id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0906.4481 | Pankaj Kohli | Pankaj Kohli | Coarse-grained Dynamic Taint Analysis for Defeating Control and
Non-control Data Attacks | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Memory corruption attacks remain the primary threat for computer security.
Information flow tracking or taint analysis has been proven to be effective
against most memory corruption attacks. However, there are two shortcomings
with current taint analysis based techniques. First, these techniques cause
application slowdown by about 76% thereby limiting their practicality. Second,
these techniques cannot handle non-control data attacks i.e., attacks that do
not overwrite control data such as return address, but instead overwrite
critical application configuration data or user identity data. In this work, to
address these problems, we describe a coarse-grained taint analysis technique
that uses information flow tracking at the level of application data objects.
We propagate a one-bit taint over each application object that is modified by
untrusted data thereby reducing the taint management overhead considerably. We
performed extensive experimental evaluation of our approach and show that it
can detect all critical attacks such as buffer overflows, and format string
attacks, including non-control data attacks. Unlike the currently known
approaches that can detect such a wide range of attacks, our approach does not
require the source code or any hardware extensions. Run-time performance
overhead evaluation shows that, on an average, our approach causes application
slowdown by only 37% which is an order of magnitude improvement over existing
approaches. Finally, since our approach performs run-time binary
instrumentation, it is easier to integrate it with existing applications and
systems.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 14:07:35 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Jul 2009 07:18:43 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Kohli",
"Pankaj",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.4492 | Alberto Griggio | Alessandro Cimatti, Alberto Griggio, Roberto Sebastiani | Efficient Generation of Craig Interpolants in Satisfiability Modulo
Theories | submitted to ACM Transactions on Computational Logic (TOCL) | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of computing Craig Interpolants has recently received a lot of
interest. In this paper, we address the problem of efficient generation of
interpolants for some important fragments of first order logic, which are
amenable for effective decision procedures, called Satisfiability Modulo Theory
solvers.
We make the following contributions.
First, we provide interpolation procedures for several basic theories of
interest: the theories of linear arithmetic over the rationals, difference
logic over rationals and integers, and UTVPI over rationals and integers.
Second, we define a novel approach to interpolate combinations of theories,
that applies to the Delayed Theory Combination approach.
Efficiency is ensured by the fact that the proposed interpolation algorithms
extend state of the art algorithms for Satisfiability Modulo Theories. Our
experimental evaluation shows that the MathSAT SMT solver can produce
interpolants with minor overhead in search, and much more efficiently than
other competitor solvers.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 14:47:01 GMT"
}
]
| 2009-06-25T00:00:00 | [
[
"Cimatti",
"Alessandro",
""
],
[
"Griggio",
"Alberto",
""
],
[
"Sebastiani",
"Roberto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4539 | Michael Mahoney | Michael W. Mahoney and Hariharan Narayanan | Learning with Spectral Kernels and Heavy-Tailed Data | 21 pages. Substantially revised and extended relative to the first
version | null | null | null | cs.LG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two ubiquitous aspects of large-scale data analysis are that the data often
have heavy-tailed properties and that diffusion-based or spectral-based methods
are often used to identify and extract structure of interest. Perhaps
surprisingly, popular distribution-independent methods such as those based on
the VC dimension fail to provide nontrivial results for even simple learning
problems such as binary classification in these two settings. In this paper, we
develop distribution-dependent learning methods that can be used to provide
dimension-independent sample complexity bounds for the binary classification
problem in these two popular settings. In particular, we provide bounds on the
sample complexity of maximum margin classifiers when the magnitude of the
entries in the feature vector decays according to a power law and also when
learning is performed with the so-called Diffusion Maps kernel. Both of these
results rely on bounding the annealed entropy of gap-tolerant classifiers in a
Hilbert space. We provide such a bound, and we demonstrate that our proof
technique generalizes to the case when the margin is measured with respect to
more general Banach space norms. The latter result is of potential interest in
cases where modeling the relationship between data elements as a dot product in
a Hilbert space is too restrictive.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 18:38:31 GMT"
},
{
"version": "v2",
"created": "Mon, 10 May 2010 17:19:30 GMT"
}
]
| 2010-05-11T00:00:00 | [
[
"Mahoney",
"Michael W.",
""
],
[
"Narayanan",
"Hariharan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.4560 | Edith Cohen | Edith Cohen, Haim Kaplan, Subhabrata Sen | Coordinated Weighted Sampling for Estimating Aggregates Over Multiple
Weight Assignments | This is an updated full version of the PVLDB 2009 conference version | null | null | null | cs.DB cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many data sources are naturally modeled by multiple weight assignments over a
set of keys: snapshots of an evolving database at multiple points in time,
measurements collected over multiple time periods, requests for resources
served at multiple locations, and records with multiple numeric attributes.
Over such vector-weighted data we are interested in aggregates with respect to
one set of weights, such as weighted sums, and aggregates over multiple sets of
weights such as the $L_1$ difference.
Sample-based summarization is highly effective for data sets that are too
large to be stored or manipulated. The summary facilitates approximate
processing queries that may be specified after the summary was generated.
Current designs, however, are geared for data sets where a single {\em
scalar} weight is associated with each key.
We develop a sampling framework based on {\em coordinated weighted samples}
that is suited for multiple weight assignments and obtain estimators that are
{\em orders of magnitude tighter} than previously possible.
We demonstrate the power of our methods through an extensive empirical
evaluation on diverse data sets ranging from IP network to stock quotes data.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 20:09:00 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Nov 2010 23:13:19 GMT"
}
]
| 2010-11-11T00:00:00 | [
[
"Cohen",
"Edith",
""
],
[
"Kaplan",
"Haim",
""
],
[
"Sen",
"Subhabrata",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0906.4567 | Pu Wang | P. Wang, M. Gonzalez, C. A. Hidalgo, A.-L. Barabasi | Understanding the spreading patterns of mobile phone viruses | 13 pages, 4 figures | Science 324, 1071-1076 (2009) | 10.1126/science.1167053 | null | physics.data-an cs.NI physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We model the mobility of mobile phone users to study the fundamental
spreading patterns characterizing a mobile virus outbreak. We find that while
Bluetooth viruses can reach all susceptible handsets with time, they spread
slowly due to human mobility, offering ample opportunities to deploy antiviral
software. In contrast, viruses utilizing multimedia messaging services could
infect all users in hours, but currently a phase transition on the underlying
call graph limits them to only a small fraction of the susceptible users. These
results explain the lack of a major mobile virus breakout so far and predict
that once a mobile operating system's market share reaches the phase transition
point, viruses will pose a serious threat to mobile communications.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 20:50:10 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Wang",
"P.",
""
],
[
"Gonzalez",
"M.",
""
],
[
"Hidalgo",
"C. A.",
""
],
[
"Barabasi",
"A. -L.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0906.4570 | Luca Vigan\`o | Michele Barletta, Silvio Ranise, Luca Vigan\`o | Verifying the Interplay of Authorization Policies and Workflow in
Service-Oriented Architectures (Full version) | 16 pages, 4 figures, full version of paper at Symposium on Secure
Computing (SecureCom09) | null | null | null | cs.CR cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A widespread design approach in distributed applications based on the
service-oriented paradigm, such as web-services, consists of clearly separating
the enforcement of authorization policies and the workflow of the applications,
so that the interplay between the policy level and the workflow level is
abstracted away. While such an approach is attractive because it is quite
simple and permits one to reason about crucial properties of the policies under
consideration, it does not provide the right level of abstraction to specify
and reason about the way the workflow may interfere with the policies, and vice
versa. For example, the creation of a certificate as a side effect of a
workflow operation may enable a policy rule to fire and grant access to a
certain resource; without executing the operation, the policy rule should
remain inactive. Similarly, policy queries may be used as guards for workflow
transitions.
In this paper, we present a two-level formal verification framework to
overcome these problems and formally reason about the interplay of
authorization policies and workflow in service-oriented architectures. This
allows us to define and investigate some verification problems for SO
applications and give sufficient conditions for their decidability.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 16:31:42 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Barletta",
"Michele",
""
],
[
"Ranise",
"Silvio",
""
],
[
"Viganò",
"Luca",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4582 | Patrick J. Wolfe | Mohamed-Ali Belabbas and Patrick J. Wolfe | On landmark selection and sampling in high-dimensional data analysis | 18 pages, 6 figures, submitted for publication | Philosophical Transactions of the Royal Society, Series A, vol.
367, pp. 4295-4312, 2009 | 10.1098/rsta.2009.0161 | null | stat.ML cs.CV cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, the spectral analysis of appropriately defined kernel
matrices has emerged as a principled way to extract the low-dimensional
structure often prevalent in high-dimensional data. Here we provide an
introduction to spectral methods for linear and nonlinear dimension reduction,
emphasizing ways to overcome the computational limitations currently faced by
practitioners with massive datasets. In particular, a data subsampling or
landmark selection process is often employed to construct a kernel based on
partial information, followed by an approximate spectral analysis termed the
Nystrom extension. We provide a quantitative framework to analyse this
procedure, and use it to demonstrate algorithmic performance bounds on a range
of practical approaches designed to optimize the landmark selection process. We
compare the practical implications of these bounds by way of real-world
examples drawn from the field of computer vision, whereby low-dimensional
manifold structure is shown to emerge from high-dimensional video data streams.
| [
{
"version": "v1",
"created": "Wed, 24 Jun 2009 23:40:22 GMT"
}
]
| 2010-04-20T00:00:00 | [
[
"Belabbas",
"Mohamed-Ali",
""
],
[
"Wolfe",
"Patrick J.",
""
]
]
| [
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.4589 | Dong Huang | Dong Huang, Zhiqi Shen, Chunyan Miao, Zhihong Man, Cyril Leung | Further Analysis on Resource Allocation in Wireless Communications Under
Imperfect Channel State Information | This paper has been withdrawn | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn by the author due to some errors.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 01:55:03 GMT"
},
{
"version": "v2",
"created": "Fri, 26 Feb 2010 07:38:56 GMT"
}
]
| 2010-02-26T00:00:00 | [
[
"Huang",
"Dong",
""
],
[
"Shen",
"Zhiqi",
""
],
[
"Miao",
"Chunyan",
""
],
[
"Man",
"Zhihong",
""
],
[
"Leung",
"Cyril",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4597 | Bilal Sadiq | Bilal Sadiq and Gustavo de Veciana | Large deviations sum-queue optimality of a radial sum-rate monotone
opportunistic scheduler | Revised version. Major changes include addition of
details/intermediate steps in various proofs, a summary of technical steps in
Table 1, and correction of typos. | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A centralized wireless system is considered that is serving a fixed set of
users with time varying channel capacities. An opportunistic scheduling rule in
this context selects a user (or users) to serve based on the current channel
state and user queues. Unless the user traffic is symmetric and/or the
underlying capacity region a polymatroid, little is known concerning how
performance optimal schedulers should tradeoff "maximizing current service
rate" (being opportunistic) versus "balancing unequal queues" (enhancing
user-diversity to enable future high service rate opportunities). By contrast
with currently proposed opportunistic schedulers, e.g., MaxWeight and Exp Rule,
a radial sum-rate monotone (RSM) scheduler de-emphasizes queue-balancing in
favor of greedily maximizing the system service rate as the queue-lengths are
scaled up linearly. In this paper it is shown that an RSM opportunistic
scheduler, p-Log Rule, is not only throughput-optimal, but also maximizes the
asymptotic exponential decay rate of the sum-queue distribution for a two-queue
system. The result complements existing optimality results for opportunistic
scheduling and point to RSM schedulers as a good design choice given the need
for robustness in wireless systems with both heterogeneity and high degree of
uncertainty.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 03:29:28 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Mar 2010 21:17:00 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Sadiq",
"Bilal",
""
],
[
"de Veciana",
"Gustavo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4602 | Margreta Kuijper | M. Kuijper and K. Schindelar | Minimal Gr\"obner bases and the predictable leading monomial property | 14 pages, submitted, shortened version | Linear Algebra and its Applications, vol. 434, pages 104-116, 2011 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We focus on Gr\"obner bases for modules of univariate polynomial vectors over
a ring. We identify a useful property, the "predictable leading monomial (PLM)
property" that is shared by minimal Gr\"{o}bner bases of modules in F[x]^q, no
matter what positional term order is used. The PLM property is useful in a
range of applications and can be seen as a strengthening of the wellknown
predictable degree property (= row reducedness), a terminology introduced by
Forney in the 70's. Because of the presence of zero divisors, minimal
Gr\"{o}bner bases over a finite ring of the type Z_p^r (where p is a prime
integer and r is an integer >1) do not necessarily have the PLM property. In
this paper we show how to derive, from an ordered minimal Gr\"{o}bner basis, a
so-called "minimal Gr\"{o}bner p-basis" that does have a PLM property. We
demonstrate that minimal Gr\"obner p-bases lend themselves particularly well to
derive minimal realization parametrizations over Z_p^r. Applications are in
coding and sequences over Z_p^r.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 04:08:54 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Jan 2010 00:59:30 GMT"
},
{
"version": "v3",
"created": "Thu, 27 May 2010 01:53:58 GMT"
}
]
| 2010-12-24T00:00:00 | [
[
"Kuijper",
"M.",
""
],
[
"Schindelar",
"K.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4607 | R Doomun | Sandeep. Kugali, S. S. Manvi, A. V. Sutagundar | A Bandwidth Characterization Tool For MPEG-2 File | 10 pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS, June 2009 Issue, Vol. 2, No. 1 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper proposes the design and development of MPEG 2 Video Decoder to
offer flexible and effective utilization of bandwidth services. The decoder is
capable of decoding the MPEG 2 bit stream on a single host machine. The present
decoder is designed to be simple, but yet effectively reconstruct the video
from MPEG 2 bit stream.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 05:40:46 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Kugali",
"Sandeep.",
""
],
[
"Manvi",
"S. S.",
""
],
[
"Sutagundar",
"A. V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0906.4609 | Vadim E. Levit | Vadim E. Levit and Eugen Mandrescu | Critical independent sets and Konig--Egervary graphs | 8 pages, 5 figures | null | null | null | math.CO cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let alpha(G) be the cardinality of a independence set of maximum size in the
graph G, while mu(G) is the size of a maximum matching. G is a Konig--Egervary
graph if its order equals alpha(G) + mu(G). The set core(G) is the intersection
of all maximum independent sets of G (Levit & Mandrescu, 2002). The number
def(G)=|V(G)|-2*mu(G) is the deficiency of G (Lovasz & Plummer, 1986). The
number d(G)=max{|S|-|N(S)|:S in Ind(G)} is the critical difference of G. An
independent set A is critical if |A|-|N(A)|=d(G), where N(S) is the
neighborhood of S (Zhang, 1990). In 2009, Larson showed that G is
Konig--Egervary graph if and only if there exists a maximum independent set
that is critical as well. In this paper we prove that: (i)
d(G)=|core(G)|-|N(core(G))|=alpha(G)-mu(G)=def(G) for every Konig--Egervary
graph G; (ii) G is Konig--Egervary graph if and only if every maximum
independent set of G is critical.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 15:09:41 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 07:36:39 GMT"
}
]
| 2011-01-25T00:00:00 | [
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.4612 | EPTCS | Turlough Neary, Damien Woods, Anthony K. Seda, Niall Murphy | Proceedings International Workshop on The Complexity of Simple Programs | null | EPTCS 1, 2009 | 10.4204/EPTCS.1 | null | cs.CC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This is the first volume of Electronic Proceedings in Theoretical Computer
Science (EPTCS), a free international refereed open access venue for the rapid
electronic publication of the proceedings of workshops and conferences, and of
festschriften, etc, in the general area of theoretical computer science,
broadly construed.
It contains the proceedings of the International Workshop on The Complexity
of Simple Programs, which was hosted at University College Cork on the 6th and
7th of December, 2008. All speakers were invited and all of the papers went
through a thorough peer-review process.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 16:32:39 GMT"
}
]
| 2009-10-13T00:00:00 | [
[
"Neary",
"Turlough",
""
],
[
"Woods",
"Damien",
""
],
[
"Seda",
"Anthony K.",
""
],
[
"Murphy",
"Niall",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.4615 | Melda Yuksel | Melda Yuksel and Elza Erkip | Diversity-Multiplexing Tradeoff for the Multiple-Antenna Wire-tap
Channel | 10 pages, 4 figures, to appear in IEEE Transactions on Wireless
Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper the fading multiple antenna (MIMO) wire-tap channel is
investigated under short term power constraints. The secret diversity gain and
the secret multiplexing gain are defined. Using these definitions, the secret
diversitymultiplexing tradeoff (DMT) is calculated analytically for no
transmitter side channel state information (CSI) and for full CSI. When there
is no CSI at the transmitter, under the assumption of Gaussian codebooks, it is
shown that the eavesdropper steals both transmitter and receiver antennas, and
the secret DMT depends on the remaining degrees of freedom. When CSI is
available at the transmitter (CSIT), the eavesdropper steals only transmitter
antennas. This dependence on the availability of CSI is unlike the DMT results
without secrecy constraints, where the DMT remains the same for no CSI and full
CSI at the transmitter under short term power constraints. A zero-forcing type
scheme is shown to achieve the secret DMT when CSIT is available.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 06:44:05 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Dec 2010 10:07:13 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Yuksel",
"Melda",
""
],
[
"Erkip",
"Elza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4618 | Pedro Peris-Lopez | Pedro Peris-Lopez, Julio C. Hernandez-Castro, Christos Dimitrakakis,
Aikaterini Mitrokotsa, Juan M. E. Tapiador | Shedding Light on RFID Distance Bounding Protocols and Terrorist Fraud
Attacks | 31 pages, 10 figures, 1 table | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The vast majority of RFID authentication protocols assume the proximity
between readers and tags due to the limited range of the radio channel.
However, in real scenarios an intruder can be located between the prover (tag)
and the verifier (reader) and trick this last one into thinking that the prover
is in close proximity. This attack is generally known as a relay attack in
which scope distance fraud, mafia fraud and terrorist attacks are included.
Distance bounding protocols represent a promising countermeasure to hinder
relay attacks. Several protocols have been proposed during the last years but
vulnerabilities of major or minor relevance have been identified in most of
them. In 2008, Kim et al. [1] proposed a new distance bounding protocol with
the objective of being the best in terms of security, privacy, tag
computational overhead and fault tolerance. In this paper, we analyze this
protocol and we present a passive full disclosure attack, which allows an
adversary to discover the long-term secret key of the tag. The presented attack
is very relevant, since no security objectives are met in Kim et al.'s
protocol. Then, design guidelines are introduced with the aim of facilitating
protocol designers the stimulating task of designing secure and efficient
schemes against relay attacks. Finally a new protocol, named Hitomi and
inspired by [1], is designed conforming the guidelines proposed previously.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 07:12:26 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Jun 2010 19:35:19 GMT"
}
]
| 2010-06-22T00:00:00 | [
[
"Peris-Lopez",
"Pedro",
""
],
[
"Hernandez-Castro",
"Julio C.",
""
],
[
"Dimitrakakis",
"Christos",
""
],
[
"Mitrokotsa",
"Aikaterini",
""
],
[
"Tapiador",
"Juan M. E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.4643 | Ligong Wang | Shraga Bross, Amos Lapidoth and Ligong Wang | The Poisson Channel with Side Information | Final version to appear in the proceedings of Allerton 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The continuous-time, peak-limited, infinite-bandwidth Poisson channel with
spurious counts is considered. It is shown that if the times at which the
spurious counts occur are known noncausally to the transmitter but not to the
receiver, then the capacity is equal to that of the Poisson channel with no
spurious counts. Knowing the times at which the spurious counts occur only
causally at the transmitter does not increase capacity.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 09:49:04 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 14:34:27 GMT"
}
]
| 2009-10-05T00:00:00 | [
[
"Bross",
"Shraga",
""
],
[
"Lapidoth",
"Amos",
""
],
[
"Wang",
"Ligong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4663 | R Doomun | Hafeez Ullah Amin, Abdur Rashid Khan | Acquiring Knowledge for Evaluation of Teachers Performance in Higher
Education using a Questionnaire | 7 pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS, June 2009 Issue, Vol. 2, No.1 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present the step by step knowledge acquisition process by
choosing a structured method through using a questionnaire as a knowledge
acquisition tool. Here we want to depict the problem domain as, how to evaluate
teachers performance in higher education through the use of expert system
technology. The problem is how to acquire the specific knowledge for a selected
problem efficiently and effectively from human experts and encode it in the
suitable computer format. Acquiring knowledge from human experts in the process
of expert systems development is one of the most common problems cited till
yet. This questionnaire was sent to 87 domain experts within all public and
private universities in Pakistani. Among them 25 domain experts sent their
valuable opinions. Most of the domain experts were highly qualified, well
experienced and highly responsible persons. The whole questionnaire was divided
into 15 main groups of factors, which were further divided into 99 individual
questions. These facts were analyzed further to give a final shape to the
questionnaire. This knowledge acquisition technique may be used as a learning
tool for further research work.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 11:09:39 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Amin",
"Hafeez Ullah",
""
],
[
"Khan",
"Abdur Rashid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.4668 | {\L}ukasz Chmielewski Mr. | {\L}ukasz Chmielewski, Jaap-Henk Hoepman, Peter van Rossum | Client-Server Password Recovery (Extended Abstract) | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Human memory is not perfect - people constantly memorize new facts and forget
old ones. One example is forgetting a password, a common problem raised at IT
help desks. We present several protocols that allow a user to automatically
recover a password from a server using partial knowledge of the password. These
protocols can be easily adapted to the personal entropy setting, where a user
can recover a password only if he can answer a large enough subset of personal
questions.
We introduce client-server password recovery methods, in which the recovery
data are stored at the server, and the recovery procedures are integrated into
the login procedures. These methods apply to two of the most common types of
password based authentication systems. The security of these solutions is
significantly better than the security of presently proposed password recovery
schemes. Our protocols are based on a variation of threshold encryption that
may be of independent interest.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 14:41:45 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Chmielewski",
"Łukasz",
""
],
[
"Hoepman",
"Jaap-Henk",
""
],
[
"van Rossum",
"Peter",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.4675 | Mariano Beguerisse D\'iaz | Mariano Beguerisse-Diaz, Mason A. Porter, Jukka-Pekka Onnela | Competition for Popularity in Bipartite Networks | 13 Pages, 19 Figures | null | 10.1063/1.3475411 | null | physics.soc-ph cs.SI physics.data-an | http://creativecommons.org/licenses/by/3.0/ | We present a dynamical model for rewiring and attachment in bipartite
networks in which edges are added between nodes that belong to catalogs that
can either be fixed in size or growing in size. The model is motivated by an
empirical study of data from the video rental service Netflix, which invites
its users to give ratings to the videos available in its catalog. We find that
the distribution of the number of ratings given by users and that of the number
of ratings received by videos both follow a power law with an exponential
cutoff. We also examine the activity patterns of Netflix users and find bursts
of intense video-rating activity followed by long periods of inactivity. We
derive ordinary differential equations to model the acquisition of edges by the
nodes over time and obtain the corresponding time-dependent degree
distributions. We then compare our results with the Netflix data and find good
agreement. We conclude with a discussion of how catalog models can be used to
study systems in which agents are forced to choose, rate, or prioritize their
interactions from a very large set of options.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 12:40:19 GMT"
},
{
"version": "v2",
"created": "Thu, 27 May 2010 13:43:45 GMT"
}
]
| 2013-09-10T00:00:00 | [
[
"Beguerisse-Diaz",
"Mariano",
""
],
[
"Porter",
"Mason A.",
""
],
[
"Onnela",
"Jukka-Pekka",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0906.4680 | Olivier Passalacqua | Eric Benoit (LISTIC), Marc-Philippe Huget (LISTIC), Patrice Moreaux
(LISTIC), Olivier Passalacqua (LISTIC) | Reconfiguration of Distributed Information Fusion System ? A case study | 6 pages - Preprint version | Workshop on Dependable Control of Discrete Systems, Bari : Italie
(2009) | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information Fusion Systems are now widely used in different fusion contexts,
like scientific processing, sensor networks, video and image processing. One of
the current trends in this area is to cope with distributed systems. In this
context, we have defined and implemented a Dynamic Distributed Information
Fusion System runtime model. It allows us to cope with dynamic execution
supports while trying to maintain the functionalities of a given Dynamic
Distributed Information Fusion System. The paper presents our system, the
reconfiguration problems we are faced with and our solutions.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 12:35:57 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Benoit",
"Eric",
"",
"LISTIC"
],
[
"Huget",
"Marc-Philippe",
"",
"LISTIC"
],
[
"Moreaux",
"Patrice",
"",
"LISTIC"
],
[
"Passalacqua",
"Olivier",
"",
"LISTIC"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0906.4690 | R Doomun | Ladda Suanmali, Naomie Salim and Mohammed Salem Binwahlan | Fuzzy Logic Based Method for Improving Text Summarization | 6 pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Text summarization can be classified into two approaches: extraction and
abstraction. This paper focuses on extraction approach. The goal of text
summarization based on extraction approach is sentence selection. One of the
methods to obtain the suitable sentences is to assign some numerical measure of
a sentence for the summary called sentence weighting and then select the best
ones. The first step in summarization by extraction is the identification of
important features. In our experiment, we used 125 test documents in DUC2002
data set. Each document is prepared by preprocessing process: sentence
segmentation, tokenization, removing stop word, and word stemming. Then, we use
8 important features and calculate their score for each sentence. We propose
text summarization based on fuzzy logic to improve the quality of the summary
created by the general statistic method. We compare our results with the
baseline summarizer and Microsoft Word 2007 summarizers. The results show that
the best average precision, recall, and f-measure for the summaries were
obtained by fuzzy method.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 13:19:07 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Suanmali",
"Ladda",
""
],
[
"Salim",
"Naomie",
""
],
[
"Binwahlan",
"Mohammed Salem",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.4692 | Rossano Venturini | Paolo Ferragina and Igor Nitto and Rossano Venturini | On optimally partitioning a text to improve its compression | null | null | null | null | cs.DS cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we investigate the problem of partitioning an input string T in
such a way that compressing individually its parts via a base-compressor C gets
a compressed output that is shorter than applying C over the entire T at once.
This problem was introduced in the context of table compression, and then
further elaborated and extended to strings and trees. Unfortunately, the
literature offers poor solutions: namely, we know either a cubic-time algorithm
for computing the optimal partition based on dynamic programming, or few
heuristics that do not guarantee any bounds on the efficacy of their computed
partition, or algorithms that are efficient but work in some specific scenarios
(such as the Burrows-Wheeler Transform) and achieve compression performance
that might be worse than the optimal-partitioning by a $\Omega(\sqrt{\log n})$
factor. Therefore, computing efficiently the optimal solution is still open. In
this paper we provide the first algorithm which is guaranteed to compute in
$O(n \log_{1+\eps}n)$ time a partition of T whose compressed output is
guaranteed to be no more than $(1+\epsilon)$-worse the optimal one, where
$\epsilon$ may be any positive constant.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 13:36:24 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Ferragina",
"Paolo",
""
],
[
"Nitto",
"Igor",
""
],
[
"Venturini",
"Rossano",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4706 | Yves Brise | Yves Brise and Bernd G\"artner | Clarksons Algorithm for Violator Spaces | 21 pages | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Clarksons algorithm is a two-staged randomized algorithm for solving linear
programs. This algorithm has been simplified and adapted to fit the framework
of LP-type problems. In this framework we can tackle a number of non-linear
problems such as computing the smallest enclosing ball of a set of points in
R^d . In 2006, it has been shown that the algorithm in its original form works
for violator spaces too, which are a proper general- ization of LP-type
problems. It was not clear, however, whether previous simplifications of the
algorithm carry over to the new setting. In this paper we show the following
theoretical results: (a) It is shown, for the first time, that Clarksons second
stage can be simplified. (b) The previous simplifications of Clarksons first
stage carry over to the violator space setting. (c) Furthermore, we show the
equivalence of violator spaces and partitions of the hypercube by hypercubes.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 14:54:45 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 09:59:51 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Brise",
"Yves",
""
],
[
"Gärtner",
"Bernd",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.4711 | Carlo Alberto Furia | Carlo A. Furia and Paola Spoletini | On Relaxing Metric Information in Linear Temporal Logic | Minor changes | Proceedings of the 18th International Symposium on Temporal
Representation and Reasoning (TIME'11). Pgg. 72--79, IEEE Computer Society,
September 2011 | 10.1109/TIME.2011.9 | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Metric LTL formulas rely on the next operator to encode time distances,
whereas qualitative LTL formulas use only the until operator. This paper shows
how to transform any metric LTL formula M into a qualitative formula Q, such
that Q is satisfiable if and only if M is satisfiable over words with
variability bounded with respect to the largest distances used in M (i.e.,
occurrences of next), but the size of Q is independent of such distances.
Besides the theoretical interest, this result can help simplify the
verification of systems with time-granularity heterogeneity, where large
distances are required to express the coarse-grain dynamics in terms of
fine-grain time units.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 15:04:50 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Apr 2010 07:08:25 GMT"
},
{
"version": "v3",
"created": "Sat, 23 Apr 2011 08:53:19 GMT"
},
{
"version": "v4",
"created": "Fri, 17 Jun 2011 13:42:24 GMT"
}
]
| 2013-08-14T00:00:00 | [
[
"Furia",
"Carlo A.",
""
],
[
"Spoletini",
"Paola",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.4725 | Ross Duncan | Bob Coecke and Ross Duncan | Interacting Quantum Observables: Categorical Algebra and Diagrammatics | 81 pages, many figures. Significant changes from previous version.
The first sections contain a gentle introduction for physicists to the
graphical language, and its use in quantum computation | New J. Phys. 13 (2011) 043016 | 10.1088/1367-2630/13/4/043016 | null | quant-ph cs.LO math.CT math.QA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has two tightly intertwined aims: (i) To introduce an intuitive
and universal graphical calculus for multi-qubit systems, the ZX-calculus,
which greatly simplifies derivations in the area of quantum computation and
information. (ii) To axiomatise complementarity of quantum observables within a
general framework for physical theories in terms of dagger symmetric monoidal
categories. We also axiomatize phase shifts within this framework.
Using the well-studied canonical correspondence between graphical calculi and
symmetric monoidal categories, our results provide a purely graphical
formalisation of complementarity for quantum observables. Each individual
observable, represented by a commutative special dagger Frobenius algebra,
gives rise to an abelian group of phase shifts, which we call the phase group.
We also identify a strong form of complementarity, satisfied by the Z and X
spin observables, which yields a scaled variant of a bialgebra.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 15:58:11 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Jan 2011 13:49:04 GMT"
},
{
"version": "v3",
"created": "Thu, 21 Apr 2011 14:18:07 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Coecke",
"Bob",
""
],
[
"Duncan",
"Ross",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
}
]
|
0906.4747 | Erik Demaine | Erik D. Demaine, Martin L. Demaine, Vi Hart, Gregory N. Price,
Tomohiro Tachi | (Non)existence of Pleated Folds: How Paper Folds Between Creases | 19 pages, 6 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We prove that the pleated hyperbolic paraboloid, a familiar origami model
known since 1927, in fact cannot be folded with the standard crease pattern in
the standard mathematical model of zero-thickness paper. In contrast, we show
that the model can be folded with additional creases, suggesting that real
paper "folds" into this model via small such creases. We conjecture that the
circular version of this model, consisting simply of concentric circular
creases, also folds without extra creases.
At the heart of our results is a new structural theorem characterizing
uncreased intrinsically flat surfaces--the portions of paper between the
creases. Differential geometry has much to say about the local behavior of such
surfaces when they are sufficiently smooth, e.g., that they are torsal ruled.
But this classic result is simply false in the context of the whole surface.
Our structural characterization tells the whole story, and even applies to
surfaces with discontinuities in the second derivative. We use our theorem to
prove fundamental properties about how paper folds, for example, that straight
creases on the piece of paper must remain piecewise-straight (polygonal) by
folding.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 17:03:21 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Hart",
"Vi",
""
],
[
"Price",
"Gregory N.",
""
],
[
"Tachi",
"Tomohiro",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0906.4750 | Gregory Kucherov | Roman Kolpakov, Gregory Kucherov, Pascal Ochem | On maximal repetitions of arbitrary exponent | 8 pages, 1 figure | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The first two authors have shown [KK99,KK00] that the sum the exponent (and
thus the number) of maximal repetitions of exponent at least 2 (also called
runs) is linear in the length of the word. The exponent 2 in the definition of
a run may seem arbitrary. In this paper, we consider maximal repetitions of
exponent strictly greater than 1.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 16:59:17 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Kolpakov",
"Roman",
""
],
[
"Kucherov",
"Gregory",
""
],
[
"Ochem",
"Pascal",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.4762 | Alin Suciu PhD | Cristian Klein, Octavian Cret, Alin Suciu | Design and Implementation of a High Quality and High Throughput TRNG in
FPGA | 5 pages, 5 figures, 1 table | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper focuses on the design and implementation of a high-quality and
high-throughput true-random number generator (TRNG) in FPGA. Various practical
issues which we encountered are highlighted and the influence of the various
parameters on the functioning of the TRNG are discussed. We also propose a few
values for the parameters which use the minimum amount of the resources but
still pass common random number generator test batteries such as DieHard and
TestU01.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 18:32:24 GMT"
}
]
| 2009-06-26T00:00:00 | [
[
"Klein",
"Cristian",
""
],
[
"Cret",
"Octavian",
""
],
[
"Suciu",
"Alin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.4764 | Chaitanya Nittala | Sriram Somanchi, Chaitanya Nittala, Narahari Yadati | A Novel Bid Optimizer for Sponsored Search Auctions based on Cooperative
Game Theory | To be published in Proceedings of the 2009 IEEE/WIC/ACM International
Conference on Intelligent Agent Technology. 2009 | null | null | null | cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a bid optimizer for sponsored keyword search
auctions which leads to better retention of advertisers by yielding attractive
utilities to the advertisers without decreasing the revenue to the search
engine. The bid optimizer is positioned as a key value added tool the search
engine provides to the advertisers. The proposed bid optimizer algorithm
transforms the reported values of the advertisers for a keyword into a
correlated bid profile using many ideas from cooperative game theory. The
algorithm is based on a characteristic form game involving the search engine
and the advertisers. Ideas from Nash bargaining theory are used in formulating
the characteristic form game to provide for a fair share of surplus among the
players involved. The algorithm then computes the nucleolus of the
characteristic form game since we find that the nucleolus is an apt way of
allocating the gains of cooperation among the search engine and the
advertisers. The algorithm next transforms the nucleolus into a correlated bid
profile using a linear programming formulation. This bid profile is input to a
standard generalized second price mechanism (GSP) for determining the
allocation of sponsored slots and the prices to be be paid by the winners. The
correlated bid profile that we determine is a locally envy-free equilibrium and
also a correlated equilibrium of the underlying game. Through detailed
simulation experiments, we show that the proposed bid optimizer retains more
customers than a plain GSP mechanism and also yields better long-run utilities
to the search engine and the advertisers.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 18:25:53 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 11:31:40 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Somanchi",
"Sriram",
""
],
[
"Nittala",
"Chaitanya",
""
],
[
"Yadati",
"Narahari",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0906.4779 | Jascha Sohl-Dickstein | Jascha Sohl-Dickstein, Peter Battaglino and Michael R. DeWeese | Minimum Probability Flow Learning | Updated to match ICML conference proceedings | null | null | null | cs.LG physics.data-an stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Fitting probabilistic models to data is often difficult, due to the general
intractability of the partition function and its derivatives. Here we propose a
new parameter estimation technique that does not require computing an
intractable normalization factor or sampling from the equilibrium distribution
of the model. This is achieved by establishing dynamics that would transform
the observed data distribution into the model distribution, and then setting as
the objective the minimization of the KL divergence between the data
distribution and the distribution produced by running the dynamics for an
infinitesimal time. Score matching, minimum velocity learning, and certain
forms of contrastive divergence are shown to be special cases of this learning
technique. We demonstrate parameter estimation in Ising models, deep belief
networks and an independent component analysis model of natural scenes. In the
Ising model case, current state of the art techniques are outperformed by at
least an order of magnitude in learning time, with lower error in recovered
coupling parameters.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 19:15:44 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Sep 2009 02:20:21 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Jun 2010 07:03:16 GMT"
},
{
"version": "v4",
"created": "Sun, 25 Sep 2011 01:33:51 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Sohl-Dickstein",
"Jascha",
""
],
[
"Battaglino",
"Peter",
""
],
[
"DeWeese",
"Michael R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0906.4789 | R Doomun | Amir Azizi, Hamid Reza Pourreza | Efficient IRIS Recognition through Improvement of Feature Extraction and
subset Selection | 10 pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS JUne 2009 Issue, Vol. 2, No. 1 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The selection of the optimal feature subset and the classification has become
an important issue in the field of iris recognition. In this paper we propose
several methods for iris feature subset selection and vector creation. The
deterministic feature sequence is extracted from the iris image by using the
contourlet transform technique. Contourlet transform captures the intrinsic
geometrical structures of iris image. It decomposes the iris image into a set
of directional sub-bands with texture details captured in different
orientations at various scales so for reducing the feature vector dimensions we
use the method for extract only significant bit and information from normalized
iris images. In this method we ignore fragile bits. And finally we use SVM
(Support Vector Machine) classifier for approximating the amount of people
identification in our proposed system. Experimental result show that most
proposed method reduces processing time and increase the classification
accuracy and also the iris feature vector length is much smaller versus the
other methods.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 20:14:42 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Azizi",
"Amir",
""
],
[
"Pourreza",
"Hamid Reza",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.4805 | Suvrit Sra | Suvrit Sra | A Trivial Observation related to Sparse Recovery | Replaces previous correct but useless version with another correct,
but hopefully somewhat less useless version | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We make a trivial modification to the elegant analysis of Garg and Khandekar
(\emph{Gradient Descent with Sparsification} ICML 2009) that replaces the
standard Restricted Isometry Property (RIP), with another RIP-type property
(which could be simpler than the RIP, but we are not sure; it could be as hard
as the RIP to check, thereby rendering this little writeup totally worthless).
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 15:25:48 GMT"
},
{
"version": "v2",
"created": "Sat, 27 Jun 2009 21:00:11 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Sra",
"Suvrit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4816 | Assaf Naor | Subhash Khot and Assaf Naor | Sharp kernel clustering algorithms and their associated Grothendieck
inequalities | null | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the kernel clustering problem we are given a (large) $n\times n$ symmetric
positive semidefinite matrix $A=(a_{ij})$ with $\sum_{i=1}^n\sum_{j=1}^n
a_{ij}=0$ and a (small) $k\times k$ symmetric positive semidefinite matrix
$B=(b_{ij})$. The goal is to find a partition $\{S_1,...,S_k\}$ of $\{1,...
n\}$ which maximizes $ \sum_{i=1}^k\sum_{j=1}^k (\sum_{(p,q)\in S_i\times
S_j}a_{pq})b_{ij}$.
We design a polynomial time approximation algorithm that achieves an
approximation ratio of $\frac{R(B)^2}{C(B)}$, where $R(B)$ and $C(B)$ are
geometric parameters that depend only on the matrix $B$, defined as follows: if
$b_{ij} = < v_i, v_j>$ is the Gram matrix representation of $B$ for some
$v_1,...,v_k\in \R^k$ then $R(B)$ is the minimum radius of a Euclidean ball
containing the points $\{v_1, ..., v_k\}$. The parameter $C(B)$ is defined as
the maximum over all measurable partitions $\{A_1,...,A_k\}$ of $\R^{k-1}$ of
the quantity $\sum_{i=1}^k\sum_{j=1}^k b_{ij}< z_i,z_j>$, where for $i\in
\{1,...,k\}$ the vector $z_i\in \R^{k-1}$ is the Gaussian moment of $A_i$,
i.e., $z_i=\frac{1}{(2\pi)^{(k-1)/2}}\int_{A_i}xe^{-\|x\|_2^2/2}dx$. We also
show that for every $\eps > 0$, achieving an approximation guarantee of
$(1-\e)\frac{R(B)^2}{C(B)}$ is Unique Games hard.
| [
{
"version": "v1",
"created": "Thu, 25 Jun 2009 23:10:44 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Khot",
"Subhash",
""
],
[
"Naor",
"Assaf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.4827 | Walid Saad | Walid Saad, Zhu Han, Tamer Basar, Merouane Debbah and Are
Hj{\o}rungnes | Physical Layer Security: Coalitional Games for Distributed Cooperation | Best paper Award at Wiopt 2009 | null | null | null | cs.IT cs.GT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cooperation between wireless network nodes is a promising technique for
improving the physical layer security of wireless transmission, in terms of
secrecy capacity, in the presence of multiple eavesdroppers. While existing
physical layer security literature answered the question "what are the
link-level secrecy capacity gains from cooperation?", this paper attempts to
answer the question of "how to achieve those gains in a practical decentralized
wireless network and in the presence of a secrecy capacity cost for information
exchange?". For this purpose, we model the physical layer security cooperation
problem as a coalitional game with non-transferable utility and propose a
distributed algorithm for coalition formation. Through the proposed algorithm,
the wireless users can autonomously cooperate and self-organize into disjoint
independent coalitions, while maximizing their secrecy capacity taking into
account the security costs during information exchange. We analyze the
resulting coalitional structures, discuss their properties, and study how the
users can self-adapt the network topology to environmental changes such as
mobility. Simulation results show that the proposed algorithm allows the users
to cooperate and self-organize while improving the average secrecy capacity per
user up to 25.32% relative to the non-cooperative case.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 01:20:58 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Saad",
"Walid",
""
],
[
"Han",
"Zhu",
""
],
[
"Basar",
"Tamer",
""
],
[
"Debbah",
"Merouane",
""
],
[
"Hjørungnes",
"Are",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4834 | R Doomun | B. Rezaie, MR. Jahed Motlagh, M. Analoui, S. Khorsandi | Global Stability Analysis for an Internet Congestion Control Model with
a Time-Varying Link Capacity | 5 pages, International Journal of Computer Science and Information
Security, IJCSIS | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a global stability analysis is given for a rate-based
congestion control system modeled by a nonlinear delayed differential equation.
The model determines the dynamics of a single-source single-link network, with
a time-varying capacity of link and a fixed communication delay. We obtain a
sufficient delay-independent conditions on system parameters under which global
asymptotic stability of the system is guarantied. The proof is based on an
extension of Lyapunov-Krasovskii theorem for a class of nonlinear time-delay
systems. The numerical simulations for a typical scenario justify the
theoretical results.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 03:24:12 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Rezaie",
"B.",
""
],
[
"Motlagh",
"MR. Jahed",
""
],
[
"Analoui",
"M.",
""
],
[
"Khorsandi",
"S.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.4837 | Serguei Mokhov | Bin Han, Serguei A. Mokhov, and Joey Paquet | Advances in the Design and Implementation of a Multi-Tier Architecture
in the GIPSY Environment | 11 pages, 3 figures | null | 10.1109/SERA.2010.40 | null | cs.SE cs.DC cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present advances in the software engineering design and implementation of
the multi-tier run-time system for the General Intensional Programming System
(GIPSY) by further unifying the distributed technologies used to implement the
Demand Migration Framework (DMF) in order to streamline distributed execution
of hybrid intensional-imperative programs using Java.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 04:08:05 GMT"
}
]
| 2010-07-09T00:00:00 | [
[
"Han",
"Bin",
""
],
[
"Mokhov",
"Serguei A.",
""
],
[
"Paquet",
"Joey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.4838 | R Doomun | Siddhivinayak Kulkarni, Imad Haidar | Forecasting Model for Crude Oil Price Using Artificial Neural Networks
and Commodity Futures Prices | 8 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.NE q-fin.PM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a model based on multilayer feedforward neural network to
forecast crude oil spot price direction in the short-term, up to three days
ahead. A great deal of attention was paid on finding the optimal ANN model
structure. In addition, several methods of data pre-processing were tested. Our
approach is to create a benchmark based on lagged value of pre-processed spot
price, then add pre-processed futures prices for 1, 2, 3,and four months to
maturity, one by one and also altogether. The results on the benchmark suggest
that a dynamic model of 13 lags is the optimal to forecast spot price direction
for the short-term. Further, the forecast accuracy of the direction of the
market was 78%, 66%, and 53% for one, two, and three days in future
conclusively. For all the experiments, that include futures data as an input,
the results show that on the short-term, futures prices do hold new information
on the spot price direction. The results obtained will generate comprehensive
understanding of the crude oil dynamic which help investors and individuals for
risk managements.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 04:25:12 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Kulkarni",
"Siddhivinayak",
""
],
[
"Haidar",
"Imad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.PM",
"description": "Security selection and optimization, capital allocation, investment strategies and performance measurement",
"span": "(Portfolio Management)"
}
]
|
0906.4846 | Lorentz Jantschi | Lorentz Jantschi | A genetic algorithm for structure-activity relationships: software
implementation | 21 pages; 10 figures; 14 tables | null | null | null | cs.NE | http://creativecommons.org/licenses/publicdomain/ | The design and the implementation of a genetic algorithm are described. The
applicability domain is on structure-activity relationships expressed as
multiple linear regressions and predictor variables are from families of
structure-based molecular descriptors. An experiment to compare different
selection and survival strategies was designed and realized. The genetic
algorithm was run using the designed experiment on a set of 206 polychlorinated
biphenyls searching on structure-activity relationships having known the
measured octanol-water partition coefficients and a family of molecular
descriptors. The experiment shows that different selection and survival
strategies create different partitions on the entire population of all possible
genotypes.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 06:25:07 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Jantschi",
"Lorentz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0906.4900 | EPTCS | Maurice H. ter Beek | Proceedings Fourth European Young Researchers Workshop on Service
Oriented Computing | null | EPTCS 2, 2009 | 10.4204/EPTCS.2 | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Service-Oriented Computing (SOC) is an emerging new paradigm for distributed
and object-oriented computing by allowing autonomous, platform-independent
computational entities (called services) to be built (described, discovered,
composed, orchestrated) within and across organizational boundaries. Like no
other computing paradigm before, SOC is destined to exert a lasting influence
on the business domain, among others (e-commerce, e-government, e-business,
e-learning, e-health, etc.).
The Young Researchers workshop series on Service-Oriented Computing is meant
to be a platform for junior researchers from industry and academics alike. Its
core objectives are to exchange information regarding advancements in the state
of the art and practice of SOC, as well as to identify emerging research topics
and the future trends in this domain.
Following the success of the previous three workshops, the 4th European Young
Researchers Workshop on Service-Oriented Computing (YR-SOC 2009) introduced two
novelties: it was organised outside of the UK and it saw the introduction of a
number of tutorials, thus making the workshop a 3-day event. YR-SOC 2009 took
place at the CNR Institute of Information Science and Technologies in Pisa,
Italy, and was organised by Maurice ter Beek, Barry Norton, Stephan
Reiff-Marganiec and Monika Solanki.
The contributions in this volume cover aspects such as automated service
composition, context-aware SOC, service-oriented programming, QoS-aware SOC,
service-oriented architectures, SOC modelling and analysis, process management,
web services, ontologies and the semantic web.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 10:52:52 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"ter Beek",
"Maurice H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.4913 | Nihar Shah B | K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar and Kannan Ramchandran | Explicit Construction of Optimal Exact Regenerating Codes for
Distributed Storage | 7 pages, 2 figures, in the Proceedings of Allerton Conference on
Communication, Control and Computing, September 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Erasure coding techniques are used to increase the reliability of distributed
storage systems while minimizing storage overhead. Also of interest is
minimization of the bandwidth required to repair the system following a node
failure. In a recent paper, Wu et al. characterize the tradeoff between the
repair bandwidth and the amount of data stored per node. They also prove the
existence of regenerating codes that achieve this tradeoff.
In this paper, we introduce Exact Regenerating Codes, which are regenerating
codes possessing the additional property of being able to duplicate the data
stored at a failed node. Such codes require low processing and communication
overheads, making the system practical and easy to maintain. Explicit
construction of exact regenerating codes is provided for the minimum bandwidth
point on the storage-repair bandwidth tradeoff, relevant to
distributed-mail-server applications. A subspace based approach is provided and
shown to yield necessary and sufficient conditions on a linear code to possess
the exact regeneration property as well as prove the uniqueness of our
construction.
Also included in the paper, is an explicit construction of regenerating codes
for the minimum storage point for parameters relevant to storage in
peer-to-peer systems. This construction supports a variable number of nodes and
can handle multiple, simultaneous node failures. All constructions given in the
paper are of low complexity, requiring low field size in particular.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 19:20:51 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Oct 2009 17:11:35 GMT"
}
]
| 2009-10-06T00:00:00 | [
[
"Rashmi",
"K. V.",
""
],
[
"Shah",
"Nihar B.",
""
],
[
"Kumar",
"P. Vijay",
""
],
[
"Ramchandran",
"Kannan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.4917 | Jing-wei Chen | Chen Jing-wei, Feng Yong, Qin Xiao-lin, and Zhang Jing-zhong | Simultaneous Integer Relation Detection and Its an Application | null | null | null | null | cs.SC cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Let $\mathbf{x_1}, ..., \mathbf{x_t} \in \mathbb{R}^{n}$. A simultaneous
integer relation (SIR) for $\mathbf{x_1}, ..., \mathbf{x_t}$ is a vector
$\mathbf{m} \in \mathbb{Z}^{n}\setminus\{\textbf{0}\}$ such that
$\mathbf{x_i}^T\mathbf{m} = 0$ for $i = 1, ..., t$. In this paper, we propose
an algorithm SIRD to detect an SIR for real vectors, which constructs an SIR
within $\mathcal {O}(n^4 + n^3 \log \lambda(X))$ arithmetic operations, where
$\lambda(X)$ is the least Euclidean norm of SIRs for $\mathbf{x_1}, >...,
\mathbf{x_t}$. One can easily generalize SIRD to complex number field.
Experimental results show that SIRD is practical and better than another
detecting algorithm in the literature. In its application, we present a new
algorithm for finding the minimal polynomial of an arbitrary complex algebraic
number from its an approximation, which is not based on LLL. We also provide a
sufficient condition on the precision of the approximate value, which depends
only on the height and the degree of the algebraic number.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 13:07:52 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jan 2010 08:54:12 GMT"
}
]
| 2010-01-25T00:00:00 | [
[
"Jing-wei",
"Chen",
""
],
[
"Yong",
"Feng",
""
],
[
"Xiao-lin",
"Qin",
""
],
[
"Jing-zhong",
"Zhang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0906.4927 | Lijun Chang | Lijun Chang, Jeffrey Xu Yu, Lu Qin | Fast Probabilistic Ranking under x-Relation Model | null | null | null | null | cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The probabilistic top-k queries based on the interplay of score and
probability, under the possible worlds semantic, become an important research
issue that considers both score and uncertainty on the same basis. In the
literature, many different probabilistic top-k queries are proposed. Almost all
of them need to compute the probability of a tuple t_i to be ranked at the j-th
position across the entire set of possible worlds. The cost of such computing
is the dominant cost and is known as O(kn^2), where n is the size of dataset.
In this paper, we propose a new novel algorithm that computes such probability
in O(kn).
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 13:24:57 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Chang",
"Lijun",
""
],
[
"Yu",
"Jeffrey Xu",
""
],
[
"Qin",
"Lu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0906.4936 | R Doomun | Bechir Alaya, Claude Duvallet, Bruno Sadeg | A New Approach to Manage QoS in Distributed Multimedia Systems | 10 pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.MM cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dealing with network congestion is a criterion used to enhance quality of
service (QoS) in distributed multimedia systems. The existing solutions for the
problem of network congestion ignore scalability considerations because they
maintain a separate classification for each video stream. In this paper, we
propose a new method allowing to control QoS provided to clients according to
the network congestion, by discarding some frames when needed. The technique
proposed, called (m,k)-frame, is scalable with little degradation in
application performances. (m,k)-frame method is issued from the notion of
(m,k)-firm realtime constraints which means that among k invocations of a task,
m invocations must meet their deadline. Our simulation studies show the
usefulness of (m,k)-frame method to adapt the QoS to the real conditions in a
multimedia application, according to the current system load. Notably, the
system must adjust the QoS provided to active clients1 when their number
varies, i.e. dynamic arrival of clients.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 13:40:38 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Alaya",
"Bechir",
""
],
[
"Duvallet",
"Claude",
""
],
[
"Sadeg",
"Bruno",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0906.4973 | Saqib Saeed | Rizwan A. Khan, M. Aasim Qureshi, Saqib Saeed | Vision Based Navigation for a Mobile Robot with Different Field of Views | This paper was published in Proceedings of Pak-US International
Symposium on High Optical Networks and Enabling Technologies (HONET 2005)
Islamabad, Pakistan | null | null | null | cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The basic idea behind evolutionary robotics is to evolve a set of neural
controllers for a particular task at hand. It involves use of various input
parameters such as infrared sensors, light sensors and vision based methods.
This paper aims to explore the evolution of vision based navigation in a mobile
robot. It discusses in detail the effect of different field of views for a
mobile robot. The individuals have been evolved using different FOV values and
the results have been recorded and analyzed.The optimum values for FOV have
been proposed after evaluating more than 100 different values. It has been
observed that the optimum FOV value requires lesser number of generations for
evolution and the mobile robot trained with that particular value is able to
navigate well in the environment.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 16:15:09 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Khan",
"Rizwan A.",
""
],
[
"Qureshi",
"M. Aasim",
""
],
[
"Saeed",
"Saqib",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0906.4982 | Dmitry Ignatov | Dmitry I. Ignatov, Sergei O. Kuznetsov | Concept-based Recommendations for Internet Advertisement | D.I.Ignatov, S.O. Kuznetsov. Concept-based Recommendations for
Internet Advertisement//In proceedings of The Sixth International Conference
Concept Lattices and Their Applications (CLA'08), Olomouc, Czech Republic,
2008 ISBN 978-80-244-2111-7 | null | null | null | cs.AI cs.CY cs.IR stat.ML | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of detecting terms that can be interesting to the advertiser is
considered. If a company has already bought some advertising terms which
describe certain services, it is reasonable to find out the terms bought by
competing companies. A part of them can be recommended as future advertising
terms to the company. The goal of this work is to propose better interpretable
recommendations based on FCA and association rules.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 17:26:05 GMT"
}
]
| 2013-12-03T00:00:00 | [
[
"Ignatov",
"Dmitry I.",
""
],
[
"Kuznetsov",
"Sergei O.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
]
|
0906.4995 | Christine Michel | Christine Michel (LIESP, Ictt) | Dispositif de supervision pour les tuteurs impliqu\'es dans un
apprentissage \`a la gestion de projets | 11 pages | Workshop "Instrumentation des activit\'es du tuteur :
Environnements de supervision, usages et ing\'enierie" de la conf\'erence
EIAH2009, Le Mans : France (2009) | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article presents results of the observation of a project management
teaching-by-project course. It describe return of experience not only of
student but also of tutors one years after the course. Many problems are
identified like individual student evaluation, tutor distance, lake of
coordination, lake of communication. We ask tutor about the pertinence of an
instrumental solution, based upon dashboard, to solve problems of coordination
and evaluation identified. We made the hypothese that a cognitive tool will
improve too the knowledge construction and the learning process.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 18:52:53 GMT"
}
]
| 2009-06-29T00:00:00 | [
[
"Michel",
"Christine",
"",
"LIESP, Ictt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0906.5007 | Ali Parandehgheibi | Daron Acemoglu, Asuman Ozdaglar, Ali ParandehGheibi | Spread of Misinformation in Social Networks | Submitted to Games and Economic Behavior | null | null | LIDS report 2812 | cs.IT cs.DC math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a model to investigate the tension between information aggregation
and spread of misinformation in large societies (conceptualized as networks of
agents communicating with each other). Each individual holds a belief
represented by a scalar. Individuals meet pairwise and exchange information,
which is modeled as both individuals adopting the average of their pre-meeting
beliefs. When all individuals engage in this type of information exchange, the
society will be able to effectively aggregate the initial information held by
all individuals. There is also the possibility of misinformation, however,
because some of the individuals are "forceful," meaning that they influence the
beliefs of (some) of the other individuals they meet, but do not change their
own opinion. The paper characterizes how the presence of forceful agents
interferes with information aggregation. Under the assumption that even
forceful agents obtain some information (however infrequent) from some others
(and additional weak regularity conditions), we first show that beliefs in this
class of societies converge to a consensus among all individuals. This
consensus value is a random variable, however, and we characterize its
behavior. Our main results quantify the extent of misinformation in the society
by either providing bounds or exact results (in some special cases) on how far
the consensus value can be from the benchmark without forceful agents (where
there is efficient information aggregation). The worst outcomes obtain when
there are several forceful agents and forceful agents themselves update their
beliefs only on the basis of information they obtain from individuals most
likely to have received their own information previously.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 20:57:55 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Acemoglu",
"Daron",
""
],
[
"Ozdaglar",
"Asuman",
""
],
[
"ParandehGheibi",
"Ali",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0906.5010 | Seshadhri Comandur | C. Seshadhri | Testing cycle-freeness: Finding a certificate | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We deal with the problem of designing one-sided error property testers for
cycle-freeness in bounded degree graphs. Such a property tester always accepts
forests. Furthermore, when it rejects an input, it provides a short cycle as a
certificate. The problem of testing cycle-freeness in this model was first
considered by Goldreich and Ron \cite{GR97}. They give a constant time tester
with two-sided error (it does not provide certificates for rejection) and prove
a $\Omega(\sqrt{n})$ lower bound for testers with one-sided error. We design a
property tester with one-sided error whose running time matches this lower
bound (upto polylogarithmic factors). Interestingly, this has connections to a
recent conjecture of Benjamini, Schramm, and Shapira \cite{BSS08}. The property
of cycle-freeness is closed under the operation of taking minors. This is the
first example of such a property that has an almost optimal
$\otilde(\sqrt{n})$-time one-sided error tester, but has a constant time
two-sided error tester. It was conjectured in \cite{BSS08} that this happens
for a vast class of minor-closed properties, and this result can seen as the
first indication towards that.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 21:06:04 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Seshadhri",
"C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.5017 | Tao Zhou | Ming-Sheng Shang, Zi-Ke Zhang, Tao Zhou, Yi-Cheng Zhang | Collaborative filtering with diffusion-based similarity on tripartite
graphs | 8 pages, 4 figures, 1 table | Physica A 389 (2010) 1259-1264 | 10.1016/j.physa.2009.11.041 | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collaborative tags are playing more and more important role for the
organization of information systems. In this paper, we study a personalized
recommendation model making use of the ternary relations among users, objects
and tags. We propose a measure of user similarity based on his preference and
tagging information. Two kinds of similarities between users are calculated by
using a diffusion-based process, which are then integrated for recommendation.
We test the proposed method in a standard collaborative filtering framework
with three metrics: ranking score, Recall and Precision, and demonstrate that
it performs better than the commonly used cosine similarity.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 23:01:47 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Oct 2009 14:50:14 GMT"
}
]
| 2009-12-28T00:00:00 | [
[
"Shang",
"Ming-Sheng",
""
],
[
"Zhang",
"Zi-Ke",
""
],
[
"Zhou",
"Tao",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.5022 | Tad Hogg | Tad Hogg and Robert A. Freitas Jr | Chemical Power for Microscopic Robots in Capillaries | 28 pages, 7 figures | Nanomedicine: Nanotechnology, Biology, and Medicine 6:298-317
(2010) | 10.1016/j.nano.2009.10.002 | null | cs.RO physics.bio-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The power available to microscopic robots (nanorobots) that oxidize
bloodstream glucose while aggregated in circumferential rings on capillary
walls is evaluated with a numerical model using axial symmetry and
time-averaged release of oxygen from passing red blood cells. Robots about one
micron in size can produce up to several tens of picowatts, in steady-state, if
they fully use oxygen reaching their surface from the blood plasma. Robots with
pumps and tanks for onboard oxygen storage could collect oxygen to support
burst power demands two to three orders of magnitude larger. We evaluate
effects of oxygen depletion and local heating on surrounding tissue. These
results give the power constraints when robots rely entirely on ambient
available oxygen and identify aspects of the robot design significantly
affecting available power. More generally, our numerical model provides an
approach to evaluating robot design choices for nanomedicine treatments in and
near capillaries.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 23:54:08 GMT"
}
]
| 2010-04-09T00:00:00 | [
[
"Hogg",
"Tad",
""
],
[
"Freitas",
"Robert A.",
"Jr"
]
]
| [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
}
]
|
0906.5023 | Tsuyoshi Miezaki | Masaaki Harada, Tsuyoshi Miezaki | An Upper Bound on the Minimum Weight of Type II $\ZZ_{2k}$-Codes | 10 pages, 2 tables | J. Combin. Theory Ser. A 118 (2010), 190-196 | null | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we give a new upper bound on the minimum Euclidean weight of
Type II $\ZZ_{2k}$-codes and the concept of extremality for the Euclidean
weights when $k=3,4,5,6$. Together with the known result, we demonstrate that
there is an extremal Type II $\ZZ_{2k}$-code of length $8m$ $(m \le 8)$ when
$k=3,4,5,6$.
| [
{
"version": "v1",
"created": "Fri, 26 Jun 2009 23:58:21 GMT"
}
]
| 2012-05-28T00:00:00 | [
[
"Harada",
"Masaaki",
""
],
[
"Miezaki",
"Tsuyoshi",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.5031 | R Doomun | Ram Kumar Singh, Prof. T. Ramajujam | Intrusion Detection System Using Advanced Honeypots | 9 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The exponential growth of Internet traffic has made public servers
increasingly vulnerable to unauthorized accesses and intrusions. In addition to
maintaining low latency for the client, filtering unauthorized accesses has
become one of the major concerns of a server maintainer. This implementation of
an Intrusion Detection System distinguishes between the traffic coming from
clients and the traffic originated from the attackers, in an attempt to
simultaneously mitigate the problems of both latency and security. We then
present the results of a series of stress and scalability tests, and suggest a
number of potential uses for such a system. As computer attacks are becoming
more and more difficult to identify the need for better and more efficient
intrusion detection systems increases. The main problem with current intrusion
detection systems is high rate of false alarms. Using honeypots provides
effective solution to increase the security.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 03:34:28 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Singh",
"Ram Kumar",
""
],
[
"Ramajujam",
"Prof. T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.5034 | R Doomun | Anshika Pal, Deepak Singh Tomar, S.C. Shrivastava | Effective Focused Crawling Based on Content and Link Structure Analysis | 5 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A focused crawler traverses the web selecting out relevant pages to a
predefined topic and neglecting those out of concern. While surfing the
internet it is difficult to deal with irrelevant pages and to predict which
links lead to quality pages. In this paper a technique of effective focused
crawling is implemented to improve the quality of web navigation. To check the
similarity of web pages w.r.t. topic keywords a similarity function is used and
the priorities of extracted out links are also calculated based on meta data
and resultant pages generated from focused crawler. The proposed work also uses
a method for traversing the irrelevant pages that met during crawling to
improve the coverage of a specific topic.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 03:50:59 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Pal",
"Anshika",
""
],
[
"Tomar",
"Deepak Singh",
""
],
[
"Shrivastava",
"S. C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.5038 | R Doomun | Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan | A Novel Two-Stage Dynamic Decision Support based Optimal Threat
Evaluation and Defensive Resource Scheduling Algorithm for Multi Air-borne
threats | 8 Pages, International Journal of Computer Science and Information
Security, IJCSIS | IJCSIS June 2009 Issue, Vol.2, No. 1 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a novel two-stage flexible dynamic decision support based
optimal threat evaluation and defensive resource scheduling algorithm for
multi-target air-borne threats. The algorithm provides flexibility and
optimality by swapping between two objective functions, i.e. the preferential
and subtractive defense strategies as and when required. To further enhance the
solution quality, it outlines and divides the critical parameters used in
Threat Evaluation and Weapon Assignment (TEWA) into three broad categories
(Triggering, Scheduling and Ranking parameters). Proposed algorithm uses a
variant of many-to-many Stable Marriage Algorithm (SMA) to solve Threat
Evaluation (TE) and Weapon Assignment (WA) problem. In TE stage, Threat Ranking
and Threat-Asset pairing is done. Stage two is based on a new flexible dynamic
weapon scheduling algorithm, allowing multiple engagements using
shoot-look-shoot strategy, to compute near-optimal solution for a range of
scenarios. Analysis part of this paper presents the strengths and weaknesses of
the proposed algorithm over an alternative greedy algorithm as applied to
different offline scenarios.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 04:24:59 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Naeem",
"Huma",
""
],
[
"Masood",
"Asif",
""
],
[
"Hussain",
"Mukhtar",
""
],
[
"Khan",
"Shoab A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.5039 | R Doomun | Ahmed Ben Jmaa, Walid Mahdi, Yousra Ben Jemaa, Abdelmajid Ben Hamadou | A new approach for digit recognition based on hand gesture analysis | 8 Pages, International Journal of Computer Science and Information
Security | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present in this paper a new approach for hand gesture analysis that allows
digit recognition. The analysis is based on extracting a set of features from a
hand image and then combining them by using an induction graph. The most
important features we extract from each image are the fingers locations, their
heights and the distance between each pair of fingers. Our approach consists of
three steps: (i) Hand detection and localization, (ii) fingers extraction and
(iii) features identification and combination to digit recognition. Each input
image is assumed to contain only one person, thus we apply a fuzzy classifier
to identify the skin pixels. In the finger extraction step, we attempt to
remove all the hand components except the fingers, this process is based on the
hand anatomy properties. The final step consists on representing histogram of
the detected fingers in order to extract features that will be used for digit
recognition. The approach is invariant to scale, rotation and translation of
the hand. Some experiments have been undertaken to show the effectiveness of
the proposed approach.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 04:46:23 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Jmaa",
"Ahmed Ben",
""
],
[
"Mahdi",
"Walid",
""
],
[
"Jemaa",
"Yousra Ben",
""
],
[
"Hamadou",
"Abdelmajid Ben",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0906.5040 | Chendong Li | Chendong Li | Towards the Patterns of Hard CSPs with Association Rule Mining | 10 pages, 3 figures, submitted to ICDM'09 | null | null | null | cs.DB cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The hardness of finite domain Constraint Satisfaction Problems (CSPs) is a
very important research area in Constraint Programming (CP) community. However,
this problem has not yet attracted much attention from the researchers in the
association rule mining community. As a popular data mining technique,
association rule mining has an extremely wide application area and it has
already been successfully applied to many interdisciplines. In this paper, we
study the association rule mining techniques and propose a cascaded approach to
extract the interesting patterns of the hard CSPs. As far as we know, this
problem is investigated with the data mining techniques for the first time.
Specifically, we generate the random CSPs and collect their characteristics by
solving all the CSP instances, and then apply the data mining techniques on the
data set and further to discover the interesting patterns of the hardness of
the randomly generated CSPs
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 05:11:48 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Li",
"Chendong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.5050 | Leah Epstein | Leah Epstein and Asaf Levin | AFPTAS results for common variants of bin packing: A new method to
handle the small items | null | SIAM Journal on Optimization 20(6): 3121-3145 (2010) | 10.1137/090767613 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider two well-known natural variants of bin packing, and show that
these packing problems admit asymptotic fully polynomial time approximation
schemes (AFPTAS). In bin packing problems, a set of one-dimensional items of
size at most 1 is to be assigned (packed) to subsets of sum at most 1 (bins).
It has been known for a while that the most basic problem admits an AFPTAS. In
this paper, we develop methods that allow to extend this result to other
variants of bin packing. Specifically, the problems which we study in this
paper, for which we design asymptotic fully polynomial time approximation
schemes, are the following. The first problem is "Bin packing with cardinality
constraints", where a parameter k is given, such that a bin may contain up to k
items. The goal is to minimize the number of bins used. The second problem is
"Bin packing with rejection", where every item has a rejection penalty
associated with it. An item needs to be either packed to a bin or rejected, and
the goal is to minimize the number of used bins plus the total rejection
penalty of unpacked items. This resolves the complexity of two important
variants of the bin packing problem. Our approximation schemes use a novel
method for packing the small items. This new method is the core of the improved
running times of our schemes over the running times of the previous results,
which are only asymptotic polynomial time approximation schemes (APTAS).
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 08:39:18 GMT"
}
]
| 2012-02-16T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"Levin",
"Asaf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.5051 | Leah Epstein | Leah Epstein and Asaf Levin | Bin packing with general cost structures | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Following the work of Anily et al., we consider a variant of bin packing,
called "bin packing with general cost structures" (GCBP) and design an
asymptotic fully polynomial time approximation scheme (AFPTAS) for this
problem. In the classic bin packing problem, a set of one-dimensional items is
to be assigned to subsets of total size at most 1, that is, to be packed into
unit sized bins. However, in GCBP, the cost of a bin is not 1 as in classic bin
packing, but it is a non-decreasing and concave function of the number of items
packed in it, where the cost of an empty bin is zero. The construction of the
AFPTAS requires novel techniques for dealing with small items, which are
developed in this work. In addition, we develop a fast approximation algorithm
which acts identically for all non-decreasing and concave functions, and has an
asymptotic approximation ratio of 1.5 for all functions simultaneously.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 19:48:10 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"Levin",
"Asaf",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.5060 | R Doomun | Prof. Dhananjay R. Kalbande, Dr. G. T. Thampi, Mr. Manish Singh | Incidence Handling and Response System | 8 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A computer network can be attacked in a number of ways. The security-related
threats have become not only numerous but also diverse and they may also come
in the form of blended attacks. It becomes difficult for any security system to
block all types of attacks. This gives rise to the need of an incidence
handling capability which is necessary for rapidly detecting incidents,
minimizing loss and destruction, mitigating the weaknesses that were exploited
and restoring the computing services. Incidence response has always been an
important aspect of information security but it is often overlooked by security
administrators. in this paper, we propose an automated system which will handle
the security threats and make the computer network capable enough to withstand
any kind of attack. we also present the state-of-the-art technology in
computer, network and software which is required to build such a system.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 10:10:18 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Kalbande",
"Prof. Dhananjay R.",
""
],
[
"Thampi",
"Dr. G. T.",
""
],
[
"Singh",
"Mr. Manish",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.5062 | Simant Dube | Simant Dube | Geometrical Interpretation of the Master Theorem for Divide-and-conquer
Recurrences | 11 pages, 6 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide geometrical interpretation of the Master Theorem to solve
divide-and-conquer recurrences. We show how different cases of the recurrences
correspond to different kinds of fractal images. Fractal dimension and
Hausdorff measure are shown to be closely related to the solution of such
recurrences.
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 04:43:17 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Jul 2009 10:34:53 GMT"
}
]
| 2016-09-08T00:00:00 | [
[
"Dube",
"Simant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.5070 | R Doomun | R. Thamilselvan, Dr. P. Balasubramanie | Integrating Genetic Algorithm, Tabu Search Approach for Job Shop
Scheduling | 6 pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new algorithm based on integrating Genetic Algorithms
and Tabu Search methods to solve the Job Shop Scheduling problem. The idea of
the proposed algorithm is derived from Genetic Algorithms. Most of the
scheduling problems require either exponential time or space to generate an
optimal answer. Job Shop scheduling (JSS) is the general scheduling problem and
it is a NP-complete problem, but it is difficult to find the optimal solution.
This paper applies Genetic Algorithms and Tabu Search for Job Shop Scheduling
problem and compares the results obtained by each. With the implementation of
our approach the JSS problems reaches optimal solution and minimize the
makespan.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 11:16:30 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Thamilselvan",
"R.",
""
],
[
"Balasubramanie",
"Dr. P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0906.5073 | R Doomun | R. Avudaiammal, R. SivaSubramanian, R.Pandian, P. Seethalakshmi | TTSS Packet Classification Algorithm to enhance Multimedia Applications
in Network Processor based Router | 6 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The objective of this paper is to implement the Trie based Tuple Space
Search(TTSS) packet classification algorithm for Network Processor(NP) based
router to enhance multimedia applications. The performance is evaluated using
Intel IXP2400 NP Simulator. The results demonstrate that, TTSS has better
performance than Tuple Space Search algorithm and is well suited to achieve
high speed packet classification to support multimedia applications.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 11:59:15 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Avudaiammal",
"R.",
""
],
[
"SivaSubramanian",
"R.",
""
],
[
"Pandian",
"R.",
""
],
[
"Seethalakshmi",
"P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0906.5089 | David Fern\'andez-Baca | Mukul S. Bansal, Jianrong Dong, David Fern\'andez-Baca | Comparing and Aggregating Partially Resolved Trees | 34 pages | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We define, analyze, and give efficient algorithms for two kinds of distance
measures for rooted and unrooted phylogenies. For rooted trees, our measures
are based on the topologies the input trees induce on triplets; that is, on
three-element subsets of the set of species. For unrooted trees, the measures
are based on quartets (four-element subsets). Triplet and quartet-based
distances provide a robust and fine-grained measure of the similarities between
trees. The distinguishing feature of our distance measures relative to
traditional quartet and triplet distances is their ability to deal cleanly with
the presence of unresolved nodes, also called polytomies. For rooted trees,
these are nodes with more than two children; for unrooted trees, they are nodes
of degree greater than three.
Our first class of measures are parametric distances, where there is a
parameter that weighs the difference between an unresolved triplet/quartet
topology and a resolved one. Our second class of measures are based on
Hausdorff distance. Each tree is viewed as a set of all possible ways in which
the tree could be refined to eliminate unresolved nodes. The distance between
the original (unresolved) trees is then taken to be the Hausdorff distance
between the associated sets of fully resolved trees, where the distance between
trees in the sets is the triplet or quartet distance, as appropriate.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 15:56:42 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Bansal",
"Mukul S.",
""
],
[
"Dong",
"Jianrong",
""
],
[
"Fernández-Baca",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0906.5106 | Shmuel Onn | Raymond Hemmecke, Shmuel Onn, Robert Weismantel | Multicommodity Flow in Polynomial Time | null | Optimization Letters, 5:13--25, 2011 | null | null | math.CO cs.DM cs.DS math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The multicommodity flow problem is NP-hard already for two commodities over
bipartite graphs. Nonetheless, using our recent theory of n-fold integer
programming and extensions developed herein, we are able to establish the
surprising polynomial time solvability of the problem in two broad situations.
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 23:56:05 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Jul 2009 14:29:56 GMT"
}
]
| 2011-01-18T00:00:00 | [
[
"Hemmecke",
"Raymond",
""
],
[
"Onn",
"Shmuel",
""
],
[
"Weismantel",
"Robert",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
0906.5110 | Susmit Jha | Susmit Jha | Statistical Analysis of Privacy and Anonymity Guarantees in Randomized
Security Protocol Implementations | null | null | null | null | cs.CR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Security protocols often use randomization to achieve probabilistic
non-determinism. This non-determinism, in turn, is used in obfuscating the
dependence of observable values on secret data. Since the correctness of
security protocols is very important, formal analysis of security protocols has
been widely studied in literature. Randomized security protocols have also been
analyzed using formal techniques such as process-calculi and probabilistic
model checking. In this paper, we consider the problem of validating
implementations of randomized protocols. Unlike previous approaches which treat
the protocol as a white-box, our approach tries to verify an implementation
provided as a black box. Our goal is to infer the secrecy guarantees provided
by a security protocol through statistical techniques. We learn the
probabilistic dependency of the observable outputs on secret inputs using
Bayesian network. This is then used to approximate the leakage of secret. In
order to evaluate the accuracy of our statistical approach, we compare our
technique with the probabilistic model checking technique on two examples:
crowds protocol and dining crypotgrapher's protocol.
| [
{
"version": "v1",
"created": "Sat, 27 Jun 2009 23:24:14 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Jha",
"Susmit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.5112 | Javaid Aslam | Javaid Aslam | Response to Refutation of Aslam's Proof that NP = P | Total 9 pages, including the figures. Have further minimized the
overlap, with only references to the main paper | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides a further refinement to the previous response by
introducing new structures and algorithms for counting VMPs of common
\emph{Edge Requirement} (ER) and hence for counting the perfect matchings.
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 16:07:06 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jan 2015 20:54:52 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Mar 2015 00:58:51 GMT"
},
{
"version": "v4",
"created": "Sat, 7 Oct 2017 03:38:30 GMT"
}
]
| 2017-10-10T00:00:00 | [
[
"Aslam",
"Javaid",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0906.5114 | Hal Daum\'e III | Hal Daum\'e III | Non-Parametric Bayesian Areal Linguistics | null | Proceedings of the Conference of the North American Association
for Computational Linguistics, 2009 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a statistical model over linguistic areas and phylogeny.
Our model recovers known areas and identifies a plausible hierarchy of areal
features. The use of areas improves genetic reconstruction of languages both
qualitatively and quantitatively according to a variety of metrics. We model
linguistic areas by a Pitman-Yor process and linguistic phylogeny by Kingman's
coalescent.
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 02:32:53 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Daumé",
"Hal",
"III"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0906.5119 | Arnaud Martin | Arnaud Martin (E3I2), Christophe Osswald (E3I2), Jean Dezert (ONERA),
Florentin Smarandache (UNM) | General combination rules for qualitative and quantitative beliefs | null | Journal of Advances in Information Fusion 3, 2 (2008) 67-89 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Martin and Osswald \cite{Martin07} have recently proposed many
generalizations of combination rules on quantitative beliefs in order to manage
the conflict and to consider the specificity of the responses of the experts.
Since the experts express themselves usually in natural language with
linguistic labels, Smarandache and Dezert \cite{Li07} have introduced a
mathematical framework for dealing directly also with qualitative beliefs. In
this paper we recall some element of our previous works and propose the new
combination rules, developed for the fusion of both qualitative or quantitative
beliefs.
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 08:09:04 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Martin",
"Arnaud",
"",
"E3I2"
],
[
"Osswald",
"Christophe",
"",
"E3I2"
],
[
"Dezert",
"Jean",
"",
"ONERA"
],
[
"Smarandache",
"Florentin",
"",
"UNM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.5120 | Arnaud Martin | Jean Dezert (ONERA), Arnaud Martin (E3I2), Florentin Smarandache (UNM) | Comments on "A new combination of evidence based on compromise" by K.
Yamada | null | Fuzzy Sets and Systems 160, 6 (2009) 853-855 | null | null | cs.CV cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Comments on ``A new combination of evidence based on compromise'' by K.
Yamada
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 08:10:33 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Dezert",
"Jean",
"",
"ONERA"
],
[
"Martin",
"Arnaud",
"",
"E3I2"
],
[
"Smarandache",
"Florentin",
"",
"UNM"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.5123 | R Doomun | Poonam Garg | Cryptanalysis of SDES via evolutionary computation techniques | 7 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS May 2009 Issue, Vol. 1, No. 1 | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The cryptanalysis of simplified data encryption standard can be formulated as
NP-Hard combinatorial problem. The goal of this paper is two fold. First we
want to make a study about how evolutionary computation techniques can
efficiently solve the NP-Hard combinatorial problem. For achieving this goal we
test several evolutionary computation techniques like memetic algorithm,
genetic algorithm and simulated annealing for the cryptanalysis of simplified
data encryption standard problem (SDES). And second was a comparison between
memetic algorithm, genetic algorithm and simulated annealing were made in order
to investigate the performance for the cryptanalysis on SDES. The methods were
tested and extensive computational results show that memetic algorithm performs
better than genetic algorithms and simulated annealing for such type of NP-Hard
combinatorial problem. This paper represents our first effort toward efficient
memetic algorithm for the cryptanalysis of SDES.
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 09:29:04 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Garg",
"Poonam",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0906.5131 | Oded Kafri | Oded Kafri | A Comment on Nonextensive Statistical Mechanics | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There is a conception that Boltzmann-Gibbs statistics cannot yield the long
tail distribution. This is the justification for the intensive research of
nonextensive entropies (i.e. Tsallis entropy and others). Here the error that
caused this misconception is explained and it is shown that a long tail
distribution exists in equilibrium thermodynamics for more than a century.
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 11:24:03 GMT"
},
{
"version": "v2",
"created": "Tue, 30 Jun 2009 06:33:24 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Kafri",
"Oded",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.5148 | Tijl De Bie | Tijl De Bie | Explicit probabilistic models for databases and networks | Submitted | null | null | null | cs.AI cs.DB cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recent work in data mining and related areas has highlighted the importance
of the statistical assessment of data mining results. Crucial to this endeavour
is the choice of a non-trivial null model for the data, to which the found
patterns can be contrasted. The most influential null models proposed so far
are defined in terms of invariants of the null distribution. Such null models
can be used by computation intensive randomization approaches in estimating the
statistical significance of data mining results.
Here, we introduce a methodology to construct non-trivial probabilistic
models based on the maximum entropy (MaxEnt) principle. We show how MaxEnt
models allow for the natural incorporation of prior information. Furthermore,
they satisfy a number of desirable properties of previously introduced
randomization approaches. Lastly, they also have the benefit that they can be
represented explicitly. We argue that our approach can be used for a variety of
data types. However, for concreteness, we have chosen to demonstrate it in
particular for databases and networks.
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 07:55:41 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"De Bie",
"Tijl",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.5151 | Hal Daum\'e III | Hal Daum\'e III | Unsupervised Search-based Structured Prediction | null | Proceedings of the International Conference on Machine Learning,
2009 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe an adaptation and application of a search-based structured
prediction algorithm "Searn" to unsupervised learning problems. We show that it
is possible to reduce unsupervised learning to supervised learning and
demonstrate a high-quality unsupervised shift-reduce parsing model. We
additionally show a close connection between unsupervised Searn and expectation
maximization. Finally, we demonstrate the efficacy of a semi-supervised
extension. The key idea that enables this is an application of the predict-self
idea for unsupervised learning.
| [
{
"version": "v1",
"created": "Sun, 28 Jun 2009 17:47:22 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Daumé",
"Hal",
"III"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0906.5181 | Serguei Mokhov | Serguei A. Mokhov, Joey Paquet, and Mourad Debbabi | Reasoning About a Simulated Printer Case Investigation with Forensic
Lucid | 18 pages, 3 figures, 7 listings, TOC, index; this article closely
relates to arXiv:0906.0049 and arXiv:0904.3789 but to remain stand-alone
repeats some of the background and introductory content; abstract presented
at HSC'09 and the full updated paper at ICDF2C'11. This is an updated/edited
version after ICDF2C proceedings with more references and corrections | S. A. Mokhov, J. Paquet, and M. Debbabi. Reasoning about a
simulated printer case investigation with Forensic Lucid. In P. Gladyshev and
M. K. Rogers, editors, Proceedings of ICDF2C'11, number 0088 in LNICST, pp.
282-296. Springer, 2012 | 10.1007/978-3-642-35515-8_23 | null | cs.LO cs.CR cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this work we model the ACME (a fictitious company name) "printer case
incident" and make its specification in Forensic Lucid, a Lucid- and
intensional-logic-based programming language for cyberforensic analysis and
event reconstruction specification. The printer case involves a dispute between
two parties that was previously solved using the finite-state automata (FSA)
approach, and is now re-done in a more usable way in Forensic Lucid. Our
simulation is based on the said case modeling by encoding concepts like
evidence and the related witness accounts as an evidential statement context in
a Forensic Lucid program, which is an input to the transition function that
models the possible deductions in the case. We then invoke the transition
function (actually its reverse) with the evidential statement context to see if
the evidence we encoded agrees with one's claims and then attempt to
reconstruct the sequence of events that may explain the claim or disprove it.
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 00:06:22 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Apr 2012 09:41:26 GMT"
}
]
| 2013-09-17T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
],
[
"Paquet",
"Joey",
""
],
[
"Debbabi",
"Mourad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.5202 | Patrick J. Wolfe | Daniel Rudoy, Prabahan Basu, and Patrick J. Wolfe | Superposition frames for adaptive time-frequency analysis and fast
reconstruction | 16 pages, 6 figures; revised version | IEEE Transactions on Signal Processing, vol. 58, pp. 2581-2596,
2010 | 10.1109/TSP.2010.2041604 | null | math.NA cs.SD | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this article we introduce a broad family of adaptive, linear
time-frequency representations termed superposition frames, and show that they
admit desirable fast overlap-add reconstruction properties akin to standard
short-time Fourier techniques. This approach stands in contrast to many
adaptive time-frequency representations in the extant literature, which, while
more flexible than standard fixed-resolution approaches, typically fail to
provide efficient reconstruction and often lack the regular structure necessary
for precise frame-theoretic analysis. Our main technical contributions come
through the development of properties which ensure that this construction
provides for a numerically stable, invertible signal representation. Our
primary algorithmic contributions come via the introduction and discussion of
specific signal adaptation criteria in deterministic and stochastic settings,
based respectively on time-frequency concentration and nonstationarity
detection. We conclude with a short speech enhancement example that serves to
highlight potential applications of our approach.
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 19:49:30 GMT"
},
{
"version": "v2",
"created": "Tue, 3 Nov 2009 18:52:23 GMT"
}
]
| 2010-04-20T00:00:00 | [
[
"Rudoy",
"Daniel",
""
],
[
"Basu",
"Prabahan",
""
],
[
"Wolfe",
"Patrick J.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
]
|
0906.5233 | Toby Walsh | George Katsirelos, Sebastian Maneth, Nina Narodytska, Toby Walsh | Restricted Global Grammar Constraints | Proceedings of the 15th International Conference on Principles and
Practice of Constraint Programming, Lisbon, Portugal. September 2009 | null | null | null | cs.AI cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the global GRAMMAR constraint over restricted classes of
context free grammars like deterministic and unambiguous context-free grammars.
We show that detecting disentailment for the GRAMMAR constraint in these cases
is as hard as parsing an unrestricted context free grammar.We also consider the
class of linear grammars and give a propagator that runs in quadratic time.
Finally, to demonstrate the use of linear grammars, we show that a weighted
linear GRAMMAR constraint can efficiently encode the EDITDISTANCE constraint,
and a conjunction of the EDITDISTANCE constraint and the REGULAR constraint
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 09:23:39 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Katsirelos",
"George",
""
],
[
"Maneth",
"Sebastian",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Walsh",
"Toby",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0906.5278 | Nikolaos Vasiloglou | Nikolaos Vasiloglou and Petros Maragos | Spectrum of Fractal Interpolation Functions | null | null | null | null | cs.IT math.IT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper we compute the Fourier spectrum of the Fractal Interpolation
Functions FIFs as introduced by Michael Barnsley. We show that there is an
analytical way to compute them. In this paper we attempt to solve the inverse
problem of FIF by using the spectrum
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 14:43:15 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Vasiloglou",
"Nikolaos",
""
],
[
"Maragos",
"Petros",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.5286 | Yifan Hu | Emden Gansner, Yifan Hu, Stephen Kobourov, Chris Volinsky | Putting Recommendations on the Map -- Visualizing Clusters and Relations | 8 pages | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For users, recommendations can sometimes seem odd or counterintuitive.
Visualizing recommendations can remove some of this mystery, showing how a
recommendation is grouped with other choices. A drawing can also lead a user's
eye to other options. Traditional 2D-embeddings of points can be used to create
a basic layout, but these methods, by themselves, do not illustrate clusters
and neighborhoods very well. In this paper, we propose the use of geographic
maps to enhance the definition of clusters and neighborhoods, and consider the
effectiveness of this approach in visualizing similarities and recommendations
arising from TV shows and music selections. All the maps referenced in this
paper can be found in http://www.research.att.com/~volinsky/maps
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 15:00:43 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Gansner",
"Emden",
""
],
[
"Hu",
"Yifan",
""
],
[
"Kobourov",
"Stephen",
""
],
[
"Volinsky",
"Chris",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0906.5289 | Doron Ezri | Doron Ezri and Shimi Shilo | Green Cellular - Optimizing the Cellular Network for Minimal Emission
from Mobile Stations | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Wireless systems, which include cellular phones, have become an essential
part of the modern life. However the mounting evidence that cellular radiation
might adversely affect the health of its users, leads to a growing concern
among authorities and the general public. Radiating antennas in the proximity
of the user, such as antennas of mobile phones are of special interest for this
matter. In this paper we suggest a new architecture for wireless networks,
aiming at minimal emission from mobile stations, without any additional
radiation sources. The new architecture, dubbed Green Cellular, abandons the
classical transceiver base station design and suggests the augmentation of
transceiver base stations with receive only devices. These devices, dubbed
Green Antennas, are not aiming at coverage extension but rather at minimizing
the emission from mobile stations. We discuss the implications of the Green
Cellular architecture on 3G and 4G cellular technologies. We conclude by
showing that employing the Green Cellular approach may lead to a significant
decrease in the emission from mobile stations, especially in indoor scenarios.
This is achieved without exposing the user to any additional radiation source.
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 15:03:35 GMT"
}
]
| 2009-06-30T00:00:00 | [
[
"Ezri",
"Doron",
""
],
[
"Shilo",
"Shimi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.5325 | Nicholas Mastronarde | Nicholas Mastronarde and Mihaela van der Schaar | Online Reinforcement Learning for Dynamic Multimedia Systems | 35 pages, 11 figures, 10 tables | IEEE Trans. on Image Processing, vol. 19, no. 2, pp. 290-305, Feb.
2010 | 10.1109/TIP.2009.2035228 | null | cs.LG cs.MM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In our previous work, we proposed a systematic cross-layer framework for
dynamic multimedia systems, which allows each layer to make autonomous and
foresighted decisions that maximize the system's long-term performance, while
meeting the application's real-time delay constraints. The proposed solution
solved the cross-layer optimization offline, under the assumption that the
multimedia system's probabilistic dynamics were known a priori. In practice,
however, these dynamics are unknown a priori and therefore must be learned
online. In this paper, we address this problem by allowing the multimedia
system layers to learn, through repeated interactions with each other, to
autonomously optimize the system's long-term performance at run-time. We
propose two reinforcement learning algorithms for optimizing the system under
different design constraints: the first algorithm solves the cross-layer
optimization in a centralized manner, and the second solves it in a
decentralized manner. We analyze both algorithms in terms of their required
computation, memory, and inter-layer communication overheads. After noting that
the proposed reinforcement learning algorithms learn too slowly, we introduce a
complementary accelerated learning algorithm that exploits partial knowledge
about the system's dynamics in order to dramatically improve the system's
performance. In our experiments, we demonstrate that decentralized learning can
perform as well as centralized learning, while enabling the layers to act
autonomously. Additionally, we show that existing application-independent
reinforcement learning algorithms, and existing myopic learning algorithms
deployed in multimedia systems, perform significantly worse than our proposed
application-aware and foresighted learning methods.
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 17:48:40 GMT"
}
]
| 2013-06-06T00:00:00 | [
[
"Mastronarde",
"Nicholas",
""
],
[
"van der Schaar",
"Mihaela",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
]
|
0906.5339 | Salah A. Aly | Salah A. Aly | Asymmetric Quantum Cyclic Codes | null | null | null | null | cs.IT cs.MS math.IT quant-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is recently conjectured in quantum information processing that phase-shift
errors occur with high probability than qubit-flip errors, hence the former is
more disturbing to quantum information than the later one. This leads us to
construct asymmetric quantum error controlling codes to protect quantum
information over asymmetric channels, $\Pr Z \geq \Pr X$. In this paper we
present two generic methods to derive asymmetric quantum cyclic codes using the
generator polynomials and defining sets of classical cyclic codes.
Consequently, the methods allow us to construct several families of asymmetric
quantum BCH, RS, and RM codes. Finally, the methods are used to construct
families of asymmetric subsystem codes.
| [
{
"version": "v1",
"created": "Mon, 29 Jun 2009 19:37:12 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Nov 2009 03:03:56 GMT"
}
]
| 2009-11-30T00:00:00 | [
[
"Aly",
"Salah A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
]
|
0906.5393 | R Doomun | Nasir Mahmood Malik, Arif Mushtaq, Samina Khalid, Tehmina Khalil,
Faisal Munir Malik | Measurable & Scalable NFRs using Fuzzy Logic and Likert Scale | 5 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Most of the research related to Non Functional Requirements (NFRs) have
presented NFRs frameworks by integrating non functional requirements with
functional requirements while we proposed that measurement of NFRs is possible
e.g. cost and performance and NFR like usability can be scaled. Our novel
hybrid approach integrates three things rather than two i.e. Functional
Requirements (FRs), Measurable NFRs (M-NFRs) and Scalable NFRs (S-NFRs). We
have also found the use of Fuzzy Logic and Likert Scale effective for handling
of discretely measurable as well as scalable NFRs as these techniques can
provide a simple way to arrive at a discrete or scalable NFR in contrast to
vague, ambiguous, imprecise, noisy or missing NFR. Our approach can act as
baseline for new NFR and aspect oriented frameworks by using all types of UML
diagrams.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 01:22:27 GMT"
}
]
| 2009-07-01T00:00:00 | [
[
"Malik",
"Nasir Mahmood",
""
],
[
"Mushtaq",
"Arif",
""
],
[
"Khalid",
"Samina",
""
],
[
"Khalil",
"Tehmina",
""
],
[
"Malik",
"Faisal Munir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.5394 | Salman Avestimehr | Salman Avestimehr, Suhas Diggavi, and David Tse | Wireless Network Information Flow: A Deterministic Approach | To appear in IEEE transactions on Information Theory, Vol 57, No 4,
April 2011 | null | 10.1109/TIT.2011.2110110 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a wireless network with a single source and a single destination and an
arbitrary number of relay nodes, what is the maximum rate of information flow
achievable? We make progress on this long standing problem through a two-step
approach. First we propose a deterministic channel model which captures the key
wireless properties of signal strength, broadcast and superposition. We obtain
an exact characterization of the capacity of a network with nodes connected by
such deterministic channels. This result is a natural generalization of the
celebrated max-flow min-cut theorem for wired networks. Second, we use the
insights obtained from the deterministic analysis to design a new
quantize-map-and-forward scheme for Gaussian networks. In this scheme, each
relay quantizes the received signal at the noise level and maps it to a random
Gaussian codeword for forwarding, and the final destination decodes the
source's message based on the received signal. We show that, in contrast to
existing schemes, this scheme can achieve the cut-set upper bound to within a
gap which is independent of the channel parameters. In the case of the relay
channel with a single relay as well as the two-relay Gaussian diamond network,
the gap is 1 bit/s/Hz. Moreover, the scheme is universal in the sense that the
relays need no knowledge of the values of the channel parameters to
(approximately) achieve the rate supportable by the network. We also present
extensions of the results to multicast networks, half-duplex networks and
ergodic networks.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 01:36:20 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Aug 2009 04:58:34 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Jun 2010 02:37:03 GMT"
},
{
"version": "v4",
"created": "Thu, 16 Sep 2010 18:45:41 GMT"
},
{
"version": "v5",
"created": "Sun, 26 Sep 2010 18:49:41 GMT"
},
{
"version": "v6",
"created": "Fri, 3 Dec 2010 02:42:15 GMT"
},
{
"version": "v7",
"created": "Fri, 25 Feb 2011 16:11:03 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Avestimehr",
"Salman",
""
],
[
"Diggavi",
"Suhas",
""
],
[
"Tse",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.5397 | Juyul Lee | Juyul Lee and Nihar Jindal | Asymptotically Optimal Policies for Hard-deadline Scheduling over Fading
Channels | 24 pages, 9 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A hard-deadline, opportunistic scheduling problem in which $B$ bits must be
transmitted within $T$ time-slots over a time-varying channel is studied: the
transmitter must decide how many bits to serve in each slot based on knowledge
of the current channel but without knowledge of the channel in future slots,
with the objective of minimizing expected transmission energy. In order to
focus on the effects of delay and fading, we assume that no other packets are
scheduled simultaneously and no outage is considered. We also assume that the
scheduler can transmit at capacity where the underlying noise channel is
Gaussian such that the energy-bit relation is a Shannon-type exponential
function. No closed form solution for the optimal policy is known for this
problem, which is naturally formulated as a finite-horizon dynamic program, but
three different policies are shown to be optimal in the limiting regimes where
$T$ is fixed and $B$ is large, $T$ is fixed and $B$ is small, and where $B$ and
$T$ are simultaneously taken to infinity. In addition, the advantage of optimal
scheduling is quantified relative to a non-opportunistic (i.e., channel-blind)
equal-bit policy.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 02:00:23 GMT"
}
]
| 2009-07-01T00:00:00 | [
[
"Lee",
"Juyul",
""
],
[
"Jindal",
"Nihar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0906.5418 | Salvatore Mele | Anne Gentil-Beccot, Salvatore Mele, Travis Brooks | Citing and Reading Behaviours in High-Energy Physics. How a Community
Stopped Worrying about Journals and Learned to Love Repositories | Version to be published in Scientometrics | null | null | CERN-OPEN-2009-012, SLAC-PUB-13693 | cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Contemporary scholarly discourse follows many alternative routes in addition
to the three-century old tradition of publication in peer-reviewed journals.
The field of High- Energy Physics (HEP) has explored alternative communication
strategies for decades, initially via the mass mailing of paper copies of
preliminary manuscripts, then via the inception of the first online
repositories and digital libraries.
This field is uniquely placed to answer recurrent questions raised by the
current trends in scholarly communication: is there an advantage for scientists
to make their work available through repositories, often in preliminary form?
Is there an advantage to publishing in Open Access journals? Do scientists
still read journals or do they use digital repositories?
The analysis of citation data demonstrates that free and immediate online
dissemination of preprints creates an immense citation advantage in HEP,
whereas publication in Open Access journals presents no discernible advantage.
In addition, the analysis of clickstreams in the leading digital library of the
field shows that HEP scientists seldom read journals, preferring preprints
instead.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 16:45:04 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Nov 2009 09:58:08 GMT"
}
]
| 2009-11-25T00:00:00 | [
[
"Gentil-Beccot",
"Anne",
""
],
[
"Mele",
"Salvatore",
""
],
[
"Brooks",
"Travis",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0906.5446 | Tom Hirschowitz | Daniel Hirschkoff (LIP), Aur\'elien Pardon (LIP), Tom Hirschowitz
(LAMA), Samuel Hym (LIFL), Damien Pous (INRIA Rh\^one-Alpes / LIG Laboratoire
d'Informatique de Grenoble) | Encapsulation and Dynamic Modularity in the Pi-Calculus | null | PLACES 2008, Oslo : Norv\`ege (2008) | 10.1016/j.entcs.2009.06.005 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a process calculus featuring high level constructs for
component-oriented programming in a distributed setting. We propose an
extension of the higher-order pi-calculus intended to capture several important
mechanisms related to component-based programming, such as dynamic update,
reconfiguration and code migration. In this paper, we are primarily concerned
with the possibility to build a distributed implementation of our calculus.
Accordingly, we define a low-level calculus, that describes how the high-level
constructs are implemented, as well as details of the data structures
manipulated at runtime. We also discuss current and future directions of
research in relation to our analysis of component-based programming.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 09:16:03 GMT"
}
]
| 2009-09-04T00:00:00 | [
[
"Hirschkoff",
"Daniel",
"",
"LIP"
],
[
"Pardon",
"Aurélien",
"",
"LIP"
],
[
"Hirschowitz",
"Tom",
"",
"LAMA"
],
[
"Hym",
"Samuel",
"",
"LIFL"
],
[
"Pous",
"Damien",
"",
"INRIA Rhône-Alpes / LIG Laboratoire\n d'Informatique de Grenoble"
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0906.5450 | Sk Sarif Hassan s | Pabitra Pal Choudhury, Sk. Sarif Hassan, Sudhakar Sahoo, Birendra
Kumar Nayak | Theory of Rule 6 and its Application to Round Robin Tournament | Related to Scheduling Problems | null | null | null | cs.DM cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we have used one 2 variable Boolean function called Rule 6 to
define another beautiful transformation named as Extended Rule-6. Using this
function we have explored the algebraic beauties and its application to an
efficient Round Robin Tournament (RRT) routine for 2k (k is any natural number)
number of teams. At the end, we have thrown some light towards any number of
teams of the form nk where n, k are natural numbers.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 09:34:07 GMT"
}
]
| 2009-07-01T00:00:00 | [
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Hassan",
"Sk. Sarif",
""
],
[
"Sahoo",
"Sudhakar",
""
],
[
"Nayak",
"Birendra Kumar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0906.5475 | Yong-Hyuk Kim | Yong-Hyuk Kim and Yourim Yoon | A Note on Mathematical Modelling of Practical Multicampaign Assignment
and Its Computational Complexity | 14 pages, 1 figure | Proceedings of the 2010 ACM Symposium on Applied Computing (SAC),
pages 94-98, 2010 | null | null | cs.CC cs.OH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Within personalized marketing, a recommendation issue known as multicampaign
assignment is to overcome a critical problem, known as the multiple
recommendation problem which occurs when running several personalized campaigns
simultaneously. This paper mainly deals with the hardness of multicampaign
assignment, which is treated as a very challenging problem in marketing. The
objective in this problem is to find a customer-campaign matrix which maximizes
the effectiveness of multiple campaigns under some constraints. We present a
realistic response suppression function, which is designed to be more
practical, and explain how this can be learned from historical data. Moreover,
we provide a proof that this more realistic version of the problem is NP-hard,
thus justifying to use of heuristics presented in previous work.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 13:53:03 GMT"
}
]
| 2010-05-04T00:00:00 | [
[
"Kim",
"Yong-Hyuk",
""
],
[
"Yoon",
"Yourim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
]
|
0906.5485 | Markus Ojala | Markus Ojala, Gemma C. Garriga, Aristides Gionis, Heikki Mannila | Query Significance in Databases via Randomizations | 10 pages | null | null | null | cs.DB cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Many sorts of structured data are commonly stored in a multi-relational
format of interrelated tables. Under this relational model, exploratory data
analysis can be done by using relational queries. As an example, in the
Internet Movie Database (IMDb) a query can be used to check whether the average
rank of action movies is higher than the average rank of drama movies.
We consider the problem of assessing whether the results returned by such a
query are statistically significant or just a random artifact of the structure
in the data. Our approach is based on randomizing the tables occurring in the
queries and repeating the original query on the randomized tables. It turns out
that there is no unique way of randomizing in multi-relational data. We propose
several randomization techniques, study their properties, and show how to find
out which queries or hypotheses about our data result in statistically
significant information. We give results on real and generated data and show
how the significance of some queries vary between different randomizations.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 14:08:19 GMT"
}
]
| 2009-07-01T00:00:00 | [
[
"Ojala",
"Markus",
""
],
[
"Garriga",
"Gemma C.",
""
],
[
"Gionis",
"Aristides",
""
],
[
"Mannila",
"Heikki",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0906.5488 | Rasmus M{\o}gelberg | Rasmus Ejlers M{\o}gelberg, Alex Simpson | Relational Parametricity for Computational Effects | 31 pages, appears in Logical Methods in Computer Science | Logical Methods in Computer Science, Volume 5, Issue 3 (August 9,
2009) lmcs:1113 | 10.2168/LMCS-5(3:7)2009 | null | cs.PL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | According to Strachey, a polymorphic program is parametric if it applies a
uniform algorithm independently of the type instantiations at which it is
applied. The notion of relational parametricity, introduced by Reynolds, is one
possible mathematical formulation of this idea. Relational parametricity
provides a powerful tool for establishing data abstraction properties, proving
equivalences of datatypes, and establishing equalities of programs. Such
properties have been well studied in a pure functional setting. Many programs,
however, exhibit computational effects, and are not accounted for by the
standard theory of relational parametricity. In this paper, we develop a
foundational framework for extending the notion of relational parametricity to
programming languages with effects.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 11:47:58 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Aug 2009 19:09:56 GMT"
}
]
| 2019-03-14T00:00:00 | [
[
"Møgelberg",
"Rasmus Ejlers",
""
],
[
"Simpson",
"Alex",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0906.5561 | Hongyu Lu | Hongyu Lu, Chongguang Wu, Shanglian Bao | An Improved Algorithm based on Shannon-Happ Formula for Calculating
Transfer Function from Signal Flow Graph and Its Visualization | null | null | null | null | cs.NA cs.SC | http://creativecommons.org/licenses/by/3.0/ | A new method based on Shannon-Happ formula to calculate transfer function
from Signal Flow Graph (SFG) is presented. The algorithm provides an explicit
approach to get the transfer function in a format with both numerical and
symbolic expressions. The adoption of the symbolic variable in SFG, which could
represent the nonlinear item or the independent sub-system, is achieved by
variable separation approach. An investigation is given for the solutions of
several special conditions of SFG. To improve the efficiency of the algorithm,
a new technique combined with Johnson method for generating the combinations of
the non-touching loops is developed. It uses the previous combinations in lower
order to get the ones in higher order. There is an introduction about the
visualization of SFG and the subroutines for system performance analysis in the
software, AVANT.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 15:47:42 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Oct 2009 07:30:32 GMT"
}
]
| 2009-10-20T00:00:00 | [
[
"Lu",
"Hongyu",
""
],
[
"Wu",
"Chongguang",
""
],
[
"Bao",
"Shanglian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0906.5596 | Saqib Saeed | Zaigham Mehmood, Saqib Saeed | Teaching Quality Assurance and Project Management to Undergraduate
Computing Students in Pakistan | This paper was published in the proceedings of 4th International
Conference on Business Management and Economics 2008 Turkey | null | null | null | cs.CY cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Software Project Management (SPM) and Software Quality Assurance (SQA) are
key components of undergraduate Computing programmes at educational
establishments in Pakistan. Because of the nature of these subjects, there are
a number of issues that need to be discussed and resolved so that the teaching
becomes more effective, students learning experience is more enjoyable and
their ability to be actively involved in SPM and SQA, after the completion of
their studies, becomes further improved. In this paper, we discuss experience
of teaching SPM and SQA at one particular institution in Islamabad Pakistan.
Using this as a case study, we underline the students perspective, highlight
the inherent issues and suggest ways to improve the delivery of these subjects.
Since, the issues are mainly generic, the aim is to provide discussion and
recommendations to benefit a wider computing community in academia.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 18:22:49 GMT"
}
]
| 2009-07-01T00:00:00 | [
[
"Mehmood",
"Zaigham",
""
],
[
"Saeed",
"Saqib",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0906.5608 | Saqib Saeed | Saqib Saeed, Christoph Kunz | Loading Arbitrary Knowledge Bases in Matrix Browser | This paper was published in the proceedings of IEEE International
Multi Topic Conference (INMIC 2004) Lahore, Pakistan 24th- 26th December 2004 | null | null | null | cs.IR cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper describes the work done on Matrix Browser, which is a recently
developed graphical user interface to explore and navigate complex networked
information spaces. This approach presents a new way of navigating information
nets in windows explorer like widget. The problem on hand was how to export
arbitrary knowledge bases in Matrix Browser. This was achieved by identifying
the relationships present in knowledge bases and then by forming the
hierarchies from this data and these hierarchies are being exported to matrix
browser. This paper gives solution to this problem and informs about
implementation work.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 18:42:59 GMT"
}
]
| 2012-05-14T00:00:00 | [
[
"Saeed",
"Saqib",
""
],
[
"Kunz",
"Christoph",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0907.0001 | Denis Krotov | Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | On weight distributions of perfect colorings and completely regular
codes | 17pp; partially presented at "Optimal Codes and Related Topics"
OC2009, Varna (Bulgaria). V.2: the title was changed (old: "On weight
distributions of perfect structures"), Sect.5 "Weight enumerators ..." was
added | Des. Codes Cryptogr. 61(3) 2011, 315-329 | 10.1007/s10623-010-9479-4 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A vertex coloring of a graph is called "perfect" if for any two colors $a$
and $b$, the number of the color-$b$ neighbors of a color-$a$ vertex $x$ does
not depend on the choice of $x$, that is, depends only on $a$ and $b$ (the
corresponding partition of the vertex set is known as "equitable"). A set of
vertices is called "completely regular" if the coloring according to the
distance from this set is perfect. By the "weight distribution" of some
coloring with respect to some set we mean the information about the number of
vertices of every color at every distance from the set. We study the weight
distribution of a perfect coloring (equitable partition) of a graph with
respect to a completely regular set (in particular, with respect to a vertex if
the graph is distance-regular). We show how to compute this distribution by the
knowledge of the color composition over the set. For some partial cases of
completely regular sets, we derive explicit formulas of weight distributions.
Since any (other) completely regular set itself generates a perfect coloring,
this gives universal formulas for calculating the weight distribution of any
completely regular set from its parameters. In the case of Hamming graphs, we
prove a very simple formula for the weight enumerator of an arbitrary perfect
coloring. Codewords: completely regular code; equitable partition; partition
design; perfect coloring; perfect structure; regular partition; weight
distribution; weight enumerator.
| [
{
"version": "v1",
"created": "Tue, 30 Jun 2009 20:04:59 GMT"
},
{
"version": "v2",
"created": "Mon, 2 May 2011 16:53:37 GMT"
}
]
| 2011-08-31T00:00:00 | [
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0002 | Denis Krotov | Denis Krotov (Sobolev Institute of Mathematics, Novosibirsk, Russia) | On the binary codes with parameters of doubly-shortened 1-perfect codes | 12pp | Des. Codes Cryptogr. 57(2) 2010, 181-194 | 10.1007/s10623-009-9360-5 | null | math.CO cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show that any binary $(n=2^m-3, 2^{n-m}, 3)$ code $C_1$ is a part of an
equitable partition (perfect coloring) $\{C_1,C_2,C_3,C_4\}$ of the $n$-cube
with the parameters $((0,1,n-1,0)(1,0,n-1,0)(1,1,n-4,2)(0,0,n-1,1))$. Now the
possibility to lengthen the code $C_1$ to a 1-perfect code of length $n+2$ is
equivalent to the possibility to split the part $C_4$ into two distance-3 codes
or, equivalently, to the biparticity of the graph of distances 1 and 2 of
$C_4$. In any case, $C_1$ is uniquely embeddable in a twofold 1-perfect code of
length $n+2$ with some structural restrictions, where by a twofold 1-perfect
code we mean that any vertex of the space is within radius 1 from exactly two
codewords.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 19:59:11 GMT"
}
]
| 2010-07-20T00:00:00 | [
[
"Krotov",
"Denis",
"",
"Sobolev Institute of Mathematics, Novosibirsk, Russia"
]
]
| [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0049 | Zhuo Li | Zhuo Li and Lijuan Xing | No More Perfect Codes: Classification of Perfect Quantum Codes | 3 pages, no figure | null | null | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We solve the problem of the classification of perfect quantum codes. We prove
that the only nontrivial perfect quantum codes are those with the parameters .
There exist no other nontrivial perfect quantum codes.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 01:49:15 GMT"
}
]
| 2009-07-05T00:00:00 | [
[
"Li",
"Zhuo",
""
],
[
"Xing",
"Lijuan",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0067 | R Doomun | Huma Naeem, Asif Masood, Mukhtar Hussain, Shoab A. Khan | A Novel Two-Staged Decision Support based Threat Evaluation and Weapon
Assignment Algorithm, Asset-based Dynamic Weapon Scheduling using Artificial
Intelligence Techinques | 7 Pages, International Journal of Computer Science and Information
Security (IJCSIS) | IJCSIS June 2009 Issue, Vol. 2, No. 1 | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Surveillance control and reporting (SCR) system for air threats play an
important role in the defense of a country. SCR system corresponds to air and
ground situation management/processing along with information fusion,
communication, coordination, simulation and other critical defense oriented
tasks. Threat Evaluation and Weapon Assignment (TEWA) sits at the core of SCR
system. In such a system, maximal or near maximal utilization of constrained
resources is of extreme importance. Manual TEWA systems cannot provide
optimality because of different limitations e.g.surface to air missile (SAM)
can fire from a distance of 5Km, but manual TEWA systems are constrained by
human vision range and other constraints. Current TEWA systems usually work on
target-by-target basis using some type of greedy algorithm thus affecting the
optimality of the solution and failing in multi-target scenario. his paper
relates to a novel two-staged flexible dynamic decision support based optimal
threat evaluation and weapon assignment algorithm for multi-target air-borne
threats.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 06:05:22 GMT"
}
]
| 2009-07-02T00:00:00 | [
[
"Naeem",
"Huma",
""
],
[
"Masood",
"Asif",
""
],
[
"Hussain",
"Mukhtar",
""
],
[
"Khan",
"Shoab A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0075 | R Doomun | Hamidreza Mahini, Alireza Mahini, and Javad Ghofrani | XDANNG: XML based Distributed Artificial Neural Network with Globus
Toolkit | 8 pages, international journal of computer science and information
security | IJCSIS June 2009 Issue, Vol. 2 No. 1 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Artificial Neural Network is one of the most common AI application fields.
This field has direct and indirect usages most sciences. The main goal of ANN
is to imitate biological neural networks for solving scientific problems. But
the level of parallelism is the main problem of ANN systems in comparison with
biological systems. To solve this problem, we have offered a XML-based
framework for implementing ANN on the Globus Toolkit Platform. Globus Toolkit
is well known management software for multipurpose Grids. Using the Grid for
simulating the neuron network will lead to a high degree of parallelism in the
implementation of ANN. We have used the XML for improving flexibility and
scalability in our framework.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 07:35:52 GMT"
}
]
| 2009-07-02T00:00:00 | [
[
"Mahini",
"Hamidreza",
""
],
[
"Mahini",
"Alireza",
""
],
[
"Ghofrani",
"Javad",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0907.0088 | Didehvar Farzaad | Farzad Didehvar, Ali D. Mehrabi, Fatemeh Raee B | On Unique Independence Weighted Graphs | 9 pages, 1 figure | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An independent set in a graph G is a set of vertices no two of which are
joined by an edge. A vertex-weighted graph associates a weight with every
vertex in the graph. A vertex-weighted graph G is called a unique independence
vertex-weighted graph if it has a unique independent set with maximum sum of
weights. Although, in this paper we observe that the problem of recognizing
unique independence vertex-weighted graphs is NP-hard in general and therefore
no efficient characterization can be expected in general; we give, however,
some combinatorial characterizations of unique independence vertex-weighted
graphs. This paper introduces a motivating application of this problem in the
area of combinatorial auctions, as well.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 08:38:09 GMT"
}
]
| 2009-07-02T00:00:00 | [
[
"Didehvar",
"Farzad",
""
],
[
"Mehrabi",
"Ali D.",
""
],
[
"B",
"Fatemeh Raee",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.0138 | Samuel Fiorini | Celine Engelbeen, Samuel Fiorini, Antje Kiesel | A closest vector problem arising in radiation therapy planning | Major revision. | null | null | null | cs.DM math.OC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the problem of finding a vector that can be written
as a nonnegative integer linear combination of given 0-1 vectors, the
generators, such that the l_1-distance between this vector and a given target
vector is minimized. We prove that this closest vector problem is NP-hard to
approximate within a O(d) additive error, where d is the dimension of the
ambient vector space. We show that the problem can be approximated within a
O(d^{3/2}) additive error in polynomial time, by rounding an optimal solution
of a natural LP relaxation for the problem. We also observe that in the
particular case where the target vector is integer and the generators form a
totally unimodular matrix, the problem can be solved in polynomial time.
The closest vector problem arises in the elaboration of radiation therapy
plans. In this context, the target is a nonnegative integer matrix and the
generators are certain 0-1 matrices whose rows satisfy the consecutive ones
property. Here we mainly consider the version of the problem in which the set
of generators comprises all those matrices that have on each nonzero row a
number of ones that is at least a certain constant. This set of generators
encodes the so-called minimum separation constraint.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 12:58:39 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Nov 2009 12:15:00 GMT"
},
{
"version": "v3",
"created": "Thu, 11 Mar 2010 16:01:48 GMT"
}
]
| 2010-03-12T00:00:00 | [
[
"Engelbeen",
"Celine",
""
],
[
"Fiorini",
"Samuel",
""
],
[
"Kiesel",
"Antje",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.