "created": "Mon, 13 Jul 2009 14:29:56 GMT" } ]
2011-01-18T00:00:00
[ [ "Hemmecke", "Raymond", "" ], [ "Onn", "Shmuel", "" ], [ "Weismantel", "Robert", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0906.5110
Susmit Jha
Susmit Jha
Statistical Analysis of Privacy and Anonymity Guarantees in Randomized Security Protocol Implementations
null
null
null
null
cs.CR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security protocols often use randomization to achieve probabilistic non-determinism. This non-determinism, in turn, is used in obfuscating the dependence of observable values on secret data. Since the correctness of security protocols is very important, formal analysis of security protocols has been widely studied in literature. Randomized security protocols have also been analyzed using formal techniques such as process-calculi and probabilistic model checking. In this paper, we consider the problem of validating implementations of randomized protocols. Unlike previous approaches which treat the protocol as a white-box, our approach tries to verify an implementation provided as a black box. Our goal is to infer the secrecy guarantees provided by a security protocol through statistical techniques. We learn the probabilistic dependency of the observable outputs on secret inputs using Bayesian network. This is then used to approximate the leakage of secret. In order to evaluate the accuracy of our statistical approach, we compare our technique with the probabilistic model checking technique on two examples: crowds protocol and dining crypotgrapher's protocol.
[ { "version": "v1", "created": "Sat, 27 Jun 2009 23:24:14 GMT" } ]
2009-06-30T00:00:00
[ [ "Jha", "Susmit", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.5112
Javaid Aslam
Javaid Aslam
Response to Refutation of Aslam's Proof that NP = P
Total 9 pages, including the figures. Have further minimized the overlap, with only references to the main paper
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides a further refinement to the previous response by introducing new structures and algorithms for counting VMPs of common \emph{Edge Requirement} (ER) and hence for counting the perfect matchings.
[ { "version": "v1", "created": "Sun, 28 Jun 2009 16:07:06 GMT" }, { "version": "v2", "created": "Fri, 23 Jan 2015 20:54:52 GMT" }, { "version": "v3", "created": "Sun, 15 Mar 2015 00:58:51 GMT" }, { "version": "v4", "created": "Sat, 7 Oct 2017 03:38:30 GMT" } ]
2017-10-10T00:00:00
[ [ "Aslam", "Javaid", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0906.5114
Hal Daum\'e III
Hal Daum\'e III
Non-Parametric Bayesian Areal Linguistics
null
Proceedings of the Conference of the North American Association for Computational Linguistics, 2009
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a statistical model over linguistic areas and phylogeny. Our model recovers known areas and identifies a plausible hierarchy of areal features. The use of areas improves genetic reconstruction of languages both qualitatively and quantitatively according to a variety of metrics. We model linguistic areas by a Pitman-Yor process and linguistic phylogeny by Kingman's coalescent.
[ { "version": "v1", "created": "Sun, 28 Jun 2009 02:32:53 GMT" } ]
2009-06-30T00:00:00
[ [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0906.5119
Arnaud Martin
Arnaud Martin (E3I2), Christophe Osswald (E3I2), Jean Dezert (ONERA), Florentin Smarandache (UNM)
General combination rules for qualitative and quantitative beliefs
null
Journal of Advances in Information Fusion 3, 2 (2008) 67-89
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Martin and Osswald \cite{Martin07} have recently proposed many generalizations of combination rules on quantitative beliefs in order to manage the conflict and to consider the specificity of the responses of the experts. Since the experts express themselves usually in natural language with linguistic labels, Smarandache and Dezert \cite{Li07} have introduced a mathematical framework for dealing directly also with qualitative beliefs. In this paper we recall some element of our previous works and propose the new combination rules, developed for the fusion of both qualitative or quantitative beliefs.
[ { "version": "v1", "created": "Sun, 28 Jun 2009 08:09:04 GMT" } ]
2009-06-30T00:00:00
[ [ "Martin", "Arnaud", "", "E3I2" ], [ "Osswald", "Christophe", "", "E3I2" ], [ "Dezert", "Jean", "", "ONERA" ], [ "Smarandache", "Florentin", "", "UNM" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.5120
Arnaud Martin
Jean Dezert (ONERA), Arnaud Martin (E3I2), Florentin Smarandache (UNM)
Comments on "A new combination of evidence based on compromise" by K. Yamada
null
Fuzzy Sets and Systems 160, 6 (2009) 853-855
null
null
cs.CV cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Comments on ``A new combination of evidence based on compromise'' by K. Yamada
[ { "version": "v1", "created": "Sun, 28 Jun 2009 08:10:33 GMT" } ]
2009-06-30T00:00:00
[ [ "Dezert", "Jean", "", "ONERA" ], [ "Martin", "Arnaud", "", "E3I2" ], [ "Smarandache", "Florentin", "", "UNM" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.5123
R Doomun
Poonam Garg
Cryptanalysis of SDES via evolutionary computation techniques
7 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS May 2009 Issue, Vol. 1, No. 1
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The cryptanalysis of simplified data encryption standard can be formulated as NP-Hard combinatorial problem. The goal of this paper is two fold. First we want to make a study about how evolutionary computation techniques can efficiently solve the NP-Hard combinatorial problem. For achieving this goal we test several evolutionary computation techniques like memetic algorithm, genetic algorithm and simulated annealing for the cryptanalysis of simplified data encryption standard problem (SDES). And second was a comparison between memetic algorithm, genetic algorithm and simulated annealing were made in order to investigate the performance for the cryptanalysis on SDES. The methods were tested and extensive computational results show that memetic algorithm performs better than genetic algorithms and simulated annealing for such type of NP-Hard combinatorial problem. This paper represents our first effort toward efficient memetic algorithm for the cryptanalysis of SDES.
[ { "version": "v1", "created": "Sun, 28 Jun 2009 09:29:04 GMT" } ]
2009-06-30T00:00:00
[ [ "Garg", "Poonam", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0906.5131
Oded Kafri
Oded Kafri
A Comment on Nonextensive Statistical Mechanics
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is a conception that Boltzmann-Gibbs statistics cannot yield the long tail distribution. This is the justification for the intensive research of nonextensive entropies (i.e. Tsallis entropy and others). Here the error that caused this misconception is explained and it is shown that a long tail distribution exists in equilibrium thermodynamics for more than a century.
[ { "version": "v1", "created": "Sun, 28 Jun 2009 11:24:03 GMT" }, { "version": "v2", "created": "Tue, 30 Jun 2009 06:33:24 GMT" } ]
2009-06-30T00:00:00
[ [ "Kafri", "Oded", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.5148
Tijl De Bie
Tijl De Bie
Explicit probabilistic models for databases and networks
Submitted
null
null
null
cs.AI cs.DB cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent work in data mining and related areas has highlighted the importance of the statistical assessment of data mining results. Crucial to this endeavour is the choice of a non-trivial null model for the data, to which the found patterns can be contrasted. The most influential null models proposed so far are defined in terms of invariants of the null distribution. Such null models can be used by computation intensive randomization approaches in estimating the statistical significance of data mining results. Here, we introduce a methodology to construct non-trivial probabilistic models based on the maximum entropy (MaxEnt) principle. We show how MaxEnt models allow for the natural incorporation of prior information. Furthermore, they satisfy a number of desirable properties of previously introduced randomization approaches. Lastly, they also have the benefit that they can be represented explicitly. We argue that our approach can be used for a variety of data types. However, for concreteness, we have chosen to demonstrate it in particular for databases and networks.
[ { "version": "v1", "created": "Mon, 29 Jun 2009 07:55:41 GMT" } ]
2009-06-30T00:00:00
[ [ "De Bie", "Tijl", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.5151
Hal Daum\'e III
Hal Daum\'e III
Unsupervised Search-based Structured Prediction
null
Proceedings of the International Conference on Machine Learning, 2009
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an adaptation and application of a search-based structured prediction algorithm "Searn" to unsupervised learning problems. We show that it is possible to reduce unsupervised learning to supervised learning and demonstrate a high-quality unsupervised shift-reduce parsing model. We additionally show a close connection between unsupervised Searn and expectation maximization. Finally, we demonstrate the efficacy of a semi-supervised extension. The key idea that enables this is an application of the predict-self idea for unsupervised learning.
[ { "version": "v1", "created": "Sun, 28 Jun 2009 17:47:22 GMT" } ]
2009-06-30T00:00:00
[ [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0906.5181
Serguei Mokhov
Serguei A. Mokhov, Joey Paquet, and Mourad Debbabi
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid
18 pages, 3 figures, 7 listings, TOC, index; this article closely relates to arXiv:0906.0049 and arXiv:0904.3789 but to remain stand-alone repeats some of the background and introductory content; abstract presented at HSC'09 and the full updated paper at ICDF2C'11. This is an updated/edited version after ICDF2C proceedings with more references and corrections
S. A. Mokhov, J. Paquet, and M. Debbabi. Reasoning about a simulated printer case investigation with Forensic Lucid. In P. Gladyshev and M. K. Rogers, editors, Proceedings of ICDF2C'11, number 0088 in LNICST, pp. 282-296. Springer, 2012
10.1007/978-3-642-35515-8_23
null
cs.LO cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we model the ACME (a fictitious company name) "printer case incident" and make its specification in Forensic Lucid, a Lucid- and intensional-logic-based programming language for cyberforensic analysis and event reconstruction specification. The printer case involves a dispute between two parties that was previously solved using the finite-state automata (FSA) approach, and is now re-done in a more usable way in Forensic Lucid. Our simulation is based on the said case modeling by encoding concepts like evidence and the related witness accounts as an evidential statement context in a Forensic Lucid program, which is an input to the transition function that models the possible deductions in the case. We then invoke the transition function (actually its reverse) with the evidential statement context to see if the evidence we encoded agrees with one's claims and then attempt to reconstruct the sequence of events that may explain the claim or disprove it.
[ { "version": "v1", "created": "Mon, 29 Jun 2009 00:06:22 GMT" }, { "version": "v2", "created": "Thu, 26 Apr 2012 09:41:26 GMT" } ]
2013-09-17T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "Paquet", "Joey", "" ], [ "Debbabi", "Mourad", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.5202
Patrick J. Wolfe
Daniel Rudoy, Prabahan Basu, and Patrick J. Wolfe
Superposition frames for adaptive time-frequency analysis and fast reconstruction
16 pages, 6 figures; revised version
IEEE Transactions on Signal Processing, vol. 58, pp. 2581-2596, 2010
10.1109/TSP.2010.2041604
null
math.NA cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we introduce a broad family of adaptive, linear time-frequency representations termed superposition frames, and show that they admit desirable fast overlap-add reconstruction properties akin to standard short-time Fourier techniques. This approach stands in contrast to many adaptive time-frequency representations in the extant literature, which, while more flexible than standard fixed-resolution approaches, typically fail to provide efficient reconstruction and often lack the regular structure necessary for precise frame-theoretic analysis. Our main technical contributions come through the development of properties which ensure that this construction provides for a numerically stable, invertible signal representation. Our primary algorithmic contributions come via the introduction and discussion of specific signal adaptation criteria in deterministic and stochastic settings, based respectively on time-frequency concentration and nonstationarity detection. We conclude with a short speech enhancement example that serves to highlight potential applications of our approach.
[ { "version": "v1", "created": "Mon, 29 Jun 2009 19:49:30 GMT" }, { "version": "v2", "created": "Tue, 3 Nov 2009 18:52:23 GMT" } ]
2010-04-20T00:00:00
[ [ "Rudoy", "Daniel", "" ], [ "Basu", "Prabahan", "" ], [ "Wolfe", "Patrick J.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0906.5233
Toby Walsh
George Katsirelos, Sebastian Maneth, Nina Narodytska, Toby Walsh
Restricted Global Grammar Constraints
Proceedings of the 15th International Conference on Principles and Practice of Constraint Programming, Lisbon, Portugal. September 2009
null
null
null
cs.AI cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the global GRAMMAR constraint over restricted classes of context free grammars like deterministic and unambiguous context-free grammars. We show that detecting disentailment for the GRAMMAR constraint in these cases is as hard as parsing an unrestricted context free grammar.We also consider the class of linear grammars and give a propagator that runs in quadratic time. Finally, to demonstrate the use of linear grammars, we show that a weighted linear GRAMMAR constraint can efficiently encode the EDITDISTANCE constraint, and a conjunction of the EDITDISTANCE constraint and the REGULAR constraint
[ { "version": "v1", "created": "Mon, 29 Jun 2009 09:23:39 GMT" } ]
2009-06-30T00:00:00
[ [ "Katsirelos", "George", "" ], [ "Maneth", "Sebastian", "" ], [ "Narodytska", "Nina", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0906.5278
Nikolaos Vasiloglou
Nikolaos Vasiloglou and Petros Maragos
Spectrum of Fractal Interpolation Functions
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we compute the Fourier spectrum of the Fractal Interpolation Functions FIFs as introduced by Michael Barnsley. We show that there is an analytical way to compute them. In this paper we attempt to solve the inverse problem of FIF by using the spectrum
[ { "version": "v1", "created": "Mon, 29 Jun 2009 14:43:15 GMT" } ]
2009-06-30T00:00:00
[ [ "Vasiloglou", "Nikolaos", "" ], [ "Maragos", "Petros", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.5286
Yifan Hu
Emden Gansner, Yifan Hu, Stephen Kobourov, Chris Volinsky
Putting Recommendations on the Map -- Visualizing Clusters and Relations
8 pages
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For users, recommendations can sometimes seem odd or counterintuitive. Visualizing recommendations can remove some of this mystery, showing how a recommendation is grouped with other choices. A drawing can also lead a user's eye to other options. Traditional 2D-embeddings of points can be used to create a basic layout, but these methods, by themselves, do not illustrate clusters and neighborhoods very well. In this paper, we propose the use of geographic maps to enhance the definition of clusters and neighborhoods, and consider the effectiveness of this approach in visualizing similarities and recommendations arising from TV shows and music selections. All the maps referenced in this paper can be found in http://www.research.att.com/~volinsky/maps
[ { "version": "v1", "created": "Mon, 29 Jun 2009 15:00:43 GMT" } ]
2009-06-30T00:00:00
[ [ "Gansner", "Emden", "" ], [ "Hu", "Yifan", "" ], [ "Kobourov", "Stephen", "" ], [ "Volinsky", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0906.5289
Doron Ezri
Doron Ezri and Shimi Shilo
Green Cellular - Optimizing the Cellular Network for Minimal Emission from Mobile Stations
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless systems, which include cellular phones, have become an essential part of the modern life. However the mounting evidence that cellular radiation might adversely affect the health of its users, leads to a growing concern among authorities and the general public. Radiating antennas in the proximity of the user, such as antennas of mobile phones are of special interest for this matter. In this paper we suggest a new architecture for wireless networks, aiming at minimal emission from mobile stations, without any additional radiation sources. The new architecture, dubbed Green Cellular, abandons the classical transceiver base station design and suggests the augmentation of transceiver base stations with receive only devices. These devices, dubbed Green Antennas, are not aiming at coverage extension but rather at minimizing the emission from mobile stations. We discuss the implications of the Green Cellular architecture on 3G and 4G cellular technologies. We conclude by showing that employing the Green Cellular approach may lead to a significant decrease in the emission from mobile stations, especially in indoor scenarios. This is achieved without exposing the user to any additional radiation source.
[ { "version": "v1", "created": "Mon, 29 Jun 2009 15:03:35 GMT" } ]
2009-06-30T00:00:00
[ [ "Ezri", "Doron", "" ], [ "Shilo", "Shimi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.5325
Nicholas Mastronarde
Nicholas Mastronarde and Mihaela van der Schaar
Online Reinforcement Learning for Dynamic Multimedia Systems
35 pages, 11 figures, 10 tables
IEEE Trans. on Image Processing, vol. 19, no. 2, pp. 290-305, Feb. 2010
10.1109/TIP.2009.2035228
null
cs.LG cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In our previous work, we proposed a systematic cross-layer framework for dynamic multimedia systems, which allows each layer to make autonomous and foresighted decisions that maximize the system's long-term performance, while meeting the application's real-time delay constraints. The proposed solution solved the cross-layer optimization offline, under the assumption that the multimedia system's probabilistic dynamics were known a priori. In practice, however, these dynamics are unknown a priori and therefore must be learned online. In this paper, we address this problem by allowing the multimedia system layers to learn, through repeated interactions with each other, to autonomously optimize the system's long-term performance at run-time. We propose two reinforcement learning algorithms for optimizing the system under different design constraints: the first algorithm solves the cross-layer optimization in a centralized manner, and the second solves it in a decentralized manner. We analyze both algorithms in terms of their required computation, memory, and inter-layer communication overheads. After noting that the proposed reinforcement learning algorithms learn too slowly, we introduce a complementary accelerated learning algorithm that exploits partial knowledge about the system's dynamics in order to dramatically improve the system's performance. In our experiments, we demonstrate that decentralized learning can perform as well as centralized learning, while enabling the layers to act autonomously. Additionally, we show that existing application-independent reinforcement learning algorithms, and existing myopic learning algorithms deployed in multimedia systems, perform significantly worse than our proposed application-aware and foresighted learning methods.
[ { "version": "v1", "created": "Mon, 29 Jun 2009 17:48:40 GMT" } ]
2013-06-06T00:00:00
[ [ "Mastronarde", "Nicholas", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0906.5339
Salah A. Aly
Salah A. Aly
Asymmetric Quantum Cyclic Codes
null
null
null
null
cs.IT cs.MS math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is recently conjectured in quantum information processing that phase-shift errors occur with high probability than qubit-flip errors, hence the former is more disturbing to quantum information than the later one. This leads us to construct asymmetric quantum error controlling codes to protect quantum information over asymmetric channels, $\Pr Z \geq \Pr X$. In this paper we present two generic methods to derive asymmetric quantum cyclic codes using the generator polynomials and defining sets of classical cyclic codes. Consequently, the methods allow us to construct several families of asymmetric quantum BCH, RS, and RM codes. Finally, the methods are used to construct families of asymmetric subsystem codes.
[ { "version": "v1", "created": "Mon, 29 Jun 2009 19:37:12 GMT" }, { "version": "v2", "created": "Mon, 30 Nov 2009 03:03:56 GMT" } ]
2009-11-30T00:00:00
[ [ "Aly", "Salah A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0906.5393
R Doomun
Nasir Mahmood Malik, Arif Mushtaq, Samina Khalid, Tehmina Khalil, Faisal Munir Malik
Measurable & Scalable NFRs using Fuzzy Logic and Likert Scale
5 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most of the research related to Non Functional Requirements (NFRs) have presented NFRs frameworks by integrating non functional requirements with functional requirements while we proposed that measurement of NFRs is possible e.g. cost and performance and NFR like usability can be scaled. Our novel hybrid approach integrates three things rather than two i.e. Functional Requirements (FRs), Measurable NFRs (M-NFRs) and Scalable NFRs (S-NFRs). We have also found the use of Fuzzy Logic and Likert Scale effective for handling of discretely measurable as well as scalable NFRs as these techniques can provide a simple way to arrive at a discrete or scalable NFR in contrast to vague, ambiguous, imprecise, noisy or missing NFR. Our approach can act as baseline for new NFR and aspect oriented frameworks by using all types of UML diagrams.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 01:22:27 GMT" } ]
2009-07-01T00:00:00
[ [ "Malik", "Nasir Mahmood", "" ], [ "Mushtaq", "Arif", "" ], [ "Khalid", "Samina", "" ], [ "Khalil", "Tehmina", "" ], [ "Malik", "Faisal Munir", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.5394
Salman Avestimehr
Salman Avestimehr, Suhas Diggavi, and David Tse
Wireless Network Information Flow: A Deterministic Approach
To appear in IEEE transactions on Information Theory, Vol 57, No 4, April 2011
null
10.1109/TIT.2011.2110110
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a wireless network with a single source and a single destination and an arbitrary number of relay nodes, what is the maximum rate of information flow achievable? We make progress on this long standing problem through a two-step approach. First we propose a deterministic channel model which captures the key wireless properties of signal strength, broadcast and superposition. We obtain an exact characterization of the capacity of a network with nodes connected by such deterministic channels. This result is a natural generalization of the celebrated max-flow min-cut theorem for wired networks. Second, we use the insights obtained from the deterministic analysis to design a new quantize-map-and-forward scheme for Gaussian networks. In this scheme, each relay quantizes the received signal at the noise level and maps it to a random Gaussian codeword for forwarding, and the final destination decodes the source's message based on the received signal. We show that, in contrast to existing schemes, this scheme can achieve the cut-set upper bound to within a gap which is independent of the channel parameters. In the case of the relay channel with a single relay as well as the two-relay Gaussian diamond network, the gap is 1 bit/s/Hz. Moreover, the scheme is universal in the sense that the relays need no knowledge of the values of the channel parameters to (approximately) achieve the rate supportable by the network. We also present extensions of the results to multicast networks, half-duplex networks and ergodic networks.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 01:36:20 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2009 04:58:34 GMT" }, { "version": "v3", "created": "Thu, 3 Jun 2010 02:37:03 GMT" }, { "version": "v4", "created": "Thu, 16 Sep 2010 18:45:41 GMT" }, { "version": "v5", "created": "Sun, 26 Sep 2010 18:49:41 GMT" }, { "version": "v6", "created": "Fri, 3 Dec 2010 02:42:15 GMT" }, { "version": "v7", "created": "Fri, 25 Feb 2011 16:11:03 GMT" } ]
2016-11-18T00:00:00
[ [ "Avestimehr", "Salman", "" ], [ "Diggavi", "Suhas", "" ], [ "Tse", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.5397
Juyul Lee
Juyul Lee and Nihar Jindal
Asymptotically Optimal Policies for Hard-deadline Scheduling over Fading Channels
24 pages, 9 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A hard-deadline, opportunistic scheduling problem in which $B$ bits must be transmitted within $T$ time-slots over a time-varying channel is studied: the transmitter must decide how many bits to serve in each slot based on knowledge of the current channel but without knowledge of the channel in future slots, with the objective of minimizing expected transmission energy. In order to focus on the effects of delay and fading, we assume that no other packets are scheduled simultaneously and no outage is considered. We also assume that the scheduler can transmit at capacity where the underlying noise channel is Gaussian such that the energy-bit relation is a Shannon-type exponential function. No closed form solution for the optimal policy is known for this problem, which is naturally formulated as a finite-horizon dynamic program, but three different policies are shown to be optimal in the limiting regimes where $T$ is fixed and $B$ is large, $T$ is fixed and $B$ is small, and where $B$ and $T$ are simultaneously taken to infinity. In addition, the advantage of optimal scheduling is quantified relative to a non-opportunistic (i.e., channel-blind) equal-bit policy.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 02:00:23 GMT" } ]
2009-07-01T00:00:00
[ [ "Lee", "Juyul", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0906.5418
Salvatore Mele
Anne Gentil-Beccot, Salvatore Mele, Travis Brooks
Citing and Reading Behaviours in High-Energy Physics. How a Community Stopped Worrying about Journals and Learned to Love Repositories
Version to be published in Scientometrics
null
null
CERN-OPEN-2009-012, SLAC-PUB-13693
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Contemporary scholarly discourse follows many alternative routes in addition to the three-century old tradition of publication in peer-reviewed journals. The field of High- Energy Physics (HEP) has explored alternative communication strategies for decades, initially via the mass mailing of paper copies of preliminary manuscripts, then via the inception of the first online repositories and digital libraries. This field is uniquely placed to answer recurrent questions raised by the current trends in scholarly communication: is there an advantage for scientists to make their work available through repositories, often in preliminary form? Is there an advantage to publishing in Open Access journals? Do scientists still read journals or do they use digital repositories? The analysis of citation data demonstrates that free and immediate online dissemination of preprints creates an immense citation advantage in HEP, whereas publication in Open Access journals presents no discernible advantage. In addition, the analysis of clickstreams in the leading digital library of the field shows that HEP scientists seldom read journals, preferring preprints instead.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 16:45:04 GMT" }, { "version": "v2", "created": "Wed, 25 Nov 2009 09:58:08 GMT" } ]
2009-11-25T00:00:00
[ [ "Gentil-Beccot", "Anne", "" ], [ "Mele", "Salvatore", "" ], [ "Brooks", "Travis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0906.5446
Tom Hirschowitz
Daniel Hirschkoff (LIP), Aur\'elien Pardon (LIP), Tom Hirschowitz (LAMA), Samuel Hym (LIFL), Damien Pous (INRIA Rh\^one-Alpes / LIG Laboratoire d'Informatique de Grenoble)
Encapsulation and Dynamic Modularity in the Pi-Calculus
null
PLACES 2008, Oslo : Norv\`ege (2008)
10.1016/j.entcs.2009.06.005
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a process calculus featuring high level constructs for component-oriented programming in a distributed setting. We propose an extension of the higher-order pi-calculus intended to capture several important mechanisms related to component-based programming, such as dynamic update, reconfiguration and code migration. In this paper, we are primarily concerned with the possibility to build a distributed implementation of our calculus. Accordingly, we define a low-level calculus, that describes how the high-level constructs are implemented, as well as details of the data structures manipulated at runtime. We also discuss current and future directions of research in relation to our analysis of component-based programming.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 09:16:03 GMT" } ]
2009-09-04T00:00:00
[ [ "Hirschkoff", "Daniel", "", "LIP" ], [ "Pardon", "Aurélien", "", "LIP" ], [ "Hirschowitz", "Tom", "", "LAMA" ], [ "Hym", "Samuel", "", "LIFL" ], [ "Pous", "Damien", "", "INRIA Rhône-Alpes / LIG Laboratoire\n d'Informatique de Grenoble" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0906.5450
Sk Sarif Hassan s
Pabitra Pal Choudhury, Sk. Sarif Hassan, Sudhakar Sahoo, Birendra Kumar Nayak
Theory of Rule 6 and its Application to Round Robin Tournament
Related to Scheduling Problems
null
null
null
cs.DM cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we have used one 2 variable Boolean function called Rule 6 to define another beautiful transformation named as Extended Rule-6. Using this function we have explored the algebraic beauties and its application to an efficient Round Robin Tournament (RRT) routine for 2k (k is any natural number) number of teams. At the end, we have thrown some light towards any number of teams of the form nk where n, k are natural numbers.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 09:34:07 GMT" } ]
2009-07-01T00:00:00
[ [ "Choudhury", "Pabitra Pal", "" ], [ "Hassan", "Sk. Sarif", "" ], [ "Sahoo", "Sudhakar", "" ], [ "Nayak", "Birendra Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0906.5475
Yong-Hyuk Kim
Yong-Hyuk Kim and Yourim Yoon
A Note on Mathematical Modelling of Practical Multicampaign Assignment and Its Computational Complexity
14 pages, 1 figure
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), pages 94-98, 2010
null
null
cs.CC cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within personalized marketing, a recommendation issue known as multicampaign assignment is to overcome a critical problem, known as the multiple recommendation problem which occurs when running several personalized campaigns simultaneously. This paper mainly deals with the hardness of multicampaign assignment, which is treated as a very challenging problem in marketing. The objective in this problem is to find a customer-campaign matrix which maximizes the effectiveness of multiple campaigns under some constraints. We present a realistic response suppression function, which is designed to be more practical, and explain how this can be learned from historical data. Moreover, we provide a proof that this more realistic version of the problem is NP-hard, thus justifying to use of heuristics presented in previous work.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 13:53:03 GMT" } ]
2010-05-04T00:00:00
[ [ "Kim", "Yong-Hyuk", "" ], [ "Yoon", "Yourim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0906.5485
Markus Ojala
Markus Ojala, Gemma C. Garriga, Aristides Gionis, Heikki Mannila
Query Significance in Databases via Randomizations
10 pages
null
null
null
cs.DB cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many sorts of structured data are commonly stored in a multi-relational format of interrelated tables. Under this relational model, exploratory data analysis can be done by using relational queries. As an example, in the Internet Movie Database (IMDb) a query can be used to check whether the average rank of action movies is higher than the average rank of drama movies. We consider the problem of assessing whether the results returned by such a query are statistically significant or just a random artifact of the structure in the data. Our approach is based on randomizing the tables occurring in the queries and repeating the original query on the randomized tables. It turns out that there is no unique way of randomizing in multi-relational data. We propose several randomization techniques, study their properties, and show how to find out which queries or hypotheses about our data result in statistically significant information. We give results on real and generated data and show how the significance of some queries vary between different randomizations.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 14:08:19 GMT" } ]
2009-07-01T00:00:00
[ [ "Ojala", "Markus", "" ], [ "Garriga", "Gemma C.", "" ], [ "Gionis", "Aristides", "" ], [ "Mannila", "Heikki", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0906.5488
Rasmus M{\o}gelberg
Rasmus Ejlers M{\o}gelberg, Alex Simpson
Relational Parametricity for Computational Effects
31 pages, appears in Logical Methods in Computer Science
Logical Methods in Computer Science, Volume 5, Issue 3 (August 9, 2009) lmcs:1113
10.2168/LMCS-5(3:7)2009
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
According to Strachey, a polymorphic program is parametric if it applies a uniform algorithm independently of the type instantiations at which it is applied. The notion of relational parametricity, introduced by Reynolds, is one possible mathematical formulation of this idea. Relational parametricity provides a powerful tool for establishing data abstraction properties, proving equivalences of datatypes, and establishing equalities of programs. Such properties have been well studied in a pure functional setting. Many programs, however, exhibit computational effects, and are not accounted for by the standard theory of relational parametricity. In this paper, we develop a foundational framework for extending the notion of relational parametricity to programming languages with effects.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 11:47:58 GMT" }, { "version": "v2", "created": "Sun, 9 Aug 2009 19:09:56 GMT" } ]
2019-03-14T00:00:00
[ [ "Møgelberg", "Rasmus Ejlers", "" ], [ "Simpson", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0906.5561
Hongyu Lu
Hongyu Lu, Chongguang Wu, Shanglian Bao
An Improved Algorithm based on Shannon-Happ Formula for Calculating Transfer Function from Signal Flow Graph and Its Visualization
null
null
null
null
cs.NA cs.SC
http://creativecommons.org/licenses/by/3.0/
A new method based on Shannon-Happ formula to calculate transfer function from Signal Flow Graph (SFG) is presented. The algorithm provides an explicit approach to get the transfer function in a format with both numerical and symbolic expressions. The adoption of the symbolic variable in SFG, which could represent the nonlinear item or the independent sub-system, is achieved by variable separation approach. An investigation is given for the solutions of several special conditions of SFG. To improve the efficiency of the algorithm, a new technique combined with Johnson method for generating the combinations of the non-touching loops is developed. It uses the previous combinations in lower order to get the ones in higher order. There is an introduction about the visualization of SFG and the subroutines for system performance analysis in the software, AVANT.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 15:47:42 GMT" }, { "version": "v2", "created": "Tue, 20 Oct 2009 07:30:32 GMT" } ]
2009-10-20T00:00:00
[ [ "Lu", "Hongyu", "" ], [ "Wu", "Chongguang", "" ], [ "Bao", "Shanglian", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0906.5596
Saqib Saeed
Zaigham Mehmood, Saqib Saeed
Teaching Quality Assurance and Project Management to Undergraduate Computing Students in Pakistan
This paper was published in the proceedings of 4th International Conference on Business Management and Economics 2008 Turkey
null
null
null
cs.CY cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software Project Management (SPM) and Software Quality Assurance (SQA) are key components of undergraduate Computing programmes at educational establishments in Pakistan. Because of the nature of these subjects, there are a number of issues that need to be discussed and resolved so that the teaching becomes more effective, students learning experience is more enjoyable and their ability to be actively involved in SPM and SQA, after the completion of their studies, becomes further improved. In this paper, we discuss experience of teaching SPM and SQA at one particular institution in Islamabad Pakistan. Using this as a case study, we underline the students perspective, highlight the inherent issues and suggest ways to improve the delivery of these subjects. Since, the issues are mainly generic, the aim is to provide discussion and recommendations to benefit a wider computing community in academia.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 18:22:49 GMT" } ]
2009-07-01T00:00:00
[ [ "Mehmood", "Zaigham", "" ], [ "Saeed", "Saqib", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0906.5608
Saqib Saeed
Saqib Saeed, Christoph Kunz
Loading Arbitrary Knowledge Bases in Matrix Browser
This paper was published in the proceedings of IEEE International Multi Topic Conference (INMIC 2004) Lahore, Pakistan 24th- 26th December 2004
null
null
null
cs.IR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the work done on Matrix Browser, which is a recently developed graphical user interface to explore and navigate complex networked information spaces. This approach presents a new way of navigating information nets in windows explorer like widget. The problem on hand was how to export arbitrary knowledge bases in Matrix Browser. This was achieved by identifying the relationships present in knowledge bases and then by forming the hierarchies from this data and these hierarchies are being exported to matrix browser. This paper gives solution to this problem and informs about implementation work.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 18:42:59 GMT" } ]
2012-05-14T00:00:00
[ [ "Saeed", "Saqib", "" ], [ "Kunz", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0907.0001
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
On weight distributions of perfect colorings and completely regular codes
17pp; partially presented at "Optimal Codes and Related Topics" OC2009, Varna (Bulgaria). V.2: the title was changed (old: "On weight distributions of perfect structures"), Sect.5 "Weight enumerators ..." was added
Des. Codes Cryptogr. 61(3) 2011, 315-329
10.1007/s10623-010-9479-4
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A vertex coloring of a graph is called "perfect" if for any two colors $a$ and $b$, the number of the color-$b$ neighbors of a color-$a$ vertex $x$ does not depend on the choice of $x$, that is, depends only on $a$ and $b$ (the corresponding partition of the vertex set is known as "equitable"). A set of vertices is called "completely regular" if the coloring according to the distance from this set is perfect. By the "weight distribution" of some coloring with respect to some set we mean the information about the number of vertices of every color at every distance from the set. We study the weight distribution of a perfect coloring (equitable partition) of a graph with respect to a completely regular set (in particular, with respect to a vertex if the graph is distance-regular). We show how to compute this distribution by the knowledge of the color composition over the set. For some partial cases of completely regular sets, we derive explicit formulas of weight distributions. Since any (other) completely regular set itself generates a perfect coloring, this gives universal formulas for calculating the weight distribution of any completely regular set from its parameters. In the case of Hamming graphs, we prove a very simple formula for the weight enumerator of an arbitrary perfect coloring. Codewords: completely regular code; equitable partition; partition design; perfect coloring; perfect structure; regular partition; weight distribution; weight enumerator.
[ { "version": "v1", "created": "Tue, 30 Jun 2009 20:04:59 GMT" }, { "version": "v2", "created": "Mon, 2 May 2011 16:53:37 GMT" } ]
2011-08-31T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0002
Denis Krotov
Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia)
On the binary codes with parameters of doubly-shortened 1-perfect codes
12pp
Des. Codes Cryptogr. 57(2) 2010, 181-194
10.1007/s10623-009-9360-5
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that any binary $(n=2^m-3, 2^{n-m}, 3)$ code $C_1$ is a part of an equitable partition (perfect coloring) $\{C_1,C_2,C_3,C_4\}$ of the $n$-cube with the parameters $((0,1,n-1,0)(1,0,n-1,0)(1,1,n-4,2)(0,0,n-1,1))$. Now the possibility to lengthen the code $C_1$ to a 1-perfect code of length $n+2$ is equivalent to the possibility to split the part $C_4$ into two distance-3 codes or, equivalently, to the biparticity of the graph of distances 1 and 2 of $C_4$. In any case, $C_1$ is uniquely embeddable in a twofold 1-perfect code of length $n+2$ with some structural restrictions, where by a twofold 1-perfect code we mean that any vertex of the space is within radius 1 from exactly two codewords.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 19:59:11 GMT" } ]
2010-07-20T00:00:00
[ [ "Krotov", "Denis", "", "Sobolev Institute of Mathematics, Novosibirsk, Russia" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0049
Zhuo Li
Zhuo Li and Lijuan Xing
No More Perfect Codes: Classification of Perfect Quantum Codes
3 pages, no figure
null
null
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We solve the problem of the classification of perfect quantum codes. We prove that the only nontrivial perfect quantum codes are those with the parameters . There exist no other nontrivial perfect quantum codes.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 01:49:15 GMT" } ]
2009-07-05T00:00:00
[ [ "Li", "Zhuo", "" ], [ "Xing", "Lijuan", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0067
R Doomun
Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan
A Novel Two-Staged Decision Support based Threat Evaluation and Weapon Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial Intelligence Techinques
7 Pages, International Journal of Computer Science and Information Security (IJCSIS)
IJCSIS June 2009 Issue, Vol. 2, No. 1
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Surveillance control and reporting (SCR) system for air threats play an important role in the defense of a country. SCR system corresponds to air and ground situation management/processing along with information fusion, communication, coordination, simulation and other critical defense oriented tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR system. In such a system, maximal or near maximal utilization of constrained resources is of extreme importance. Manual TEWA systems cannot provide optimality because of different limitations e.g.surface to air missile (SAM) can fire from a distance of 5Km, but manual TEWA systems are constrained by human vision range and other constraints. Current TEWA systems usually work on target-by-target basis using some type of greedy algorithm thus affecting the optimality of the solution and failing in multi-target scenario. his paper relates to a novel two-staged flexible dynamic decision support based optimal threat evaluation and weapon assignment algorithm for multi-target air-borne threats.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 06:05:22 GMT" } ]
2009-07-02T00:00:00
[ [ "Naeem", "Huma", "" ], [ "Masood", "Asif", "" ], [ "Hussain", "Mukhtar", "" ], [ "Khan", "Shoab A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0075
R Doomun
Hamidreza Mahini, Alireza Mahini, and Javad Ghofrani
XDANNG: XML based Distributed Artificial Neural Network with Globus Toolkit
8 pages, international journal of computer science and information security
IJCSIS June 2009 Issue, Vol. 2 No. 1
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Artificial Neural Network is one of the most common AI application fields. This field has direct and indirect usages most sciences. The main goal of ANN is to imitate biological neural networks for solving scientific problems. But the level of parallelism is the main problem of ANN systems in comparison with biological systems. To solve this problem, we have offered a XML-based framework for implementing ANN on the Globus Toolkit Platform. Globus Toolkit is well known management software for multipurpose Grids. Using the Grid for simulating the neuron network will lead to a high degree of parallelism in the implementation of ANN. We have used the XML for improving flexibility and scalability in our framework.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 07:35:52 GMT" } ]
2009-07-02T00:00:00
[ [ "Mahini", "Hamidreza", "" ], [ "Mahini", "Alireza", "" ], [ "Ghofrani", "Javad", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0907.0088
Didehvar Farzaad
Farzad Didehvar, Ali D. Mehrabi, Fatemeh Raee B
On Unique Independence Weighted Graphs
9 pages, 1 figure
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An independent set in a graph G is a set of vertices no two of which are joined by an edge. A vertex-weighted graph associates a weight with every vertex in the graph. A vertex-weighted graph G is called a unique independence vertex-weighted graph if it has a unique independent set with maximum sum of weights. Although, in this paper we observe that the problem of recognizing unique independence vertex-weighted graphs is NP-hard in general and therefore no efficient characterization can be expected in general; we give, however, some combinatorial characterizations of unique independence vertex-weighted graphs. This paper introduces a motivating application of this problem in the area of combinatorial auctions, as well.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 08:38:09 GMT" } ]
2009-07-02T00:00:00
[ [ "Didehvar", "Farzad", "" ], [ "Mehrabi", "Ali D.", "" ], [ "B", "Fatemeh Raee", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.0138
Samuel Fiorini
Celine Engelbeen, Samuel Fiorini, Antje Kiesel
A closest vector problem arising in radiation therapy planning
Major revision.
null
null
null
cs.DM math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the problem of finding a vector that can be written as a nonnegative integer linear combination of given 0-1 vectors, the generators, such that the l_1-distance between this vector and a given target vector is minimized. We prove that this closest vector problem is NP-hard to approximate within a O(d) additive error, where d is the dimension of the ambient vector space. We show that the problem can be approximated within a O(d^{3/2}) additive error in polynomial time, by rounding an optimal solution of a natural LP relaxation for the problem. We also observe that in the particular case where the target vector is integer and the generators form a totally unimodular matrix, the problem can be solved in polynomial time. The closest vector problem arises in the elaboration of radiation therapy plans. In this context, the target is a nonnegative integer matrix and the generators are certain 0-1 matrices whose rows satisfy the consecutive ones property. Here we mainly consider the version of the problem in which the set of generators comprises all those matrices that have on each nonzero row a number of ones that is at least a certain constant. This set of generators encodes the so-called minimum separation constraint.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 12:58:39 GMT" }, { "version": "v2", "created": "Thu, 26 Nov 2009 12:15:00 GMT" }, { "version": "v3", "created": "Thu, 11 Mar 2010 16:01:48 GMT" } ]
2010-03-12T00:00:00
[ [ "Engelbeen", "Celine", "" ], [ "Fiorini", "Samuel", "" ], [ "Kiesel", "Antje", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]