id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0907.0159
Jeffrey Shallit
N. Rampersad, J. Shallit, Z. Xu
The computational complexity of universality problems for prefixes, suffixes, factors, and subwords of regular languages
null
null
null
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the computational complexity of the following problems: given a DFA or NFA representing a regular language L over a finite alphabet Sigma is the set of all prefixes (resp., suffixes, factors, subwords) of all words of L equal to Sigma*? In the case of testing universality for factors of languages represented by DFA's, we find an interesting connection to Cerny's conjecture on synchronizing words.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 14:30:40 GMT" }, { "version": "v2", "created": "Wed, 1 Jul 2009 20:28:19 GMT" }, { "version": "v3", "created": "Fri, 3 Jul 2009 15:49:05 GMT" } ]
2009-07-03T00:00:00
[ [ "Rampersad", "N.", "" ], [ "Shallit", "J.", "" ], [ "Xu", "Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.0204
Ghassan Hamarneh
Ghassan Hamarneh
Multi-Label MRF Optimization via Least Squares s-t Cuts
null
null
null
SFU-CMPT-TR 2009-08
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many applications of graph cuts in computer vision, e.g. segmentation. We present a novel method to reformulate the NP-hard, k-way graph partitioning problem as an approximate minimal s-t graph cut problem, for which a globally optimal solution is found in polynomial time. Each non-terminal vertex in the original graph is replaced by a set of ceil(log_2(k)) new vertices. The original graph edges are replaced by new edges connecting the new vertices to each other and to only two, source s and sink t, terminal nodes. The weights of the new edges are obtained using a novel least squares solution approximating the constraints of the initial k-way setup. The minimal s-t cut labels each new vertex with a binary (s vs t) "Gray" encoding, which is then decoded into a decimal label number that assigns each of the original vertices to one of k classes. We analyze the properties of the approximation and present quantitative as well as qualitative segmentation results.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 17:18:46 GMT" } ]
2009-07-02T00:00:00
[ [ "Hamarneh", "Ghassan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.0229
Sergey Polikarpov
S. V. Polikarpov, V. S. Dergachev, K. E. Rumyantsev, D. M. Golubchikov
A new model of artificial neuron: cyberneuron and its use
23 pages, 23 figures, in Russian
null
null
null
cs.NE cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article describes a new type of artificial neuron, called the authors "cyberneuron". Unlike classical models of artificial neurons, this type of neuron used table substitution instead of the operation of multiplication of input values for the weights. This allowed to significantly increase the information capacity of a single neuron, but also greatly simplify the process of learning. Considered an example of the use of "cyberneuron" with the task of detecting computer viruses.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 19:54:39 GMT" } ]
2009-07-02T00:00:00
[ [ "Polikarpov", "S. V.", "" ], [ "Dergachev", "V. S.", "" ], [ "Rumyantsev", "K. E.", "" ], [ "Golubchikov", "D. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.0255
Hazer Inaltekin
Hazer Inaltekin, Mung Chiang, H. Vincent Poor
A Cut-off Phenomenon in Location Based Random Access Games with Imperfect Information
Presented in the Fourth International Wireless Internet Conference
null
null
null
cs.IT cs.GT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes the behavior of selfish transmitters under imperfect location information. The scenario considered is that of a wireless network consisting of selfish nodes that are randomly distributed over the network domain according to a known probability distribution, and that are interested in communicating with a common sink node using common radio resources. In this scenario, the wireless nodes do not know the exact locations of their competitors but rather have belief distributions about these locations. Firstly, properties of the packet success probability curve as a function of the node-sink separation are obtained for such networks. Secondly, a monotonicity property for the best-response strategies of selfish nodes is identified. That is, for any given strategies of competitors of a node, there exists a critical node-sink separation for this node such that its best-response is to transmit when its distance to the sink node is smaller than this critical threshold, and to back off otherwise. Finally, necessary and sufficient conditions for a given strategy profile to be a Nash equilibrium are provided.
[ { "version": "v1", "created": "Wed, 1 Jul 2009 22:46:03 GMT" } ]
2009-07-03T00:00:00
[ [ "Inaltekin", "Hazer", "" ], [ "Chiang", "Mung", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0907.0288
Simant Dube
Simant Dube
An Iterative Fingerprint Enhancement Algorithm Based on Accurate Determination of Orientation Flow
10 pages, 4 figures. Ongoing work. To be submitted to appropriate conference/journal
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an algorithm to enhance and binarize a fingerprint image. The algorithm is based on accurate determination of orientation flow of the ridges of the fingerprint image by computing variance of the neighborhood pixels around a pixel in different directions. We show that an iterative algorithm which captures the mutual interdependence of orientation flow computation, enhancement and binarization gives very good results on poor quality images.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 04:57:32 GMT" } ]
2009-07-03T00:00:00
[ [ "Dube", "Simant", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.0291
Bruno Salvy
Alin Bostan (INRIA Rocquencourt), Bruno Salvy (INRIA Rocquencourt), Khang Tran
Generating functions of Chebyshev-like polynomials
null
null
10.1142/S1793042110003691
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this short note, we give simple proofs of several results and conjectures formulated by Stolarsky and Tran concerning generating functions of some families of Chebyshev-like polynomials.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 06:29:52 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2009 08:08:48 GMT" }, { "version": "v3", "created": "Wed, 25 Nov 2009 20:02:00 GMT" } ]
2013-06-19T00:00:00
[ [ "Bostan", "Alin", "", "INRIA Rocquencourt" ], [ "Salvy", "Bruno", "", "INRIA Rocquencourt" ], [ "Tran", "Khang", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0907.0305
Leah Epstein
Leah Epstein, Asaf Levin, Julian Mestre and Danny Segev
Improved approximation guarantees for weighted matching in the semi-streaming model
null
SIAM J. Discrete Math. 25(3): 1251-1265 (2011)
10.1137/100801901
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the maximum weight matching problem in the semi-streaming model, and improve on the currently best one-pass algorithm due to Zelke (Proc. of STACS2008, pages 669-680) by devising a deterministic approach whose performance guarantee is 4.91+epsilon. In addition, we study preemptive online algorithms, a sub-class of one-pass algorithms where we are only allowed to maintain a feasible matching in memory at any point in time. All known results prior to Zelke's belong to this sub-class. We provide a lower bound of 4.967 on the competitive ratio of any such deterministic algorithm, and hence show that future improvements will have to store in memory a set of edges which is not necessarily a feasible matching.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 08:11:22 GMT" } ]
2012-02-16T00:00:00
[ [ "Epstein", "Leah", "" ], [ "Levin", "Asaf", "" ], [ "Mestre", "Julian", "" ], [ "Segev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.0313
Wojciech Mazurczyk
Wojciech Mazurczyk and Krzysztof Szczypiorski
Steganography in Handling Oversized IP Packets
10 pages, 7 figures, paper submitted to First International Workshop on Network Steganography - IWNS 2009
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper identifies new class of network steganography methods that utilize mechanisms to handle oversized packets in IP networks: IP fragmentation, PMTUD (Path MTU Discovery) and PLPMTUD (Packetization Layer Path MTU Discovery). In particular, we propose two new steganographic methods and two extensions of existing ones. We show how IP fragmentation simplifies utilizing steganographic methods which requires transmitter-receiver synchronization. We present how mentioned mechanisms can be used to enable hidden communication for both versions of IP protocol: 4 and 6. Also the detection of the proposed methods is enclosed in this paper.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 09:01:19 GMT" } ]
2009-07-03T00:00:00
[ [ "Mazurczyk", "Wojciech", "" ], [ "Szczypiorski", "Krzysztof", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.0328
James Whitacre
James M Whitacre, Axel Bender
Degenerate neutrality creates evolvable fitness landscapes
null
WorldComp 2009, Las Vegas, NV, USA
null
null
cs.NE cs.AI cs.MA
http://creativecommons.org/licenses/by/3.0/
Understanding how systems can be designed to be evolvable is fundamental to research in optimization, evolution, and complex systems science. Many researchers have thus recognized the importance of evolvability, i.e. the ability to find new variants of higher fitness, in the fields of biological evolution and evolutionary computation. Recent studies by Ciliberti et al (Proc. Nat. Acad. Sci., 2007) and Wagner (Proc. R. Soc. B., 2008) propose a potentially important link between the robustness and the evolvability of a system. In particular, it has been suggested that robustness may actually lead to the emergence of evolvability. Here we study two design principles, redundancy and degeneracy, for achieving robustness and we show that they have a dramatically different impact on the evolvability of the system. In particular, purely redundant systems are found to have very little evolvability while systems with degeneracy, i.e. distributed robustness, can be orders of magnitude more evolvable. These results offer insights into the general principles for achieving evolvability and may prove to be an important step forward in the pursuit of evolvable representations in evolutionary computation.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 09:59:39 GMT" } ]
2009-07-03T00:00:00
[ [ "Whitacre", "James M", "" ], [ "Bender", "Axel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.0329
James Whitacre
James M Whitacre
Evidence of coevolution in multi-objective evolutionary algorithms
null
WorldComp 2009, Las Vegas, NV, USA
null
null
cs.NE cs.AI
http://creativecommons.org/licenses/by/3.0/
This paper demonstrates that simple yet important characteristics of coevolution can occur in evolutionary algorithms when only a few conditions are met. We find that interaction-based fitness measurements such as fitness (linear) ranking allow for a form of coevolutionary dynamics that is observed when 1) changes are made in what solutions are able to interact during the ranking process and 2) evolution takes place in a multi-objective environment. This research contributes to the study of simulated evolution in a at least two ways. First, it establishes a broader relationship between coevolution and multi-objective optimization than has been previously considered in the literature. Second, it demonstrates that the preconditions for coevolutionary behavior are weaker than previously thought. In particular, our model indicates that direct cooperation or competition between species is not required for coevolution to take place. Moreover, our experiments provide evidence that environmental perturbations can drive coevolutionary processes; a conclusion that mirrors arguments put forth in dual phase evolution theory. In the discussion, we briefly consider how our results may shed light onto this and other recent theories of evolution.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 10:15:31 GMT" } ]
2009-07-03T00:00:00
[ [ "Whitacre", "James M", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0332
James Whitacre
James M Whitacre
Survival of the flexible: explaining the recent dominance of nature-inspired optimization within a rapidly evolving world
null
null
null
null
cs.NE cs.AI
http://creativecommons.org/licenses/by/3.0/
Although researchers often comment on the rising popularity of nature-inspired meta-heuristics (NIM), there has been a paucity of data to directly support the claim that NIM are growing in prominence compared to other optimization techniques. This study presents evidence that the use of NIM is not only growing, but indeed appears to have surpassed mathematical optimization techniques (MOT) in several important metrics related to academic research activity (publication frequency) and commercial activity (patenting frequency). Motivated by these findings, this article discusses some of the possible origins of this growing popularity. I review different explanations for NIM popularity and discuss why some of these arguments remain unsatisfying. I argue that a compelling and comprehensive explanation should directly account for the manner in which most NIM success has actually been achieved, e.g. through hybridization and customization to different problem environments. By taking a problem lifecycle perspective, this paper offers a fresh look at the hypothesis that nature-inspired meta-heuristics derive much of their utility from being flexible. I discuss global trends within the business environments where optimization algorithms are applied and I speculate that highly flexible algorithm frameworks could become increasingly popular within our diverse and rapidly changing world.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 10:27:23 GMT" }, { "version": "v2", "created": "Sat, 12 Dec 2009 15:38:31 GMT" }, { "version": "v3", "created": "Fri, 21 Jan 2011 09:28:20 GMT" } ]
2011-01-24T00:00:00
[ [ "Whitacre", "James M", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0334
James Whitacre
James M. Whitacre, Ruhul A. Sarker, Q. Tuan Pham
The Self-Organization of Interaction Networks for Nature-Inspired Optimization
null
IEEE Transactions on Evolutionary Computation, Volume 12, Issue 2, April 2008 Page(s):220 - 230
10.1109/TEVC.2007.900327
null
cs.NE cs.AI
http://creativecommons.org/licenses/by/3.0/
Over the last decade, significant progress has been made in understanding complex biological systems, however there have been few attempts at incorporating this knowledge into nature inspired optimization algorithms. In this paper, we present a first attempt at incorporating some of the basic structural properties of complex biological systems which are believed to be necessary preconditions for system qualities such as robustness. In particular, we focus on two important conditions missing in Evolutionary Algorithm populations; a self-organized definition of locality and interaction epistasis. We demonstrate that these two features, when combined, provide algorithm behaviors not observed in the canonical Evolutionary Algorithm or in Evolutionary Algorithms with structured populations such as the Cellular Genetic Algorithm. The most noticeable change in algorithm behavior is an unprecedented capacity for sustainable coexistence of genetically distinct individuals within a single population. This capacity for sustained genetic diversity is not imposed on the population but instead emerges as a natural consequence of the dynamics of the system.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 10:36:13 GMT" } ]
2009-07-03T00:00:00
[ [ "Whitacre", "James M.", "" ], [ "Sarker", "Ruhul A.", "" ], [ "Pham", "Q. Tuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0340
James Whitacre
James M. Whitacre, Hussein A. Abbass, Ruhul Sarker, Axel Bender, Stephen Baker
Strategic Positioning in Tactical Scenario Planning
null
Genetic And Evolutionary Computation Conference 2008, Pages 1081-1088
10.1145/1389095.1389293
null
cs.NE cs.AI
http://creativecommons.org/licenses/by/3.0/
Capability planning problems are pervasive throughout many areas of human interest with prominent examples found in defense and security. Planning provides a unique context for optimization that has not been explored in great detail and involves a number of interesting challenges which are distinct from traditional optimization research. Planning problems demand solutions that can satisfy a number of competing objectives on multiple scales related to robustness, adaptiveness, risk, etc. The scenario method is a key approach for planning. Scenarios can be defined for long-term as well as short-term plans. This paper introduces computational scenario-based planning problems and proposes ways to accommodate strategic positioning within the tactical planning domain. We demonstrate the methodology in a resource planning problem that is solved with a multi-objective evolutionary algorithm. Our discussion and results highlight the fact that scenario-based planning is naturally framed within a multi-objective setting. However, the conflicting objectives occur on different system levels rather than within a single system alone. This paper also contends that planning problems are of vital interest in many human endeavors and that Evolutionary Computation may be well positioned for this problem domain.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 10:56:52 GMT" } ]
2009-07-03T00:00:00
[ [ "Whitacre", "James M.", "" ], [ "Abbass", "Hussein A.", "" ], [ "Sarker", "Ruhul", "" ], [ "Bender", "Axel", "" ], [ "Baker", "Stephen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0375
Philippe Robert S.
L. Leskel\"a (MSA), Philippe Robert (INRIA), Florian Simatos
Interacting branching processes and linear file-sharing networks
null
Advances in Applied Probability, 42(3), 2010
null
null
math.PR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
File-sharing networks are distributed systems used to disseminate files among nodes of a communication network. The general simple principle of these systems is that once a node has retrieved a file, it may become a server for this file. In this paper, the capacity of these networks is analyzed with a stochastic model when there is a constant flow of incoming requests for a given file. It is shown that the problem can be solved by analyzing the asymptotic behavior of a class of interacting branching processes. Several results of independent interest concerning these branching processes are derived and then used to study the file-sharing systems.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 13:05:08 GMT" }, { "version": "v2", "created": "Thu, 22 Apr 2010 12:36:18 GMT" } ]
2010-05-12T00:00:00
[ [ "Leskelä", "L.", "", "MSA" ], [ "Robert", "Philippe", "", "INRIA" ], [ "Simatos", "Florian", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.0403
Andreas Witzel
Krzysztof R. Apt and Andreas Witzel and Jonathan A. Zvesper
Common Knowledge in Interaction Structures
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider two simple variants of a framework for reasoning about knowledge amongst communicating groups of players. Our goal is to clarify the resulting epistemic issues. In particular, we investigate what is the impact of common knowledge of the underlying hypergraph connecting the players, and under what conditions common knowledge distributes over disjunction. We also obtain two versions of the classic result that common knowledge cannot be achieved in the absence of a simultaneous event (here a message sent to the whole group).
[ { "version": "v1", "created": "Thu, 2 Jul 2009 15:19:22 GMT" } ]
2009-07-03T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "Witzel", "Andreas", "" ], [ "Zvesper", "Jonathan A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.0404
Saqib Saeed
Sohail Safdar, Jamil Ahmad, Shaftab Ahmed, M. Tayyab Asghar, Saqib Saeed
Agent based Model for providing optimized, synchronized and failure free execution of workflow process
This paper was published in the proceedings of 4th International Conference on New Exploratory Technology (NEXT 2007) Seoul, Korea 25-27 October 2007
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main objective of this paper is to provide an optimized solution and algorithm for the execution of a workflow process by ensuring the data consistency, correctness, completeness among various tasks involved. The solution proposed provides a synchronized and failure free flow of execution among various tasks involved in a workflow process. A synchronizing agent is bound at a very low level, i.e. with the workflow activity or task to get the desired goals to be done and an algorithm is provided to show the execution of workflow process completely.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 15:19:39 GMT" } ]
2009-07-03T00:00:00
[ [ "Safdar", "Sohail", "" ], [ "Ahmad", "Jamil", "" ], [ "Ahmed", "Shaftab", "" ], [ "Asghar", "M. Tayyab", "" ], [ "Saeed", "Saqib", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.0418
Gary Huang
Andrew Kae, Gary B. Huang, Erik Learned-Miller
Bounding the Probability of Error for High Precision Recognition
null
null
null
UM-CS-2009-031
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider models for which it is important, early in processing, to estimate some variables with high precision, but perhaps at relatively low rates of recall. If some variables can be identified with near certainty, then they can be conditioned upon, allowing further inference to be done efficiently. Specifically, we consider optical character recognition (OCR) systems that can be bootstrapped by identifying a subset of correctly translated document words with very high precision. This "clean set" is subsequently used as document-specific training data. While many current OCR systems produce measures of confidence for the identity of each letter or word, thresholding these confidence values, even at very high values, still produces some errors. We introduce a novel technique for identifying a set of correct words with very high precision. Rather than estimating posterior probabilities, we bound the probability that any given word is incorrect under very general assumptions, using an approximate worst case analysis. As a result, the parameters of the model are nearly irrelevant, and we are able to identify a subset of words, even in noisy documents, of which we are highly confident. On our set of 10 documents, we are able to identify about 6% of the words on average without making a single error. This ability to produce word lists with very high precision allows us to use a family of models which depends upon such clean word lists.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 16:09:47 GMT" } ]
2009-07-03T00:00:00
[ [ "Kae", "Andrew", "" ], [ "Huang", "Gary B.", "" ], [ "Learned-Miller", "Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.0453
Leonid (Aryeh) Kontorovich
Leonid Aryeh Kontorovich
Random DFAs are Efficiently PAC Learnable
withdrawn
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper has been withdrawn due to an error found by Dana Angluin and Lev Reyzin.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 17:54:45 GMT" }, { "version": "v2", "created": "Mon, 20 Jul 2009 08:59:45 GMT" } ]
2009-07-20T00:00:00
[ [ "Kontorovich", "Leonid Aryeh", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.0455
Alessandro Pluchino
Alessandro Pluchino, Andrea Rapisarda, Cesare Garofalo
The Peter Principle Revisited: A Computational Study
final version published on Physica A, 10 pages, 4 figures, 1 table (for on-line supplementary material see the link: http://www.ct.infn.it/cactus/peter-links.html)
Physica A 389 (2010) 467-472
10.1016/j.physa.2009.09.045
null
physics.soc-ph cs.GT nlin.AO physics.pop-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the late sixties the Canadian psychologist Laurence J. Peter advanced an apparently paradoxical principle, named since then after him, which can be summarized as follows: {\it 'Every new member in a hierarchical organization climbs the hierarchy until he/she reaches his/her level of maximum incompetence'}. Despite its apparent unreasonableness, such a principle would realistically act in any organization where the mechanism of promotion rewards the best members and where the mechanism at their new level in the hierarchical structure does not depend on the competence they had at the previous level, usually because the tasks of the levels are very different to each other. Here we show, by means of agent based simulations, that if the latter two features actually hold in a given model of an organization with a hierarchical structure, then not only is the Peter principle unavoidable, but also it yields in turn a significant reduction of the global efficiency of the organization. Within a game theory-like approach, we explore different promotion strategies and we find, counterintuitively, that in order to avoid such an effect the best ways for improving the efficiency of a given organization are either to promote each time an agent at random or to promote randomly the best and the worst members in terms of competence.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 18:02:48 GMT" }, { "version": "v2", "created": "Fri, 4 Sep 2009 12:44:50 GMT" }, { "version": "v3", "created": "Thu, 29 Oct 2009 14:10:40 GMT" } ]
2009-10-29T00:00:00
[ [ "Pluchino", "Alessandro", "" ], [ "Rapisarda", "Andrea", "" ], [ "Garofalo", "Cesare", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Physics", "code": "physics.pop-ph", "description": "Description coming soon", "span": "(Popular Physics)" } ]
0907.0472
Xiaohu Shang
Xiaohu Shang, Biao Chen, Gerhard Kramer, H. Vincent Poor
Capacity Regions and Sum-Rate Capacities of Vector Gaussian Interference Channels
33 pages, 1 figure, submitted to IEEE trans. on Information theory
null
10.1109/TIT.2010.2059950
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The capacity regions of vector, or multiple-input multiple-output, Gaussian interference channels are established for very strong interference and aligned strong interference. Furthermore, the sum-rate capacities are established for Z interference, noisy interference, and mixed (aligned weak/intermediate and aligned strong) interference. These results generalize known results for scalar Gaussian interference channels.
[ { "version": "v1", "created": "Thu, 2 Jul 2009 23:50:15 GMT" } ]
2016-11-17T00:00:00
[ [ "Shang", "Xiaohu", "" ], [ "Chen", "Biao", "" ], [ "Kramer", "Gerhard", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0499
Fahem Kebair
Fahem Kebair and Frederic Serin
Agent-Oriented Approach for Detecting and Managing Risks in Emergency Situations
5
null
null
null
cs.AI cs.MA
http://creativecommons.org/licenses/by/3.0/
This paper presents an agent-oriented approach to build a decision support system aimed at helping emergency managers to detect and to manage risks. We stress the flexibility and the adaptivity characteristics that are crucial to build a robust and efficient system, able to resolve complex problems. The system should be independent as much as possible from the subject of study. Thereby, an original approach based on a mechanism of perception, representation, characterisation and assessment is proposed. The work described here is applied on the RoboCupRescue application. Experimentations and results are provided.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 14:24:23 GMT" } ]
2009-07-06T00:00:00
[ [ "Kebair", "Fahem", "" ], [ "Serin", "Frederic", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.0505
Xiaohu Shang
Xiaohu Shang, Biao Chen, H. Vincent Poor
Multi-User MISO Interference Channels with Single-User Detection: Optimality of Beamforming and the Achievable Rate Region
41 pages, 7 figures, submitted to IEEE trans. on Information Theory in Apr. 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a multi-user interference channel with multi-antenna transmitters and single-antenna receivers, by restricting each transmitter to Gaussian input and each receiver to a single-user detector, computing the largest achievable rate region amounts to solving a family of non-convex optimization problems. Recognizing the intrinsic connection between the signal power at the intended receiver and the interference power at the unintended receiver, the original family of non-convex optimization problems is converted into a new family of convex optimization problems. It is shown that, for such interference channels with each receiver implementing single-user detection, transmitter beamforming can achieve all boundary points of the achievable rate region.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 00:08:41 GMT" } ]
2009-07-06T00:00:00
[ [ "Shang", "Xiaohu", "" ], [ "Chen", "Biao", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0507
James Whitacre
James M. Whitacre, Ruhul A. Sarker, Q. Tuan Pham
Spontaneous organization leads to robustness in evolutionary algorithms
This paper has been withdrawn so that it can be published in IJAIT (International Journal of Artificial Intelligence Tools)
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The interaction networks of biological systems are known to take on several non-random structural properties, some of which are believed to positively influence system robustness. Researchers are only starting to understand how these structural properties emerge, however suggested roles for component fitness and community development (modularity) have attracted interest from the scientific community. In this study, we apply some of these concepts to an evolutionary algorithm and spontaneously organize its population using information that the population receives as it moves over a fitness landscape. More precisely, we employ fitness and clustering based driving forces for guiding network structural dynamics, which in turn are controlled by the population dynamics of an evolutionary algorithm. To evaluate the effect this has on evolution, experiments are conducted on six engineering design problems and six artificial test functions and compared against cellular genetic algorithms and 16 other evolutionary algorithm designs. Our results indicate that a self-organizing topology evolutionary algorithm exhibits surprisingly robust search behavior with promising performance observed over short and long time scales. After a careful analysis of these results, we conclude that the coevolution between a population and its topology represents a powerful new paradigm for designing robust search heuristics.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 00:34:32 GMT" }, { "version": "v2", "created": "Sun, 6 Feb 2011 02:35:11 GMT" } ]
2011-02-08T00:00:00
[ [ "Whitacre", "James M.", "" ], [ "Sarker", "Ruhul A.", "" ], [ "Pham", "Q. Tuan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0516
James Whitacre
James M Whitacre
Adaptation and Self-Organization in Evolutionary Algorithms
PhD Thesis
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Abbreviated Abstract: The objective of Evolutionary Computation is to solve practical problems (e.g. optimization, data mining) by simulating the mechanisms of natural evolution. This thesis addresses several topics related to adaptation and self-organization in evolving systems with the overall aims of improving the performance of Evolutionary Algorithms (EA), understanding its relation to natural evolution, and incorporating new mechanisms for mimicking complex biological systems.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 02:21:36 GMT" } ]
2009-07-06T00:00:00
[ [ "Whitacre", "James M", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0907.0520
James Whitacre
Hussein Abbass, Axel Bender, Helen Dam, Stephen Baker, James M Whitacre, Ruhul Sarker
Computational Scenario-based Capability Planning
GECCO-2008, Atlanta, GA, USA
null
10.1145/1389095.1389378
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scenarios are pen-pictures of plausible futures, used for strategic planning. The aim of this investigation is to expand the horizon of scenario-based planning through computational models that are able to aid the analyst in the planning process. The investigation builds upon the advances of Information and Communication Technology (ICT) to create a novel, flexible and customizable computational capability-based planning methodology that is practical and theoretically sound. We will show how evolutionary computation, in particular evolutionary multi-objective optimization, can play a central role - both as an optimizer and as a source for innovation.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 02:32:34 GMT" } ]
2009-07-06T00:00:00
[ [ "Abbass", "Hussein", "" ], [ "Bender", "Axel", "" ], [ "Dam", "Helen", "" ], [ "Baker", "Stephen", "" ], [ "Whitacre", "James M", "" ], [ "Sarker", "Ruhul", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0540
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Inversive Meadows and Divisive Meadows
18 pages; error corrected; 29 pages, combined with arXiv:0909.2088 [math.RA] and arXiv:0909.5271 [math.RA]
Journal of Applied Logic, 9(3):203--220, 2011
10.1016/j.jal.2011.03.001
null
math.RA cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inversive meadows are commutative rings with a multiplicative identity element and a total multiplicative inverse operation whose value at 0 is 0. Divisive meadows are inversive meadows with the multiplicative inverse operation replaced by a division operation. We give finite equational specifications of the class of all inversive meadows and the class of all divisive meadows. It depends on the angle from which they are viewed whether inversive meadows or divisive meadows must be considered more basic. We show that inversive and divisive meadows of rational numbers can be obtained as initial algebras of finite equational specifications. In the spirit of Peacock's arithmetical algebra, we study variants of inversive and divisive meadows without an additive identity element and/or an additive inverse operation. We propose simple constructions of variants of inversive and divisive meadows with a partial multiplicative inverse or division operation from inversive and divisive meadows. Divisive meadows are more basic if these variants are considered as well. We give a simple account of how mathematicians deal with 1 / 0, in which meadows and a customary convention among mathematicians play prominent parts, and we make plausible that a convincing account, starting from the popular computer science viewpoint that 1 / 0 is undefined, by means of some logic of partial functions is not attainable.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 06:42:28 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 07:14:16 GMT" }, { "version": "v3", "created": "Tue, 2 Nov 2010 16:00:31 GMT" } ]
2011-08-02T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.0542
Christine Michel
Christine Michel (LIESP, ICTT), Marc-Eric Bobillier-Chaumon (ICTT), V\'eronique Cohen-Montandreau (ICTT), Franck Tarpin-Bernard (LIESP, ICTT)
D\'emarche d'\'evaluation de l'usage et des r\'epercussions psychosociales d'un environnement STIC sur une population de personnes \^ag\'ees en r\'esidence m\'edicalis\'ee
null
17 \`eme conf\'erence francophone sur l'Interaction Homme-Machine, Toulouse : France (2005)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The MNESIS Project aims to see whether the use of computerized environment by elderly people in medicalized residences stimulates their cognitive capacities and contributes to a better integration, recognition or acceptance within their social environment (friends, family, medical staff). In this paper we present the protocol of evaluation that is defined to check this assumption. This protocol is between users' centred traditional protocols (built on investigations and indirect observation) and studies of Web Usage Mining (where knowledge databases about the uses are built from traces of use). It allows collecting direct and indirect information on a large scale and over long periods.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 06:44:42 GMT" } ]
2009-07-06T00:00:00
[ [ "Michel", "Christine", "", "LIESP, ICTT" ], [ "Bobillier-Chaumon", "Marc-Eric", "", "ICTT" ], [ "Cohen-Montandreau", "Véronique", "", "ICTT" ], [ "Tarpin-Bernard", "Franck", "", "LIESP, ICTT" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0907.0589
Rahul Gupta
Rahul Gupta, Sunita Sarawagi, Ajit A. Diwan
Generalized Collective Inference with Symmetric Clique Potentials
30 pages
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Collective graphical models exploit inter-instance associative dependence to output more accurate labelings. However existing models support very limited kind of associativity which restricts accuracy gains. This paper makes two major contributions. First, we propose a general collective inference framework that biases data instances to agree on a set of {\em properties} of their labelings. Agreement is encouraged through symmetric clique potentials. We show that rich properties leads to bigger gains, and present a systematic inference procedure for a large class of such properties. The procedure performs message passing on the cluster graph, where property-aware messages are computed with cluster specific algorithms. This provides an inference-only solution for domain adaptation. Our experiments on bibliographic information extraction illustrate significant test error reduction over unseen domains. Our second major contribution consists of algorithms for computing outgoing messages from clique clusters with symmetric clique potentials. Our algorithms are exact for arbitrary symmetric potentials on binary labels and for max-like and majority-like potentials on multiple labels. For majority potentials, we also provide an efficient Lagrangian Relaxation based algorithm that compares favorably with the exact algorithm. We present a 13/15-approximation algorithm for the NP-hard Potts potential, with runtime sub-quadratic in the clique size. In contrast, the best known previous guarantee for graphs with Potts potentials is only 1/2. We empirically show that our method for Potts potentials is an order of magnitude faster than the best alternatives, and our Lagrangian Relaxation based algorithm for majority potentials beats the best applicable heuristic -- ICM.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 11:32:47 GMT" }, { "version": "v2", "created": "Tue, 7 Jul 2009 13:31:01 GMT" } ]
2009-07-07T00:00:00
[ [ "Gupta", "Rahul", "" ], [ "Sarawagi", "Sunita", "" ], [ "Diwan", "Ajit A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0592
James Whitacre
James M. Whitacre, Tuan Q. Pham, Ruhul A. Sarker
Credit Assignment in Adaptive Evolutionary Algorithms
null
Genetic And Evolutionary Computation Conference, 2006
10.1145/1143997.1144206
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a new method for assigning credit to search operators is presented. Starting with the principle of optimizing search bias, search operators are selected based on an ability to create solutions that are historically linked to future generations. Using a novel framework for defining performance measurements, distributing credit for performance, and the statistical interpretation of this credit, a new adaptive method is developed and shown to outperform a variety of adaptive and non-adaptive competitors.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 11:02:25 GMT" } ]
2009-07-06T00:00:00
[ [ "Whitacre", "James M.", "" ], [ "Pham", "Tuan Q.", "" ], [ "Sarker", "Ruhul A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0595
James Whitacre
James M. Whitacre, Tuan Q. Pham, Ruhul A. Sarker
Use of statistical outlier detection method in adaptive evolutionary algorithms
null
Genetic And Evolutionary Computation Conference, 2006
10.1145/1143997.1144205
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the issue of adapting probabilities for Evolutionary Algorithm (EA) search operators is revisited. A framework is devised for distinguishing between measurements of performance and the interpretation of those measurements for purposes of adaptation. Several examples of measurements and statistical interpretations are provided. Probability value adaptation is tested using an EA with 10 search operators against 10 test problems with results indicating that both the type of measurement and its statistical interpretation play significant roles in EA performance. We also find that selecting operators based on the prevalence of outliers rather than on average performance is able to provide considerable improvements to adaptive methods and soundly outperforms the non-adaptive case.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 11:07:43 GMT" } ]
2009-07-06T00:00:00
[ [ "Whitacre", "James M.", "" ], [ "Pham", "Tuan Q.", "" ], [ "Sarker", "Ruhul A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0597
James Whitacre
James M. Whitacre, Axel Bender, Stephen Baker, Qi Fan, Ruhul A. Sarker, Hussein Abbass
Network Topology and Time Criticality Effects in the Modularised Fleet Mix Problem
null
SimTecT 2007 conference, Melbourne Australia
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we explore the interplay between network topology and time criticality in a military logistics system. A general goal of this work (and previous work) is to evaluate land transportation requirements or, more specifically, how to design appropriate fleets of military general service vehicles that are tasked with the supply and re-supply of military units dispersed in an area of operation. The particular focus of this paper is to gain a better understanding of how the logistics environment changes when current Army vehicles with fixed transport characteristics are replaced by a new generation of modularised vehicles that can be configured task-specifically. The experimental work is conducted within a well developed strategic planning simulation environment which includes a scenario generation engine for automatically sampling supply and re-supply missions and a multi-objective meta-heuristic search algorithm (i.e. Evolutionary Algorithm) for solving the particular scheduling and routing problems. The results presented in this paper allow for a better understanding of how (and under what conditions) a modularised vehicle fleet can provide advantages over the currently implemented system.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 11:16:29 GMT" } ]
2009-07-06T00:00:00
[ [ "Whitacre", "James M.", "" ], [ "Bender", "Axel", "" ], [ "Baker", "Stephen", "" ], [ "Fan", "Qi", "" ], [ "Sarker", "Ruhul A.", "" ], [ "Abbass", "Hussein", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0598
James Whitacre
Slawomir Wesolkowski, Michael Mazurek, James M. Whitacre, Axel Bender, Hussein Abbass
Robustness and Adaptiveness Analysis of Future Fleets
null
SimtecT 2009 conference, Adelaide, Australia
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Making decisions about the structure of a future military fleet is a challenging task. Several issues need to be considered such as the existence of multiple competing objectives and the complexity of the operating environment. A particular challenge is posed by the various types of uncertainty that the future might hold. It is uncertain what future events might be encountered; how fleet design decisions will influence and shape the future; and how present and future decision makers will act based on available information, their personal biases regarding the importance of different objectives, and their economic preferences. In order to assist strategic decision-making, an analysis of future fleet options needs to account for conditions in which these different classes of uncertainty are exposed. It is important to understand what assumptions a particular fleet is robust to, what the fleet can readily adapt to, and what conditions present clear risks to the fleet. We call this the analysis of a fleet's strategic positioning. This paper introduces how strategic positioning can be evaluated using computer simulations. Our main aim is to introduce a framework for capturing information that can be useful to a decision maker and for defining the concepts of robustness and adaptiveness in the context of future fleet design. We demonstrate our conceptual framework using simulation studies of an air transportation fleet. We capture uncertainty by employing an explorative scenario-based approach. Each scenario represents a sampling of different future conditions, different model assumptions, and different economic preferences. Proposed changes to a fleet are then analysed based on their influence on the fleet's robustness, adaptiveness, and risk to different scenarios.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 11:23:14 GMT" } ]
2009-07-06T00:00:00
[ [ "Wesolkowski", "Slawomir", "" ], [ "Mazurek", "Michael", "" ], [ "Whitacre", "James M.", "" ], [ "Bender", "Axel", "" ], [ "Abbass", "Hussein", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0611
Serge Tichkiewitch
S. Butdee (KMRC), Chaiwat Noomtong (LGS), Serge Tichkiewitch (LGS)
A process planning system with feature based neural network search strategy for aluminum extrusion die manufacturing
null
Asian International Journal of Science and Technology in Production and Manufacturing Engineering 2, 1 (2009) 137-157
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aluminum extrusion die manufacturing is a critical task for productive improvement and increasing potential of competition in aluminum extrusion industry. It causes to meet the efficiency not only consistent quality but also time and production cost reduction. Die manufacturing consists first of die design and process planning in order to make a die for extruding the customer's requirement products. The efficiency of die design and process planning are based on the knowledge and experience of die design and die manufacturer experts. This knowledge has been formulated into a computer system called the knowledge-based system. It can be reused to support a new die design and process planning. Such knowledge can be extracted directly from die geometry which is composed of die features. These features are stored in die feature library to be prepared for producing a new die manufacturing. Die geometry is defined according to the characteristics of the profile so we can reuse die features from the previous similar profile design cases. This paper presents the CaseXpert Process Planning System for die manufacturing based on feature based neural network technique. Die manufacturing cases in the case library would be retrieved with searching and learning method by neural network for reusing or revising it to build a die design and process planning when a new case is similar with the previous die manufacturing cases. The results of the system are dies design and machining process. The system has been successfully tested, it has been proved that the system can reduce planning time and respond high consistent plans.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 12:08:13 GMT" } ]
2009-07-06T00:00:00
[ [ "Butdee", "S.", "", "KMRC" ], [ "Noomtong", "Chaiwat", "", "LGS" ], [ "Tichkiewitch", "Serge", "", "LGS" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0907.0615
Rigo Michel
Emilie Charlier, Tomi Karki, Michel Rigo
Multidimensional Generalized Automatic Sequences and Shape-symmetric Morphic Words
null
null
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An infinite word is S-automatic if, for all n>=0, its (n + 1)st letter is the output of a deterministic automaton fed with the representation of n in the considered numeration system S. In this extended abstract, we consider an analogous definition in a multidimensional setting and present the connection to the shape-symmetric infinite words introduced by Arnaud Maes. More precisely, for d>=2, we state that a multidimensional infinite word x : N^d \to \Sigma over a finite alphabet \Sigma is S-automatic for some abstract numeration system S built on a regular language containing the empty word if and only if x is the image by a coding of a shape-symmetric infinite word.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 12:39:13 GMT" } ]
2009-07-06T00:00:00
[ [ "Charlier", "Emilie", "" ], [ "Karki", "Tomi", "" ], [ "Rigo", "Michel", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.0616
Philipp Weis
Philipp Weis, Neil Immerman
Structure Theorem and Strict Alternation Hierarchy for FO^2 on Words
null
Logical Methods in Computer Science, Volume 5, Issue 3 (August 4, 2009) lmcs:1159
10.2168/LMCS-5(3:4)2009
null
cs.LO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is well-known that every first-order property on words is expressible using at most three variables. The subclass of properties expressible with only two variables is also quite interesting and well-studied. We prove precise structure theorems that characterize the exact expressive power of first-order logic with two variables on words. Our results apply to both the case with and without a successor relation. For both languages, our structure theorems show exactly what is expressible using a given quantifier depth, n, and using m blocks of alternating quantifiers, for any m \leq n. Using these characterizations, we prove, among other results, that there is a strict hierarchy of alternating quantifiers for both languages. The question whether there was such a hierarchy had been completely open. As another consequence of our structural results, we show that satisfiability for first-order logic with two variables without successor, which is NEXP-complete in general, becomes NP-complete once we only consider alphabets of a bounded size.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 12:28:01 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2009 23:05:40 GMT" } ]
2015-07-01T00:00:00
[ [ "Weis", "Philipp", "" ], [ "Immerman", "Neil", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.0620
Rigo Michel
J. Bell, E. Charlier, A. S. Fraenkel, M. Rigo
A Decision Problem for Ultimately Periodic Sets in Non-standard Numeration Systems
null
null
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a non-standard numeration system like the one built over the Fibonacci sequence where nonnegative integers are represented by words over $\{0,1\}$ without two consecutive 1. Given a set $X$ of integers such that the language of their greedy representations in this system is accepted by a finite automaton, we consider the problem of deciding whether or not $X$ is a finite union of arithmetic progressions. We obtain a decision procedure for this problem, under some hypothesis about the considered numeration system. In a second part, we obtain an analogous decision result for a particular class of abstract numeration systems built on an infinite regular language.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 12:43:20 GMT" } ]
2009-07-06T00:00:00
[ [ "Bell", "J.", "" ], [ "Charlier", "E.", "" ], [ "Fraenkel", "A. S.", "" ], [ "Rigo", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.0624
Rigo Michel
M. Rigo, L. Waxweiler
A note on syndeticity, recognizable sets and Cobham's theorem
null
Bull. Eur. Assoc. Theor. Comput. Sci. EATCS 88 (2006), 169-173
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note, we give an alternative proof of the following result. Let p, q >= 2 be two multiplicatively independent integers. If an infinite set of integers is both p- and q-recognizable, then it is syndetic. Notice that this result is needed in the classical proof of the celebrated Cobham?s theorem. Therefore the aim of this paper is to complete [13] and [1] to obtain an accessible proof of Cobham?s theorem.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 12:59:02 GMT" } ]
2009-07-06T00:00:00
[ [ "Rigo", "M.", "" ], [ "Waxweiler", "L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.0649
Fabrice Theoleyre
Benoit Darties (LIG), Fabrice Theoleyre (LIG), Andrzej Duda (LIG)
A Divide-and-Conquer Scheme for Assigning Roles in Multi-Channel Wireless Mesh Networks
null
IEEE Conference on Local Computer Networks (LCN), Zurich : Switzerland (2009)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A multi-channel MAC seems to be an interesting approach for improving network throughput by multiplexing transmissions over orthogonal channels. In particular, Molecular MAC has recently proposed to modify the standard IEEE 802.11 DCF access method to use dynamic channel switching for efficient packet forwarding over multiple hops. However, this MAC layer requires role and channel assignment to nodes: some of them use a static channel, while others dynamically switch to neighbor channels on-demand. To assign roles and channels, we extend the notion of the Weakly Connected Dominating Set, the structure already used in clustering. More precisely, we adapt the WCDS structure and introduce new constraints to define what we call a reversible WCDS (r-WCDS), which is particularly suitable for wireless mesh networks operating under Molecular MAC. We propose a divide-and-conquer scheme that partitions the network into clusters with one leader per cluster solving a MILP formulation to assign roles in its cluster. By appropriately defining the roles at the border of clusters, we maintain global connectivity in the r-wcds. Finally, our simulations show that the performance of the propose scheme is close to a centralized algorithm.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 14:48:21 GMT" }, { "version": "v2", "created": "Thu, 8 Jul 2010 06:36:39 GMT" } ]
2010-07-26T00:00:00
[ [ "Darties", "Benoit", "", "LIG" ], [ "Theoleyre", "Fabrice", "", "LIG" ], [ "Duda", "Andrzej", "", "LIG" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.0678
R Doomun
Piyush Kumar Shukla, Dr. S. Silakari, Dr. Sarita Singh Bhadoria
Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks
10 pages, International Journal of Computer Science and Information Security
IJCSIS May 2009 Issue, Vol. 1, No. 1
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering this fact, performance of MAC protocol can be enhanced. The purpose of this work is to modify the existing protocol by enabling it to adapt according to state of the network. The modified protocol takes appropriate action whenever unutilized periods detected. In this way, to increase the effective bandwidth utilization and determine how it behaves under increasing load, and varying packet sizes. It will also include effects of attacks i.e. Denial of service attacks, Replay Attack, Continuous Channel Access or Exhaustion attack, Flooding attack, Jamming (Radio interference) attack, Selective forwarding attack which degrade performance of MAC protocol. In Continuous Channel Access or Exhaustion attack, a malicious node disrupts the MAC protocol, by continuously requesting or transmitting over the channel. This eventually leads a starvation for other nodes in the network w.r.t channel access. remedy may be the network ignores excessive requests without sending expensive radio transmissions. This limit however cannot drop below the expected maximum data rate the network has to support. This limit is usually coded into the protocol during the design phase and requires additional logic also. Repeated application of these exhaustion or collision based MAC layer attacks can lead into unfairness.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 17:11:28 GMT" } ]
2009-07-06T00:00:00
[ [ "Shukla", "Piyush Kumar", "" ], [ "Silakari", "Dr. S.", "" ], [ "Bhadoria", "Dr. Sarita Singh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.0691
Chinh Hoang
Elaine M. Eschen, Chinh T. Hoang, R. Sritharan, Lorna Stewart
On the complexity of deciding whether the distinguishing chromatic number of a graph is at most two
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In an article [3] published recently in this journal, it was shown that when k >= 3, the problem of deciding whether the distinguishing chromatic number of a graph is at most k is NP-hard. We consider the problem when k = 2. In regards to the issue of solvability in polynomial time, we show that the problem is at least as hard as graph automorphism but no harder than graph isomorphism.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 18:34:38 GMT" } ]
2009-07-06T00:00:00
[ [ "Eschen", "Elaine M.", "" ], [ "Hoang", "Chinh T.", "" ], [ "Sritharan", "R.", "" ], [ "Stewart", "Lorna", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.0718
Jonathan Sorenson
Jonathan P. Sorenson
A Randomized Sublinear Time Parallel GCD Algorithm for the EREW PRAM
null
Information Processing Letters 110 (2010) 198-201
10.1016/j.ipl.2009.12.008
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a randomized parallel algorithm that computes the greatest common divisor of two integers of n bits in length with probability 1-o(1) that takes O(n loglog n / log n) expected time using n^{6+\epsilon} processors on the EREW PRAM parallel model of computation. We believe this to be the first randomized sublinear time algorithm on the EREW PRAM for this problem.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 21:12:38 GMT" }, { "version": "v2", "created": "Fri, 15 Jan 2010 21:58:58 GMT" } ]
2010-01-15T00:00:00
[ [ "Sorenson", "Jonathan P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.0725
Ertugrul Basar
Ertugrul Basar and Umit Aygolu
High-Rate Full-Diversity Space-Time Block Codes for Three and Four Transmit Antennas
To appear in IET Communications, 21 pages, 4 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we deal with the design of high-rate, full-diversity, low maximum likelihood (ML) decoding complexity space-time block codes (STBCs) with code rates of 2 and 1.5 complex symbols per channel use for multiple-input multiple output (MIMO) systems employing three and four transmit antennas. We fill the empty slots of the existing STBCs from CIODs in their transmission matrices by additional symbols and use the conditional ML decoding technique which significantly reduces the ML decoding complexity of non-orthogonal STBCs while ensuring full-diversity and high coding gain. First, two new schemes with code rates of 2 and 1.5 are proposed for MIMO systems with four transmit antennas. We show that our low-complexity rate-2 STBC outperforms the corresponding best STBC recently proposed by Biglieri et al. for QPSK, due to its superior coding gain while our rate-1.5 STBC outperforms the full-diversity quasi-orthogonal STBC (QOSTBC). Then, two STBCs with code rates of 2 and 1.5 are proposed for three transmit antennas which are shown to outperform the corresponding full-diversity QOSTBC for three transmit antennas. We prove by an information-theoretic analysis that the capacities of new rate-2 STBCs for three and four transmit antennas are much closer to the actual MIMO channel capacity than the capacities of classical OSTBCs and CIODs.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 22:15:05 GMT" } ]
2009-07-07T00:00:00
[ [ "Basar", "Ertugrul", "" ], [ "Aygolu", "Umit", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0726
Zoya Svitkina
Zachary Friggstad, Mohammad R. Salavatipour, Zoya Svitkina
Asymmetric Traveling Salesman Path and Directed Latency Problems
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study integrality gaps and approximability of two closely related problems on directed graphs. Given a set V of n nodes in an underlying asymmetric metric and two specified nodes s and t, both problems ask to find an s-t path visiting all other nodes. In the asymmetric traveling salesman path problem (ATSPP), the objective is to minimize the total cost of this path. In the directed latency problem, the objective is to minimize the sum of distances on this path from s to each node. Both of these problems are NP-hard. The best known approximation algorithms for ATSPP had ratio O(log n) until the very recent result that improves it to O(log n/ log log n). However, only a bound of O(sqrt(n)) for the integrality gap of its linear programming relaxation has been known. For directed latency, the best previously known approximation algorithm has a guarantee of O(n^(1/2+eps)), for any constant eps > 0. We present a new algorithm for the ATSPP problem that has an approximation ratio of O(log n), but whose analysis also bounds the integrality gap of the standard LP relaxation of ATSPP by the same factor. This solves an open problem posed by Chekuri and Pal [2007]. We then pursue a deeper study of this linear program and its variations, which leads to an algorithm for the k-person ATSPP (where k s-t paths of minimum total length are sought) and an O(log n)-approximation for the directed latency problem.
[ { "version": "v1", "created": "Fri, 3 Jul 2009 22:42:23 GMT" }, { "version": "v2", "created": "Tue, 1 Jun 2010 23:44:37 GMT" } ]
2010-06-03T00:00:00
[ [ "Friggstad", "Zachary", "" ], [ "Salavatipour", "Mohammad R.", "" ], [ "Svitkina", "Zoya", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.0741
Travis Gagie
Travis Gagie and Yakov Nekrich
Tight Bounds for Online Stable Sorting
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although many authors have considered how many ternary comparisons it takes to sort a multiset $S$ of size $n$, the best known upper and lower bounds still differ by a term linear in $n$. In this paper we restrict our attention to online stable sorting and prove upper and lower bounds that are within (o (n)) not only of each other but also of the best known upper bound for offline sorting. Specifically, we first prove that if the number of distinct elements (\sigma = o (n / \log n)), then ((H + 1) n + o (n)) comparisons are sufficient, where $H$ is the entropy of the distribution of the elements in $S$. We then give a simple proof that ((H + 1) n - o (n)) comparisons are necessary in the worst case.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 06:18:38 GMT" } ]
2009-07-07T00:00:00
[ [ "Gagie", "Travis", "" ], [ "Nekrich", "Yakov", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.0746
Marcus Hutter
Marcus Hutter
Open Problems in Universal Induction & Intelligence
32 LaTeX pages
Algorithms, 3:2 (2009) pages 879-906
null
null
cs.AI cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Specialized intelligent systems can be found everywhere: finger print, handwriting, speech, and face recognition, spam filtering, chess and other game programs, robots, et al. This decade the first presumably complete mathematical theory of artificial intelligence based on universal induction-prediction-decision-action has been proposed. This information-theoretic approach solidifies the foundations of inductive inference and artificial intelligence. Getting the foundations right usually marks a significant progress and maturing of a field. The theory provides a gold standard and guidance for researchers working on intelligent algorithms. The roots of universal induction have been laid exactly half-a-century ago and the roots of universal intelligence exactly one decade ago. So it is timely to take stock of what has been achieved and what remains to be done. Since there are already good recent surveys, I describe the state-of-the-art only in passing and refer the reader to the literature. This article concentrates on the open problems in universal induction and its extension to universal intelligence.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 08:45:22 GMT" } ]
2010-12-30T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0748
Paolo Frasca
Ruggero Carli, Fabio Fagnani, Paolo Frasca, Sandro Zampieri
Gossip consensus algorithms via quantized communication
Accepted for publication
null
null
null
math.OC cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the average consensus problem on a network of digital links, and proposes a set of algorithms based on pairwise ''gossip'' communications and updates. We study the convergence properties of such algorithms with the goal of answering two design questions, arising from the literature: whether the agents should encode their communication by a deterministic or a randomized quantizer, and whether they should use, and how, exact information regarding their own states in the update.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 09:12:16 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2009 15:15:01 GMT" } ]
2011-07-25T00:00:00
[ [ "Carli", "Ruggero", "" ], [ "Fagnani", "Fabio", "" ], [ "Frasca", "Paolo", "" ], [ "Zampieri", "Sandro", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0907.0749
Dan Ghica
Dan R. Ghica
Function Interface Models for Hardware Compilation: Types, Signatures, Protocols
25 pages, 8 figures
null
null
University of Birmingham Technical Report CSR-08-04
cs.PL cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of synthesis of gate-level descriptions of digital circuits from behavioural specifications written in higher-level programming languages (hardware compilation) has been studied for a long time yet a definitive solution has not been forthcoming. The argument of this essay is mainly methodological, bringing a perspective that is informed by recent developments in programming-language theory. We argue that one of the major obstacles in the way of hardware compilation becoming a useful and mature technology is the lack of a well defined function interface model, i.e. a canonical way in which functions communicate with arguments. We discuss the consequences of this problem and propose a solution based on new developments in programming language theory. We conclude by presenting a prototype implementation and some examples illustrating our principles.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 09:24:26 GMT" } ]
2009-07-07T00:00:00
[ [ "Ghica", "Dan R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0907.0774
Nitin Saxena
G\'abor Ivanyos, Marek Karpinski, Nitin Saxena
Deterministic Polynomial Time Algorithms for Matrix Completion Problems
14 pages, preliminary
LMS J. of Computation and Mathematics 17 (2014)
10.1112/S1461157013000296
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present new deterministic algorithms for several cases of the maximum rank matrix completion problem (for short matrix completion), i.e. the problem of assigning values to the variables in a given symbolic matrix as to maximize the resulting matrix rank. Matrix completion belongs to the fundamental problems in computational complexity with numerous important algorithmic applications, among others, in computing dynamic transitive closures or multicast network codings (Harvey et al SODA 2005, Harvey et al SODA 2006). We design efficient deterministic algorithms for common generalizations of the results of Lovasz and Geelen on this problem by allowing linear functions in the entries of the input matrix such that the submatrices corresponding to each variable have rank one. We present also a deterministic polynomial time algorithm for finding the minimal number of generators of a given module structure given by matrices. We establish further several hardness results related to matrix algebras and modules. As a result we connect the classical problem of polynomial identity testing with checking surjectivity (or injectivity) between two given modules. One of the elements of our algorithm is a construction of a greedy algorithm for finding a maximum rank element in the more general setting of the problem. The proof methods used in this paper could be also of independent interest.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 17:10:33 GMT" }, { "version": "v2", "created": "Sat, 26 Dec 2009 01:17:38 GMT" } ]
2014-07-11T00:00:00
[ [ "Ivanyos", "Gábor", "" ], [ "Karpinski", "Marek", "" ], [ "Saxena", "Nitin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.0783
Hal Daum\'e III
Hal Daum\'e III
Bayesian Multitask Learning with Latent Hierarchies
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We learn multiple hypotheses for related tasks under a latent hierarchical relationship between tasks. We exploit the intuition that for domain adaptation, we wish to share classifier structure, but for multitask learning, we wish to share covariance structure. Our hierarchical model is seen to subsume several previously proposed multitask learning models and performs well on three distinct real-world data sets.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 18:35:52 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.0784
Hal Daum\'e III
Hal Daum\'e III
Cross-Task Knowledge-Constrained Self Training
null
null
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithmic framework for learning multiple related tasks. Our framework exploits a form of prior knowledge that relates the output spaces of these tasks. We present PAC learning results that analyze the conditions under which such learning is possible. We present results on learning a shallow parser and named-entity recognition system that exploits our framework, showing consistent improvements over baseline methods.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 18:42:01 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.0785
Hal Daum\'e III
Hal Daum\'e III and Lyle Campbell
A Bayesian Model for Discovering Typological Implications
null
ACL 2007
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A standard form of analysis for linguistic typology is the universal implication. These implications state facts about the range of extant languages, such as ``if objects come after verbs, then adjectives come after nouns.'' Such implications are typically discovered by painstaking hand analysis over a small sample of languages. We propose a computational model for assisting at this process. Our model is able to discover both well-known implications as well as some novel implications that deserve further study. Moreover, through a careful application of hierarchical analysis, we are able to cope with the well-known sampling problem: languages are not independent.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 18:43:16 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ], [ "Campbell", "Lyle", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.0786
Hal Daum\'e III
Hal Daum\'e III and John Langford and Daniel Marcu
Search-based Structured Prediction
null
Machine Learning Journal 2009
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present Searn, an algorithm for integrating search and learning to solve complex structured prediction problems such as those that occur in natural language, speech, computational biology, and vision. Searn is a meta-algorithm that transforms these complex problems into simple classification problems to which any binary classifier may be applied. Unlike current algorithms for structured learning that require decomposition of both the loss function and the feature functions over the predicted structure, Searn is able to learn prediction functions for any loss function and any class of features. Moreover, Searn comes with a strong, natural theoretical guarantee: good performance on the derived classification problems implies good performance on the structured prediction problem.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 18:48:34 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ], [ "Langford", "John", "" ], [ "Marcu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.0792
James Raynolds
James E. Raynolds and Lenore M. Mullin
A generalized inner and outer product of arbitrary multi-dimensional arrays using A Mathematics of Arrays (MoA)
null
null
null
null
cs.MS cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An algorithm has been devised to compute the inner and outer product between two arbitrary multi-dimensional arrays A and B in a single piece of code. It was derived using A Mathematics of Arrays (MoA) and the $\psi$-calculus. Extensive tests of the new algorithm are presented for running in sequential as well as OpenMP multiple processor modes.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 20:17:28 GMT" } ]
2009-07-07T00:00:00
[ [ "Raynolds", "James E.", "" ], [ "Mullin", "Lenore M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.0796
James Raynolds
Lenore M. Mullin and James E. Raynolds
Tensors and n-d Arrays:A Mathematics of Arrays (MoA), psi-Calculus and the Composition of Tensor and Array Operations
null
null
null
null
cs.MS cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kronecker product is a key algorithm and is ubiquitous across the physical, biological, and computation social sciences. Thus considerations of optimal implementation are important. The need to have high performance and computational reproducibility is paramount. Moreover, due to the need to compose multiple Kronecker products, issues related to data structures, layout and indexing algebra require a new look at an old problem. This paper discusses the outer product/tensor product and a special case of the tensor product: the Kronecker product, along with optimal implementation when composed, and mapped to complex processor/memory hierarchies. We discuss how the use of ``A Mathematics of Arrays" (MoA), and the psi-Calculus, (a calculus of indexing with shapes), provides optimal, verifiable, reproducible, scalable, and portable implementations of both hardware and software.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 20:38:39 GMT" } ]
2009-07-07T00:00:00
[ [ "Mullin", "Lenore M.", "" ], [ "Raynolds", "James E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.0804
Hal Daum\'e III
Hal Daum\'e III and Daniel Marcu
Induction of Word and Phrase Alignments for Automatic Document Summarization
null
Computational Linguistics, 2005
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current research in automatic single document summarization is dominated by two effective, yet naive approaches: summarization by sentence extraction, and headline generation via bag-of-words models. While successful in some tasks, neither of these models is able to adequately capture the large set of linguistic devices utilized by humans when they produce summaries. One possible explanation for the widespread use of these models is that good techniques have been developed to extract appropriate training data for them from existing document/abstract and document/headline corpora. We believe that future progress in automatic summarization will be driven both by the development of more sophisticated, linguistically informed models, as well as a more effective leveraging of document/abstract corpora. In order to open the doors to simultaneously achieving both of these goals, we have developed techniques for automatically producing word-to-word and phrase-to-phrase alignments between documents and their human-written abstracts. These alignments make explicit the correspondences that exist in such document/abstract pairs, and create a potentially rich data source from which complex summarization algorithms may learn. This paper describes experiments we have carried out to analyze the ability of humans to perform such alignments, and based on these analyses, we describe experiments for creating them automatically. Our model for the alignment task is based on an extension of the standard hidden Markov model, and learns to create alignments in a completely unsupervised fashion. We describe our model in detail and present experimental results that show that our model is able to learn to reliably identify word- and phrase-level alignments in a corpus of <document,abstract> pairs.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 22:57:26 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ], [ "Marcu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.0806
Hal Daum\'e III
Hal Daum\'e III and Daniel Marcu
A Noisy-Channel Model for Document Compression
null
ACL 2002
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a document compression system that uses a hierarchical noisy-channel model of text production. Our compression system first automatically derives the syntactic structure of each sentence and the overall discourse structure of the text given as input. The system then uses a statistical hierarchical model of text production in order to drop non-important syntactic and discourse constituents so as to generate coherent, grammatical document compressions of arbitrary length. The system outperforms both a baseline and a sentence-based compression system that operates by simplifying sequentially all sentences in a text. Our results support the claim that discourse knowledge plays an important role in document summarization.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 22:26:47 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ], [ "Marcu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.0807
Hal Daum\'e III
Hal Daum\'e III and Daniel Marcu
A Large-Scale Exploration of Effective Global Features for a Joint Entity Detection and Tracking Model
null
HLT/EMNLP 2005
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Entity detection and tracking (EDT) is the task of identifying textual mentions of real-world entities in documents, extending the named entity detection and coreference resolution task by considering mentions other than names (pronouns, definite descriptions, etc.). Like NE tagging and coreference resolution, most solutions to the EDT task separate out the mention detection aspect from the coreference aspect. By doing so, these solutions are limited to using only local features for learning. In contrast, by modeling both aspects of the EDT task simultaneously, we are able to learn using highly complex, non-local features. We develop a new joint EDT model and explore the utility of many features, demonstrating their effectiveness on this task.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 22:28:15 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ], [ "Marcu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.0808
Hal Daum\'e III
Hal Daum\'e III and Daniel Marcu
A Bayesian Model for Supervised Clustering with the Dirichlet Process Prior
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a Bayesian framework for tackling the supervised clustering problem, the generic problem encountered in tasks such as reference matching, coreference resolution, identity uncertainty and record linkage. Our clustering model is based on the Dirichlet process prior, which enables us to define distributions over the countably infinite sets that naturally arise in this problem. We add supervision to our model by positing the existence of a set of unobserved random variables (we call these "reference types") that are generic across all clusters. Inference in our framework, which requires integrating over infinitely many parameters, is solved using Markov chain Monte Carlo techniques. We present algorithms for both conjugate and non-conjugate priors. We present a simple--but general--parameterization of our model based on a Gaussian assumption. We evaluate this model on one artificial task and three real-world tasks, comparing it against both unsupervised and state-of-the-art supervised algorithms. Our results show that our model is able to outperform other models across a variety of tasks and performance metrics.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 22:32:58 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ], [ "Marcu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.0809
Hal Daum\'e III
Hal Daum\'e III and Daniel Marcu
Learning as Search Optimization: Approximate Large Margin Methods for Structured Prediction
null
ICML 2005
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mappings to structured output spaces (strings, trees, partitions, etc.) are typically learned using extensions of classification algorithms to simple graphical structures (eg., linear chains) in which search and parameter estimation can be performed exactly. Unfortunately, in many complex problems, it is rare that exact search or parameter estimation is tractable. Instead of learning exact models and searching via heuristic means, we embrace this difficulty and treat the structured output problem in terms of approximate search. We present a framework for learning as search optimization, and two parameter updates with convergence theorems and bounds. Empirical evidence shows that our integrated approach to learning and decoding can outperform exact models at smaller computational cost.
[ { "version": "v1", "created": "Sat, 4 Jul 2009 22:34:25 GMT" } ]
2009-07-07T00:00:00
[ [ "Daumé", "Hal", "III" ], [ "Marcu", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.0821
Chengqing Li
Chengqing Li, Shujun Li, Kwok-Tung Lo
Breaking a new substitution-diffusion based image cipher using chaotic standard and logistic maps
7 pages, 2 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, an image encryption scheme based on chaotic standard and logistic maps was proposed. This paper studies the security of the scheme and shows that it can be broken with only one chosen-plaintext. Some other security defects of the scheme are also reported.
[ { "version": "v1", "created": "Sun, 5 Jul 2009 03:40:38 GMT" } ]
2009-07-07T00:00:00
[ [ "Li", "Chengqing", "" ], [ "Li", "Shujun", "" ], [ "Lo", "Kwok-Tung", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.0877
Stephen Bloom
S.L. Bloom and Z. Esik
Algebraic Ordinals
30 pages
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An algebraic tree T is one determined by a finite system of fixed point equations. The frontier \Fr(T) of an algebraic tree t is linearly ordered by the lexicographic order \lex. When (\Fr(T),\lex) is well-ordered, its order type is an \textbf{algebraic ordinal}. We prove that the algebraic ordinals are exactly the ordinals less than $\omega^{\omega^\omega}$.
[ { "version": "v1", "created": "Sun, 5 Jul 2009 18:24:28 GMT" }, { "version": "v2", "created": "Fri, 5 Feb 2010 14:49:46 GMT" }, { "version": "v3", "created": "Mon, 8 Feb 2010 14:49:21 GMT" } ]
2010-02-08T00:00:00
[ [ "Bloom", "S. L.", "" ], [ "Esik", "Z.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.0884
Wolfgang Mulzer
Nir Ailon, Bernard Chazelle, Kenneth L. Clarkson, Ding Liu, Wolfgang Mulzer, C. Seshadhri
Self-Improving Algorithms
26 pages, 8 figures, preliminary versions appeared at SODA 2006 and SoCG 2008. Thorough revision to improve the presentation of the paper
SIAM Journal on Computing (SICOMP), 40(2), 2011, pp. 350-375
10.1137/090766437
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate ways in which an algorithm can improve its expected performance by fine-tuning itself automatically with respect to an unknown input distribution D. We assume here that D is of product type. More precisely, suppose that we need to process a sequence I_1, I_2, ... of inputs I = (x_1, x_2, ..., x_n) of some fixed length n, where each x_i is drawn independently from some arbitrary, unknown distribution D_i. The goal is to design an algorithm for these inputs so that eventually the expected running time will be optimal for the input distribution D = D_1 * D_2 * ... * D_n. We give such self-improving algorithms for two problems: (i) sorting a sequence of numbers and (ii) computing the Delaunay triangulation of a planar point set. Both algorithms achieve optimal expected limiting complexity. The algorithms begin with a training phase during which they collect information about the input distribution, followed by a stationary regime in which the algorithms settle to their optimized incarnations.
[ { "version": "v1", "created": "Sun, 5 Jul 2009 19:48:43 GMT" }, { "version": "v2", "created": "Mon, 18 Oct 2010 09:43:17 GMT" } ]
2011-05-30T00:00:00
[ [ "Ailon", "Nir", "" ], [ "Chazelle", "Bernard", "" ], [ "Clarkson", "Kenneth L.", "" ], [ "Liu", "Ding", "" ], [ "Mulzer", "Wolfgang", "" ], [ "Seshadhri", "C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0907.0907
Sariel Har-Peled
Sariel Har-Peled
Randomized Incremental Construction of Compressed Quadtrees
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple randomized incremental algorithm for building compressed quadtrees. The resulting algorithm seems to be simpler than previously known algorithms for this task.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 03:03:42 GMT" }, { "version": "v2", "created": "Thu, 9 Jul 2009 15:08:25 GMT" } ]
2009-07-09T00:00:00
[ [ "Har-Peled", "Sariel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0907.0914
Yoshiyuki Kabashima
Y. Kabashima, T. Wadayama and T. Tanaka
A typical reconstruction limit of compressed sensing based on Lp-norm minimization
12 pages, 2 figures
J. Stat. Mech. (2009) L09003 (12 pages)
10.1088/1742-5468/2009/09/L09003
null
cs.IT cond-mat.dis-nn math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of reconstructing an $N$-dimensional continuous vector $\bx$ from $P$ constraints which are generated by its linear transformation under the assumption that the number of non-zero elements of $\bx$ is typically limited to $\rho N$ ($0\le \rho \le 1$). Problems of this type can be solved by minimizing a cost function with respect to the $L_p$-norm $||\bx||_p=\lim_{\epsilon \to +0}\sum_{i=1}^N |x_i|^{p+\epsilon}$, subject to the constraints under an appropriate condition. For several $p$, we assess a typical case limit $\alpha_c(\rho)$, which represents a critical relation between $\alpha=P/N$ and $\rho$ for successfully reconstructing the original vector by minimization for typical situations in the limit $N,P \to \infty$ with keeping $\alpha$ finite, utilizing the replica method. For $p=1$, $\alpha_c(\rho)$ is considerably smaller than its worst case counterpart, which has been rigorously derived by existing literature of information theory.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 05:38:16 GMT" }, { "version": "v2", "created": "Sat, 5 Dec 2009 07:04:22 GMT" } ]
2015-05-13T00:00:00
[ [ "Kabashima", "Y.", "" ], [ "Wadayama", "T.", "" ], [ "Tanaka", "T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0907.0929
Marc Shapiro
Mihai Letia (LIP), Nuno Pregui\c{c}a (CITI/Sep. Inform\'atica, FCT), Marc Shapiro (LIP6, Inria Rocquencourt)
CRDTs: Consistency without concurrency control
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A CRDT is a data type whose operations commute when they are concurrent. Replicas of a CRDT eventually converge without any complex concurrency control. As an existence proof, we exhibit a non-trivial CRDT: a shared edit buffer called Treedoc. We outline the design, implementation and performance of Treedoc. We discuss how the CRDT concept can be generalised, and its limitations.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 08:01:05 GMT" } ]
2009-07-07T00:00:00
[ [ "Letia", "Mihai", "", "LIP" ], [ "Preguiça", "Nuno", "", "CITI/Sep. Informática, FCT" ], [ "Shapiro", "Marc", "", "LIP6, Inria Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.0931
Danny Bickson
Danny Bickson and Danny Dolev
Distributed Sensor Selection using a Truncated Newton Method
Submitted for publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new distributed algorithm for computing a truncated Newton method, where the main diagonal of the Hessian is computed using belief propagation. As a case study for this approach, we examine the sensor selection problem, a Boolean convex optimization problem. We form two distributed algorithms. The first algorithm is a distributed version of the interior point method by Joshi and Boyd, and the second algorithm is an order of magnitude faster approximation. As an example application we discuss distributed anomaly detection in networks. We demonstrate the applicability of our solution using both synthetic data and real traffic logs collected from the Abilene Internet backbone.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 08:05:49 GMT" }, { "version": "v2", "created": "Thu, 14 Jan 2010 19:31:17 GMT" } ]
2010-01-14T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0937
Rapha\"el Rossignol
Nadia Creignou, Herve Daude, Uwe Egly and Raphael Rossignol
The threshold for random (1,2)-QSAT
20 pages. Preliminary, conference versions of this article appeared in SAT08 and SAT09
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The QSAT problem is the quantified version of the SAT problem. We show the existence of a threshold effect for the phase transition associated with the satisfiability of random quantified extended 2-CNF formulas. We consider boolean CNF formulas of the form $\forall X \exists Y \varphi(X,Y)$, where $X$ has $m$ variables, $Y$ has $n$ variables and each clause in $\varphi$ has one literal from $X$ and two from $Y$. For such formulas, we show that the threshold phenomenon is controlled by the ratio between the number of clauses and the number $n$ of existential variables. Then we give the exact location of the associated critical ratio $c^{*}$. Indeed, we prove that $c^{*}$ is a decreasing function of $ \alpha$, where $\alpha$ is the limiting value of $m / \log (n)$ when $n$ tends to infinity.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 15:30:21 GMT" } ]
2009-07-07T00:00:00
[ [ "Creignou", "Nadia", "" ], [ "Daude", "Herve", "" ], [ "Egly", "Uwe", "" ], [ "Rossignol", "Raphael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.0939
Thierry Petit
Thierry Petit and Emmanuel Poder
The Soft Cumulative Constraint
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This research report presents an extension of Cumulative of Choco constraint solver, which is useful to encode over-constrained cumulative problems. This new global constraint uses sweep and task interval violation-based algorithms.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 09:11:42 GMT" }, { "version": "v2", "created": "Tue, 7 Jul 2009 09:43:51 GMT" } ]
2009-07-07T00:00:00
[ [ "Petit", "Thierry", "" ], [ "Poder", "Emmanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.0942
Rigo Michel
Charlier Emilie, Le Gonidec Marion, Rigo Michel
Representing Real Numbers in a Generalized Numeration Systems
18 pages
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how to represent an interval of real numbers in an abstract numeration system built on a language that is not necessarily regular. As an application, we consider representations of real numbers using the Dyck language. We also show that our framework can be applied to the rational base numeration systems.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 09:17:02 GMT" } ]
2009-07-07T00:00:00
[ [ "Emilie", "Charlier", "" ], [ "Marion", "Le Gonidec", "" ], [ "Michel", "Rigo", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.0944
Yves Wiaux
Y. Wiaux, G. Puy, Y. Boursier, P. Vandergheynst
Spread spectrum for imaging techniques in radio interferometry
10 pages, 3 figures. Version 2 matches version accepted for publication in MNRAS. Changes include minor clarifications
Mon. Not. R. Astron. Soc. 400 (2009) 1029
10.1111/j.1365-2966.2009.15519.x
null
astro-ph.IM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the probe of astrophysical signals through radio interferometers with small field of view and baselines with non-negligible and constant component in the pointing direction. In this context, the visibilities measured essentially identify with a noisy and incomplete Fourier coverage of the product of the planar signals with a linear chirp modulation. In light of the recent theory of compressed sensing and in the perspective of defining the best possible imaging techniques for sparse signals, we analyze the related spread spectrum phenomenon and suggest its universality relative to the sparsity dictionary. Our results rely both on theoretical considerations related to the mutual coherence between the sparsity and sensing dictionaries, as well as on numerical simulations.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 09:20:39 GMT" }, { "version": "v2", "created": "Tue, 11 Aug 2009 10:02:45 GMT" } ]
2009-11-16T00:00:00
[ [ "Wiaux", "Y.", "" ], [ "Puy", "G.", "" ], [ "Boursier", "Y.", "" ], [ "Vandergheynst", "P.", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.0971
Yann Laigle-Chapuy
Fr\'ed\'eric Didier, Yann Laigle-Chapuy (INRIA Rocquencourt)
Attacking the combination generator
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present one of the most efficient attacks against the combination generator. This attack is inherent to this system as its only assumption is that the filtering function has a good autocorrelation. This is usually the case if the system is designed to be resistant to other kinds of attacks. We use only classical tools, namely vectorial correlation, weight 4 multiples and Walsh transform.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 11:45:19 GMT" }, { "version": "v2", "created": "Mon, 13 Jul 2009 06:56:22 GMT" } ]
2009-07-13T00:00:00
[ [ "Didier", "Frédéric", "", "INRIA Rocquencourt" ], [ "Laigle-Chapuy", "Yann", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.1005
Julien Cohen
Julien Cohen (LINA)
A class of structured P2P systems supporting browsing
14 pages
null
null
null
cs.IR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Browsing is a way of finding documents in a large amount of data which is complementary to querying and which is particularly suitable for multimedia documents. Locating particular documents in a very large collection of multimedia documents such as the ones available in peer to peer networks is a difficult task. However, current peer to peer systems do not allow to do this by browsing. In this report, we show how one can build a peer to peer system supporting a kind of browsing. In our proposal, one must extend an existing distributed hash table system with a few features : handling partial hash-keys and providing appropriate routing mechanisms for these hash-keys. We give such an algorithm for the particular case of the Tapestry distributed hash table. This is a work in progress as no proper validation has been done yet.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 14:24:27 GMT" } ]
2009-07-07T00:00:00
[ [ "Cohen", "Julien", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.1012
Chao-Yang Pang
Chao-Yang Pang, Wei Hu, Xia Li, and Be-Qiong Hu
Apply Local Clustering Method to Improve the Running Speed of Ant Colony Optimization
21 pages, 5figures
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ant Colony Optimization (ACO) has time complexity O(t*m*N*N), and its typical application is to solve Traveling Salesman Problem (TSP), where t, m, and N denotes the iteration number, number of ants, number of cities respectively. Cutting down running time is one of study focuses, and one way is to decrease parameter t and N, especially N. For this focus, the following method is presented in this paper. Firstly, design a novel clustering algorithm named Special Local Clustering algorithm (SLC), then apply it to classify all cities into compact classes, where compact class is the class that all cities in this class cluster tightly in a small region. Secondly, let ACO act on every class to get a local TSP route. Thirdly, all local TSP routes are jointed to form solution. Fourthly, the inaccuracy of solution caused by clustering is eliminated. Simulation shows that the presented method improves the running speed of ACO by 200 factors at least. And this high speed is benefit from two factors. One is that class has small size and parameter N is cut down. The route length at every iteration step is convergent when ACO acts on compact class. The other factor is that, using the convergence of route length as termination criterion of ACO and parameter t is cut down.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 15:53:11 GMT" }, { "version": "v2", "created": "Tue, 7 Jul 2009 00:24:58 GMT" } ]
2009-07-07T00:00:00
[ [ "Pang", "Chao-Yang", "" ], [ "Hu", "Wei", "" ], [ "Li", "Xia", "" ], [ "Hu", "Be-Qiong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.1050
Filippo Radicchi
Filippo Radicchi, Santo Fortunato, Benjamin Markines, Alessandro Vespignani
Diffusion of scientific credits and the ranking of scientists
Revised version. 11 pages, 10 figures, 1 table. The portal to compute the rankings of scientists is at http://www.physauthorsrank.org
Phys. Rev. E 80, 056103 (2009)
10.1103/PhysRevE.80.056103
null
physics.soc-ph cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, the abundance of digital data enabled the implementation of graph based ranking algorithms that provide system level analysis for ranking publications and authors. Here we take advantage of the entire Physical Review publication archive (1893-2006) to construct authors' networks where weighted edges, as measured from opportunely normalized citation counts, define a proxy for the mechanism of scientific credit transfer. On this network we define a ranking method based on a diffusion algorithm that mimics the spreading of scientific credits on the network. We compare the results obtained with our algorithm with those obtained by local measures such as the citation count and provide a statistical analysis of the assignment of major career awards in the area of Physics. A web site where the algorithm is made available to perform customized rank analysis can be found at the address http://www.physauthorsrank.org
[ { "version": "v1", "created": "Mon, 6 Jul 2009 17:47:28 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2009 12:34:41 GMT" } ]
2009-11-11T00:00:00
[ [ "Radicchi", "Filippo", "" ], [ "Fortunato", "Santo", "" ], [ "Markines", "Benjamin", "" ], [ "Vespignani", "Alessandro", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0907.1054
Kaushik Sinha
Mikhail Belkin and Kaushik Sinha
Learning Gaussian Mixtures with Arbitrary Separation
null
null
null
null
cs.LG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a method for learning the parameters of a mixture of $k$ identical spherical Gaussians in $n$-dimensional space with an arbitrarily small separation between the components. Our algorithm is polynomial in all parameters other than $k$. The algorithm is based on an appropriate grid search over the space of parameters. The theoretical analysis of the algorithm hinges on a reduction of the problem to 1 dimension and showing that two 1-dimensional mixtures whose densities are close in the $L^2$ norm must have similar means and mixing coefficients. To produce such a lower bound for the $L^2$ norm in terms of the distances between the corresponding means, we analyze the behavior of the Fourier transform of a mixture of Gaussians in 1 dimension around the origin, which turns out to be closely related to the properties of the Vandermonde matrix obtained from the component means. Analysis of this matrix together with basic function approximation results allows us to provide a lower bound for the norm of the mixture in the Fourier domain. In recent years much research has been aimed at understanding the computational aspects of learning parameters of Gaussians mixture distributions in high dimension. To the best of our knowledge all existing work on learning parameters of Gaussian mixtures assumes minimum separation between components of the mixture which is an increasing function of either the dimension of the space $n$ or the number of components $k$. In our paper we prove the first result showing that parameters of a $n$-dimensional Gaussian mixture model with arbitrarily small component separation can be learned in time polynomial in $n$.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 17:41:57 GMT" }, { "version": "v2", "created": "Thu, 13 May 2010 19:20:36 GMT" } ]
2010-05-14T00:00:00
[ [ "Belkin", "Mikhail", "" ], [ "Sinha", "Kaushik", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.1061
Venkatesh Saligrama
George Kamal Atia and Venkatesh Saligrama
Boolean Compressed Sensing and Noisy Group Testing
In this revision: reorganized the paper, added citations to related work, and fixed some bugs
IEEE Trans.Inf.Theory 58 (2012) 1880-1901
10.1109/TIT.2011.2178156
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The fundamental task of group testing is to recover a small distinguished subset of items from a large population while efficiently reducing the total number of tests (measurements). The key contribution of this paper is in adopting a new information-theoretic perspective on group testing problems. We formulate the group testing problem as a channel coding/decoding problem and derive a single-letter characterization for the total number of tests used to identify the defective set. Although the focus of this paper is primarily on group testing, our main result is generally applicable to other compressive sensing models. The single letter characterization is shown to be order-wise tight for many interesting noisy group testing scenarios. Specifically, we consider an additive Bernoulli($q$) noise model where we show that, for $N$ items and $K$ defectives, the number of tests $T$ is $O(\frac{K\log N}{1-q})$ for arbitrarily small average error probability and $O(\frac{K^2\log N}{1-q})$ for a worst case error criterion. We also consider dilution effects whereby a defective item in a positive pool might get diluted with probability $u$ and potentially missed. In this case, it is shown that $T$ is $O(\frac{K\log N}{(1-u)^2})$ and $O(\frac{K^2\log N}{(1-u)^2})$ for the average and the worst case error criteria, respectively. Furthermore, our bounds allow us to verify existing known bounds for noiseless group testing including the deterministic noise-free case and approximate reconstruction with bounded distortion. Our proof of achievability is based on random coding and the analysis of a Maximum Likelihood Detector, and our information theoretic lower bound is based on Fano's inequality.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 18:13:34 GMT" }, { "version": "v2", "created": "Thu, 12 Nov 2009 20:33:32 GMT" }, { "version": "v3", "created": "Tue, 14 Sep 2010 20:37:52 GMT" }, { "version": "v4", "created": "Thu, 23 Dec 2010 23:43:32 GMT" }, { "version": "v5", "created": "Tue, 12 Jun 2012 20:54:52 GMT" }, { "version": "v6", "created": "Tue, 10 Dec 2013 15:31:16 GMT" } ]
2015-03-13T00:00:00
[ [ "Atia", "George Kamal", "" ], [ "Saligrama", "Venkatesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1065
Ramasuri Narayanam
Ramasuri Narayanam, and Y. Narahari
Design of an Optimal Bayesian Incentive Compatible Broadcast Protocol for Ad hoc Networks with Rational Nodes
This version of the manuscript is published in IEEE Journal on Selected Areas in Communications (IEEE JSAC), VOL. 26, NO. 7, September 2008
null
null
null
cs.GT cs.AI cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nodes in an ad hoc wireless network incur certain costs for forwarding packets since packet forwarding consumes the resources of the nodes. If the nodes are rational, free packet forwarding by the nodes cannot be taken for granted and incentive based protocols are required to stimulate cooperation among the nodes. Existing incentive based approaches are based on the VCG (Vickrey-Clarke-Groves) mechanism which leads to high levels of incentive budgets and restricted applicability to only certain topologies of networks. Moreover, the existing approaches have only focused on unicast and multicast. Motivated by this, we propose an incentive based broadcast protocol that satisfies Bayesian incentive compatibility and minimizes the incentive budgets required by the individual nodes. The proposed protocol, which we call {\em BIC-B} (Bayesian incentive compatible broadcast) protocol, also satisfies budget balance. We also derive a necessary and sufficient condition for the ex-post individual rationality of the BIC-B protocol. The {\em BIC-B} protocol exhibits superior performance in comparison to a dominant strategy incentive compatible broadcast protocol.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 18:25:11 GMT" } ]
2009-07-07T00:00:00
[ [ "Narayanam", "Ramasuri", "" ], [ "Narahari", "Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.1072
Aaron Sterling
Aaron Sterling
Self-Assembling Systems are Distributed Systems
Withdrawing because I would like to polish this before submitting it publicly again
null
null
null
cs.FL cs.DC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2004, Klavins et al. introduced the use of graph grammars to describe -- and to program -- systems of self-assembly. We show that these graph grammars can be embedded in a graph rewriting characterization of distributed systems that was proposed by Degano and Montanari over twenty years ago. We apply this embedding to generalize Soloveichik and Winfree's local determinism criterion (for achieving a unique terminal assembly), from assembly systems of 4-sided tiles that embed in the plane, to arbitrary graph assembly systems. We present a partial converse of the embedding result, by providing sufficient conditions under which systems of distributed processors can be simulated by graph assembly systems topologically, in the plane, and in 3-space. We conclude by defining a new complexity measure: "surface cost" (essentially the convex hull of the space inhabited by agents at the conclusion of a self-assembled computation). We show that, for growth-bounded graphs, executing a subroutine to find a Maximum Independent Set only increases the surface cost of a self-assembling computation by a constant factor. We obtain this complexity bound by using the simulation results to import the distributed computing notions of "local synchronizer" and "deterministic coin flipping" into self-assembly.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 19:04:52 GMT" }, { "version": "v2", "created": "Wed, 20 Jul 2011 14:01:27 GMT" } ]
2011-07-21T00:00:00
[ [ "Sterling", "Aaron", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0907.1080
Matt Gibson
Matt Gibson, Gaurav Kanade, Erik Krohn, Kasturi Varadarajan
Quasi-Polynomial Time Approximation Schemes for Target Tracking
16 pages, 10 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of tracking $n$ targets in the plane using $2n$ cameras. We can use two cameras to estimate the location of a target. We are then interested in forming $n$ camera pairs where each camera belongs to exactly one pair, followed by forming a matching between the targets and camera pairs so as to best estimate the locations of each of the targets. We consider a special case of this problem where each of the cameras are placed along a horizontal line $l$, and we consider two objective functions which have been shown to give good estimates of the locations of the targets when the distances between the targets and the cameras are sufficiently large. In the first objective, the value of an assignment of a camera pair to a target is the tracking angle formed by the assignment. Here, we are interested in maximizing the sum of these tracking angles. A polynomial time 2-approximation is known for this problem. We give a quasi-polynomial time algorithm that returns a solution whose value is at least a $(1-\epsilon)$ factor of the value of an optimal solution for any $\epsilon > 0$. In the second objective, the cost of an assignment of a camera pair to a target is the ratio of the vertical distance between the target and $l$ to the horizontal distance between the cameras in the camera pair. In this setting, we are interested in minimizing the sum of these ratios. A polynomial time 2-approximation is known for this problem. We give a quasi-polynomial time algorithm that returns a solution whose value is at most a $(1+\epsilon)$ factor of the value of an optimal solution for any $\epsilon > 0$.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 19:55:38 GMT" } ]
2009-07-07T00:00:00
[ [ "Gibson", "Matt", "" ], [ "Kanade", "Gaurav", "" ], [ "Krohn", "Erik", "" ], [ "Varadarajan", "Kasturi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0907.1099
Niranjay Ravindran
Niranjay Ravindran, Nihar Jindal
Multi-User Diversity vs. Accurate Channel State Information in MIMO Downlink Channels
Submitted to IEEE Transactions on Communications, July 2009
null
10.1109/TWC.2012.071612.101350
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a multiple transmit antenna, single antenna per receiver downlink channel with limited channel state feedback, we consider the following question: given a constraint on the total system-wide feedback load, is it preferable to get low-rate/coarse channel feedback from a large number of receivers or high-rate/high-quality feedback from a smaller number of receivers? Acquiring feedback from many receivers allows multi-user diversity to be exploited, while high-rate feedback allows for very precise selection of beamforming directions. We show that there is a strong preference for obtaining high-quality feedback, and that obtaining near-perfect channel information from as many receivers as possible provides a significantly larger sum rate than collecting a few feedback bits from a large number of users.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 20:39:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Ravindran", "Niranjay", "" ], [ "Jindal", "Nihar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1100
Siu Chin
Mark Girolami, Ben Calderhead and Siu A. Chin
Riemannian Manifold Hamiltonian Monte Carlo
This paper has been withdrawn by the posting author because he is no longer a co-author of this work
null
null
null
stat.CO cs.NA math.NA math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper proposes a Riemannian Manifold Hamiltonian Monte Carlo sampler to resolve the shortcomings of existing Monte Carlo algorithms when sampling from target densities that may be high dimensional and exhibit strong correlations. The method provides a fully automated adaptation mechanism that circumvents the costly pilot runs required to tune proposal densities for Metropolis-Hastings or indeed Hybrid Monte Carlo and Metropolis Adjusted Langevin Algorithms. This allows for highly efficient sampling even in very high dimensions where different scalings may be required for the transient and stationary phases of the Markov chain. The proposed method exploits the Riemannian structure of the parameter space of statistical models and thus automatically adapts to the local manifold structure at each step based on the metric tensor. A semi-explicit second order symplectic integrator for non-separable Hamiltonians is derived for simulating paths across this manifold which provides highly efficient convergence and exploration of the target density. The performance of the Riemannian Manifold Hamiltonian Monte Carlo method is assessed by performing posterior inference on logistic regression models, log-Gaussian Cox point processes, stochastic volatility models, and Bayesian estimation of parameter posteriors of dynamical systems described by nonlinear differential equations. Substantial improvements in the time normalised Effective Sample Size are reported when compared to alternative sampling approaches. Matlab code at \url{http://www.dcs.gla.ac.uk/inference/rmhmc} allows replication of all results.
[ { "version": "v1", "created": "Mon, 6 Jul 2009 20:45:31 GMT" }, { "version": "v2", "created": "Fri, 20 Sep 2013 19:40:08 GMT" }, { "version": "v3", "created": "Tue, 17 Dec 2019 08:20:13 GMT" } ]
2019-12-18T00:00:00
[ [ "Girolami", "Mark", "" ], [ "Calderhead", "Ben", "" ], [ "Chin", "Siu A.", "" ] ]
[ { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0907.1103
Mihai Patrascu
Mihai Patrascu
A Lower Bound for Succinct Rank Queries
7 pages
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rank problem in succinct data structures asks to preprocess an array A[1..n] of bits into a data structure using as close to n bits as possible, and answer queries of the form rank(k) = Sum_{i=1}^k A[i]. The problem has been intensely studied, and features as a subroutine in a majority of succinct data structures. We show that in the cell probe model with w-bit cells, if rank takes t time, the space of the data structure must be at least n + n/w^{O(t)} bits. This redundancy/query trade-off is essentially optimal, matching our upper bound from [FOCS'08].
[ { "version": "v1", "created": "Mon, 6 Jul 2009 20:58:55 GMT" } ]
2009-07-08T00:00:00
[ [ "Patrascu", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.1131
Sariel Har-Peled
Sariel Har-Peled
Approximating Spanning Trees with Low Crossing Number
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a linear programming based algorithm for computing a spanning tree $T$ of a set $P$ of $n$ points in $\Re^d$, such that its crossing number is $O(\min(t \log n, n^{1-1/d}))$, where $t$ the minimum crossing number of any spanning tree of $P$. This is the first guaranteed approximation algorithm for this problem. We provide a similar approximation algorithm for the more general settings of building a spanning tree for a set system with bounded \VC dimension. Our approach is an alternative to the reweighting technique previously used in computing such spanning trees. Our approach is an alternative to the reweighting technique previously used in computing such spanning trees.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 02:27:52 GMT" } ]
2009-07-08T00:00:00
[ [ "Har-Peled", "Sariel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0907.1201
Nir Avni
Nir Avni, Benjamin Weiss
Generating Product Systems
null
null
null
null
math.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generalizing Krieger's finite generation theorem, we give conditions for an ergodic system to be generated by a pair of partitions, each required to be measurable with respect to a given sub-algebra, and also required to have a fixed size.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 12:13:21 GMT" } ]
2009-07-08T00:00:00
[ [ "Avni", "Nir", "" ], [ "Weiss", "Benjamin", "" ] ]
[ { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1224
Jianguo Liu
Jian-Guo Liu, Tao Zhou, Qiang Guo, Bing-Hong Wang, Yi-Cheng Zhang
Effect of user tastes on personalized recommendation
8 pages, 4 figures
IJMPC 20(12) 2009 1925-1932
10.1142/S0129183109014825
null
physics.data-an cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, based on a weighted projection of the user-object bipartite network, we study the effects of user tastes on the mass-diffusion-based personalized recommendation algorithm, where a user's tastes or interests are defined by the average degree of the objects he has collected. We argue that the initial recommendation power located on the objects should be determined by both of their degree and the users' tastes. By introducing a tunable parameter, the user taste effects on the configuration of initial recommendation power distribution are investigated. The numerical results indicate that the presented algorithm could improve the accuracy, measured by the average ranking score, more importantly, we find that when the data is sparse, the algorithm should give more recommendation power to the objects whose degrees are close to the users' tastes, while when the data becomes dense, it should assign more power on the objects whose degrees are significantly different from user's tastes.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 13:56:59 GMT" }, { "version": "v2", "created": "Wed, 14 Oct 2009 15:17:35 GMT" } ]
2015-05-13T00:00:00
[ [ "Liu", "Jian-Guo", "" ], [ "Zhou", "Tao", "" ], [ "Guo", "Qiang", "" ], [ "Wang", "Bing-Hong", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0907.1227
Tzipora Halevi
Tzipora Halevi, Nitesh Saxena and Shai Halevi
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
15 pages, 1 figure, presented at RFIDSec 09
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#
[ { "version": "v1", "created": "Tue, 7 Jul 2009 14:26:50 GMT" } ]
2009-07-08T00:00:00
[ [ "Halevi", "Tzipora", "" ], [ "Saxena", "Nitesh", "" ], [ "Halevi", "Shai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.1228
Jianguo Liu
Jian-Guo Liu, Tao Zhou, Zhao-Guo Xuan, Hong-An Che, Bing-Hong Wang, Yi-Cheng Zhang
Degree correlation effect of bipartite network on personalized recommendation
9 pages, 3 figures
IJMPC 21(01) 2010 137-147
10.1142/S0129183110014999
null
physics.data-an cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, by introducing a new user similarity index base on the diffusion process, we propose a modified collaborative filtering (MCF) algorithm, which has remarkably higher accuracy than the standard collaborative filtering. In the proposed algorithm, the degree correlation between users and objects is taken into account and embedded into the similarity index by a tunable parameter. The numerical simulation on a benchmark data set shows that the algorithmic accuracy of the MCF, measured by the average ranking score, is further improved by 18.19% in the optimal case. In addition, two significant criteria of algorithmic performance, diversity and popularity, are also taken into account. Numerical results show that the presented algorithm can provide more diverse and less popular recommendations, for example, when the recommendation list contains 10 objects, the diversity, measured by the hamming distance, is improved by 21.90%.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 14:20:47 GMT" } ]
2015-05-13T00:00:00
[ [ "Liu", "Jian-Guo", "" ], [ "Zhou", "Tao", "" ], [ "Xuan", "Zhao-Guo", "" ], [ "Che", "Hong-An", "" ], [ "Wang", "Bing-Hong", "" ], [ "Zhang", "Yi-Cheng", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0907.1238
Matteo Magnani
Matteo Buferli, Matteo Magnani, Danilo Montesi
ChOrDa: a methodology for the modeling of business processes with BPMN
11 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present a modeling methodology for BPMN, the standard notation for the representation of business processes. Our methodology simplifies the development of collaborative BPMN diagrams, enabling the automated creation of skeleton process diagrams representing complex choreographies. To evaluate and tune the methodology, we have developed a tool supporting it, that we apply to the modeling of an international patenting process as a working example.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 15:29:58 GMT" } ]
2009-07-08T00:00:00
[ [ "Buferli", "Matteo", "" ], [ "Magnani", "Matteo", "" ], [ "Montesi", "Danilo", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.1245
Tobias Kuhn
Tobias Kuhn
How Controlled English can Improve Semantic Wikis
null
In Proceedings of the Fourth Semantic Wiki Workshop (SemWiki 2009), co-located with 6th European Semantic Web Conference (ESWC 2009), CEUR Workshop Proceedings, Volume 464, 2009
null
null
cs.HC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The motivation of semantic wikis is to make acquisition, maintenance, and mining of formal knowledge simpler, faster, and more flexible. However, most existing semantic wikis have a very technical interface and are restricted to a relatively low level of expressivity. In this paper, we explain how AceWiki uses controlled English - concretely Attempto Controlled English (ACE) - to provide a natural and intuitive interface while supporting a high degree of expressivity. We introduce recent improvements of the AceWiki system and user studies that indicate that AceWiki is usable and useful.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 15:59:02 GMT" } ]
2009-07-08T00:00:00
[ [ "Kuhn", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.1251
Tobias Kuhn
Tobias Kuhn
How to Evaluate Controlled Natural Languages
null
In Pre-Proceedings of the Workshop on Controlled Natural Language (CNL 2009), CEUR Workshop Proceedings, Volume 448, 2009
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a general framework how controlled natural languages can be evaluated and compared on the basis of user experiments. The subjects are asked to classify given statements (in the language to be tested) as either true or false with respect to a certain situation that is shown in a graphical notation called "ontographs". A first experiment has been conducted that applies this framework to the language Attempto Controlled English (ACE).
[ { "version": "v1", "created": "Tue, 7 Jul 2009 16:15:21 GMT" } ]
2009-07-08T00:00:00
[ [ "Kuhn", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0907.1255
Samir Medina Perlaza
S.M. Perlaza, N. Fawaz, S. Lasaulce, M. Debbah
From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks
Submitted to IEEE Trans. in Signal Processing. Revised on 23-11-09
null
10.1109/TSP.2010.2046084
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a non-cooperative interference alignment (IA) technique which allows an opportunistic multiple input multiple output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmiting along the spatial directions (SD) associated with the singular values of its channel matrix using a water-filling power allocation (PA) scheme. Often, power limitations lead the primary transmitter to leave some of its SD unused. Here, it is shown that the opportunistic link can transmit its own data if it is possible to align the interference produced on the primary link with such unused SDs. We provide both a processing scheme to perform IA and a PA scheme which maximizes the transmission rate of the opportunistic link. The asymptotes of the achievable transmission rates of the opportunistic link are obtained in the regime of large numbers of antennas. Using this result, it is shown that depending on the signal-to-noise ratio and the number of transmit and receive antennas of the primary and opportunistic links, both systems can achieve transmission rates of the same order.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 16:43:34 GMT" }, { "version": "v2", "created": "Thu, 24 Dec 2009 07:56:05 GMT" } ]
2015-05-13T00:00:00
[ [ "Perlaza", "S. M.", "" ], [ "Fawaz", "N.", "" ], [ "Lasaulce", "S.", "" ], [ "Debbah", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1256
Jonathan Voris
Nitesh Saxena and Jonathan Voris
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags (RFIDSec 2009)
Presented at the 5th Workshop on RFID Security held from June 30 - July 2 in Leuven, Belgium. Paper is 13 pages with 4 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Random number generation is a fundamental security primitive for RFID devices. However, even this relatively simple requirement is beyond the capacity of today's average RFID tag. A recently proposed solution, Fingerprint Extraction and Random Number Generation in SRAM (FERNS) [14, 15], involves the use of onboard RAM as the source of "true" randomness. Unfortunately, practical considerations prevent this approach from reaching its full potential. First, this method must compete with other system functionalities for use of memory. Thus, the amount of uninitialized RAM available for utilization as a randomness generator may be severely restricted. Second, RAM is subject to data remanence; there is a time period after losing power during which stored data remains intact in memory. This means that after a portion of memory has been used for entropy collection once it will require a relatively extended period of time without power before it can be reused. In a usable RFID based security application, which requires multiple or long random numbers, this may lead to unacceptably high delays. In this paper, we show that data remanence negatively affects RAM based random number generation. We demonstrate the practical considerations that must be taken into account when using RAM as an entropy source. We also discuss the implementation of a true random number generator on Intel's WISP RFID tag, which is the first such implementation to the authors' best knowledge. By relating this to the requirements of some popular RFID authentication protocols, we assess the (im)practicality of utilizing memory based randomness techniques on resource constrained devices.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 16:51:40 GMT" } ]
2009-07-08T00:00:00
[ [ "Saxena", "Nitesh", "" ], [ "Voris", "Jonathan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.1266
Devavrat Shah
Libin Jiang, Devavrat Shah, Jinwoo Shin, Jean Walrand
Distributed Random Access Algorithm: Scheduling and Congesion Control
null
null
null
null
cs.IT cs.NI math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides proofs of the rate stability, Harris recurrence, and epsilon-optimality of CSMA algorithms where the backoff parameter of each node is based on its backlog. These algorithms require only local information and are easy to implement. The setup is a network of wireless nodes with a fixed conflict graph that identifies pairs of nodes whose simultaneous transmissions conflict. The paper studies two algorithms. The first algorithm schedules transmissions to keep up with given arrival rates of packets. The second algorithm controls the arrivals in addition to the scheduling and attempts to maximize the sum of the utilities of the flows of packets at the different nodes. For the first algorithm, the paper proves rate stability for strictly feasible arrival rates and also Harris recurrence of the queues. For the second algorithm, the paper proves the epsilon-optimality. Both algorithms operate with strictly local information in the case of decreasing step sizes, and operate with the additional information of the number of nodes in the network in the case of constant step size.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 17:12:59 GMT" } ]
2009-07-08T00:00:00
[ [ "Jiang", "Libin", "" ], [ "Shah", "Devavrat", "" ], [ "Shin", "Jinwoo", "" ], [ "Walrand", "Jean", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0907.1280
Erik Krohn
James King and Erik Krohn
The Complexity of Guarding Terrains
26 pages, 24 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set $G$ of points on a 1.5-dimensional terrain, also known as an $x$-monotone polygonal chain, is said to guard the terrain if any point on the terrain is 'seen' by a point in $G$. Two points on the terrain see each other if and only if the line segment between them is never strictly below the terrain. The minimum terrain guarding problem asks for a minimum guarding set for the given input terrain. We prove that the decision version of this problem is NP-hard. This solves a significant open problem and complements recent positive approximability results for the optimization problem. Our proof uses a reduction from PLANAR 3-SAT. We build gadgets capable of 'mirroring' a consistent variable assignment back and forth across a main valley. The structural simplicity of 1.5-dimensional terrains makes it difficult to build general clause gadgets that do not destroy this assignment when they are evaluated. However, we exploit the structure in instances of PLANAR 3-SAT to find very specific operations involving only 'adjacent' variables. For these restricted operations we can construct gadgets that allow a full reduction to work.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 19:07:51 GMT" } ]
2009-07-08T00:00:00
[ [ "King", "James", "" ], [ "Krohn", "Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0907.1295
Jonathan Sorenson
Ankur Gupta, Anna Kispert, Jonathan P. Sorenson
Online Sorting via Searching and Selection
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present a framework based on a simple data structure and parameterized algorithms for the problems of finding items in an unsorted list of linearly ordered items based on their rank (selection) or value (search). As a side-effect of answering these online selection and search queries, we progressively sort the list. Our algorithms are based on Hoare's Quickselect, and are parameterized based on the pivot selection method. For example, if we choose the pivot as the last item in a subinterval, our framework yields algorithms that will answer q<=n unique selection and/or search queries in a total of O(n log q) average time. After q=\Omega(n) queries the list is sorted. Each repeated selection query takes constant time, and each repeated search query takes O(log n) time. The two query types can be interleaved freely. By plugging different pivot selection methods into our framework, these results can, for example, become randomized expected time or deterministic worst-case time. Our methods are easy to implement, and we show they perform well in practice.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 20:37:19 GMT" } ]
2009-09-30T00:00:00
[ [ "Gupta", "Ankur", "" ], [ "Kispert", "Anna", "" ], [ "Sorenson", "Jonathan P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.1297
Cristopher Moore
Sergey Bravyi, Cristopher Moore, and Alexander Russell
Bounds on the quantum satisfiability threshold
null
null
null
null
quant-ph cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Quantum k-SAT is the problem of deciding whether there is a n-qubit state which is perpendicular to a set of vectors, each of which lies in the Hilbert space of k qubits. Equivalently, the problem is to decide whether a particular type of local Hamiltonian has a ground state with zero energy. We consider random quantum k-SAT formulas with n variables and m = \alpha n clauses, and ask at what value of \alpha these formulas cease to be satisfiable. We show that the threshold for random quantum 3-SAT is at most 3.594. For comparison, convincing arguments from statistical physics suggest that the classical 3-SAT threshold is \alpha \approx 4.267. For larger k, we show that the quantum threshold is a constant factor smaller than the classical one. Our bounds work by determining the generic rank of the satisfying subspace for certain gadgets, and then using the technique of differential equations to analyze various algorithms that partition the hypergraph into a collection of these gadgets. Our use of differential equation to establish upper bounds on a satisfiability threshold appears to be novel, and our techniques may apply to various classical problems as well.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 20:49:59 GMT" }, { "version": "v2", "created": "Fri, 10 Jul 2009 03:02:18 GMT" }, { "version": "v3", "created": "Thu, 18 Sep 2014 15:20:16 GMT" } ]
2014-09-19T00:00:00
[ [ "Bravyi", "Sergey", "" ], [ "Moore", "Cristopher", "" ], [ "Russell", "Alexander", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.1307
Scott Summers
Scott M. Summers
Reducing Tile Complexity for the Self-Assembly of Scaled Shapes Through Temperature Programming
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper concerns the self-assembly of scaled-up versions of arbitrary finite shapes. We work in the multiple temperature model that was introduced by Aggarwal, Cheng, Goldwasser, Kao, and Schweller (Complexities for Generalized Models of Self-Assembly, SODA 2004). The multiple temperature model is a natural generalization of Winfree's abstract tile assembly model, where the temperature of a tile system is allowed to be shifted up and down as self-assembly proceeds. We first exhibit two constant-size tile sets in which scaled-up versions of arbitrary shapes self-assemble. Our first tile set has the property that each scaled shape self-assembles via an asymptotically "Kolmogorov-optimum" temperature sequence but the scaling factor grows with the size of the shape being assembled. In contrast, our second tile set assembles each scaled shape via a temperature sequence whose length is proportional to the number of points in the shape but the scaling factor is a constant independent of the shape being assembled. We then show that there is no constant-size tile set that can uniquely assemble an arbitrary (non-scaled, connected) shape in the multiple temperature model, i.e., the scaling is necessary for self-assembly. This answers an open question of Kao and Schweller (Reducing Tile Complexity for Self-Assembly Through Temperature Programming, SODA 2006), who asked whether such a tile set existed.
[ { "version": "v1", "created": "Tue, 7 Jul 2009 21:37:11 GMT" } ]
2009-09-30T00:00:00
[ [ "Summers", "Scott M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.1334
Xiaotie Deng
Xiaotie Deng, Qi Qi, Amin Saberi
On the Complexity of Envy-Free Cake Cutting
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the envy-free cake-cutting problem for $d+1$ players with $d$ cuts, for both the oracle function model and the polynomial time function model. For the former, we derive a $\theta(({1\over\epsilon})^{d-1})$ time matching bound for the query complexity of $d+1$ player cake cutting with Lipschitz utilities for any $d> 1$. When the utility functions are given by a polynomial time algorithm, we prove the problem to be PPAD-complete. For measurable utility functions, we find a fully polynomial-time algorithm for finding an approximate envy-free allocation of a cake among three people using two cuts.
[ { "version": "v1", "created": "Wed, 8 Jul 2009 05:28:07 GMT" } ]
2009-07-10T00:00:00
[ [ "Deng", "Xiaotie", "" ], [ "Qi", "Qi", "" ], [ "Saberi", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.1357
Nicolas Stouls
Jean-Fran\c{c}ois Couchot (LIFC), Alain Giorgetti (LIFC), Nicolas Stouls (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes)
Graph Based Reduction of Program Verification Conditions
null
Automated Formal Methods (AFM'09), colocated with CAV'09 (2009) 40-47
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Increasing the automaticity of proofs in deductive verification of C programs is a challenging task. When applied to industrial C programs known heuristics to generate simpler verification conditions are not efficient enough. This is mainly due to their size and a high number of irrelevant hypotheses. This work presents a strategy to reduce program verification conditions by selecting their relevant hypotheses. The relevance of a hypothesis is determined by the combination of a syntactic analysis and two graph traversals. The first graph is labeled by constants and the second one by the predicates in the axioms. The approach is applied on a benchmark arising in industrial program verification.
[ { "version": "v1", "created": "Wed, 8 Jul 2009 08:32:57 GMT" } ]
2011-05-24T00:00:00
[ [ "Couchot", "Jean-François", "", "LIFC" ], [ "Giorgetti", "Alain", "", "LIFC" ], [ "Stouls", "Nicolas", "", "CITI Insa Lyon / INRIA Grenoble Rhône-Alpes" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.1369
Manjish Pal
Manjish Pal
Towards an $O(\sqrt[3]{\log n})$-Approximation Algorithm for {\sc Balanced Separator}
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The {\sc $c$-Balanced Separator} problem is a graph-partitioning problem in which given a graph $G$, one aims to find a cut of minimum size such that both the sides of the cut have at least $cn$ vertices. In this paper, we present new directions of progress in the {\sc $c$-Balanced Separator} problem. More specifically, we propose a new family of mathematical programs, which depends upon a parameter $\epsilon > 0$, and extend the seminal work of Arora-Rao-Vazirani ({\sf ARV}) \cite{ARV} to show that the polynomial time solvability of the proposed family of programs implies an improvement in the approximation factor to $O(\log^{{1/3} + \epsilon} n)$ from the best-known factor of $O(\sqrt{\log n})$ due to {\sf ARV}. In fact, for $\epsilon = 1/3$, the program we get is the SDP proposed by {\sf ARV}. For $\epsilon < 1/3$, this family of programs is not convex but one can transform them into so called \emph{\textbf{concave programs}} in which one optimizes a concave function over a convex feasible set. The properties of concave programs allows one to apply techniques due to Hoffman \cite{H81} or Tuy \emph{et al} \cite{TTT85} to solve such problems with arbitrary accuracy. But the problem of finding of a method to solve these programs that converges in polynomial time still remains open. Our result, although conditional, introduces a new family of programs which is more powerful than semi-definite programming in the context of approximation algorithms and hence it will of interest to investigate this family both in the direction of designing efficient algorithms and proving hardness results.
[ { "version": "v1", "created": "Wed, 8 Jul 2009 09:32:02 GMT" } ]
2009-07-10T00:00:00
[ [ "Pal", "Manjish", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]