id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0907.0159 | Jeffrey Shallit | N. Rampersad, J. Shallit, Z. Xu | The computational complexity of universality problems for prefixes,
suffixes, factors, and subwords of regular languages | null | null | null | null | cs.FL cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we consider the computational complexity of the following
problems: given a DFA or NFA representing a regular language L over a finite
alphabet Sigma is the set of all prefixes (resp., suffixes, factors, subwords)
of all words of L equal to Sigma*? In the case of testing universality for
factors of languages represented by DFA's, we find an interesting connection to
Cerny's conjecture on synchronizing words.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 14:30:40 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Jul 2009 20:28:19 GMT"
},
{
"version": "v3",
"created": "Fri, 3 Jul 2009 15:49:05 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Rampersad",
"N.",
""
],
[
"Shallit",
"J.",
""
],
[
"Xu",
"Z.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.0204 | Ghassan Hamarneh | Ghassan Hamarneh | Multi-Label MRF Optimization via Least Squares s-t Cuts | null | null | null | SFU-CMPT-TR 2009-08 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There are many applications of graph cuts in computer vision, e.g.
segmentation. We present a novel method to reformulate the NP-hard, k-way graph
partitioning problem as an approximate minimal s-t graph cut problem, for which
a globally optimal solution is found in polynomial time. Each non-terminal
vertex in the original graph is replaced by a set of ceil(log_2(k)) new
vertices. The original graph edges are replaced by new edges connecting the new
vertices to each other and to only two, source s and sink t, terminal nodes.
The weights of the new edges are obtained using a novel least squares solution
approximating the constraints of the initial k-way setup. The minimal s-t cut
labels each new vertex with a binary (s vs t) "Gray" encoding, which is then
decoded into a decimal label number that assigns each of the original vertices
to one of k classes. We analyze the properties of the approximation and present
quantitative as well as qualitative segmentation results.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 17:18:46 GMT"
}
]
| 2009-07-02T00:00:00 | [
[
"Hamarneh",
"Ghassan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0907.0229 | Sergey Polikarpov | S. V. Polikarpov, V. S. Dergachev, K. E. Rumyantsev, D. M. Golubchikov | A new model of artificial neuron: cyberneuron and its use | 23 pages, 23 figures, in Russian | null | null | null | cs.NE cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This article describes a new type of artificial neuron, called the authors
"cyberneuron". Unlike classical models of artificial neurons, this type of
neuron used table substitution instead of the operation of multiplication of
input values for the weights. This allowed to significantly increase the
information capacity of a single neuron, but also greatly simplify the process
of learning. Considered an example of the use of "cyberneuron" with the task of
detecting computer viruses.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 19:54:39 GMT"
}
]
| 2009-07-02T00:00:00 | [
[
"Polikarpov",
"S. V.",
""
],
[
"Dergachev",
"V. S.",
""
],
[
"Rumyantsev",
"K. E.",
""
],
[
"Golubchikov",
"D. M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.0255 | Hazer Inaltekin | Hazer Inaltekin, Mung Chiang, H. Vincent Poor | A Cut-off Phenomenon in Location Based Random Access Games with
Imperfect Information | Presented in the Fourth International Wireless Internet Conference | null | null | null | cs.IT cs.GT math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper analyzes the behavior of selfish transmitters under imperfect
location information. The scenario considered is that of a wireless network
consisting of selfish nodes that are randomly distributed over the network
domain according to a known probability distribution, and that are interested
in communicating with a common sink node using common radio resources. In this
scenario, the wireless nodes do not know the exact locations of their
competitors but rather have belief distributions about these locations.
Firstly, properties of the packet success probability curve as a function of
the node-sink separation are obtained for such networks. Secondly, a
monotonicity property for the best-response strategies of selfish nodes is
identified. That is, for any given strategies of competitors of a node, there
exists a critical node-sink separation for this node such that its
best-response is to transmit when its distance to the sink node is smaller than
this critical threshold, and to back off otherwise. Finally, necessary and
sufficient conditions for a given strategy profile to be a Nash equilibrium are
provided.
| [
{
"version": "v1",
"created": "Wed, 1 Jul 2009 22:46:03 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Inaltekin",
"Hazer",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0907.0288 | Simant Dube | Simant Dube | An Iterative Fingerprint Enhancement Algorithm Based on Accurate
Determination of Orientation Flow | 10 pages, 4 figures. Ongoing work. To be submitted to appropriate
conference/journal | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe an algorithm to enhance and binarize a fingerprint image. The
algorithm is based on accurate determination of orientation flow of the ridges
of the fingerprint image by computing variance of the neighborhood pixels
around a pixel in different directions. We show that an iterative algorithm
which captures the mutual interdependence of orientation flow computation,
enhancement and binarization gives very good results on poor quality images.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 04:57:32 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Dube",
"Simant",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0907.0291 | Bruno Salvy | Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt),
Khang Tran | Generating functions of Chebyshev-like polynomials | null | null | 10.1142/S1793042110003691 | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this short note, we give simple proofs of several results and conjectures
formulated by Stolarsky and Tran concerning generating functions of some
families of Chebyshev-like polynomials.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 06:29:52 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Aug 2009 08:08:48 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Nov 2009 20:02:00 GMT"
}
]
| 2013-06-19T00:00:00 | [
[
"Bostan",
"Alin",
"",
"INRIA Rocquencourt"
],
[
"Salvy",
"Bruno",
"",
"INRIA Rocquencourt"
],
[
"Tran",
"Khang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0907.0305 | Leah Epstein | Leah Epstein, Asaf Levin, Julian Mestre and Danny Segev | Improved approximation guarantees for weighted matching in the
semi-streaming model | null | SIAM J. Discrete Math. 25(3): 1251-1265 (2011) | 10.1137/100801901 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the maximum weight matching problem in the semi-streaming model, and
improve on the currently best one-pass algorithm due to Zelke (Proc. of
STACS2008, pages 669-680) by devising a deterministic approach whose
performance guarantee is 4.91+epsilon. In addition, we study preemptive online
algorithms, a sub-class of one-pass algorithms where we are only allowed to
maintain a feasible matching in memory at any point in time. All known results
prior to Zelke's belong to this sub-class. We provide a lower bound of 4.967 on
the competitive ratio of any such deterministic algorithm, and hence show that
future improvements will have to store in memory a set of edges which is not
necessarily a feasible matching.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 08:11:22 GMT"
}
]
| 2012-02-16T00:00:00 | [
[
"Epstein",
"Leah",
""
],
[
"Levin",
"Asaf",
""
],
[
"Mestre",
"Julian",
""
],
[
"Segev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.0313 | Wojciech Mazurczyk | Wojciech Mazurczyk and Krzysztof Szczypiorski | Steganography in Handling Oversized IP Packets | 10 pages, 7 figures, paper submitted to First International Workshop
on Network Steganography - IWNS 2009 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper identifies new class of network steganography methods that utilize
mechanisms to handle oversized packets in IP networks: IP fragmentation, PMTUD
(Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU Discovery). In
particular, we propose two new steganographic methods and two extensions of
existing ones. We show how IP fragmentation simplifies utilizing steganographic
methods which requires transmitter-receiver synchronization. We present how
mentioned mechanisms can be used to enable hidden communication for both
versions of IP protocol: 4 and 6. Also the detection of the proposed methods is
enclosed in this paper.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 09:01:19 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Mazurczyk",
"Wojciech",
""
],
[
"Szczypiorski",
"Krzysztof",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0907.0328 | James Whitacre | James M Whitacre, Axel Bender | Degenerate neutrality creates evolvable fitness landscapes | null | WorldComp 2009, Las Vegas, NV, USA | null | null | cs.NE cs.AI cs.MA | http://creativecommons.org/licenses/by/3.0/ | Understanding how systems can be designed to be evolvable is fundamental to
research in optimization, evolution, and complex systems science. Many
researchers have thus recognized the importance of evolvability, i.e. the
ability to find new variants of higher fitness, in the fields of biological
evolution and evolutionary computation. Recent studies by Ciliberti et al
(Proc. Nat. Acad. Sci., 2007) and Wagner (Proc. R. Soc. B., 2008) propose a
potentially important link between the robustness and the evolvability of a
system. In particular, it has been suggested that robustness may actually lead
to the emergence of evolvability. Here we study two design principles,
redundancy and degeneracy, for achieving robustness and we show that they have
a dramatically different impact on the evolvability of the system. In
particular, purely redundant systems are found to have very little evolvability
while systems with degeneracy, i.e. distributed robustness, can be orders of
magnitude more evolvable. These results offer insights into the general
principles for achieving evolvability and may prove to be an important step
forward in the pursuit of evolvable representations in evolutionary
computation.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 09:59:39 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Whitacre",
"James M",
""
],
[
"Bender",
"Axel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0907.0329 | James Whitacre | James M Whitacre | Evidence of coevolution in multi-objective evolutionary algorithms | null | WorldComp 2009, Las Vegas, NV, USA | null | null | cs.NE cs.AI | http://creativecommons.org/licenses/by/3.0/ | This paper demonstrates that simple yet important characteristics of
coevolution can occur in evolutionary algorithms when only a few conditions are
met. We find that interaction-based fitness measurements such as fitness
(linear) ranking allow for a form of coevolutionary dynamics that is observed
when 1) changes are made in what solutions are able to interact during the
ranking process and 2) evolution takes place in a multi-objective environment.
This research contributes to the study of simulated evolution in a at least two
ways. First, it establishes a broader relationship between coevolution and
multi-objective optimization than has been previously considered in the
literature. Second, it demonstrates that the preconditions for coevolutionary
behavior are weaker than previously thought. In particular, our model indicates
that direct cooperation or competition between species is not required for
coevolution to take place. Moreover, our experiments provide evidence that
environmental perturbations can drive coevolutionary processes; a conclusion
that mirrors arguments put forth in dual phase evolution theory. In the
discussion, we briefly consider how our results may shed light onto this and
other recent theories of evolution.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 10:15:31 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Whitacre",
"James M",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0332 | James Whitacre | James M Whitacre | Survival of the flexible: explaining the recent dominance of
nature-inspired optimization within a rapidly evolving world | null | null | null | null | cs.NE cs.AI | http://creativecommons.org/licenses/by/3.0/ | Although researchers often comment on the rising popularity of
nature-inspired meta-heuristics (NIM), there has been a paucity of data to
directly support the claim that NIM are growing in prominence compared to other
optimization techniques. This study presents evidence that the use of NIM is
not only growing, but indeed appears to have surpassed mathematical
optimization techniques (MOT) in several important metrics related to academic
research activity (publication frequency) and commercial activity (patenting
frequency). Motivated by these findings, this article discusses some of the
possible origins of this growing popularity. I review different explanations
for NIM popularity and discuss why some of these arguments remain unsatisfying.
I argue that a compelling and comprehensive explanation should directly account
for the manner in which most NIM success has actually been achieved, e.g.
through hybridization and customization to different problem environments. By
taking a problem lifecycle perspective, this paper offers a fresh look at the
hypothesis that nature-inspired meta-heuristics derive much of their utility
from being flexible. I discuss global trends within the business environments
where optimization algorithms are applied and I speculate that highly flexible
algorithm frameworks could become increasingly popular within our diverse and
rapidly changing world.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 10:27:23 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Dec 2009 15:38:31 GMT"
},
{
"version": "v3",
"created": "Fri, 21 Jan 2011 09:28:20 GMT"
}
]
| 2011-01-24T00:00:00 | [
[
"Whitacre",
"James M",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0334 | James Whitacre | James M. Whitacre, Ruhul A. Sarker, Q. Tuan Pham | The Self-Organization of Interaction Networks for Nature-Inspired
Optimization | null | IEEE Transactions on Evolutionary Computation, Volume 12, Issue 2,
April 2008 Page(s):220 - 230 | 10.1109/TEVC.2007.900327 | null | cs.NE cs.AI | http://creativecommons.org/licenses/by/3.0/ | Over the last decade, significant progress has been made in understanding
complex biological systems, however there have been few attempts at
incorporating this knowledge into nature inspired optimization algorithms. In
this paper, we present a first attempt at incorporating some of the basic
structural properties of complex biological systems which are believed to be
necessary preconditions for system qualities such as robustness. In particular,
we focus on two important conditions missing in Evolutionary Algorithm
populations; a self-organized definition of locality and interaction epistasis.
We demonstrate that these two features, when combined, provide algorithm
behaviors not observed in the canonical Evolutionary Algorithm or in
Evolutionary Algorithms with structured populations such as the Cellular
Genetic Algorithm. The most noticeable change in algorithm behavior is an
unprecedented capacity for sustainable coexistence of genetically distinct
individuals within a single population. This capacity for sustained genetic
diversity is not imposed on the population but instead emerges as a natural
consequence of the dynamics of the system.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 10:36:13 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Whitacre",
"James M.",
""
],
[
"Sarker",
"Ruhul A.",
""
],
[
"Pham",
"Q. Tuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0340 | James Whitacre | James M. Whitacre, Hussein A. Abbass, Ruhul Sarker, Axel Bender,
Stephen Baker | Strategic Positioning in Tactical Scenario Planning | null | Genetic And Evolutionary Computation Conference 2008, Pages
1081-1088 | 10.1145/1389095.1389293 | null | cs.NE cs.AI | http://creativecommons.org/licenses/by/3.0/ | Capability planning problems are pervasive throughout many areas of human
interest with prominent examples found in defense and security. Planning
provides a unique context for optimization that has not been explored in great
detail and involves a number of interesting challenges which are distinct from
traditional optimization research. Planning problems demand solutions that can
satisfy a number of competing objectives on multiple scales related to
robustness, adaptiveness, risk, etc. The scenario method is a key approach for
planning. Scenarios can be defined for long-term as well as short-term plans.
This paper introduces computational scenario-based planning problems and
proposes ways to accommodate strategic positioning within the tactical planning
domain. We demonstrate the methodology in a resource planning problem that is
solved with a multi-objective evolutionary algorithm. Our discussion and
results highlight the fact that scenario-based planning is naturally framed
within a multi-objective setting. However, the conflicting objectives occur on
different system levels rather than within a single system alone. This paper
also contends that planning problems are of vital interest in many human
endeavors and that Evolutionary Computation may be well positioned for this
problem domain.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 10:56:52 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Whitacre",
"James M.",
""
],
[
"Abbass",
"Hussein A.",
""
],
[
"Sarker",
"Ruhul",
""
],
[
"Bender",
"Axel",
""
],
[
"Baker",
"Stephen",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0375 | Philippe Robert S. | L. Leskel\"a (MSA), Philippe Robert (INRIA), Florian Simatos | Interacting branching processes and linear file-sharing networks | null | Advances in Applied Probability, 42(3), 2010 | null | null | math.PR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | File-sharing networks are distributed systems used to disseminate files among
nodes of a communication network. The general simple principle of these systems
is that once a node has retrieved a file, it may become a server for this file.
In this paper, the capacity of these networks is analyzed with a stochastic
model when there is a constant flow of incoming requests for a given file. It
is shown that the problem can be solved by analyzing the asymptotic behavior of
a class of interacting branching processes. Several results of independent
interest concerning these branching processes are derived and then used to
study the file-sharing systems.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 13:05:08 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Apr 2010 12:36:18 GMT"
}
]
| 2010-05-12T00:00:00 | [
[
"Leskelä",
"L.",
"",
"MSA"
],
[
"Robert",
"Philippe",
"",
"INRIA"
],
[
"Simatos",
"Florian",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0907.0403 | Andreas Witzel | Krzysztof R. Apt and Andreas Witzel and Jonathan A. Zvesper | Common Knowledge in Interaction Structures | null | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider two simple variants of a framework for reasoning about knowledge
amongst communicating groups of players. Our goal is to clarify the resulting
epistemic issues. In particular, we investigate what is the impact of common
knowledge of the underlying hypergraph connecting the players, and under what
conditions common knowledge distributes over disjunction. We also obtain two
versions of the classic result that common knowledge cannot be achieved in the
absence of a simultaneous event (here a message sent to the whole group).
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 15:19:22 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Apt",
"Krzysztof R.",
""
],
[
"Witzel",
"Andreas",
""
],
[
"Zvesper",
"Jonathan A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0907.0404 | Saqib Saeed | Sohail Safdar, Jamil Ahmad, Shaftab Ahmed, M. Tayyab Asghar, Saqib
Saeed | Agent based Model for providing optimized, synchronized and failure free
execution of workflow process | This paper was published in the proceedings of 4th International
Conference on New Exploratory Technology (NEXT 2007) Seoul, Korea 25-27
October 2007 | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The main objective of this paper is to provide an optimized solution and
algorithm for the execution of a workflow process by ensuring the data
consistency, correctness, completeness among various tasks involved. The
solution proposed provides a synchronized and failure free flow of execution
among various tasks involved in a workflow process. A synchronizing agent is
bound at a very low level, i.e. with the workflow activity or task to get the
desired goals to be done and an algorithm is provided to show the execution of
workflow process completely.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 15:19:39 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Safdar",
"Sohail",
""
],
[
"Ahmad",
"Jamil",
""
],
[
"Ahmed",
"Shaftab",
""
],
[
"Asghar",
"M. Tayyab",
""
],
[
"Saeed",
"Saqib",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0907.0418 | Gary Huang | Andrew Kae, Gary B. Huang, Erik Learned-Miller | Bounding the Probability of Error for High Precision Recognition | null | null | null | UM-CS-2009-031 | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider models for which it is important, early in processing, to
estimate some variables with high precision, but perhaps at relatively low
rates of recall. If some variables can be identified with near certainty, then
they can be conditioned upon, allowing further inference to be done
efficiently. Specifically, we consider optical character recognition (OCR)
systems that can be bootstrapped by identifying a subset of correctly
translated document words with very high precision. This "clean set" is
subsequently used as document-specific training data. While many current OCR
systems produce measures of confidence for the identity of each letter or word,
thresholding these confidence values, even at very high values, still produces
some errors.
We introduce a novel technique for identifying a set of correct words with
very high precision. Rather than estimating posterior probabilities, we bound
the probability that any given word is incorrect under very general
assumptions, using an approximate worst case analysis. As a result, the
parameters of the model are nearly irrelevant, and we are able to identify a
subset of words, even in noisy documents, of which we are highly confident. On
our set of 10 documents, we are able to identify about 6% of the words on
average without making a single error. This ability to produce word lists with
very high precision allows us to use a family of models which depends upon such
clean word lists.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 16:09:47 GMT"
}
]
| 2009-07-03T00:00:00 | [
[
"Kae",
"Andrew",
""
],
[
"Huang",
"Gary B.",
""
],
[
"Learned-Miller",
"Erik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0907.0453 | Leonid (Aryeh) Kontorovich | Leonid Aryeh Kontorovich | Random DFAs are Efficiently PAC Learnable | withdrawn | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper has been withdrawn due to an error found by Dana Angluin and Lev
Reyzin.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 17:54:45 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jul 2009 08:59:45 GMT"
}
]
| 2009-07-20T00:00:00 | [
[
"Kontorovich",
"Leonid Aryeh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.0455 | Alessandro Pluchino | Alessandro Pluchino, Andrea Rapisarda, Cesare Garofalo | The Peter Principle Revisited: A Computational Study | final version published on Physica A, 10 pages, 4 figures, 1 table
(for on-line supplementary material see the link:
http://www.ct.infn.it/cactus/peter-links.html) | Physica A 389 (2010) 467-472 | 10.1016/j.physa.2009.09.045 | null | physics.soc-ph cs.GT nlin.AO physics.pop-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the late sixties the Canadian psychologist Laurence J. Peter advanced an
apparently paradoxical principle, named since then after him, which can be
summarized as follows: {\it 'Every new member in a hierarchical organization
climbs the hierarchy until he/she reaches his/her level of maximum
incompetence'}. Despite its apparent unreasonableness, such a principle would
realistically act in any organization where the mechanism of promotion rewards
the best members and where the mechanism at their new level in the hierarchical
structure does not depend on the competence they had at the previous level,
usually because the tasks of the levels are very different to each other. Here
we show, by means of agent based simulations, that if the latter two features
actually hold in a given model of an organization with a hierarchical
structure, then not only is the Peter principle unavoidable, but also it yields
in turn a significant reduction of the global efficiency of the organization.
Within a game theory-like approach, we explore different promotion strategies
and we find, counterintuitively, that in order to avoid such an effect the best
ways for improving the efficiency of a given organization are either to promote
each time an agent at random or to promote randomly the best and the worst
members in terms of competence.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 18:02:48 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Sep 2009 12:44:50 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Oct 2009 14:10:40 GMT"
}
]
| 2009-10-29T00:00:00 | [
[
"Pluchino",
"Alessandro",
""
],
[
"Rapisarda",
"Andrea",
""
],
[
"Garofalo",
"Cesare",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Physics",
"code": "physics.pop-ph",
"description": "Description coming soon",
"span": "(Popular Physics)"
}
]
|
0907.0472 | Xiaohu Shang | Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor | Capacity Regions and Sum-Rate Capacities of Vector Gaussian Interference
Channels | 33 pages, 1 figure, submitted to IEEE trans. on Information theory | null | 10.1109/TIT.2010.2059950 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The capacity regions of vector, or multiple-input multiple-output, Gaussian
interference channels are established for very strong interference and aligned
strong interference. Furthermore, the sum-rate capacities are established for Z
interference, noisy interference, and mixed (aligned weak/intermediate and
aligned strong) interference. These results generalize known results for scalar
Gaussian interference channels.
| [
{
"version": "v1",
"created": "Thu, 2 Jul 2009 23:50:15 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Shang",
"Xiaohu",
""
],
[
"Chen",
"Biao",
""
],
[
"Kramer",
"Gerhard",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0499 | Fahem Kebair | Fahem Kebair and Frederic Serin | Agent-Oriented Approach for Detecting and Managing Risks in Emergency
Situations | 5 | null | null | null | cs.AI cs.MA | http://creativecommons.org/licenses/by/3.0/ | This paper presents an agent-oriented approach to build a decision support
system aimed at helping emergency managers to detect and to manage risks. We
stress the flexibility and the adaptivity characteristics that are crucial to
build a robust and efficient system, able to resolve complex problems. The
system should be independent as much as possible from the subject of study.
Thereby, an original approach based on a mechanism of perception,
representation, characterisation and assessment is proposed. The work described
here is applied on the RoboCupRescue application. Experimentations and results
are provided.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 14:24:23 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Kebair",
"Fahem",
""
],
[
"Serin",
"Frederic",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0907.0505 | Xiaohu Shang | Xiaohu Shang, Biao Chen, H. Vincent Poor | Multi-User MISO Interference Channels with Single-User Detection:
Optimality of Beamforming and the Achievable Rate Region | 41 pages, 7 figures, submitted to IEEE trans. on Information Theory
in Apr. 2009 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | For a multi-user interference channel with multi-antenna transmitters and
single-antenna receivers, by restricting each transmitter to Gaussian input and
each receiver to a single-user detector, computing the largest achievable rate
region amounts to solving a family of non-convex optimization problems.
Recognizing the intrinsic connection between the signal power at the intended
receiver and the interference power at the unintended receiver, the original
family of non-convex optimization problems is converted into a new family of
convex optimization problems. It is shown that, for such interference channels
with each receiver implementing single-user detection, transmitter beamforming
can achieve all boundary points of the achievable rate region.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 00:08:41 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Shang",
"Xiaohu",
""
],
[
"Chen",
"Biao",
""
],
[
"Poor",
"H. Vincent",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0507 | James Whitacre | James M. Whitacre, Ruhul A. Sarker, Q. Tuan Pham | Spontaneous organization leads to robustness in evolutionary algorithms | This paper has been withdrawn so that it can be published in IJAIT
(International Journal of Artificial Intelligence Tools) | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The interaction networks of biological systems are known to take on several
non-random structural properties, some of which are believed to positively
influence system robustness. Researchers are only starting to understand how
these structural properties emerge, however suggested roles for component
fitness and community development (modularity) have attracted interest from the
scientific community. In this study, we apply some of these concepts to an
evolutionary algorithm and spontaneously organize its population using
information that the population receives as it moves over a fitness landscape.
More precisely, we employ fitness and clustering based driving forces for
guiding network structural dynamics, which in turn are controlled by the
population dynamics of an evolutionary algorithm. To evaluate the effect this
has on evolution, experiments are conducted on six engineering design problems
and six artificial test functions and compared against cellular genetic
algorithms and 16 other evolutionary algorithm designs. Our results indicate
that a self-organizing topology evolutionary algorithm exhibits surprisingly
robust search behavior with promising performance observed over short and long
time scales. After a careful analysis of these results, we conclude that the
coevolution between a population and its topology represents a powerful new
paradigm for designing robust search heuristics.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 00:34:32 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Feb 2011 02:35:11 GMT"
}
]
| 2011-02-08T00:00:00 | [
[
"Whitacre",
"James M.",
""
],
[
"Sarker",
"Ruhul A.",
""
],
[
"Pham",
"Q. Tuan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0516 | James Whitacre | James M Whitacre | Adaptation and Self-Organization in Evolutionary Algorithms | PhD Thesis | null | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Abbreviated Abstract: The objective of Evolutionary Computation is to solve
practical problems (e.g. optimization, data mining) by simulating the
mechanisms of natural evolution. This thesis addresses several topics related
to adaptation and self-organization in evolving systems with the overall aims
of improving the performance of Evolutionary Algorithms (EA), understanding its
relation to natural evolution, and incorporating new mechanisms for mimicking
complex biological systems.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 02:21:36 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Whitacre",
"James M",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0907.0520 | James Whitacre | Hussein Abbass, Axel Bender, Helen Dam, Stephen Baker, James M
Whitacre, Ruhul Sarker | Computational Scenario-based Capability Planning | GECCO-2008, Atlanta, GA, USA | null | 10.1145/1389095.1389378 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Scenarios are pen-pictures of plausible futures, used for strategic planning.
The aim of this investigation is to expand the horizon of scenario-based
planning through computational models that are able to aid the analyst in the
planning process. The investigation builds upon the advances of Information and
Communication Technology (ICT) to create a novel, flexible and customizable
computational capability-based planning methodology that is practical and
theoretically sound. We will show how evolutionary computation, in particular
evolutionary multi-objective optimization, can play a central role - both as an
optimizer and as a source for innovation.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 02:32:34 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Abbass",
"Hussein",
""
],
[
"Bender",
"Axel",
""
],
[
"Dam",
"Helen",
""
],
[
"Baker",
"Stephen",
""
],
[
"Whitacre",
"James M",
""
],
[
"Sarker",
"Ruhul",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0540 | Kees Middelburg | J. A. Bergstra, C. A. Middelburg | Inversive Meadows and Divisive Meadows | 18 pages; error corrected; 29 pages, combined with arXiv:0909.2088
[math.RA] and arXiv:0909.5271 [math.RA] | Journal of Applied Logic, 9(3):203--220, 2011 | 10.1016/j.jal.2011.03.001 | null | math.RA cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Inversive meadows are commutative rings with a multiplicative identity
element and a total multiplicative inverse operation whose value at 0 is 0.
Divisive meadows are inversive meadows with the multiplicative inverse
operation replaced by a division operation. We give finite equational
specifications of the class of all inversive meadows and the class of all
divisive meadows. It depends on the angle from which they are viewed whether
inversive meadows or divisive meadows must be considered more basic. We show
that inversive and divisive meadows of rational numbers can be obtained as
initial algebras of finite equational specifications. In the spirit of
Peacock's arithmetical algebra, we study variants of inversive and divisive
meadows without an additive identity element and/or an additive inverse
operation. We propose simple constructions of variants of inversive and
divisive meadows with a partial multiplicative inverse or division operation
from inversive and divisive meadows. Divisive meadows are more basic if these
variants are considered as well. We give a simple account of how mathematicians
deal with 1 / 0, in which meadows and a customary convention among
mathematicians play prominent parts, and we make plausible that a convincing
account, starting from the popular computer science viewpoint that 1 / 0 is
undefined, by means of some logic of partial functions is not attainable.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 06:42:28 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 07:14:16 GMT"
},
{
"version": "v3",
"created": "Tue, 2 Nov 2010 16:00:31 GMT"
}
]
| 2011-08-02T00:00:00 | [
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0907.0542 | Christine Michel | Christine Michel (LIESP, ICTT), Marc-Eric Bobillier-Chaumon (ICTT),
V\'eronique Cohen-Montandreau (ICTT), Franck Tarpin-Bernard (LIESP, ICTT) | D\'emarche d'\'evaluation de l'usage et des r\'epercussions
psychosociales d'un environnement STIC sur une population de personnes
\^ag\'ees en r\'esidence m\'edicalis\'ee | null | 17 \`eme conf\'erence francophone sur l'Interaction Homme-Machine,
Toulouse : France (2005) | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The MNESIS Project aims to see whether the use of computerized environment by
elderly people in medicalized residences stimulates their cognitive capacities
and contributes to a better integration, recognition or acceptance within their
social environment (friends, family, medical staff). In this paper we present
the protocol of evaluation that is defined to check this assumption. This
protocol is between users' centred traditional protocols (built on
investigations and indirect observation) and studies of Web Usage Mining (where
knowledge databases about the uses are built from traces of use). It allows
collecting direct and indirect information on a large scale and over long
periods.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 06:44:42 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Michel",
"Christine",
"",
"LIESP, ICTT"
],
[
"Bobillier-Chaumon",
"Marc-Eric",
"",
"ICTT"
],
[
"Cohen-Montandreau",
"Véronique",
"",
"ICTT"
],
[
"Tarpin-Bernard",
"Franck",
"",
"LIESP, ICTT"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0907.0589 | Rahul Gupta | Rahul Gupta, Sunita Sarawagi, Ajit A. Diwan | Generalized Collective Inference with Symmetric Clique Potentials | 30 pages | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Collective graphical models exploit inter-instance associative dependence to
output more accurate labelings. However existing models support very limited
kind of associativity which restricts accuracy gains. This paper makes two
major contributions. First, we propose a general collective inference framework
that biases data instances to agree on a set of {\em properties} of their
labelings. Agreement is encouraged through symmetric clique potentials. We show
that rich properties leads to bigger gains, and present a systematic inference
procedure for a large class of such properties. The procedure performs message
passing on the cluster graph, where property-aware messages are computed with
cluster specific algorithms. This provides an inference-only solution for
domain adaptation. Our experiments on bibliographic information extraction
illustrate significant test error reduction over unseen domains. Our second
major contribution consists of algorithms for computing outgoing messages from
clique clusters with symmetric clique potentials. Our algorithms are exact for
arbitrary symmetric potentials on binary labels and for max-like and
majority-like potentials on multiple labels. For majority potentials, we also
provide an efficient Lagrangian Relaxation based algorithm that compares
favorably with the exact algorithm. We present a 13/15-approximation algorithm
for the NP-hard Potts potential, with runtime sub-quadratic in the clique size.
In contrast, the best known previous guarantee for graphs with Potts potentials
is only 1/2. We empirically show that our method for Potts potentials is an
order of magnitude faster than the best alternatives, and our Lagrangian
Relaxation based algorithm for majority potentials beats the best applicable
heuristic -- ICM.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 11:32:47 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Jul 2009 13:31:01 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Gupta",
"Rahul",
""
],
[
"Sarawagi",
"Sunita",
""
],
[
"Diwan",
"Ajit A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0592 | James Whitacre | James M. Whitacre, Tuan Q. Pham, Ruhul A. Sarker | Credit Assignment in Adaptive Evolutionary Algorithms | null | Genetic And Evolutionary Computation Conference, 2006 | 10.1145/1143997.1144206 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, a new method for assigning credit to search operators is
presented. Starting with the principle of optimizing search bias, search
operators are selected based on an ability to create solutions that are
historically linked to future generations. Using a novel framework for defining
performance measurements, distributing credit for performance, and the
statistical interpretation of this credit, a new adaptive method is developed
and shown to outperform a variety of adaptive and non-adaptive competitors.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 11:02:25 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Whitacre",
"James M.",
""
],
[
"Pham",
"Tuan Q.",
""
],
[
"Sarker",
"Ruhul A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0595 | James Whitacre | James M. Whitacre, Tuan Q. Pham, Ruhul A. Sarker | Use of statistical outlier detection method in adaptive evolutionary
algorithms | null | Genetic And Evolutionary Computation Conference, 2006 | 10.1145/1143997.1144205 | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, the issue of adapting probabilities for Evolutionary Algorithm
(EA) search operators is revisited. A framework is devised for distinguishing
between measurements of performance and the interpretation of those
measurements for purposes of adaptation. Several examples of measurements and
statistical interpretations are provided. Probability value adaptation is
tested using an EA with 10 search operators against 10 test problems with
results indicating that both the type of measurement and its statistical
interpretation play significant roles in EA performance. We also find that
selecting operators based on the prevalence of outliers rather than on average
performance is able to provide considerable improvements to adaptive methods
and soundly outperforms the non-adaptive case.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 11:07:43 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Whitacre",
"James M.",
""
],
[
"Pham",
"Tuan Q.",
""
],
[
"Sarker",
"Ruhul A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0597 | James Whitacre | James M. Whitacre, Axel Bender, Stephen Baker, Qi Fan, Ruhul A.
Sarker, Hussein Abbass | Network Topology and Time Criticality Effects in the Modularised Fleet
Mix Problem | null | SimTecT 2007 conference, Melbourne Australia | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we explore the interplay between network topology and time
criticality in a military logistics system. A general goal of this work (and
previous work) is to evaluate land transportation requirements or, more
specifically, how to design appropriate fleets of military general service
vehicles that are tasked with the supply and re-supply of military units
dispersed in an area of operation. The particular focus of this paper is to
gain a better understanding of how the logistics environment changes when
current Army vehicles with fixed transport characteristics are replaced by a
new generation of modularised vehicles that can be configured
task-specifically. The experimental work is conducted within a well developed
strategic planning simulation environment which includes a scenario generation
engine for automatically sampling supply and re-supply missions and a
multi-objective meta-heuristic search algorithm (i.e. Evolutionary Algorithm)
for solving the particular scheduling and routing problems. The results
presented in this paper allow for a better understanding of how (and under what
conditions) a modularised vehicle fleet can provide advantages over the
currently implemented system.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 11:16:29 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Whitacre",
"James M.",
""
],
[
"Bender",
"Axel",
""
],
[
"Baker",
"Stephen",
""
],
[
"Fan",
"Qi",
""
],
[
"Sarker",
"Ruhul A.",
""
],
[
"Abbass",
"Hussein",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0598 | James Whitacre | Slawomir Wesolkowski, Michael Mazurek, James M. Whitacre, Axel Bender,
Hussein Abbass | Robustness and Adaptiveness Analysis of Future Fleets | null | SimtecT 2009 conference, Adelaide, Australia | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Making decisions about the structure of a future military fleet is a
challenging task. Several issues need to be considered such as the existence of
multiple competing objectives and the complexity of the operating environment.
A particular challenge is posed by the various types of uncertainty that the
future might hold. It is uncertain what future events might be encountered; how
fleet design decisions will influence and shape the future; and how present and
future decision makers will act based on available information, their personal
biases regarding the importance of different objectives, and their economic
preferences. In order to assist strategic decision-making, an analysis of
future fleet options needs to account for conditions in which these different
classes of uncertainty are exposed. It is important to understand what
assumptions a particular fleet is robust to, what the fleet can readily adapt
to, and what conditions present clear risks to the fleet. We call this the
analysis of a fleet's strategic positioning. This paper introduces how
strategic positioning can be evaluated using computer simulations. Our main aim
is to introduce a framework for capturing information that can be useful to a
decision maker and for defining the concepts of robustness and adaptiveness in
the context of future fleet design. We demonstrate our conceptual framework
using simulation studies of an air transportation fleet. We capture uncertainty
by employing an explorative scenario-based approach. Each scenario represents a
sampling of different future conditions, different model assumptions, and
different economic preferences. Proposed changes to a fleet are then analysed
based on their influence on the fleet's robustness, adaptiveness, and risk to
different scenarios.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 11:23:14 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Wesolkowski",
"Slawomir",
""
],
[
"Mazurek",
"Michael",
""
],
[
"Whitacre",
"James M.",
""
],
[
"Bender",
"Axel",
""
],
[
"Abbass",
"Hussein",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0611 | Serge Tichkiewitch | S. Butdee (KMRC), Chaiwat Noomtong (LGS), Serge Tichkiewitch (LGS) | A process planning system with feature based neural network search
strategy for aluminum extrusion die manufacturing | null | Asian International Journal of Science and Technology in
Production and Manufacturing Engineering 2, 1 (2009) 137-157 | null | null | cs.NE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Aluminum extrusion die manufacturing is a critical task for productive
improvement and increasing potential of competition in aluminum extrusion
industry. It causes to meet the efficiency not only consistent quality but also
time and production cost reduction. Die manufacturing consists first of die
design and process planning in order to make a die for extruding the customer's
requirement products. The efficiency of die design and process planning are
based on the knowledge and experience of die design and die manufacturer
experts. This knowledge has been formulated into a computer system called the
knowledge-based system. It can be reused to support a new die design and
process planning. Such knowledge can be extracted directly from die geometry
which is composed of die features. These features are stored in die feature
library to be prepared for producing a new die manufacturing. Die geometry is
defined according to the characteristics of the profile so we can reuse die
features from the previous similar profile design cases. This paper presents
the CaseXpert Process Planning System for die manufacturing based on feature
based neural network technique. Die manufacturing cases in the case library
would be retrieved with searching and learning method by neural network for
reusing or revising it to build a die design and process planning when a new
case is similar with the previous die manufacturing cases. The results of the
system are dies design and machining process. The system has been successfully
tested, it has been proved that the system can reduce planning time and respond
high consistent plans.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 12:08:13 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Butdee",
"S.",
"",
"KMRC"
],
[
"Noomtong",
"Chaiwat",
"",
"LGS"
],
[
"Tichkiewitch",
"Serge",
"",
"LGS"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
]
|
0907.0615 | Rigo Michel | Emilie Charlier, Tomi Karki, Michel Rigo | Multidimensional Generalized Automatic Sequences and Shape-symmetric
Morphic Words | null | null | null | null | cs.FL cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An infinite word is S-automatic if, for all n>=0, its (n + 1)st letter is the
output of a deterministic automaton fed with the representation of n in the
considered numeration system S. In this extended abstract, we consider an
analogous definition in a multidimensional setting and present the connection
to the shape-symmetric infinite words introduced by Arnaud Maes. More
precisely, for d>=2, we state that a multidimensional infinite word x : N^d \to
\Sigma over a finite alphabet \Sigma is S-automatic for some abstract
numeration system S built on a regular language containing the empty word if
and only if x is the image by a coding of a shape-symmetric infinite word.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 12:39:13 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Charlier",
"Emilie",
""
],
[
"Karki",
"Tomi",
""
],
[
"Rigo",
"Michel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.0616 | Philipp Weis | Philipp Weis, Neil Immerman | Structure Theorem and Strict Alternation Hierarchy for FO^2 on Words | null | Logical Methods in Computer Science, Volume 5, Issue 3 (August 4,
2009) lmcs:1159 | 10.2168/LMCS-5(3:4)2009 | null | cs.LO cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | It is well-known that every first-order property on words is expressible
using at most three variables. The subclass of properties expressible with only
two variables is also quite interesting and well-studied. We prove precise
structure theorems that characterize the exact expressive power of first-order
logic with two variables on words. Our results apply to both the case with and
without a successor relation. For both languages, our structure theorems show
exactly what is expressible using a given quantifier depth, n, and using m
blocks of alternating quantifiers, for any m \leq n. Using these
characterizations, we prove, among other results, that there is a strict
hierarchy of alternating quantifiers for both languages. The question whether
there was such a hierarchy had been completely open. As another consequence of
our structural results, we show that satisfiability for first-order logic with
two variables without successor, which is NEXP-complete in general, becomes
NP-complete once we only consider alphabets of a bounded size.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 12:28:01 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Aug 2009 23:05:40 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Weis",
"Philipp",
""
],
[
"Immerman",
"Neil",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0907.0620 | Rigo Michel | J. Bell, E. Charlier, A. S. Fraenkel, M. Rigo | A Decision Problem for Ultimately Periodic Sets in Non-standard
Numeration Systems | null | null | null | null | cs.FL cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Consider a non-standard numeration system like the one built over the
Fibonacci sequence where nonnegative integers are represented by words over
$\{0,1\}$ without two consecutive 1. Given a set $X$ of integers such that the
language of their greedy representations in this system is accepted by a finite
automaton, we consider the problem of deciding whether or not $X$ is a finite
union of arithmetic progressions. We obtain a decision procedure for this
problem, under some hypothesis about the considered numeration system. In a
second part, we obtain an analogous decision result for a particular class of
abstract numeration systems built on an infinite regular language.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 12:43:20 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Bell",
"J.",
""
],
[
"Charlier",
"E.",
""
],
[
"Fraenkel",
"A. S.",
""
],
[
"Rigo",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.0624 | Rigo Michel | M. Rigo, L. Waxweiler | A note on syndeticity, recognizable sets and Cobham's theorem | null | Bull. Eur. Assoc. Theor. Comput. Sci. EATCS 88 (2006), 169-173 | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note, we give an alternative proof of the following result. Let p, q
>= 2 be two multiplicatively independent integers. If an infinite set of
integers is both p- and q-recognizable, then it is syndetic. Notice that this
result is needed in the classical proof of the celebrated Cobham?s theorem.
Therefore the aim of this paper is to complete [13] and [1] to obtain an
accessible proof of Cobham?s theorem.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 12:59:02 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Rigo",
"M.",
""
],
[
"Waxweiler",
"L.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0907.0649 | Fabrice Theoleyre | Benoit Darties (LIG), Fabrice Theoleyre (LIG), Andrzej Duda (LIG) | A Divide-and-Conquer Scheme for Assigning Roles in Multi-Channel
Wireless Mesh Networks | null | IEEE Conference on Local Computer Networks (LCN), Zurich :
Switzerland (2009) | null | null | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A multi-channel MAC seems to be an interesting approach for improving network
throughput by multiplexing transmissions over orthogonal channels. In
particular, Molecular MAC has recently proposed to modify the standard IEEE
802.11 DCF access method to use dynamic channel switching for efficient packet
forwarding over multiple hops. However, this MAC layer requires role and
channel assignment to nodes: some of them use a static channel, while others
dynamically switch to neighbor channels on-demand. To assign roles and
channels, we extend the notion of the Weakly Connected Dominating Set, the
structure already used in clustering. More precisely, we adapt the WCDS
structure and introduce new constraints to define what we call a reversible
WCDS (r-WCDS), which is particularly suitable for wireless mesh networks
operating under Molecular MAC. We propose a divide-and-conquer scheme that
partitions the network into clusters with one leader per cluster solving a MILP
formulation to assign roles in its cluster. By appropriately defining the roles
at the border of clusters, we maintain global connectivity in the r-wcds.
Finally, our simulations show that the performance of the propose scheme is
close to a centralized algorithm.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 14:48:21 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Jul 2010 06:36:39 GMT"
}
]
| 2010-07-26T00:00:00 | [
[
"Darties",
"Benoit",
"",
"LIG"
],
[
"Theoleyre",
"Fabrice",
"",
"LIG"
],
[
"Duda",
"Andrzej",
"",
"LIG"
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0907.0678 | R Doomun | Piyush Kumar Shukla, Dr. S. Silakari, Dr. Sarita Singh Bhadoria | Design and Analysis of an Attack Resilient and Adaptive Medium access
Control Protocol for Computer Networks | 10 pages, International Journal of Computer Science and Information
Security | IJCSIS May 2009 Issue, Vol. 1, No. 1 | null | null | cs.CR cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The challenge of designing an efficient Medium Access Control (MAC) protocol
and analyzing it has been an important research topic for over 30 years. This
paper focuses on the performance analysis (through simulation) and modification
of a well known MAC protocol CSMA/CD. The existing protocol does not consider
the wastage of bandwidth due to unutilized periods of the channel. By
considering this fact, performance of MAC protocol can be enhanced. The purpose
of this work is to modify the existing protocol by enabling it to adapt
according to state of the network. The modified protocol takes appropriate
action whenever unutilized periods detected. In this way, to increase the
effective bandwidth utilization and determine how it behaves under increasing
load, and varying packet sizes. It will also include effects of attacks i.e.
Denial of service attacks, Replay Attack, Continuous Channel Access or
Exhaustion attack, Flooding attack, Jamming (Radio interference) attack,
Selective forwarding attack which degrade performance of MAC protocol. In
Continuous Channel Access or Exhaustion attack, a malicious node disrupts the
MAC protocol, by continuously requesting or transmitting over the channel. This
eventually leads a starvation for other nodes in the network w.r.t channel
access. remedy may be the network ignores excessive requests without sending
expensive radio transmissions. This limit however cannot drop below the
expected maximum data rate the network has to support. This limit is usually
coded into the protocol during the design phase and requires additional logic
also. Repeated application of these exhaustion or collision based MAC layer
attacks can lead into unfairness.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 17:11:28 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Shukla",
"Piyush Kumar",
""
],
[
"Silakari",
"Dr. S.",
""
],
[
"Bhadoria",
"Dr. Sarita Singh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0907.0691 | Chinh Hoang | Elaine M. Eschen, Chinh T. Hoang, R. Sritharan, Lorna Stewart | On the complexity of deciding whether the distinguishing chromatic
number of a graph is at most two | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In an article [3] published recently in this journal, it was shown that when
k >= 3, the problem of deciding whether the distinguishing chromatic number of
a graph is at most k is NP-hard. We consider the problem when k = 2. In regards
to the issue of solvability in polynomial time, we show that the problem is at
least as hard as graph automorphism but no harder than graph isomorphism.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 18:34:38 GMT"
}
]
| 2009-07-06T00:00:00 | [
[
"Eschen",
"Elaine M.",
""
],
[
"Hoang",
"Chinh T.",
""
],
[
"Sritharan",
"R.",
""
],
[
"Stewart",
"Lorna",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.0718 | Jonathan Sorenson | Jonathan P. Sorenson | A Randomized Sublinear Time Parallel GCD Algorithm for the EREW PRAM | null | Information Processing Letters 110 (2010) 198-201 | 10.1016/j.ipl.2009.12.008 | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a randomized parallel algorithm that computes the greatest common
divisor of two integers of n bits in length with probability 1-o(1) that takes
O(n loglog n / log n) expected time using n^{6+\epsilon} processors on the EREW
PRAM parallel model of computation. We believe this to be the first randomized
sublinear time algorithm on the EREW PRAM for this problem.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 21:12:38 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Jan 2010 21:58:58 GMT"
}
]
| 2010-01-15T00:00:00 | [
[
"Sorenson",
"Jonathan P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.0725 | Ertugrul Basar | Ertugrul Basar and Umit Aygolu | High-Rate Full-Diversity Space-Time Block Codes for Three and Four
Transmit Antennas | To appear in IET Communications, 21 pages, 4 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we deal with the design of high-rate, full-diversity, low
maximum likelihood (ML) decoding complexity space-time block codes (STBCs) with
code rates of 2 and 1.5 complex symbols per channel use for multiple-input
multiple output (MIMO) systems employing three and four transmit antennas. We
fill the empty slots of the existing STBCs from CIODs in their transmission
matrices by additional symbols and use the conditional ML decoding technique
which significantly reduces the ML decoding complexity of non-orthogonal STBCs
while ensuring full-diversity and high coding gain. First, two new schemes with
code rates of 2 and 1.5 are proposed for MIMO systems with four transmit
antennas. We show that our low-complexity rate-2 STBC outperforms the
corresponding best STBC recently proposed by Biglieri et al. for QPSK, due to
its superior coding gain while our rate-1.5 STBC outperforms the full-diversity
quasi-orthogonal STBC (QOSTBC). Then, two STBCs with code rates of 2 and 1.5
are proposed for three transmit antennas which are shown to outperform the
corresponding full-diversity QOSTBC for three transmit antennas. We prove by an
information-theoretic analysis that the capacities of new rate-2 STBCs for
three and four transmit antennas are much closer to the actual MIMO channel
capacity than the capacities of classical OSTBCs and CIODs.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 22:15:05 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Basar",
"Ertugrul",
""
],
[
"Aygolu",
"Umit",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0726 | Zoya Svitkina | Zachary Friggstad, Mohammad R. Salavatipour, Zoya Svitkina | Asymmetric Traveling Salesman Path and Directed Latency Problems | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study integrality gaps and approximability of two closely related problems
on directed graphs. Given a set V of n nodes in an underlying asymmetric metric
and two specified nodes s and t, both problems ask to find an s-t path visiting
all other nodes. In the asymmetric traveling salesman path problem (ATSPP), the
objective is to minimize the total cost of this path. In the directed latency
problem, the objective is to minimize the sum of distances on this path from s
to each node. Both of these problems are NP-hard. The best known approximation
algorithms for ATSPP had ratio O(log n) until the very recent result that
improves it to O(log n/ log log n). However, only a bound of O(sqrt(n)) for the
integrality gap of its linear programming relaxation has been known. For
directed latency, the best previously known approximation algorithm has a
guarantee of O(n^(1/2+eps)), for any constant eps > 0. We present a new
algorithm for the ATSPP problem that has an approximation ratio of O(log n),
but whose analysis also bounds the integrality gap of the standard LP
relaxation of ATSPP by the same factor. This solves an open problem posed by
Chekuri and Pal [2007]. We then pursue a deeper study of this linear program
and its variations, which leads to an algorithm for the k-person ATSPP (where k
s-t paths of minimum total length are sought) and an O(log n)-approximation for
the directed latency problem.
| [
{
"version": "v1",
"created": "Fri, 3 Jul 2009 22:42:23 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Jun 2010 23:44:37 GMT"
}
]
| 2010-06-03T00:00:00 | [
[
"Friggstad",
"Zachary",
""
],
[
"Salavatipour",
"Mohammad R.",
""
],
[
"Svitkina",
"Zoya",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.0741 | Travis Gagie | Travis Gagie and Yakov Nekrich | Tight Bounds for Online Stable Sorting | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Although many authors have considered how many ternary comparisons it takes
to sort a multiset $S$ of size $n$, the best known upper and lower bounds still
differ by a term linear in $n$. In this paper we restrict our attention to
online stable sorting and prove upper and lower bounds that are within (o (n))
not only of each other but also of the best known upper bound for offline
sorting. Specifically, we first prove that if the number of distinct elements
(\sigma = o (n / \log n)), then ((H + 1) n + o (n)) comparisons are sufficient,
where $H$ is the entropy of the distribution of the elements in $S$. We then
give a simple proof that ((H + 1) n - o (n)) comparisons are necessary in the
worst case.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 06:18:38 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Gagie",
"Travis",
""
],
[
"Nekrich",
"Yakov",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.0746 | Marcus Hutter | Marcus Hutter | Open Problems in Universal Induction & Intelligence | 32 LaTeX pages | Algorithms, 3:2 (2009) pages 879-906 | null | null | cs.AI cs.IT cs.LG math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Specialized intelligent systems can be found everywhere: finger print,
handwriting, speech, and face recognition, spam filtering, chess and other game
programs, robots, et al. This decade the first presumably complete mathematical
theory of artificial intelligence based on universal
induction-prediction-decision-action has been proposed. This
information-theoretic approach solidifies the foundations of inductive
inference and artificial intelligence. Getting the foundations right usually
marks a significant progress and maturing of a field. The theory provides a
gold standard and guidance for researchers working on intelligent algorithms.
The roots of universal induction have been laid exactly half-a-century ago and
the roots of universal intelligence exactly one decade ago. So it is timely to
take stock of what has been achieved and what remains to be done. Since there
are already good recent surveys, I describe the state-of-the-art only in
passing and refer the reader to the literature. This article concentrates on
the open problems in universal induction and its extension to universal
intelligence.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 08:45:22 GMT"
}
]
| 2010-12-30T00:00:00 | [
[
"Hutter",
"Marcus",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0748 | Paolo Frasca | Ruggero Carli, Fabio Fagnani, Paolo Frasca, Sandro Zampieri | Gossip consensus algorithms via quantized communication | Accepted for publication | null | null | null | math.OC cs.SY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the average consensus problem on a network of digital
links, and proposes a set of algorithms based on pairwise ''gossip''
communications and updates. We study the convergence properties of such
algorithms with the goal of answering two design questions, arising from the
literature: whether the agents should encode their communication by a
deterministic or a randomized quantizer, and whether they should use, and how,
exact information regarding their own states in the update.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 09:12:16 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Sep 2009 15:15:01 GMT"
}
]
| 2011-07-25T00:00:00 | [
[
"Carli",
"Ruggero",
""
],
[
"Fagnani",
"Fabio",
""
],
[
"Frasca",
"Paolo",
""
],
[
"Zampieri",
"Sandro",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
]
|
0907.0749 | Dan Ghica | Dan R. Ghica | Function Interface Models for Hardware Compilation: Types, Signatures,
Protocols | 25 pages, 8 figures | null | null | University of Birmingham Technical Report CSR-08-04 | cs.PL cs.AR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The problem of synthesis of gate-level descriptions of digital circuits from
behavioural specifications written in higher-level programming languages
(hardware compilation) has been studied for a long time yet a definitive
solution has not been forthcoming. The argument of this essay is mainly
methodological, bringing a perspective that is informed by recent developments
in programming-language theory. We argue that one of the major obstacles in the
way of hardware compilation becoming a useful and mature technology is the lack
of a well defined function interface model, i.e. a canonical way in which
functions communicate with arguments. We discuss the consequences of this
problem and propose a solution based on new developments in programming
language theory. We conclude by presenting a prototype implementation and some
examples illustrating our principles.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 09:24:26 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Ghica",
"Dan R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
]
|
0907.0774 | Nitin Saxena | G\'abor Ivanyos, Marek Karpinski, Nitin Saxena | Deterministic Polynomial Time Algorithms for Matrix Completion Problems | 14 pages, preliminary | LMS J. of Computation and Mathematics 17 (2014) | 10.1112/S1461157013000296 | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present new deterministic algorithms for several cases of the maximum rank
matrix completion problem (for short matrix completion), i.e. the problem of
assigning values to the variables in a given symbolic matrix as to maximize the
resulting matrix rank. Matrix completion belongs to the fundamental problems in
computational complexity with numerous important algorithmic applications,
among others, in computing dynamic transitive closures or multicast network
codings (Harvey et al SODA 2005, Harvey et al SODA 2006).
We design efficient deterministic algorithms for common generalizations of
the results of Lovasz and Geelen on this problem by allowing linear functions
in the entries of the input matrix such that the submatrices corresponding to
each variable have rank one. We present also a deterministic polynomial time
algorithm for finding the minimal number of generators of a given module
structure given by matrices. We establish further several hardness results
related to matrix algebras and modules. As a result we connect the classical
problem of polynomial identity testing with checking surjectivity (or
injectivity) between two given modules. One of the elements of our algorithm is
a construction of a greedy algorithm for finding a maximum rank element in the
more general setting of the problem. The proof methods used in this paper could
be also of independent interest.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 17:10:33 GMT"
},
{
"version": "v2",
"created": "Sat, 26 Dec 2009 01:17:38 GMT"
}
]
| 2014-07-11T00:00:00 | [
[
"Ivanyos",
"Gábor",
""
],
[
"Karpinski",
"Marek",
""
],
[
"Saxena",
"Nitin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.0783 | Hal Daum\'e III | Hal Daum\'e III | Bayesian Multitask Learning with Latent Hierarchies | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We learn multiple hypotheses for related tasks under a latent hierarchical
relationship between tasks. We exploit the intuition that for domain
adaptation, we wish to share classifier structure, but for multitask learning,
we wish to share covariance structure. Our hierarchical model is seen to
subsume several previously proposed multitask learning models and performs well
on three distinct real-world data sets.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 18:35:52 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.0784 | Hal Daum\'e III | Hal Daum\'e III | Cross-Task Knowledge-Constrained Self Training | null | null | null | null | cs.LG cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an algorithmic framework for learning multiple related tasks. Our
framework exploits a form of prior knowledge that relates the output spaces of
these tasks. We present PAC learning results that analyze the conditions under
which such learning is possible. We present results on learning a shallow
parser and named-entity recognition system that exploits our framework, showing
consistent improvements over baseline methods.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 18:42:01 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.0785 | Hal Daum\'e III | Hal Daum\'e III and Lyle Campbell | A Bayesian Model for Discovering Typological Implications | null | ACL 2007 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A standard form of analysis for linguistic typology is the universal
implication. These implications state facts about the range of extant
languages, such as ``if objects come after verbs, then adjectives come after
nouns.'' Such implications are typically discovered by painstaking hand
analysis over a small sample of languages. We propose a computational model for
assisting at this process. Our model is able to discover both well-known
implications as well as some novel implications that deserve further study.
Moreover, through a careful application of hierarchical analysis, we are able
to cope with the well-known sampling problem: languages are not independent.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 18:43:16 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
],
[
"Campbell",
"Lyle",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.0786 | Hal Daum\'e III | Hal Daum\'e III and John Langford and Daniel Marcu | Search-based Structured Prediction | null | Machine Learning Journal 2009 | null | null | cs.LG cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present Searn, an algorithm for integrating search and learning to solve
complex structured prediction problems such as those that occur in natural
language, speech, computational biology, and vision. Searn is a meta-algorithm
that transforms these complex problems into simple classification problems to
which any binary classifier may be applied. Unlike current algorithms for
structured learning that require decomposition of both the loss function and
the feature functions over the predicted structure, Searn is able to learn
prediction functions for any loss function and any class of features. Moreover,
Searn comes with a strong, natural theoretical guarantee: good performance on
the derived classification problems implies good performance on the structured
prediction problem.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 18:48:34 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
],
[
"Langford",
"John",
""
],
[
"Marcu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.0792 | James Raynolds | James E. Raynolds and Lenore M. Mullin | A generalized inner and outer product of arbitrary multi-dimensional
arrays using A Mathematics of Arrays (MoA) | null | null | null | null | cs.MS cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An algorithm has been devised to compute the inner and outer product between
two arbitrary multi-dimensional arrays A and B in a single piece of code. It
was derived using A Mathematics of Arrays (MoA) and the $\psi$-calculus.
Extensive tests of the new algorithm are presented for running in sequential as
well as OpenMP multiple processor modes.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 20:17:28 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Raynolds",
"James E.",
""
],
[
"Mullin",
"Lenore M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.0796 | James Raynolds | Lenore M. Mullin and James E. Raynolds | Tensors and n-d Arrays:A Mathematics of Arrays (MoA), psi-Calculus and
the Composition of Tensor and Array Operations | null | null | null | null | cs.MS cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Kronecker product is a key algorithm and is ubiquitous across the
physical, biological, and computation social sciences. Thus considerations of
optimal implementation are important. The need to have high performance and
computational reproducibility is paramount. Moreover, due to the need to
compose multiple Kronecker products, issues related to data structures, layout
and indexing algebra require a new look at an old problem. This paper discusses
the outer product/tensor product and a special case of the tensor product: the
Kronecker product, along with optimal implementation when composed, and mapped
to complex processor/memory hierarchies. We discuss how the use of ``A
Mathematics of Arrays" (MoA), and the psi-Calculus, (a calculus of indexing
with shapes), provides optimal, verifiable, reproducible, scalable, and
portable implementations of both hardware and software.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 20:38:39 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Mullin",
"Lenore M.",
""
],
[
"Raynolds",
"James E.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.0804 | Hal Daum\'e III | Hal Daum\'e III and Daniel Marcu | Induction of Word and Phrase Alignments for Automatic Document
Summarization | null | Computational Linguistics, 2005 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Current research in automatic single document summarization is dominated by
two effective, yet naive approaches: summarization by sentence extraction, and
headline generation via bag-of-words models. While successful in some tasks,
neither of these models is able to adequately capture the large set of
linguistic devices utilized by humans when they produce summaries. One possible
explanation for the widespread use of these models is that good techniques have
been developed to extract appropriate training data for them from existing
document/abstract and document/headline corpora. We believe that future
progress in automatic summarization will be driven both by the development of
more sophisticated, linguistically informed models, as well as a more effective
leveraging of document/abstract corpora. In order to open the doors to
simultaneously achieving both of these goals, we have developed techniques for
automatically producing word-to-word and phrase-to-phrase alignments between
documents and their human-written abstracts. These alignments make explicit the
correspondences that exist in such document/abstract pairs, and create a
potentially rich data source from which complex summarization algorithms may
learn. This paper describes experiments we have carried out to analyze the
ability of humans to perform such alignments, and based on these analyses, we
describe experiments for creating them automatically. Our model for the
alignment task is based on an extension of the standard hidden Markov model,
and learns to create alignments in a completely unsupervised fashion. We
describe our model in detail and present experimental results that show that
our model is able to learn to reliably identify word- and phrase-level
alignments in a corpus of <document,abstract> pairs.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 22:57:26 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
],
[
"Marcu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.0806 | Hal Daum\'e III | Hal Daum\'e III and Daniel Marcu | A Noisy-Channel Model for Document Compression | null | ACL 2002 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a document compression system that uses a hierarchical
noisy-channel model of text production. Our compression system first
automatically derives the syntactic structure of each sentence and the overall
discourse structure of the text given as input. The system then uses a
statistical hierarchical model of text production in order to drop
non-important syntactic and discourse constituents so as to generate coherent,
grammatical document compressions of arbitrary length. The system outperforms
both a baseline and a sentence-based compression system that operates by
simplifying sequentially all sentences in a text. Our results support the claim
that discourse knowledge plays an important role in document summarization.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 22:26:47 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
],
[
"Marcu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.0807 | Hal Daum\'e III | Hal Daum\'e III and Daniel Marcu | A Large-Scale Exploration of Effective Global Features for a Joint
Entity Detection and Tracking Model | null | HLT/EMNLP 2005 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Entity detection and tracking (EDT) is the task of identifying textual
mentions of real-world entities in documents, extending the named entity
detection and coreference resolution task by considering mentions other than
names (pronouns, definite descriptions, etc.). Like NE tagging and coreference
resolution, most solutions to the EDT task separate out the mention detection
aspect from the coreference aspect. By doing so, these solutions are limited to
using only local features for learning. In contrast, by modeling both aspects
of the EDT task simultaneously, we are able to learn using highly complex,
non-local features. We develop a new joint EDT model and explore the utility of
many features, demonstrating their effectiveness on this task.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 22:28:15 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
],
[
"Marcu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.0808 | Hal Daum\'e III | Hal Daum\'e III and Daniel Marcu | A Bayesian Model for Supervised Clustering with the Dirichlet Process
Prior | null | null | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We develop a Bayesian framework for tackling the supervised clustering
problem, the generic problem encountered in tasks such as reference matching,
coreference resolution, identity uncertainty and record linkage. Our clustering
model is based on the Dirichlet process prior, which enables us to define
distributions over the countably infinite sets that naturally arise in this
problem. We add supervision to our model by positing the existence of a set of
unobserved random variables (we call these "reference types") that are generic
across all clusters. Inference in our framework, which requires integrating
over infinitely many parameters, is solved using Markov chain Monte Carlo
techniques. We present algorithms for both conjugate and non-conjugate priors.
We present a simple--but general--parameterization of our model based on a
Gaussian assumption. We evaluate this model on one artificial task and three
real-world tasks, comparing it against both unsupervised and state-of-the-art
supervised algorithms. Our results show that our model is able to outperform
other models across a variety of tasks and performance metrics.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 22:32:58 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
],
[
"Marcu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.0809 | Hal Daum\'e III | Hal Daum\'e III and Daniel Marcu | Learning as Search Optimization: Approximate Large Margin Methods for
Structured Prediction | null | ICML 2005 | null | null | cs.LG cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Mappings to structured output spaces (strings, trees, partitions, etc.) are
typically learned using extensions of classification algorithms to simple
graphical structures (eg., linear chains) in which search and parameter
estimation can be performed exactly. Unfortunately, in many complex problems,
it is rare that exact search or parameter estimation is tractable. Instead of
learning exact models and searching via heuristic means, we embrace this
difficulty and treat the structured output problem in terms of approximate
search. We present a framework for learning as search optimization, and two
parameter updates with convergence theorems and bounds. Empirical evidence
shows that our integrated approach to learning and decoding can outperform
exact models at smaller computational cost.
| [
{
"version": "v1",
"created": "Sat, 4 Jul 2009 22:34:25 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Daumé",
"Hal",
"III"
],
[
"Marcu",
"Daniel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.0821 | Chengqing Li | Chengqing Li, Shujun Li, Kwok-Tung Lo | Breaking a new substitution-diffusion based image cipher using chaotic
standard and logistic maps | 7 pages, 2 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, an image encryption scheme based on chaotic standard and logistic
maps was proposed. This paper studies the security of the scheme and shows that
it can be broken with only one chosen-plaintext. Some other security defects of
the scheme are also reported.
| [
{
"version": "v1",
"created": "Sun, 5 Jul 2009 03:40:38 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Lo",
"Kwok-Tung",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0907.0877 | Stephen Bloom | S.L. Bloom and Z. Esik | Algebraic Ordinals | 30 pages | null | null | null | cs.FL cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An algebraic tree T is one determined by a finite system of fixed point
equations. The frontier \Fr(T) of an algebraic tree t is linearly ordered by
the lexicographic order \lex. When (\Fr(T),\lex) is well-ordered, its order
type is an \textbf{algebraic ordinal}. We prove that the algebraic ordinals are
exactly the ordinals less than $\omega^{\omega^\omega}$.
| [
{
"version": "v1",
"created": "Sun, 5 Jul 2009 18:24:28 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Feb 2010 14:49:46 GMT"
},
{
"version": "v3",
"created": "Mon, 8 Feb 2010 14:49:21 GMT"
}
]
| 2010-02-08T00:00:00 | [
[
"Bloom",
"S. L.",
""
],
[
"Esik",
"Z.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0907.0884 | Wolfgang Mulzer | Nir Ailon, Bernard Chazelle, Kenneth L. Clarkson, Ding Liu, Wolfgang
Mulzer, C. Seshadhri | Self-Improving Algorithms | 26 pages, 8 figures, preliminary versions appeared at SODA 2006 and
SoCG 2008. Thorough revision to improve the presentation of the paper | SIAM Journal on Computing (SICOMP), 40(2), 2011, pp. 350-375 | 10.1137/090766437 | null | cs.DS cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate ways in which an algorithm can improve its expected
performance by fine-tuning itself automatically with respect to an unknown
input distribution D. We assume here that D is of product type. More precisely,
suppose that we need to process a sequence I_1, I_2, ... of inputs I = (x_1,
x_2, ..., x_n) of some fixed length n, where each x_i is drawn independently
from some arbitrary, unknown distribution D_i. The goal is to design an
algorithm for these inputs so that eventually the expected running time will be
optimal for the input distribution D = D_1 * D_2 * ... * D_n.
We give such self-improving algorithms for two problems: (i) sorting a
sequence of numbers and (ii) computing the Delaunay triangulation of a planar
point set. Both algorithms achieve optimal expected limiting complexity. The
algorithms begin with a training phase during which they collect information
about the input distribution, followed by a stationary regime in which the
algorithms settle to their optimized incarnations.
| [
{
"version": "v1",
"created": "Sun, 5 Jul 2009 19:48:43 GMT"
},
{
"version": "v2",
"created": "Mon, 18 Oct 2010 09:43:17 GMT"
}
]
| 2011-05-30T00:00:00 | [
[
"Ailon",
"Nir",
""
],
[
"Chazelle",
"Bernard",
""
],
[
"Clarkson",
"Kenneth L.",
""
],
[
"Liu",
"Ding",
""
],
[
"Mulzer",
"Wolfgang",
""
],
[
"Seshadhri",
"C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0907.0907 | Sariel Har-Peled | Sariel Har-Peled | Randomized Incremental Construction of Compressed Quadtrees | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a simple randomized incremental algorithm for building compressed
quadtrees. The resulting algorithm seems to be simpler than previously known
algorithms for this task.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 03:03:42 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Jul 2009 15:08:25 GMT"
}
]
| 2009-07-09T00:00:00 | [
[
"Har-Peled",
"Sariel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0907.0914 | Yoshiyuki Kabashima | Y. Kabashima, T. Wadayama and T. Tanaka | A typical reconstruction limit of compressed sensing based on Lp-norm
minimization | 12 pages, 2 figures | J. Stat. Mech. (2009) L09003 (12 pages) | 10.1088/1742-5468/2009/09/L09003 | null | cs.IT cond-mat.dis-nn math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of reconstructing an $N$-dimensional continuous
vector $\bx$ from $P$ constraints which are generated by its linear
transformation under the assumption that the number of non-zero elements of
$\bx$ is typically limited to $\rho N$ ($0\le \rho \le 1$). Problems of this
type can be solved by minimizing a cost function with respect to the $L_p$-norm
$||\bx||_p=\lim_{\epsilon \to +0}\sum_{i=1}^N |x_i|^{p+\epsilon}$, subject to
the constraints under an appropriate condition. For several $p$, we assess a
typical case limit $\alpha_c(\rho)$, which represents a critical relation
between $\alpha=P/N$ and $\rho$ for successfully reconstructing the original
vector by minimization for typical situations in the limit $N,P \to \infty$
with keeping $\alpha$ finite, utilizing the replica method. For $p=1$,
$\alpha_c(\rho)$ is considerably smaller than its worst case counterpart, which
has been rigorously derived by existing literature of information theory.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 05:38:16 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Dec 2009 07:04:22 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Kabashima",
"Y.",
""
],
[
"Wadayama",
"T.",
""
],
[
"Tanaka",
"T.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0907.0929 | Marc Shapiro | Mihai Letia (LIP), Nuno Pregui\c{c}a (CITI/Sep. Inform\'atica, FCT),
Marc Shapiro (LIP6, Inria Rocquencourt) | CRDTs: Consistency without concurrency control | null | null | null | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A CRDT is a data type whose operations commute when they are concurrent.
Replicas of a CRDT eventually converge without any complex concurrency control.
As an existence proof, we exhibit a non-trivial CRDT: a shared edit buffer
called Treedoc. We outline the design, implementation and performance of
Treedoc. We discuss how the CRDT concept can be generalised, and its
limitations.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 08:01:05 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Letia",
"Mihai",
"",
"LIP"
],
[
"Preguiça",
"Nuno",
"",
"CITI/Sep. Informática, FCT"
],
[
"Shapiro",
"Marc",
"",
"LIP6, Inria Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0907.0931 | Danny Bickson | Danny Bickson and Danny Dolev | Distributed Sensor Selection using a Truncated Newton Method | Submitted for publication | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a new distributed algorithm for computing a truncated Newton
method, where the main diagonal of the Hessian is computed using belief
propagation. As a case study for this approach, we examine the sensor selection
problem, a Boolean convex optimization problem. We form two distributed
algorithms. The first algorithm is a distributed version of the interior point
method by Joshi and Boyd, and the second algorithm is an order of magnitude
faster approximation. As an example application we discuss distributed anomaly
detection in networks. We demonstrate the applicability of our solution using
both synthetic data and real traffic logs collected from the Abilene Internet
backbone.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 08:05:49 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Jan 2010 19:31:17 GMT"
}
]
| 2010-01-14T00:00:00 | [
[
"Bickson",
"Danny",
""
],
[
"Dolev",
"Danny",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0937 | Rapha\"el Rossignol | Nadia Creignou, Herve Daude, Uwe Egly and Raphael Rossignol | The threshold for random (1,2)-QSAT | 20 pages. Preliminary, conference versions of this article appeared
in SAT08 and SAT09 | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The QSAT problem is the quantified version of the SAT problem. We show the
existence of a threshold effect for the phase transition associated with the
satisfiability of random quantified extended 2-CNF formulas. We consider
boolean CNF formulas of the form $\forall X \exists Y \varphi(X,Y)$, where $X$
has $m$ variables, $Y$ has $n$ variables and each clause in $\varphi$ has one
literal from $X$ and two from $Y$. For such formulas, we show that the
threshold phenomenon is controlled by the ratio between the number of clauses
and the number $n$ of existential variables. Then we give the exact location of
the associated critical ratio $c^{*}$. Indeed, we prove that $c^{*}$ is a
decreasing function of $ \alpha$, where $\alpha$ is the limiting value of $m /
\log (n)$ when $n$ tends to infinity.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 15:30:21 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Creignou",
"Nadia",
""
],
[
"Daude",
"Herve",
""
],
[
"Egly",
"Uwe",
""
],
[
"Rossignol",
"Raphael",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.0939 | Thierry Petit | Thierry Petit and Emmanuel Poder | The Soft Cumulative Constraint | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This research report presents an extension of Cumulative of Choco constraint
solver, which is useful to encode over-constrained cumulative problems. This
new global constraint uses sweep and task interval violation-based algorithms.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 09:11:42 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Jul 2009 09:43:51 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Petit",
"Thierry",
""
],
[
"Poder",
"Emmanuel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.0942 | Rigo Michel | Charlier Emilie, Le Gonidec Marion, Rigo Michel | Representing Real Numbers in a Generalized Numeration Systems | 18 pages | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how to represent an interval of real numbers in an abstract
numeration system built on a language that is not necessarily regular. As an
application, we consider representations of real numbers using the Dyck
language. We also show that our framework can be applied to the rational base
numeration systems.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 09:17:02 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Emilie",
"Charlier",
""
],
[
"Marion",
"Le Gonidec",
""
],
[
"Michel",
"Rigo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0907.0944 | Yves Wiaux | Y. Wiaux, G. Puy, Y. Boursier, P. Vandergheynst | Spread spectrum for imaging techniques in radio interferometry | 10 pages, 3 figures. Version 2 matches version accepted for
publication in MNRAS. Changes include minor clarifications | Mon. Not. R. Astron. Soc. 400 (2009) 1029 | 10.1111/j.1365-2966.2009.15519.x | null | astro-ph.IM cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the probe of astrophysical signals through radio interferometers
with small field of view and baselines with non-negligible and constant
component in the pointing direction. In this context, the visibilities measured
essentially identify with a noisy and incomplete Fourier coverage of the
product of the planar signals with a linear chirp modulation. In light of the
recent theory of compressed sensing and in the perspective of defining the best
possible imaging techniques for sparse signals, we analyze the related spread
spectrum phenomenon and suggest its universality relative to the sparsity
dictionary. Our results rely both on theoretical considerations related to the
mutual coherence between the sparsity and sensing dictionaries, as well as on
numerical simulations.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 09:20:39 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Aug 2009 10:02:45 GMT"
}
]
| 2009-11-16T00:00:00 | [
[
"Wiaux",
"Y.",
""
],
[
"Puy",
"G.",
""
],
[
"Boursier",
"Y.",
""
],
[
"Vandergheynst",
"P.",
""
]
]
| [
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.0971 | Yann Laigle-Chapuy | Fr\'ed\'eric Didier, Yann Laigle-Chapuy (INRIA Rocquencourt) | Attacking the combination generator | null | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present one of the most efficient attacks against the combination
generator. This attack is inherent to this system as its only assumption is
that the filtering function has a good autocorrelation. This is usually the
case if the system is designed to be resistant to other kinds of attacks. We
use only classical tools, namely vectorial correlation, weight 4 multiples and
Walsh transform.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 11:45:19 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Jul 2009 06:56:22 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Didier",
"Frédéric",
"",
"INRIA Rocquencourt"
],
[
"Laigle-Chapuy",
"Yann",
"",
"INRIA Rocquencourt"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0907.1005 | Julien Cohen | Julien Cohen (LINA) | A class of structured P2P systems supporting browsing | 14 pages | null | null | null | cs.IR cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Browsing is a way of finding documents in a large amount of data which is
complementary to querying and which is particularly suitable for multimedia
documents. Locating particular documents in a very large collection of
multimedia documents such as the ones available in peer to peer networks is a
difficult task. However, current peer to peer systems do not allow to do this
by browsing. In this report, we show how one can build a peer to peer system
supporting a kind of browsing. In our proposal, one must extend an existing
distributed hash table system with a few features : handling partial hash-keys
and providing appropriate routing mechanisms for these hash-keys. We give such
an algorithm for the particular case of the Tapestry distributed hash table.
This is a work in progress as no proper validation has been done yet.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 14:24:27 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Cohen",
"Julien",
"",
"LINA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0907.1012 | Chao-Yang Pang | Chao-Yang Pang, Wei Hu, Xia Li, and Be-Qiong Hu | Apply Local Clustering Method to Improve the Running Speed of Ant Colony
Optimization | 21 pages, 5figures | null | null | null | cs.NE cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Ant Colony Optimization (ACO) has time complexity O(t*m*N*N), and its typical
application is to solve Traveling Salesman Problem (TSP), where t, m, and N
denotes the iteration number, number of ants, number of cities respectively.
Cutting down running time is one of study focuses, and one way is to decrease
parameter t and N, especially N. For this focus, the following method is
presented in this paper. Firstly, design a novel clustering algorithm named
Special Local Clustering algorithm (SLC), then apply it to classify all cities
into compact classes, where compact class is the class that all cities in this
class cluster tightly in a small region. Secondly, let ACO act on every class
to get a local TSP route. Thirdly, all local TSP routes are jointed to form
solution. Fourthly, the inaccuracy of solution caused by clustering is
eliminated. Simulation shows that the presented method improves the running
speed of ACO by 200 factors at least. And this high speed is benefit from two
factors. One is that class has small size and parameter N is cut down. The
route length at every iteration step is convergent when ACO acts on compact
class. The other factor is that, using the convergence of route length as
termination criterion of ACO and parameter t is cut down.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 15:53:11 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Jul 2009 00:24:58 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Pang",
"Chao-Yang",
""
],
[
"Hu",
"Wei",
""
],
[
"Li",
"Xia",
""
],
[
"Hu",
"Be-Qiong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.1050 | Filippo Radicchi | Filippo Radicchi, Santo Fortunato, Benjamin Markines, Alessandro
Vespignani | Diffusion of scientific credits and the ranking of scientists | Revised version. 11 pages, 10 figures, 1 table. The portal to compute
the rankings of scientists is at http://www.physauthorsrank.org | Phys. Rev. E 80, 056103 (2009) | 10.1103/PhysRevE.80.056103 | null | physics.soc-ph cs.DL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Recently, the abundance of digital data enabled the implementation of graph
based ranking algorithms that provide system level analysis for ranking
publications and authors. Here we take advantage of the entire Physical Review
publication archive (1893-2006) to construct authors' networks where weighted
edges, as measured from opportunely normalized citation counts, define a proxy
for the mechanism of scientific credit transfer. On this network we define a
ranking method based on a diffusion algorithm that mimics the spreading of
scientific credits on the network. We compare the results obtained with our
algorithm with those obtained by local measures such as the citation count and
provide a statistical analysis of the assignment of major career awards in the
area of Physics. A web site where the algorithm is made available to perform
customized rank analysis can be found at the address
http://www.physauthorsrank.org
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 17:47:28 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Sep 2009 12:34:41 GMT"
}
]
| 2009-11-11T00:00:00 | [
[
"Radicchi",
"Filippo",
""
],
[
"Fortunato",
"Santo",
""
],
[
"Markines",
"Benjamin",
""
],
[
"Vespignani",
"Alessandro",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0907.1054 | Kaushik Sinha | Mikhail Belkin and Kaushik Sinha | Learning Gaussian Mixtures with Arbitrary Separation | null | null | null | null | cs.LG cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a method for learning the parameters of a mixture of
$k$ identical spherical Gaussians in $n$-dimensional space with an arbitrarily
small separation between the components. Our algorithm is polynomial in all
parameters other than $k$. The algorithm is based on an appropriate grid search
over the space of parameters. The theoretical analysis of the algorithm hinges
on a reduction of the problem to 1 dimension and showing that two 1-dimensional
mixtures whose densities are close in the $L^2$ norm must have similar means
and mixing coefficients. To produce such a lower bound for the $L^2$ norm in
terms of the distances between the corresponding means, we analyze the behavior
of the Fourier transform of a mixture of Gaussians in 1 dimension around the
origin, which turns out to be closely related to the properties of the
Vandermonde matrix obtained from the component means. Analysis of this matrix
together with basic function approximation results allows us to provide a lower
bound for the norm of the mixture in the Fourier domain.
In recent years much research has been aimed at understanding the
computational aspects of learning parameters of Gaussians mixture distributions
in high dimension. To the best of our knowledge all existing work on learning
parameters of Gaussian mixtures assumes minimum separation between components
of the mixture which is an increasing function of either the dimension of the
space $n$ or the number of components $k$. In our paper we prove the first
result showing that parameters of a $n$-dimensional Gaussian mixture model with
arbitrarily small component separation can be learned in time polynomial in
$n$.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 17:41:57 GMT"
},
{
"version": "v2",
"created": "Thu, 13 May 2010 19:20:36 GMT"
}
]
| 2010-05-14T00:00:00 | [
[
"Belkin",
"Mikhail",
""
],
[
"Sinha",
"Kaushik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.1061 | Venkatesh Saligrama | George Kamal Atia and Venkatesh Saligrama | Boolean Compressed Sensing and Noisy Group Testing | In this revision: reorganized the paper, added citations to related
work, and fixed some bugs | IEEE Trans.Inf.Theory 58 (2012) 1880-1901 | 10.1109/TIT.2011.2178156 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The fundamental task of group testing is to recover a small distinguished
subset of items from a large population while efficiently reducing the total
number of tests (measurements). The key contribution of this paper is in
adopting a new information-theoretic perspective on group testing problems. We
formulate the group testing problem as a channel coding/decoding problem and
derive a single-letter characterization for the total number of tests used to
identify the defective set. Although the focus of this paper is primarily on
group testing, our main result is generally applicable to other compressive
sensing models.
The single letter characterization is shown to be order-wise tight for many
interesting noisy group testing scenarios. Specifically, we consider an
additive Bernoulli($q$) noise model where we show that, for $N$ items and $K$
defectives, the number of tests $T$ is $O(\frac{K\log N}{1-q})$ for arbitrarily
small average error probability and $O(\frac{K^2\log N}{1-q})$ for a worst case
error criterion. We also consider dilution effects whereby a defective item in
a positive pool might get diluted with probability $u$ and potentially missed.
In this case, it is shown that $T$ is $O(\frac{K\log N}{(1-u)^2})$ and
$O(\frac{K^2\log N}{(1-u)^2})$ for the average and the worst case error
criteria, respectively. Furthermore, our bounds allow us to verify existing
known bounds for noiseless group testing including the deterministic noise-free
case and approximate reconstruction with bounded distortion. Our proof of
achievability is based on random coding and the analysis of a Maximum
Likelihood Detector, and our information theoretic lower bound is based on
Fano's inequality.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 18:13:34 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Nov 2009 20:33:32 GMT"
},
{
"version": "v3",
"created": "Tue, 14 Sep 2010 20:37:52 GMT"
},
{
"version": "v4",
"created": "Thu, 23 Dec 2010 23:43:32 GMT"
},
{
"version": "v5",
"created": "Tue, 12 Jun 2012 20:54:52 GMT"
},
{
"version": "v6",
"created": "Tue, 10 Dec 2013 15:31:16 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Atia",
"George Kamal",
""
],
[
"Saligrama",
"Venkatesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1065 | Ramasuri Narayanam | Ramasuri Narayanam, and Y. Narahari | Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol
for Ad hoc Networks with Rational Nodes | This version of the manuscript is published in IEEE Journal on
Selected Areas in Communications (IEEE JSAC), VOL. 26, NO. 7, September 2008 | null | null | null | cs.GT cs.AI cs.DC cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Nodes in an ad hoc wireless network incur certain costs for forwarding
packets since packet forwarding consumes the resources of the nodes. If the
nodes are rational, free packet forwarding by the nodes cannot be taken for
granted and incentive based protocols are required to stimulate cooperation
among the nodes. Existing incentive based approaches are based on the VCG
(Vickrey-Clarke-Groves) mechanism which leads to high levels of incentive
budgets and restricted applicability to only certain topologies of networks.
Moreover, the existing approaches have only focused on unicast and multicast.
Motivated by this, we propose an incentive based broadcast protocol that
satisfies Bayesian incentive compatibility and minimizes the incentive budgets
required by the individual nodes. The proposed protocol, which we call {\em
BIC-B} (Bayesian incentive compatible broadcast) protocol, also satisfies
budget balance. We also derive a necessary and sufficient condition for the
ex-post individual rationality of the BIC-B protocol. The {\em BIC-B} protocol
exhibits superior performance in comparison to a dominant strategy incentive
compatible broadcast protocol.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 18:25:11 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Narayanam",
"Ramasuri",
""
],
[
"Narahari",
"Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0907.1072 | Aaron Sterling | Aaron Sterling | Self-Assembling Systems are Distributed Systems | Withdrawing because I would like to polish this before submitting it
publicly again | null | null | null | cs.FL cs.DC cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In 2004, Klavins et al. introduced the use of graph grammars to describe --
and to program -- systems of self-assembly. We show that these graph grammars
can be embedded in a graph rewriting characterization of distributed systems
that was proposed by Degano and Montanari over twenty years ago. We apply this
embedding to generalize Soloveichik and Winfree's local determinism criterion
(for achieving a unique terminal assembly), from assembly systems of 4-sided
tiles that embed in the plane, to arbitrary graph assembly systems. We present
a partial converse of the embedding result, by providing sufficient conditions
under which systems of distributed processors can be simulated by graph
assembly systems topologically, in the plane, and in 3-space. We conclude by
defining a new complexity measure: "surface cost" (essentially the convex hull
of the space inhabited by agents at the conclusion of a self-assembled
computation). We show that, for growth-bounded graphs, executing a subroutine
to find a Maximum Independent Set only increases the surface cost of a
self-assembling computation by a constant factor. We obtain this complexity
bound by using the simulation results to import the distributed computing
notions of "local synchronizer" and "deterministic coin flipping" into
self-assembly.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 19:04:52 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jul 2011 14:01:27 GMT"
}
]
| 2011-07-21T00:00:00 | [
[
"Sterling",
"Aaron",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0907.1080 | Matt Gibson | Matt Gibson, Gaurav Kanade, Erik Krohn, Kasturi Varadarajan | Quasi-Polynomial Time Approximation Schemes for Target Tracking | 16 pages, 10 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of tracking $n$ targets in the plane using $2n$
cameras. We can use two cameras to estimate the location of a target. We are
then interested in forming $n$ camera pairs where each camera belongs to
exactly one pair, followed by forming a matching between the targets and camera
pairs so as to best estimate the locations of each of the targets. We consider
a special case of this problem where each of the cameras are placed along a
horizontal line $l$, and we consider two objective functions which have been
shown to give good estimates of the locations of the targets when the distances
between the targets and the cameras are sufficiently large. In the first
objective, the value of an assignment of a camera pair to a target is the
tracking angle formed by the assignment. Here, we are interested in maximizing
the sum of these tracking angles. A polynomial time 2-approximation is known
for this problem. We give a quasi-polynomial time algorithm that returns a
solution whose value is at least a $(1-\epsilon)$ factor of the value of an
optimal solution for any $\epsilon > 0$. In the second objective, the cost of
an assignment of a camera pair to a target is the ratio of the vertical
distance between the target and $l$ to the horizontal distance between the
cameras in the camera pair. In this setting, we are interested in minimizing
the sum of these ratios. A polynomial time 2-approximation is known for this
problem. We give a quasi-polynomial time algorithm that returns a solution
whose value is at most a $(1+\epsilon)$ factor of the value of an optimal
solution for any $\epsilon > 0$.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 19:55:38 GMT"
}
]
| 2009-07-07T00:00:00 | [
[
"Gibson",
"Matt",
""
],
[
"Kanade",
"Gaurav",
""
],
[
"Krohn",
"Erik",
""
],
[
"Varadarajan",
"Kasturi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0907.1099 | Niranjay Ravindran | Niranjay Ravindran, Nihar Jindal | Multi-User Diversity vs. Accurate Channel State Information in MIMO
Downlink Channels | Submitted to IEEE Transactions on Communications, July 2009 | null | 10.1109/TWC.2012.071612.101350 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In a multiple transmit antenna, single antenna per receiver downlink channel
with limited channel state feedback, we consider the following question: given
a constraint on the total system-wide feedback load, is it preferable to get
low-rate/coarse channel feedback from a large number of receivers or
high-rate/high-quality feedback from a smaller number of receivers? Acquiring
feedback from many receivers allows multi-user diversity to be exploited, while
high-rate feedback allows for very precise selection of beamforming directions.
We show that there is a strong preference for obtaining high-quality feedback,
and that obtaining near-perfect channel information from as many receivers as
possible provides a significantly larger sum rate than collecting a few
feedback bits from a large number of users.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 20:39:39 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Ravindran",
"Niranjay",
""
],
[
"Jindal",
"Nihar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1100 | Siu Chin | Mark Girolami, Ben Calderhead and Siu A. Chin | Riemannian Manifold Hamiltonian Monte Carlo | This paper has been withdrawn by the posting author because he is no
longer a co-author of this work | null | null | null | stat.CO cs.NA math.NA math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The paper proposes a Riemannian Manifold Hamiltonian Monte Carlo sampler to
resolve the shortcomings of existing Monte Carlo algorithms when sampling from
target densities that may be high dimensional and exhibit strong correlations.
The method provides a fully automated adaptation mechanism that circumvents the
costly pilot runs required to tune proposal densities for Metropolis-Hastings
or indeed Hybrid Monte Carlo and Metropolis Adjusted Langevin Algorithms. This
allows for highly efficient sampling even in very high dimensions where
different scalings may be required for the transient and stationary phases of
the Markov chain. The proposed method exploits the Riemannian structure of the
parameter space of statistical models and thus automatically adapts to the
local manifold structure at each step based on the metric tensor. A
semi-explicit second order symplectic integrator for non-separable Hamiltonians
is derived for simulating paths across this manifold which provides highly
efficient convergence and exploration of the target density. The performance of
the Riemannian Manifold Hamiltonian Monte Carlo method is assessed by
performing posterior inference on logistic regression models, log-Gaussian Cox
point processes, stochastic volatility models, and Bayesian estimation of
parameter posteriors of dynamical systems described by nonlinear differential
equations. Substantial improvements in the time normalised Effective Sample
Size are reported when compared to alternative sampling approaches. Matlab code
at \url{http://www.dcs.gla.ac.uk/inference/rmhmc} allows replication of all
results.
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 20:45:31 GMT"
},
{
"version": "v2",
"created": "Fri, 20 Sep 2013 19:40:08 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Dec 2019 08:20:13 GMT"
}
]
| 2019-12-18T00:00:00 | [
[
"Girolami",
"Mark",
""
],
[
"Calderhead",
"Ben",
""
],
[
"Chin",
"Siu A.",
""
]
]
| [
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0907.1103 | Mihai Patrascu | Mihai Patrascu | A Lower Bound for Succinct Rank Queries | 7 pages | null | null | null | cs.DS cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The rank problem in succinct data structures asks to preprocess an array
A[1..n] of bits into a data structure using as close to n bits as possible, and
answer queries of the form rank(k) = Sum_{i=1}^k A[i]. The problem has been
intensely studied, and features as a subroutine in a majority of succinct data
structures.
We show that in the cell probe model with w-bit cells, if rank takes t time,
the space of the data structure must be at least n + n/w^{O(t)} bits. This
redundancy/query trade-off is essentially optimal, matching our upper bound
from [FOCS'08].
| [
{
"version": "v1",
"created": "Mon, 6 Jul 2009 20:58:55 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Patrascu",
"Mihai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.1131 | Sariel Har-Peled | Sariel Har-Peled | Approximating Spanning Trees with Low Crossing Number | null | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present a linear programming based algorithm for computing a spanning tree
$T$ of a set $P$ of $n$ points in $\Re^d$, such that its crossing number is
$O(\min(t \log n, n^{1-1/d}))$, where $t$ the minimum crossing number of any
spanning tree of $P$. This is the first guaranteed approximation algorithm for
this problem. We provide a similar approximation algorithm for the more general
settings of building a spanning tree for a set system with bounded \VC
dimension. Our approach is an alternative to the reweighting technique
previously used in computing such spanning trees.
Our approach is an alternative to the reweighting technique previously used
in computing such spanning trees.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 02:27:52 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Har-Peled",
"Sariel",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0907.1201 | Nir Avni | Nir Avni, Benjamin Weiss | Generating Product Systems | null | null | null | null | math.DS cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Generalizing Krieger's finite generation theorem, we give conditions for an
ergodic system to be generated by a pair of partitions, each required to be
measurable with respect to a given sub-algebra, and also required to have a
fixed size.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 12:13:21 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Avni",
"Nir",
""
],
[
"Weiss",
"Benjamin",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1224 | Jianguo Liu | Jian-Guo Liu, Tao Zhou, Qiang Guo, Bing-Hong Wang, Yi-Cheng Zhang | Effect of user tastes on personalized recommendation | 8 pages, 4 figures | IJMPC 20(12) 2009 1925-1932 | 10.1142/S0129183109014825 | null | physics.data-an cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, based on a weighted projection of the user-object bipartite
network, we study the effects of user tastes on the mass-diffusion-based
personalized recommendation algorithm, where a user's tastes or interests are
defined by the average degree of the objects he has collected. We argue that
the initial recommendation power located on the objects should be determined by
both of their degree and the users' tastes. By introducing a tunable parameter,
the user taste effects on the configuration of initial recommendation power
distribution are investigated. The numerical results indicate that the
presented algorithm could improve the accuracy, measured by the average ranking
score, more importantly, we find that when the data is sparse, the algorithm
should give more recommendation power to the objects whose degrees are close to
the users' tastes, while when the data becomes dense, it should assign more
power on the objects whose degrees are significantly different from user's
tastes.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 13:56:59 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Oct 2009 15:17:35 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Liu",
"Jian-Guo",
""
],
[
"Zhou",
"Tao",
""
],
[
"Guo",
"Qiang",
""
],
[
"Wang",
"Bing-Hong",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0907.1227 | Tzipora Halevi | Tzipora Halevi, Nitesh Saxena and Shai Halevi | Using HB Family of Protocols for Privacy-Preserving Authentication of
RFID Tags in a Population | 15 pages, 1 figure, presented at RFIDSec 09 | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose an HB-like protocol for privacy-preserving
authentication of RFID tags, whereby a tag can remain anonymous and untraceable
to an adversary during the authentication process. Previous proposals of such
protocols were based on PRF computations. Our protocol can instead be used on
low-cost tags that may be incapable of computing standard PRFs. Moreover, since
the underlying computations in HB protocols are very efficient, our protocol
also reduces reader load compared to PRF-based protocols.
We suggest a tree-based approach that replaces the PRF-based authentication
from prior work with a procedure such as HB+ or HB#. We optimize the tree-
traversal stage through usage of a "light version" of the underlying protocol
and shared random challenges across all levels of the tree. This provides
significant reduction of the communication resources, resulting in a
privacy-preserving protocol almost as efficient as the underlying HB+ or HB#
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 14:26:50 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Halevi",
"Tzipora",
""
],
[
"Saxena",
"Nitesh",
""
],
[
"Halevi",
"Shai",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0907.1228 | Jianguo Liu | Jian-Guo Liu, Tao Zhou, Zhao-Guo Xuan, Hong-An Che, Bing-Hong Wang,
Yi-Cheng Zhang | Degree correlation effect of bipartite network on personalized
recommendation | 9 pages, 3 figures | IJMPC 21(01) 2010 137-147 | 10.1142/S0129183110014999 | null | physics.data-an cs.IR physics.soc-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, by introducing a new user similarity index base on the
diffusion process, we propose a modified collaborative filtering (MCF)
algorithm, which has remarkably higher accuracy than the standard collaborative
filtering. In the proposed algorithm, the degree correlation between users and
objects is taken into account and embedded into the similarity index by a
tunable parameter. The numerical simulation on a benchmark data set shows that
the algorithmic accuracy of the MCF, measured by the average ranking score, is
further improved by 18.19% in the optimal case. In addition, two significant
criteria of algorithmic performance, diversity and popularity, are also taken
into account. Numerical results show that the presented algorithm can provide
more diverse and less popular recommendations, for example, when the
recommendation list contains 10 objects, the diversity, measured by the hamming
distance, is improved by 21.90%.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 14:20:47 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Liu",
"Jian-Guo",
""
],
[
"Zhou",
"Tao",
""
],
[
"Xuan",
"Zhao-Guo",
""
],
[
"Che",
"Hong-An",
""
],
[
"Wang",
"Bing-Hong",
""
],
[
"Zhang",
"Yi-Cheng",
""
]
]
| [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
]
|
0907.1238 | Matteo Magnani | Matteo Buferli, Matteo Magnani, Danilo Montesi | ChOrDa: a methodology for the modeling of business processes with BPMN | 11 pages | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we present a modeling methodology for BPMN, the standard
notation for the representation of business processes. Our methodology
simplifies the development of collaborative BPMN diagrams, enabling the
automated creation of skeleton process diagrams representing complex
choreographies. To evaluate and tune the methodology, we have developed a tool
supporting it, that we apply to the modeling of an international patenting
process as a working example.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 15:29:58 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Buferli",
"Matteo",
""
],
[
"Magnani",
"Matteo",
""
],
[
"Montesi",
"Danilo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0907.1245 | Tobias Kuhn | Tobias Kuhn | How Controlled English can Improve Semantic Wikis | null | In Proceedings of the Fourth Semantic Wiki Workshop (SemWiki
2009), co-located with 6th European Semantic Web Conference (ESWC 2009), CEUR
Workshop Proceedings, Volume 464, 2009 | null | null | cs.HC cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The motivation of semantic wikis is to make acquisition, maintenance, and
mining of formal knowledge simpler, faster, and more flexible. However, most
existing semantic wikis have a very technical interface and are restricted to a
relatively low level of expressivity. In this paper, we explain how AceWiki
uses controlled English - concretely Attempto Controlled English (ACE) - to
provide a natural and intuitive interface while supporting a high degree of
expressivity. We introduce recent improvements of the AceWiki system and user
studies that indicate that AceWiki is usable and useful.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 15:59:02 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Kuhn",
"Tobias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.1251 | Tobias Kuhn | Tobias Kuhn | How to Evaluate Controlled Natural Languages | null | In Pre-Proceedings of the Workshop on Controlled Natural Language
(CNL 2009), CEUR Workshop Proceedings, Volume 448, 2009 | null | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a general framework how controlled natural languages can
be evaluated and compared on the basis of user experiments. The subjects are
asked to classify given statements (in the language to be tested) as either
true or false with respect to a certain situation that is shown in a graphical
notation called "ontographs". A first experiment has been conducted that
applies this framework to the language Attempto Controlled English (ACE).
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 16:15:21 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Kuhn",
"Tobias",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
]
|
0907.1255 | Samir Medina Perlaza | S.M. Perlaza, N. Fawaz, S. Lasaulce, M. Debbah | From Spectrum Pooling to Space Pooling: Opportunistic Interference
Alignment in MIMO Cognitive Networks | Submitted to IEEE Trans. in Signal Processing. Revised on 23-11-09 | null | 10.1109/TSP.2010.2046084 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe a non-cooperative interference alignment (IA) technique which
allows an opportunistic multiple input multiple output (MIMO) link (secondary)
to harmlessly coexist with another MIMO link (primary) in the same frequency
band. Assuming perfect channel knowledge at the primary receiver and
transmitter, capacity is achieved by transmiting along the spatial directions
(SD) associated with the singular values of its channel matrix using a
water-filling power allocation (PA) scheme. Often, power limitations lead the
primary transmitter to leave some of its SD unused. Here, it is shown that the
opportunistic link can transmit its own data if it is possible to align the
interference produced on the primary link with such unused SDs. We provide both
a processing scheme to perform IA and a PA scheme which maximizes the
transmission rate of the opportunistic link. The asymptotes of the achievable
transmission rates of the opportunistic link are obtained in the regime of
large numbers of antennas. Using this result, it is shown that depending on the
signal-to-noise ratio and the number of transmit and receive antennas of the
primary and opportunistic links, both systems can achieve transmission rates of
the same order.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 16:43:34 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Dec 2009 07:56:05 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Perlaza",
"S. M.",
""
],
[
"Fawaz",
"N.",
""
],
[
"Lasaulce",
"S.",
""
],
[
"Debbah",
"M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1256 | Jonathan Voris | Nitesh Saxena and Jonathan Voris | We Can Remember It for You Wholesale: Implications of Data Remanence on
the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009) | Presented at the 5th Workshop on RFID Security held from June 30 -
July 2 in Leuven, Belgium. Paper is 13 pages with 4 figures | null | null | null | cs.CR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Random number generation is a fundamental security primitive for RFID
devices. However, even this relatively simple requirement is beyond the
capacity of today's average RFID tag. A recently proposed solution, Fingerprint
Extraction and Random Number Generation in SRAM (FERNS) [14, 15], involves the
use of onboard RAM as the source of "true" randomness. Unfortunately, practical
considerations prevent this approach from reaching its full potential. First,
this method must compete with other system functionalities for use of memory.
Thus, the amount of uninitialized RAM available for utilization as a randomness
generator may be severely restricted. Second, RAM is subject to data remanence;
there is a time period after losing power during which stored data remains
intact in memory. This means that after a portion of memory has been used for
entropy collection once it will require a relatively extended period of time
without power before it can be reused. In a usable RFID based security
application, which requires multiple or long random numbers, this may lead to
unacceptably high delays.
In this paper, we show that data remanence negatively affects RAM based
random number generation. We demonstrate the practical considerations that must
be taken into account when using RAM as an entropy source. We also discuss the
implementation of a true random number generator on Intel's WISP RFID tag,
which is the first such implementation to the authors' best knowledge. By
relating this to the requirements of some popular RFID authentication
protocols, we assess the (im)practicality of utilizing memory based randomness
techniques on resource constrained devices.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 16:51:40 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Saxena",
"Nitesh",
""
],
[
"Voris",
"Jonathan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
]
|
0907.1266 | Devavrat Shah | Libin Jiang, Devavrat Shah, Jinwoo Shin, Jean Walrand | Distributed Random Access Algorithm: Scheduling and Congesion Control | null | null | null | null | cs.IT cs.NI math.IT math.PR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper provides proofs of the rate stability, Harris recurrence, and
epsilon-optimality of CSMA algorithms where the backoff parameter of each node
is based on its backlog. These algorithms require only local information and
are easy to implement.
The setup is a network of wireless nodes with a fixed conflict graph that
identifies pairs of nodes whose simultaneous transmissions conflict. The paper
studies two algorithms. The first algorithm schedules transmissions to keep up
with given arrival rates of packets. The second algorithm controls the arrivals
in addition to the scheduling and attempts to maximize the sum of the utilities
of the flows of packets at the different nodes. For the first algorithm, the
paper proves rate stability for strictly feasible arrival rates and also Harris
recurrence of the queues. For the second algorithm, the paper proves the
epsilon-optimality. Both algorithms operate with strictly local information in
the case of decreasing step sizes, and operate with the additional information
of the number of nodes in the network in the case of constant step size.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 17:12:59 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"Jiang",
"Libin",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Shin",
"Jinwoo",
""
],
[
"Walrand",
"Jean",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
]
|
0907.1280 | Erik Krohn | James King and Erik Krohn | The Complexity of Guarding Terrains | 26 pages, 24 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A set $G$ of points on a 1.5-dimensional terrain, also known as an
$x$-monotone polygonal chain, is said to guard the terrain if any point on the
terrain is 'seen' by a point in $G$. Two points on the terrain see each other
if and only if the line segment between them is never strictly below the
terrain. The minimum terrain guarding problem asks for a minimum guarding set
for the given input terrain. We prove that the decision version of this problem
is NP-hard. This solves a significant open problem and complements recent
positive approximability results for the optimization problem.
Our proof uses a reduction from PLANAR 3-SAT. We build gadgets capable of
'mirroring' a consistent variable assignment back and forth across a main
valley. The structural simplicity of 1.5-dimensional terrains makes it
difficult to build general clause gadgets that do not destroy this assignment
when they are evaluated. However, we exploit the structure in instances of
PLANAR 3-SAT to find very specific operations involving only 'adjacent'
variables. For these restricted operations we can construct gadgets that allow
a full reduction to work.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 19:07:51 GMT"
}
]
| 2009-07-08T00:00:00 | [
[
"King",
"James",
""
],
[
"Krohn",
"Erik",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0907.1295 | Jonathan Sorenson | Ankur Gupta, Anna Kispert, Jonathan P. Sorenson | Online Sorting via Searching and Selection | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we present a framework based on a simple data structure and
parameterized algorithms for the problems of finding items in an unsorted list
of linearly ordered items based on their rank (selection) or value (search). As
a side-effect of answering these online selection and search queries, we
progressively sort the list. Our algorithms are based on Hoare's Quickselect,
and are parameterized based on the pivot selection method.
For example, if we choose the pivot as the last item in a subinterval, our
framework yields algorithms that will answer q<=n unique selection and/or
search queries in a total of O(n log q) average time. After q=\Omega(n) queries
the list is sorted. Each repeated selection query takes constant time, and each
repeated search query takes O(log n) time. The two query types can be
interleaved freely. By plugging different pivot selection methods into our
framework, these results can, for example, become randomized expected time or
deterministic worst-case time. Our methods are easy to implement, and we show
they perform well in practice.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 20:37:19 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Gupta",
"Ankur",
""
],
[
"Kispert",
"Anna",
""
],
[
"Sorenson",
"Jonathan P.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.1297 | Cristopher Moore | Sergey Bravyi, Cristopher Moore, and Alexander Russell | Bounds on the quantum satisfiability threshold | null | null | null | null | quant-ph cond-mat.stat-mech cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Quantum k-SAT is the problem of deciding whether there is a n-qubit state
which is perpendicular to a set of vectors, each of which lies in the Hilbert
space of k qubits. Equivalently, the problem is to decide whether a particular
type of local Hamiltonian has a ground state with zero energy. We consider
random quantum k-SAT formulas with n variables and m = \alpha n clauses, and
ask at what value of \alpha these formulas cease to be satisfiable. We show
that the threshold for random quantum 3-SAT is at most 3.594. For comparison,
convincing arguments from statistical physics suggest that the classical 3-SAT
threshold is \alpha \approx 4.267. For larger k, we show that the quantum
threshold is a constant factor smaller than the classical one. Our bounds work
by determining the generic rank of the satisfying subspace for certain gadgets,
and then using the technique of differential equations to analyze various
algorithms that partition the hypergraph into a collection of these gadgets.
Our use of differential equation to establish upper bounds on a satisfiability
threshold appears to be novel, and our techniques may apply to various
classical problems as well.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 20:49:59 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Jul 2009 03:02:18 GMT"
},
{
"version": "v3",
"created": "Thu, 18 Sep 2014 15:20:16 GMT"
}
]
| 2014-09-19T00:00:00 | [
[
"Bravyi",
"Sergey",
""
],
[
"Moore",
"Cristopher",
""
],
[
"Russell",
"Alexander",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.1307 | Scott Summers | Scott M. Summers | Reducing Tile Complexity for the Self-Assembly of Scaled Shapes Through
Temperature Programming | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper concerns the self-assembly of scaled-up versions of arbitrary
finite shapes. We work in the multiple temperature model that was introduced by
Aggarwal, Cheng, Goldwasser, Kao, and Schweller (Complexities for Generalized
Models of Self-Assembly, SODA 2004). The multiple temperature model is a
natural generalization of Winfree's abstract tile assembly model, where the
temperature of a tile system is allowed to be shifted up and down as
self-assembly proceeds. We first exhibit two constant-size tile sets in which
scaled-up versions of arbitrary shapes self-assemble. Our first tile set has
the property that each scaled shape self-assembles via an asymptotically
"Kolmogorov-optimum" temperature sequence but the scaling factor grows with the
size of the shape being assembled. In contrast, our second tile set assembles
each scaled shape via a temperature sequence whose length is proportional to
the number of points in the shape but the scaling factor is a constant
independent of the shape being assembled. We then show that there is no
constant-size tile set that can uniquely assemble an arbitrary (non-scaled,
connected) shape in the multiple temperature model, i.e., the scaling is
necessary for self-assembly. This answers an open question of Kao and Schweller
(Reducing Tile Complexity for Self-Assembly Through Temperature Programming,
SODA 2006), who asked whether such a tile set existed.
| [
{
"version": "v1",
"created": "Tue, 7 Jul 2009 21:37:11 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Summers",
"Scott M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.1334 | Xiaotie Deng | Xiaotie Deng, Qi Qi, Amin Saberi | On the Complexity of Envy-Free Cake Cutting | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the envy-free cake-cutting problem for $d+1$ players with $d$ cuts,
for both the oracle function model and the polynomial time function model. For
the former, we derive a $\theta(({1\over\epsilon})^{d-1})$ time matching bound
for the query complexity of $d+1$ player cake cutting with Lipschitz utilities
for any $d> 1$. When the utility functions are given by a polynomial time
algorithm, we prove the problem to be PPAD-complete.
For measurable utility functions, we find a fully polynomial-time algorithm
for finding an approximate envy-free allocation of a cake among three people
using two cuts.
| [
{
"version": "v1",
"created": "Wed, 8 Jul 2009 05:28:07 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Deng",
"Xiaotie",
""
],
[
"Qi",
"Qi",
""
],
[
"Saberi",
"Amin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0907.1357 | Nicolas Stouls | Jean-Fran\c{c}ois Couchot (LIFC), Alain Giorgetti (LIFC), Nicolas
Stouls (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes) | Graph Based Reduction of Program Verification Conditions | null | Automated Formal Methods (AFM'09), colocated with CAV'09 (2009)
40-47 | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Increasing the automaticity of proofs in deductive verification of C programs
is a challenging task. When applied to industrial C programs known heuristics
to generate simpler verification conditions are not efficient enough. This is
mainly due to their size and a high number of irrelevant hypotheses. This work
presents a strategy to reduce program verification conditions by selecting
their relevant hypotheses. The relevance of a hypothesis is determined by the
combination of a syntactic analysis and two graph traversals. The first graph
is labeled by constants and the second one by the predicates in the axioms. The
approach is applied on a benchmark arising in industrial program verification.
| [
{
"version": "v1",
"created": "Wed, 8 Jul 2009 08:32:57 GMT"
}
]
| 2011-05-24T00:00:00 | [
[
"Couchot",
"Jean-François",
"",
"LIFC"
],
[
"Giorgetti",
"Alain",
"",
"LIFC"
],
[
"Stouls",
"Nicolas",
"",
"CITI Insa Lyon / INRIA Grenoble Rhône-Alpes"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0907.1369 | Manjish Pal | Manjish Pal | Towards an $O(\sqrt[3]{\log n})$-Approximation Algorithm for {\sc
Balanced Separator} | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The {\sc $c$-Balanced Separator} problem is a graph-partitioning problem in
which given a graph $G$, one aims to find a cut of minimum size such that both
the sides of the cut have at least $cn$ vertices. In this paper, we present new
directions of progress in the {\sc $c$-Balanced Separator} problem. More
specifically, we propose a new family of mathematical programs, which depends
upon a parameter $\epsilon > 0$, and extend the seminal work of
Arora-Rao-Vazirani ({\sf ARV}) \cite{ARV} to show that the polynomial time
solvability of the proposed family of programs implies an improvement in the
approximation factor to $O(\log^{{1/3} + \epsilon} n)$ from the best-known
factor of $O(\sqrt{\log n})$ due to {\sf ARV}. In fact, for $\epsilon = 1/3$,
the program we get is the SDP proposed by {\sf ARV}. For $\epsilon < 1/3$, this
family of programs is not convex but one can transform them into so called
\emph{\textbf{concave programs}} in which one optimizes a concave function over
a convex feasible set. The properties of concave programs allows one to apply
techniques due to Hoffman \cite{H81} or Tuy \emph{et al} \cite{TTT85} to solve
such problems with arbitrary accuracy. But the problem of finding of a method
to solve these programs that converges in polynomial time still remains open.
Our result, although conditional, introduces a new family of programs which is
more powerful than semi-definite programming in the context of approximation
algorithms and hence it will of interest to investigate this family both in the
direction of designing efficient algorithms and proving hardness results.
| [
{
"version": "v1",
"created": "Wed, 8 Jul 2009 09:32:02 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Pal",
"Manjish",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.