id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0907.1375
Francois Pellegrini
C\'edric Chevalier (LaBRI, INRIA Bordeaux - Sud-Ouest), Fran\c{c}ois Pellegrini (LaBRI, INRIA Bordeaux - Sud-Ouest)
PT-Scotch: A tool for efficient parallel graph ordering
null
Parallel Computing 34, 6-8 (2008) 318-331
10.1016/j.parco.2007.12.001
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The parallel ordering of large graphs is a difficult problem, because on the one hand minimum degree algorithms do not parallelize well, and on the other hand the obtainment of high quality orderings with the nested dissection algorithm requires efficient graph bipartitioning heuristics, the best sequential implementations of which are also hard to parallelize. This paper presents a set of algorithms, implemented in the PT-Scotch software package, which allows one to order large graphs in parallel, yielding orderings the quality of which is only slightly worse than the one of state-of-the-art sequential algorithms. Our implementation uses the classical nested dissection approach but relies on several novel features to solve the parallel graph bipartitioning problem. Thanks to these improvements, PT-Scotch produces consistently better orderings than ParMeTiS on large numbers of processors.
[ { "version": "v1", "created": "Wed, 8 Jul 2009 15:11:00 GMT" } ]
2009-07-10T00:00:00
[ [ "Chevalier", "Cédric", "", "LaBRI, INRIA Bordeaux - Sud-Ouest" ], [ "Pellegrini", "François", "", "LaBRI, INRIA Bordeaux - Sud-Ouest" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.1413
Anand Sarwate
Kamalika Chaudhuri, Anand D. Sarwate
Privacy constraints in regularized convex optimization
This paper has been withdrawn by the authors due to some errors. Corrections have been included in arXiv:0912.0071v4
null
null
null
cs.CR cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is withdrawn due to some errors, which are corrected in arXiv:0912.0071v4 [cs.LG].
[ { "version": "v1", "created": "Thu, 9 Jul 2009 06:51:54 GMT" }, { "version": "v2", "created": "Fri, 4 Jun 2010 20:36:43 GMT" }, { "version": "v3", "created": "Tue, 21 Jun 2011 17:05:53 GMT" } ]
2011-06-22T00:00:00
[ [ "Chaudhuri", "Kamalika", "" ], [ "Sarwate", "Anand D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.1432
Adnan Raja
Adnan Raja, Vinod M. Prabhakaran, and Pramod Viswanath
Reciprocity in Linear Deterministic Networks under Linear Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The linear deterministic model has been used recently to get a first order understanding of many wireless communication network problems. In many of these cases, it has been pointed out that the capacity regions of the network and its reciprocal (where the communication links are reversed and the roles of the sources and the destinations are swapped) are the same. In this paper, we consider a linear deterministic communication network with multiple unicast information flows. For this model and under the restriction to the class of linear coding, we show that the rate regions for a network and its reciprocal are the same. This can be viewed as a generalization of the linear reversibility of wireline networks, already known in the network coding literature.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 07:38:16 GMT" } ]
2009-07-10T00:00:00
[ [ "Raja", "Adnan", "" ], [ "Prabhakaran", "Vinod M.", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1455
Anthony van Raan
Rodrigo Costas, Thed N. van Leeuwen, and Anthony F.J. van Raan
Is scientific literature subject to a sell-by-date? A general methodology to analyze the durability of scientific documents
26 pages, 9 tables, 5 figures
null
null
null
physics.soc-ph cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study of the citation histories and ageing of documents are topics that have been addressed from several perspectives, especially in the analysis of documents with delayed recognition or sleeping beauties. However, there is no general methodology that can be extensively applied for different time periods and/or research fields. In this paper a new methodology for the general analysis of the ageing and durability of scientific papers is presented. This methodology classifies documents into three general types: Delayed documents, which receive the main part of their citations later than normal documents; Flash in the pans, which receive citations immediately after their publication but they are not cited in the long term; and Normal documents, documents with a typical distribution of citations over time. These three types of durability have been analyzed considering the whole population of documents in the Web of Science with at least 5 external citations (i.e. not considering self-citations). Several patterns related to the three types of durability have been found and the potential for further research of the developed methodology is discussed.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 08:52:04 GMT" } ]
2009-07-10T00:00:00
[ [ "Costas", "Rodrigo", "" ], [ "van Leeuwen", "Thed N.", "" ], [ "van Raan", "Anthony F. J.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0907.1482
Arno Pauly
Arno Pauly
How discontinuous is Computing Nash Equilibria?
to be presented at CCA 2009
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the degree of discontinuity of several solution concepts from non-cooperative game theory. While the consideration of Nash equilibria forms the core of our work, also pure and correlated equilibria are dealt with. Formally, we restrict the treatment to two player games, but results and proofs extend to the n-player case. As a side result, the degree of discontinuity of solving systems of linear inequalities is settled.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 18:45:25 GMT" } ]
2009-07-10T00:00:00
[ [ "Pauly", "Arno", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.1523
Federico Penna
Federico Penna, Roberto Garello
Theoretical Performance Analysis of Eigenvalue-based Detection
31 pages, 12 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we develop a complete analytical framework based on Random Matrix Theory for the performance evaluation of Eigenvalue-based Detection. While, up to now, analysis was limited to false-alarm probability, we have obtained an analytical expression also for the probability of missed detection, by using the theory of spiked population models. A general scenario with multiple signals present at the same time is considered. The theoretical results of this paper allow to predict the error probabilities, and to set the decision threshold accordingly, by means of a few mathematical formulae. In this way the design of an eigenvalue-based detector is made conceptually identical to that of a traditional energy detector. As additional results, the paper discusses the conditions of signal identifiability for single and multiple sources. All the analytical results are validated through numerical simulations, covering also convergence, identifiabilty and non-Gaussian practical modulations.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 12:49:45 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2009 07:38:54 GMT" } ]
2009-09-23T00:00:00
[ [ "Penna", "Federico", "" ], [ "Garello", "Roberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1540
Sonja Georgievska
Sonja Georgievska and Suzana Andova
Testing Probabilistic Processes: Can Random Choices Be Unobservable?
24 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A central paradigm behind process semantics based on observability and testing is that the exact moment of occurring of an internal nondeterministic choice is unobservable. It is natural, therefore, for this property to hold when the internal choice is quantified with probabilities. However, ever since probabilities have been introduced in process semantics, it has been a challenge to preserve the unobservability of the random choice, while not violating the other laws of process theory and probability theory. This paper addresses this problem. It proposes two semantics for processes where the internal nondeterminism has been quantified with probabilities. The first one is based on the notion of testing, i.e. interaction between the process and its environment. The second one, the probabilistic ready trace semantics, is based on the notion of observability. Both are shown to coincide. They are also preserved under the standard operators.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 13:29:25 GMT" } ]
2009-07-10T00:00:00
[ [ "Georgievska", "Sonja", "" ], [ "Andova", "Suzana", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.1545
Se Baek Oh
Se Baek Oh, George Barbastathis, and Ramesh Raskar
Augmenting Light Field to model Wave Optics effects
Covering some of the topics presented in CVPR 2009 short course on light field: Present and Future
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The ray-based 4D light field representation cannot be directly used to analyze diffractive or phase--sensitive optical elements. In this paper, we exploit tools from wave optics and extend the light field representation via a novel "light field transform". We introduce a key modification to the ray--based model to support the transform. We insert a "virtual light source", with potentially negative valued radiance for certain emitted rays. We create a look-up table of light field transformers of canonical optical elements. The two key conclusions are that (i) in free space, the 4D light field completely represents wavefront propagation via rays with real (positive as well as negative) valued radiance and (ii) at occluders, a light field composed of light field transformers plus insertion of (ray--based) virtual light sources represents resultant phase and amplitude of wavefronts. For free--space propagation, we analyze different wavefronts and coherence possibilities. For occluders, we show that the light field transform is simply based on a convolution followed by a multiplication operation. This formulation brings powerful concepts from wave optics to computer vision and graphics. We show applications in cubic-phase plate imaging and holographic displays.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 13:43:12 GMT" } ]
2009-07-10T00:00:00
[ [ "Oh", "Se Baek", "" ], [ "Barbastathis", "George", "" ], [ "Raskar", "Ramesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.1558
Marcelo A. Montemurro
Marcelo A. Montemurro and Damian Zanette
Towards the quantification of the semantic information encoded in written language
19 pages, 4 figures
Advances in Complex Systems, Volume 13, Issue 2 (2010), pp. 135-153
10.1142/S0219525910002530
null
physics.soc-ph cs.CL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Written language is a complex communication signal capable of conveying information encoded in the form of ordered sequences of words. Beyond the local order ruled by grammar, semantic and thematic structures affect long-range patterns in word usage. Here, we show that a direct application of information theory quantifies the relationship between the statistical distribution of words and the semantic content of the text. We show that there is a characteristic scale, roughly around a few thousand words, which establishes the typical size of the most informative segments in written language. Moreover, we find that the words whose contributions to the overall information is larger, are the ones more closely associated with the main subjects and topics of the text. This scenario can be explained by a model of word usage that assumes that words are distributed along the text in domains of a characteristic size where their frequency is higher than elsewhere. Our conclusions are based on the analysis of a large database of written language, diverse in subjects and styles, and thus are likely to be applicable to general language sequences encoding complex information.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 14:36:47 GMT" }, { "version": "v2", "created": "Fri, 10 Jul 2009 11:35:08 GMT" }, { "version": "v3", "created": "Mon, 27 Jul 2009 06:40:04 GMT" } ]
2010-05-17T00:00:00
[ [ "Montemurro", "Marcelo A.", "" ], [ "Zanette", "Damian", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0907.1579
Jacob Biamonte
Jacob D. Biamonte
The Computational Power of Minkowski Spacetime
6 pages, LaTeX, feedback welcome
J.Phys.Conf.Ser.229:012020,2010
10.1088/1742-6596/229/1/012020
null
quant-ph cs.CC gr-qc physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lorentzian length of a timelike curve connecting both endpoints of a classical computation is a function of the path taken through Minkowski spacetime. The associated runtime difference is due to time-dilation: the phenomenon whereby an observer finds that another's physically identical ideal clock has ticked at a different rate than their own clock. Using ideas appearing in the framework of computational complexity theory, time-dilation is quantified as an algorithmic resource by relating relativistic energy to an $n$th order polynomial time reduction at the completion of an observer's journey. These results enable a comparison between the optimal quadratic \emph{Grover speedup} from quantum computing and an $n=2$ speedup using classical computers and relativistic effects. The goal is not to propose a practical model of computation, but to probe the ultimate limits physics places on computation.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 14:46:59 GMT" } ]
2011-06-27T00:00:00
[ [ "Biamonte", "Jacob D.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0907.1586
David South
David M. South
Data Preservation and Long Term Analysis in High Energy Physics
To appear in the proceedings of 44th Rencontres de Moriond on QCD and High Energy Interactions, La Thuile, Valle d'Aosta, Italy, 14-21 Mar 2009. 4 pages, 2 figures + 1 photo, 1 style file
null
null
null
hep-ex cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High energy physics data is a long term investment and contains the potential for physics results beyond the lifetime of a collaboration. Many existing experiments are concluding their physics programs, and looking at ways to preserve their data heritage. Preservation of high-energy physics data and data analysis structures is a challenge, and past experience has shown it can be difficult if adequate planning and resources are not provided. A study group has been formed to provide guidelines for such data preservation efforts in the future. Key areas to be investigated were identified at a workshop at DESY in January 2009, to be followed by a workshop at SLAC in May 2009. More information can be found at http://dphep.org
[ { "version": "v1", "created": "Thu, 9 Jul 2009 15:32:35 GMT" } ]
2009-12-09T00:00:00
[ [ "South", "David M.", "" ] ]
[ { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0907.1587
Thomas Fischbacher
Thomas Fischbacher and Hans Fangohr
Continuum multi-physics modeling with scripting languages: the Nsim simulation compiler prototype for classical field theory
50 pages, 5 figures
null
null
null
physics.comp-ph cond-mat.mes-hall cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate that for a broad class of physical systems that can be described using classical field theory, automated runtime translation of the physical equations to parallelized finite-element numerical simulation code is feasible. This allows the implementation of multiphysics extension modules to popular scripting languages (such as Python) that handle the complete specification of the physical system at script level. We discuss two example applications that utilize this framework: the micromagnetic simulation package "Nmag" as well as a short Python script to study morphogenesis in a reaction-diffusion model.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 15:32:47 GMT" } ]
2009-07-12T00:00:00
[ [ "Fischbacher", "Thomas", "" ], [ "Fangohr", "Hans", "" ] ]
[ { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Physics", "code": "cond-mat.mes-hall", "description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures", "span": "(Mesoscale and Nanoscale Physics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.1597
Thomas Hinton
James A. R. Marshall and Thomas G. Hinton
Beyond No Free Lunch: Realistic Algorithms for Arbitrary Problem Classes
(V3 fixed some other typos and improved some results)
null
null
null
cs.IT cs.NE math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how the necessary and sufficient conditions for the NFL to apply can be reduced to the single requirement of the set of objective functions under consideration being closed under permutation, and quantify the extent to which a set of objectives not closed under permutation can give rise to a performance difference between two algorithms. Then we provide a more refined definition of performance under which we show that revisiting algorithms are always trumped by enumerative ones.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 16:10:43 GMT" }, { "version": "v2", "created": "Wed, 15 Jul 2009 09:21:22 GMT" }, { "version": "v3", "created": "Tue, 16 Mar 2010 15:44:37 GMT" } ]
2010-03-17T00:00:00
[ [ "Marshall", "James A. R.", "" ], [ "Hinton", "Thomas G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1632
Naveen Ashish
Naveen Ashish, Sharad Mehrotra, Pouria Pirzadeh
Incorporating Integrity Constraints in Uncertain Databases
null
null
null
null
cs.DB cs.IR
http://creativecommons.org/licenses/publicdomain/
We develop an approach to incorporate additional knowledge, in the form of general purpose integrity constraints (ICs), to reduce uncertainty in probabilistic databases. While incorporating ICs improves data quality (and hence quality of answers to a query), it significantly complicates query processing. To overcome the additional complexity, we develop an approach to map an uncertain relation U with ICs to another uncertain relation U', that approximates the set of consistent worlds represented by U. Queries over U can instead be evaluated over U' achieving higher quality (due to reduced uncertainty in U') without additional complexity in query processing due to ICs. We demonstrate the effectiveness and scalability of our approach to large data-sets with complex constraints. We also present experimental results demonstrating the utility of incorporating integrity constraints in uncertain relations, in the context of an information extraction application.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 18:45:29 GMT" } ]
2009-07-10T00:00:00
[ [ "Ashish", "Naveen", "" ], [ "Mehrotra", "Sharad", "" ], [ "Pirzadeh", "Pouria", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.1678
Chen Avin
Chen Avin, Yuval Lando, Zvi Lotker
Simple Random Walks on Radio Networks (Simple Random Walks on Hyper-Graphs)
null
null
null
null
cs.NI cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, protocols that are based on the properties of random walks on graphs have found many applications in communication and information networks, such as wireless networks, peer-to-peer networks and the Web. For wireless networks (and other networks), graphs are actually not the correct model of the communication; instead hyper-graphs better capture the communication over a wireless shared channel. Motivated by this example, we study in this paper random walks on hyper-graphs. First, we formalize the random walk process on hyper-graphs and generalize key notions from random walks on graphs. We then give the novel definition of radio cover time, namely, the expected time of a random walk to be heard (as opposed to visit) by all nodes. We then provide some basic bounds on the radio cover, in particular, we show that while on graphs the radio cover time is O(mn), in hyper-graphs it is O(mnr) where n, m and r are the number of nodes, the number of edges and the rank of the hyper-graph, respectively. In addition, we define radio hitting times and give a polynomial algorithm to compute them. We conclude the paper with results on specific hyper-graphs that model wireless networks in one and two dimensions.
[ { "version": "v1", "created": "Thu, 9 Jul 2009 21:32:07 GMT" } ]
2009-07-13T00:00:00
[ [ "Avin", "Chen", "" ], [ "Lando", "Yuval", "" ], [ "Lotker", "Zvi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.1721
Samar Agnihotri
Samar Agnihotri, Rajesh Venkatachalapathy
Distributed Function Computation in Asymmetric Communication Scenarios
10 pages, 6 figures, 2 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the distributed function computation problem in asymmetric communication scenarios, where the sink computes some deterministic function of the data split among N correlated informants. The distributed function computation problem is addressed as a generalization of distributed source coding (DSC) problem. We are mainly interested in minimizing the number of informant bits required, in the worst-case, to allow the sink to exactly compute the function. We provide a constructive solution for this in terms of an interactive communication protocol and prove its optimality. The proposed protocol also allows us to compute the worst-case achievable rate-region for the computation of any function. We define two classes of functions: lossy and lossless. We show that, in general, the lossy functions can be computed at the sink with fewer number of informant bits than the DSC problem, while computation of the lossless functions requires as many informant bits as the DSC problem.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 04:50:22 GMT" } ]
2009-07-13T00:00:00
[ [ "Agnihotri", "Samar", "" ], [ "Venkatachalapathy", "Rajesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1722
Dai Tri Man Le
Ryszard Janicki, Dai Tri Man Le
Modelling Concurrency with Comtraces and Generalized Comtraces
49 pages
null
10.1016/j.ic.2011.08.001
null
cs.LO cs.DC cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Comtraces (combined traces) are extensions of Mazurkiewicz traces that can model the "not later than" relationship. In this paper, we first introduce the novel notion of generalized comtraces, extensions of comtraces that can additionally model the "non-simultaneously" relationship. Then we study some basic algebraic properties and canonical reprentations of comtraces and generalized comtraces. Finally we analyze the relationship between generalized comtraces and generalized stratified order structures. The major technical contribution of this paper is a proof showing that generalized comtraces can be represented by generalized stratified order structures.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 04:36:37 GMT" }, { "version": "v2", "created": "Thu, 16 Jul 2009 06:13:21 GMT" }, { "version": "v3", "created": "Wed, 9 Sep 2009 15:16:01 GMT" }, { "version": "v4", "created": "Mon, 18 Jul 2011 17:55:40 GMT" }, { "version": "v5", "created": "Wed, 31 Aug 2011 16:00:34 GMT" } ]
2011-09-01T00:00:00
[ [ "Janicki", "Ryszard", "" ], [ "Le", "Dai Tri Man", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.1723
Samar Agnihotri
Samar Agnihotri and Rajesh Venkatachalapathy
Worst-case Compressibility of Discrete and Finite Distributions
5 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the worst-case distributed source coding (DSC) problem of [1], the smaller cardinality of the support-set describing the correlation in informant data, may neither imply that fewer informant bits are required nor that fewer informants need to be queried, to finish the data-gathering at the sink. It is important to formally address these observations for two reasons: first, to develop good worst-case information measures and second, to perform meaningful worst-case information-theoretic analysis of various distributed data-gathering problems. Towards this goal, we introduce the notions of bit-compressibility and informant-compressibility of support-sets. We consider DSC and distributed function computation problems and provide results on computing the bit- and informant- compressibilities regions of the support-sets as a function of their cardinality.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 04:39:52 GMT" } ]
2009-07-13T00:00:00
[ [ "Agnihotri", "Samar", "" ], [ "Venkatachalapathy", "Rajesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1724
Mark Jerrum
Leslie Ann Goldberg and Mark Jerrum
Inapproximability of the Tutte polynomial of a planar graph
In this revision, significant changes have been made to the structure of the paper to clarify the presentation. Extra detail has been provided at certain points in the proofs, and on at least one occasion the exposition has been made more systematic. Some typos have been corrected. The results are unchanged. 28 pages and 5 figures
Computational Complexity, 2012
10.1007/s00037-012-0046-4
null
cs.CC math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Tutte polynomial of a graph G is a two-variable polynomial T(G;x,y) that encodes many interesting properties of the graph. We study the complexity of the following problem, for rationals x and y: given as input a planar graph G, determine T(G;x,y). Vertigan completely mapped the complexity of exactly computing the Tutte polynomial of a planar graph. He showed that the problem can be solved in polynomial time if (x,y) is on the hyperbola H_q given by (x-1)(y-1)=q for q=1 or q=2 or if (x,y) is one of the two special points (x,y)=(-1,-1) or (x,y)=(1,1). Otherwise, the problem is #P-hard. In this paper, we consider the problem of approximating T(G;x,y), in the usual sense of "fully polynomial randomised approximation scheme" or FPRAS. Roughly speaking, an FPRAS is required to produce, in polynomial time and with high probability, an answer that has small relative error. Assuming that NP is different from RP, we show that there is no FPRAS for the Tutte polynomial in a large portion of the (x,y) plane. In particular, there is no FPRAS if x>1, y<-1 or if y>1, x<-1 or if x<0, y<0 and q>5. Also, there is no FPRAS if x<1, y<1 and q=3. For q>5, our result is intriguing because it shows that there is no FPRAS at (x,y)=(1-q/(1+epsilon),-epsilon) for any positive epsilon but it leaves open the limit point epsilon=0, which corresponds to approximately counting q-colourings of a planar graph.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 04:55:35 GMT" }, { "version": "v2", "created": "Sun, 6 Sep 2009 09:00:54 GMT" }, { "version": "v3", "created": "Sat, 26 Mar 2011 08:49:06 GMT" } ]
2012-10-03T00:00:00
[ [ "Goldberg", "Leslie Ann", "" ], [ "Jerrum", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0907.1728
Tao Zhou
Linyuan Lu and Tao Zhou
Role of Weak Ties in Link Prediction of Complex Networks
4 pages, 1 figure and 2 tables. Accepted by CIKM workshop, see http://www.dcs.bbk.ac.uk/~dell/cnikm09/#programme
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Plenty of algorithms for link prediction have been proposed and were applied to various real networks. Among these works, the weights of links are rarely taken into account. In this paper, we use local similarity indices to estimate the likelihood of the existence of links in weighted networks, including Common Neighbor, Adamic-Adar Index, Resource Allocation Index, and their weighted versions. In both the unweighted and weighted cases, the resource allocation index performs the best. To our surprise, the weighted indices perform worse, which reminds us of the well-known Weak Tie Theory. Further extensive experimental study shows that the weak ties play a significant role in the link prediction problem, and to emphasize the contribution of weak ties can remarkably enhance the predicting accuracy.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 19:25:20 GMT" }, { "version": "v2", "created": "Fri, 14 Aug 2009 17:38:16 GMT" } ]
2009-08-14T00:00:00
[ [ "Lu", "Linyuan", "" ], [ "Zhou", "Tao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.1737
Pingyi Fan Professor
Qing Wang, Pingyi Fan and Khaled Ben Letaief
Throughput Improvement and Its Tradeoff with The Queuing Delay in the Diamond Relay Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diamond relay channel model, as a basic transmission model, has recently been attracting considerable attention in wireless Ad Hoc networks. Node cooperation and opportunistic scheduling scheme are two important techniques to improve the performance in wireless scenarios. In the paper we consider such a problem how to efficiently combine opportunistic scheduling and cooperative modes in the Rayleigh fading scenarios. To do so, we first compare the throughput of SRP (Spatial Reused Pattern) and AFP (Amplify Forwarding Pattern) in the half-duplex case with the assumption that channel side information is known to all and then come up with a new scheduling scheme. It will that that only switching between SRP and AFP simply does little help to obtain an expected improvement because SRP is always superior to AFP on average due to its efficient spatial reuse. To improve the throughput further, we put forward a new processing strategy in which buffers are employed at both relays in SRP mode. By efficiently utilizing the links with relatively higher gains, the throughput can be greatly improved at a cost of queuing delay. Furthermore, we shall quantitatively evaluate the queuing delay and the tradeoff between the throughput and the additional queuing delay. Finally, to realize our developed strategy and make sure it always run at stable status, we present two criteria and an algorithm on the selection and adjustment of the switching thresholds.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 06:29:23 GMT" } ]
2009-07-13T00:00:00
[ [ "Wang", "Qing", "" ], [ "Fan", "Pingyi", "" ], [ "Letaief", "Khaled Ben", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1739
Pingyi Fan Professor
Pingyi Fan, Pei Sun, and Khaled Ben Letaief
Efficient Signal-Time Coding Design and its Application in Wireless Gaussian Relay Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Signal-time coding, which combines the traditional encoding/modulation mode in the signal domain with signal pulse phase modulation in the time domain, was proposed to improve the information flow rate in relay networks. In this paper, we mainly focus on the efficient signal-time coding design. We first derive an explicit iterative algorithm to estimate the maximum number of available codes given the code length of signal-time coding, and then present an iterative construction method of codebooks. It is shown that compared with conventional computer search, the proposed iterative construction method can reduce the complexity greatly. Numerical results will also indicate that the new constructed codebook is optimal in terms of coding rate. To minimize the buffer size needed to store the codebook while keeping a relatively high efficiency, we shall propose a combinatorial construction method. We will then consider applications in wireless Gaussian relay networks. It will be shown that in the three node network model, the mixed transmission by using two-hop and direct transmissions is not always a good option.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 06:44:52 GMT" } ]
2009-07-13T00:00:00
[ [ "Fan", "Pingyi", "" ], [ "Sun", "Pei", "" ], [ "Letaief", "Khaled Ben", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1755
Khnykin Ivan Gennadyevich
R.T. Faizullin, I.G. Khnykin, V.I.Dylkeyt
The SAT solving method as applied to cryptographic analysis of asymmetric ciphers
10 pages, 3 figures
null
null
null
cs.CR cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The one of the most interesting problem of discrete mathematics is the SAT (satisfiability) problem. Good way in SAT solver developing is to transform the SAT problem to the problem of continuous search of global minimums of the functional associated with the CNF. This article proves the special construction of the functional and offers to solve the system of non-linear algebraic equation that determines functional stationary points via modified method of consecutive approximation. The article describes parallel versions of the method. Also gives the schema of using the method to important problems of cryptographic analysis of asymmetric ciphers, including determining concrete bits of multipliers (in binary form) in large factorization problems and concrete bits of exponent of discrete logarithm problem.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 08:18:17 GMT" } ]
2009-07-13T00:00:00
[ [ "Faizullin", "R. T.", "" ], [ "Khnykin", "I. G.", "" ], [ "Dylkeyt", "V. I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.1779
Chien-Chung Huang
Chien-Chung Huang
Classified Stable Matching
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the {\sc classified stable matching} problem, a problem motivated by academic hiring. Suppose that a number of institutes are hiring faculty members from a pool of applicants. Both institutes and applicants have preferences over the other side. An institute classifies the applicants based on their research areas (or any other criterion), and, for each class, it sets a lower bound and an upper bound on the number of applicants it would hire in that class. The objective is to find a stable matching from which no group of participants has reason to deviate. Moreover, the matching should respect the upper/lower bounds of the classes. In the first part of the paper, we study classified stable matching problems whose classifications belong to a fixed set of ``order types.'' We show that if the set consists entirely of downward forests, there is a polynomial-time algorithm; otherwise, it is NP-complete to decide the existence of a stable matching. In the second part, we investigate the problem using a polyhedral approach. Suppose that all classifications are laminar families and there is no lower bound. We propose a set of linear inequalities to describe stable matching polytope and prove that it is integral. This integrality allows us to find various optimal stable matchings using Ellipsoid algorithm. A further ramification of our result is the description of the stable matching polytope for the many-to-many (unclassified) stable matching problem. This answers an open question posed by Sethuraman, Teo and Qian.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 10:37:22 GMT" }, { "version": "v2", "created": "Sun, 25 Oct 2009 07:37:19 GMT" } ]
2009-10-25T00:00:00
[ [ "Huang", "Chien-Chung", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.1788
Alexandre Soro
Alexandre Soro, Jerome Lacan
FNT-based Reed-Solomon Erasure Codes
submitted in CCNC'10
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new construction of Maximum-Distance Separable (MDS) Reed-Solomon erasure codes based on Fermat Number Transform (FNT). Thanks to FNT, these codes support practical coding and decoding algorithms with complexity O(n log n), where n is the number of symbols of a codeword. An open-source implementation shows that the encoding speed can reach 150Mbps for codes of length up to several 10,000s of symbols. These codes can be used as the basic component of the Information Dispersal Algorithm (IDA) system used in a several P2P systems.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 12:02:11 GMT" } ]
2009-07-13T00:00:00
[ [ "Soro", "Alexandre", "" ], [ "Lacan", "Jerome", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1812
Hal Daum\'e III
Hal Daum\'e III
Fast search for Dirichlet process mixture models
null
AIStats 2007
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dirichlet process (DP) mixture models provide a flexible Bayesian framework for density estimation. Unfortunately, their flexibility comes at a cost: inference in DP mixture models is computationally expensive, even when conjugate distributions are used. In the common case when one seeks only a maximum a posteriori assignment of data points to clusters, we show that search algorithms provide a practical alternative to expensive MCMC and variational techniques. When a true posterior sample is desired, the solution found by search can serve as a good initializer for MCMC. Experimental results show that using these techniques is it possible to apply DP mixture models to very large data sets.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 13:23:37 GMT" } ]
2009-07-13T00:00:00
[ [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.1814
Hal Daum\'e III
Hal Daum\'e III
Bayesian Query-Focused Summarization
null
ACL 2006
null
null
cs.CL cs.IR cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present BayeSum (for ``Bayesian summarization''), a model for sentence extraction in query-focused summarization. BayeSum leverages the common case in which multiple documents are relevant to a single query. Using these documents as reinforcement for query terms, BayeSum is not afflicted by the paucity of information in short queries. We show that approximate inference in BayeSum is possible on large data sets and results in a state-of-the-art summarization system. Furthermore, we show how BayeSum can be understood as a justified query expansion technique in the language modeling for IR framework.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 13:24:55 GMT" } ]
2009-07-13T00:00:00
[ [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.1815
Hal Daum\'e III
Hal Daum\'e III
Frustratingly Easy Domain Adaptation
null
ACL 2007
null
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an approach to domain adaptation that is appropriate exactly in the case when one has enough ``target'' data to do slightly better than just using only ``source'' data. Our approach is incredibly simple, easy to implement as a preprocessing step (10 lines of Perl!) and outperforms state-of-the-art approaches on a range of datasets. Moreover, it is trivially extended to a multi-domain adaptation problem, where one has data from a variety of different domains.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 13:25:48 GMT" } ]
2009-07-13T00:00:00
[ [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.1817
Sheng-Gwo Chen
Sheng-Gwo Chen, Mei-Hsiu Chi and Jyh-Yang Wu
A new intrinsic numerical method for PDE on surfaces
14 pages, 11 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this note we shall introduce a simple, effective numerical method for solving partial differential equations for scalar and vector-valued data defined on surfaces. Even though we shall follow the traditional way to approximate the regular surfaces under consideration by triangular meshes, the key idea of our algorithm is to develop an intrinsic and unified way to compute directly the partial derivatives of functions defined on triangular meshes. We shall present examples in computer graphics and image processing applications.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 13:28:13 GMT" } ]
2009-07-13T00:00:00
[ [ "Chen", "Sheng-Gwo", "" ], [ "Chi", "Mei-Hsiu", "" ], [ "Wu", "Jyh-Yang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0907.1839
Michael Palmer
Michael E. Palmer, Daniel B. Miller
An Evolved Neural Controller for Bipdedal Walking with Dynamic Balance
6 pages, 7 figures. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO) 2009, Montreal
Palmer, M.E. and Miller, D.B. An Evolved Neural Controller for Bipdedal Walking with Dynamic Balance. In Proceedings of the Genetic and Evolutionary Computation Conference (GECCO) 2009, Montreal, July 8-12, 2009
null
null
cs.NE cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We successfully evolved a neural network controller that produces dynamic walking in a simulated bipedal robot with compliant actuators, a difficult control problem. The evolutionary evaluation uses a detailed software simulation of a physical robot. We describe: 1) a novel theoretical method to encourage populations to evolve "around" local optima, which employs multiple demes and fitness functions of progressively increasing difficulty, and 2) the novel genetic representation of the neural controller.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 15:21:56 GMT" } ]
2009-07-13T00:00:00
[ [ "Palmer", "Michael E.", "" ], [ "Miller", "Daniel B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0907.1840
Gianluca Della Vedova
Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi
A PTAS for the Minimum Consensus Clustering Problem with a Fixed Number of Clusters
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Consensus Clustering problem has been introduced as an effective way to analyze the results of different microarray experiments. The problem consists of looking for a partition that best summarizes a set of input partitions (each corresponding to a different microarray experiment) under a simple and intuitive cost function. The problem admits polynomial time algorithms on two input partitions, but is APX-hard on three input partitions. We investigate the restriction of Consensus Clustering when the output partition is required to contain at most k sets, giving a polynomial time approximation scheme (PTAS) while proving the NP-hardness of this restriction.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 15:16:43 GMT" } ]
2009-07-13T00:00:00
[ [ "Bonizzoni", "Paola", "" ], [ "Della Vedova", "Gianluca", "" ], [ "Dondi", "Riccardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.1888
Syed Qaseem
Syed T. Qaseem, Tareq Y. Al-Naffouri
Compressive Sensing for Feedback Reduction in MIMO Broadcast Channels
Submitted to IEEE Transactions on Wireless Communications, April 2009
null
10.1109/ICTEL.2010.5478770
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a generalized feedback model and compressive sensing based opportunistic feedback schemes for feedback resource reduction in MIMO Broadcast Channels under the assumption that both uplink and downlink channels undergo block Rayleigh fading. Feedback resources are shared and are opportunistically accessed by users who are strong, i.e. users whose channel quality information is above a certain fixed threshold. Strong users send same feedback information on all shared channels. They are identified by the base station via compressive sensing. Both analog and digital feedbacks are considered. The proposed analog & digital opportunistic feedback schemes are shown to achieve the same sum-rate throughput as that achieved by dedicated feedback schemes, but with feedback channels growing only logarithmically with number of users. Moreover, there is also a reduction in the feedback load. In the analog feedback case, we show that the propose scheme reduces the feedback noise which eventually results in better throughput, whereas in the digital feedback case the proposed scheme in a noisy scenario achieves almost the throughput obtained in a noiseless dedicated feedback scenario. We also show that for a fixed given budget of feedback bits, there exist a trade-off between the number of shared channels and thresholds accuracy of the feedback SINR.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 19:29:21 GMT" } ]
2016-11-18T00:00:00
[ [ "Qaseem", "Syed T.", "" ], [ "Al-Naffouri", "Tareq Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1916
Johanne Cohen
Olivier Bournez and Johanne Cohen
Learning Equilibria in Games by Stochastic Distributed Algorithms
null
null
null
null
cs.GT cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a class of fully stochastic and fully distributed algorithms, that we prove to learn equilibria in games. Indeed, we consider a family of stochastic distributed dynamics that we prove to converge weakly (in the sense of weak convergence for probabilistic processes) towards their mean-field limit, i.e an ordinary differential equation (ODE) in the general case. We focus then on a class of stochastic dynamics where this ODE turns out to be related to multipopulation replicator dynamics. Using facts known about convergence of this ODE, we discuss the convergence of the initial stochastic dynamics: For general games, there might be non-convergence, but when convergence of the ODE holds, considered stochastic algorithms converge towards Nash equilibria. For games admitting Lyapunov functions, that we call Lyapunov games, the stochastic dynamics converge. We prove that any ordinal potential game, and hence any potential game is a Lyapunov game, with a multiaffine Lyapunov function. For Lyapunov games with a multiaffine Lyapunov function, we prove that this Lyapunov function is a super-martingale over the stochastic dynamics. This leads a way to provide bounds on their time of convergence by martingale arguments. This applies in particular for many classes of games that have been considered in literature, including several load balancing game scenarios and congestion games.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 21:26:54 GMT" } ]
2009-07-14T00:00:00
[ [ "Bournez", "Olivier", "" ], [ "Cohen", "Johanne", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.1925
Carlos Gershenson
Carlos Gershenson and David A. Rosenblueth
Modeling self-organizing traffic lights with elementary cellular automata
33 pages, 11 Figures, 3 Tables
Complex Systems: 19(4):305-322, 2011
null
C3 Report No. 2009.06
nlin.CG cond-mat.stat-mech cs.AI nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There have been several highway traffic models proposed based on cellular automata. The simplest one is elementary cellular automaton rule 184. We extend this model to city traffic with cellular automata coupled at intersections using only rules 184, 252, and 136. The simplicity of the model offers a clear understanding of the main properties of city traffic and its phase transitions. We use the proposed model to compare two methods for coordinating traffic lights: a green-wave method that tries to optimize phases according to expected flows and a self-organizing method that adapts to the current traffic conditions. The self-organizing method delivers considerable improvements over the green-wave method. For low densities, the self-organizing method promotes the formation and coordination of platoons that flow freely in four directions, i.e. with a maximum velocity and no stops. For medium densities, the method allows a constant usage of the intersections, exploiting their maximum flux capacity. For high densities, the method prevents gridlocks and promotes the formation and coordination of "free-spaces" that flow in the opposite direction of traffic.
[ { "version": "v1", "created": "Fri, 10 Jul 2009 22:41:08 GMT" } ]
2011-09-06T00:00:00
[ [ "Gershenson", "Carlos", "" ], [ "Rosenblueth", "David A.", "" ] ]
[ { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0907.1948
Shaddin Dughmi
Shaddin Dughmi, Hu Fu, Robert Kleinberg
Amplified Hardness of Approximation for VCG-Based Mechanisms
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
If a two-player social welfare maximization problem does not admit a PTAS, we prove that any maximal-in-range truthful mechanism that runs in polynomial time cannot achieve an approximation factor better than 1/2. Moreover, for the k-player version of the same problem, the hardness of approximation improves to 1/k under the same two-player hardness assumption. (We note that 1/k is achievable by a trivial deterministic maximal-in-range mechanism.) This hardness result encompasses not only deterministic maximal-in-range mechanisms, but also all universally-truthful randomized maximal in range algorithms, as well as a class of strictly more powerful truthful-in-expectation randomized mechanisms recently introduced by Dobzinski and Dughmi. Our result applies to any class of valuation functions that satisfies some minimal closure properties. These properties are satisfied by the valuation functions in all well-studied APX-hard social welfare maximization problems, such as coverage, submodular, and subadditive valuations. We also prove a stronger result for universally-truthful maximal-in-range mechanisms. Namely, even for the class of budgeted additive valuations, which admits an FPTAS, no such mechanism can achieve an approximation factor better than 1/k in polynomial time.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 16:57:24 GMT" }, { "version": "v2", "created": "Fri, 18 Dec 2009 06:37:34 GMT" } ]
2009-12-18T00:00:00
[ [ "Dughmi", "Shaddin", "" ], [ "Fu", "Hu", "" ], [ "Kleinberg", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.1955
Matthew C. Clarke
Matthew C. Clarke
On the Chances of Completing the Game of "Perpetual Motion"
3 pages, 3 figures
null
null
null
cs.GT
http://creativecommons.org/licenses/by-nc-sa/3.0/
This brief paper describes the single-player card game called "Perpetual Motion" and reports on a computational analysis of the game's outcome. The analysis follows a Monte Carlo methodology based on a sample of 10,000 randomly generated games. The key result is that 54.55% +/- 0.89% of games can be completed (by a patient player!) but that the remaining 45.45% result in non-terminating cycles. The lengths of these non-terminating cycles leave some outstanding questions.
[ { "version": "v1", "created": "Sat, 11 Jul 2009 10:19:11 GMT" } ]
2009-07-14T00:00:00
[ [ "Clarke", "Matthew C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.1956
Haim Permuter Henry
Lei Zhao and Haim Permuter
Zero-error feedback capacity via dynamic programming
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the zero-error capacity for finite state channels with feedback when channel state information is known to both the transmitter and the receiver. We prove that the zero-error capacity in this case can be obtained through the solution of a dynamic programming problem. Each iteration of the dynamic programming provides lower and upper bounds on the zero-error capacity, and in the limit, the lower bound coincides with the zero-error feedback capacity. Furthermore, a sufficient condition for solving the dynamic programming problem is provided through a fixed-point equation. Analytical solutions for several examples are provided.
[ { "version": "v1", "created": "Sat, 11 Jul 2009 10:20:12 GMT" } ]
2009-07-14T00:00:00
[ [ "Zhao", "Lei", "" ], [ "Permuter", "Haim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1975
Sergei Fedorenko
Sergei V. Fedorenko
On semifast Fourier transform algorithms
8 pages. Proceedings of the XII international symposium on problems of redundancy in information and control systems at St.Petersburg, Russia, May 2009, pp.65-70
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the relations between well-known Fourier transform algorithms.
[ { "version": "v1", "created": "Sat, 11 Jul 2009 17:13:50 GMT" }, { "version": "v2", "created": "Mon, 29 Nov 2010 19:48:58 GMT" } ]
2010-11-30T00:00:00
[ [ "Fedorenko", "Sergei V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.1978
Matteo Magnani
Matteo Magnani, Danilo Montesi
BPDMN: A Conservative Extension of BPMN with Enhanced Data Representation Capabilities
17 pages
null
null
null
cs.SE cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of business processes involves the usage of modeling languages, tools and methodologies. In this paper we highlight and address a relevant limitation of the Business Process Modeling Notation (BPMN): its weak data representation capabilities. In particular, we extend it with data-specific constructs derived from existing data modeling notations and adapted to blend gracefully into BPMN diagrams. The extension has been developed taking existing modeling languages and requirement analyses into account: we characterize our notation using the Workfl ow Data Patterns and provide mappings to the main XML-based business process languages.
[ { "version": "v1", "created": "Sat, 11 Jul 2009 17:34:55 GMT" } ]
2009-07-14T00:00:00
[ [ "Magnani", "Matteo", "" ], [ "Montesi", "Danilo", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0907.1990
Oktie Hassanzadeh
Oktie Hassanzadeh
Automated Protein Structure Classification: A Survey
14 pages, Technical Report CSRG-589, University of Toronto
null
null
CSRG-589
cs.CE q-bio.BM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classification of proteins based on their structure provides a valuable resource for studying protein structure, function and evolutionary relationships. With the rapidly increasing number of known protein structures, manual and semi-automatic classification is becoming ever more difficult and prohibitively slow. Therefore, there is a growing need for automated, accurate and efficient classification methods to generate classification databases or increase the speed and accuracy of semi-automatic techniques. Recognizing this need, several automated classification methods have been developed. In this survey, we overview recent developments in this area. We classify different methods based on their characteristics and compare their methodology, accuracy and efficiency. We then present a few open problems and explain future directions.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 18:40:38 GMT" } ]
2009-07-14T00:00:00
[ [ "Hassanzadeh", "Oktie", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Quantitative Biology", "code": "q-bio.BM", "description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.", "span": "(Biomolecules)" } ]
0907.1992
Zhi Quan
Zhi Quan, Stephen J. Shellhammer, Wenyi Zhang, and Ali H. Sayed
Spectrum sensing by cognitive radios at very low SNR
IEEE Global Communications Conference 2009
null
10.1109/GLOCOM.2009.5426262
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spectrum sensing is one of the enabling functionalities for cognitive radio (CR) systems to operate in the spectrum white space. To protect the primary incumbent users from interference, the CR is required to detect incumbent signals at very low signal-to-noise ratio (SNR). In this paper, we present a spectrum sensing technique based on correlating spectra for detection of television (TV) broadcasting signals. The basic strategy is to correlate the periodogram of the received signal with the a priori known spectral features of the primary signal. We show that according to the Neyman-Pearson criterion, this spectral correlation-based sensing technique is asymptotically optimal at very low SNR and with a large sensing time. From the system design perspective, we analyze the effect of the spectral features on the spectrum sensing performance. Through the optimization analysis, we obtain useful insights on how to choose effective spectral features to achieve reliable sensing. Simulation results show that the proposed sensing technique can reliably detect analog and digital TV signals at SNR as low as -20 dB.
[ { "version": "v1", "created": "Sat, 11 Jul 2009 20:38:37 GMT" }, { "version": "v2", "created": "Tue, 14 Jul 2009 05:15:30 GMT" } ]
2016-11-15T00:00:00
[ [ "Quan", "Zhi", "" ], [ "Shellhammer", "Stephen J.", "" ], [ "Zhang", "Wenyi", "" ], [ "Sayed", "Ali H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2019
Tshilidzi Marwala
Tshilidzi Marwala
Foundations for a Developmental State: A case for technical education
5 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the viability of making a country a developmental state. In particular it studies the characteristics of a developmental state and how they are linked to technology. It then identifies technical education, as a vital force for the creation of a developmental state. In particular it identifies analytical, numeracy, computational and communication skills as vital forces for a society to create a developmental society.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 09:35:02 GMT" } ]
2009-07-14T00:00:00
[ [ "Marwala", "Tshilidzi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0907.2039
David D\'eharbe
David Deharbe, Bruno E.G. Gomes and Anamaria M. Moreira
Refining interfaces: the case of the B method
18 pages, submitted to ICFEM 2009
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Model-driven design of software for safety-critical applications often relies on mathematically grounded techniques such as the B method. Such techniques consist in the successive applications of refinements to derive a concrete implementation from an abstract specification. Refinement theory defines verification conditions to guarantee that such operations preserve the intended behaviour of the abstract specifications. One of these conditions requires however that concrete operations have exactly the same signatures as their abstract counterpart, which is not always a practical requirement. This paper shows how changes of signatures can be achieved while still staying within the bounds of refinement theory. This makes it possible to take advantage of the mathematical guarantees and tool support provided for the current refinement-based techniques, such as the B method.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 12:31:58 GMT" } ]
2009-07-14T00:00:00
[ [ "Deharbe", "David", "" ], [ "Gomes", "Bruno E. G.", "" ], [ "Moreira", "Anamaria M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.2049
Ariel Procaccia
Noga Alon, Michal Feldman, Ariel D. Procaccia, Moshe Tennenholtz
Strategyproof Approximation Mechanisms for Location on Networks
null
null
null
null
cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of locating a facility on a network, represented by a graph. A set of strategic agents have different ideal locations for the facility; the cost of an agent is the distance between its ideal location and the facility. A mechanism maps the locations reported by the agents to the location of the facility. Specifically, we are interested in social choice mechanisms that do not utilize payments. We wish to design mechanisms that are strategyproof, in the sense that agents can never benefit by lying, or, even better, group strategyproof, in the sense that a coalition of agents cannot all benefit by lying. At the same time, our mechanisms must provide a small approximation ratio with respect to one of two optimization targets: the social cost or the maximum cost. We give an almost complete characterization of the feasible truthful approximation ratio under both target functions, deterministic and randomized mechanisms, and with respect to different network topologies. Our main results are: We show that a simple randomized mechanism is group strategyproof and gives a (2-2/n)-approximation for the social cost, where n is the number of agents, when the network is a circle (known as a ring in the case of computer networks); we design a novel "hybrid" strategyproof randomized mechanism that provides a tight approximation ratio of 3/2 for the maximum cost when the network is a circle; and we show that no randomized SP mechanism can provide an approximation ratio better than 2-o(1) to the maximum cost even when the network is a tree, thereby matching a trivial upper bound of two.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 16:13:52 GMT" } ]
2009-07-14T00:00:00
[ [ "Alon", "Noga", "" ], [ "Feldman", "Michal", "" ], [ "Procaccia", "Ariel D.", "" ], [ "Tennenholtz", "Moshe", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.2050
{\L}ukasz Je\.z
{\L}ukasz Je\.z
Randomised Buffer Management with Bounded Delay against Adaptive Adversary
Obsolete; improved upon by arXiv:1102.1273 [cs.DS]. This comment is the only difference from previous version
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a new analysis of the RMix algorithm by Chin et al. for the Buffer Management with Bounded Delay problem (or online scheduling of unit jobs to maximise weighted throughput). Unlike the original proof of e/(e-1)-competitiveness, the new one holds even in adaptive-online adversary model. In fact, the proof works also for a slightly more general problem studied by Bie{\'n}kowski et al.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 16:11:45 GMT" }, { "version": "v2", "created": "Tue, 8 Feb 2011 09:29:06 GMT" } ]
2011-02-09T00:00:00
[ [ "Jeż", "Łukasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.2059
Sylvain Lebresne
Sylvain Lebresne
A Type System For Call-By-Name Exceptions
25 pages
Logical Methods in Computer Science, Volume 5, Issue 4 (November 2, 2009) lmcs:817
10.2168/LMCS-5(4:1)2009
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an extension of System F with call-by-name exceptions. The type system is enriched with two syntactic constructs: a union type for programs whose execution may raise an exception at top level, and a corruption type for programs that may raise an exception in any evaluation context (not necessarily at top level). We present the syntax and reduction rules of the system, as well as its typing and subtyping rules. We then study its properties, such as confluence. Finally, we construct a realizability model using orthogonality techniques, from which we deduce that well-typed programs are weakly normalizing and that the ones who have the type of natural numbers really compute a natural number, without raising exceptions.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 18:30:31 GMT" }, { "version": "v2", "created": "Mon, 2 Nov 2009 15:11:52 GMT" } ]
2015-07-01T00:00:00
[ [ "Lebresne", "Sylvain", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0907.2071
John Howat
Prosenjit Bose, Karim Dou\"ieb, Vida Dujmovi\'c and John Howat
Layered Working-Set Trees
10 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The working-set bound [Sleator and Tarjan, J. ACM, 1985] roughly states that searching for an element is fast if the element was accessed recently. Binary search trees, such as splay trees, can achieve this property in the amortized sense, while data structures that are not binary search trees are known to have this property in the worst case. We close this gap and present a binary search tree called a layered working-set tree that guarantees the working-set property in the worst case. The unified bound [Badoiu et al., TCS, 2007] roughly states that searching for an element is fast if it is near (in terms of rank distance) to a recently accessed element. We show how layered working-set trees can be used to achieve the unified bound to within a small additive term in the amortized sense while maintaining in the worst case an access time that is both logarithmic and within a small multiplicative factor of the working-set bound.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 18:11:05 GMT" } ]
2009-07-14T00:00:00
[ [ "Bose", "Prosenjit", "" ], [ "Douïeb", "Karim", "" ], [ "Dujmović", "Vida", "" ], [ "Howat", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.2072
Lucas Cordeiro Carvalho
Lucas Cordeiro, Bernd Fischer, Joao Marques-Silva
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
12 pages
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Propositional bounded model checking has been applied successfully to verify embedded software but is limited by the increasing propositional formula size and the loss of structure during the translation. These limitations can be reduced by encoding word-level information in theories richer than propositional logic and using SMT solvers for the generated verification conditions. Here, we investigate the application of different SMT solvers to the verification of embedded software written in ANSI-C. We have extended the encodings from previous SMT-based bounded model checkers to provide more accurate support for finite variables, bit-vector operations, arrays, structures, unions and pointers. We have integrated the CVC3, Boolector, and Z3 solvers with the CBMC front-end and evaluated them using both standard software model checking benchmarks and typical embedded applications from telecommunications, control systems and medical devices. The experiments show that our approach can analyze larger problems and substantially reduce the verification time.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 21:49:21 GMT" }, { "version": "v2", "created": "Mon, 13 Jul 2009 20:20:59 GMT" } ]
2009-07-14T00:00:00
[ [ "Cordeiro", "Lucas", "" ], [ "Fischer", "Bernd", "" ], [ "Marques-Silva", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.2075
Ula\c{s} Ba\u{g}ci
Ulas Bagci and Li Bai
Multiresolution Elastic Medical Image Registration in Standard Intensity Scale
IEEE Sibgrapi 2007 submission
IEEE 20th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI-07), Belo Horizonte-Minas Gerais, Brasil, October 7-10, 2007
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Medical image registration is a difficult problem. Not only a registration algorithm needs to capture both large and small scale image deformations, it also has to deal with global and local image intensity variations. In this paper we describe a new multiresolution elastic image registration method that challenges these difficulties in image registration. To capture large and small scale image deformations, we use both global and local affine transformation algorithms. To address global and local image intensity variations, we apply an image intensity standardization algorithm to correct image intensity variations. This transforms image intensities into a standard intensity scale, which allows highly accurate registration of medical images.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 22:39:34 GMT" } ]
2009-07-14T00:00:00
[ [ "Bagci", "Ulas", "" ], [ "Bai", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.2076
Francesco Biscani Ph.D.
Francesco Biscani
The Piranha algebraic manipulator
24 pages, 2 figures
null
null
null
cs.SC
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this paper we present a specialised algebraic manipulation package devoted to Celestial Mechanics. The system, called Piranha, is built on top of a generic and extensible framework, which allows to treat efficiently and in a unified way the algebraic structures most commonly encountered in Celestial Mechanics (such as multivariate polynomials and Poisson series). In this contribution we explain the architecture of the software, with special focus on the implementation of series arithmetics, show its current capabilities, and present benchmarks indicating that Piranha is competitive, performance-wise, with other specialised manipulators.
[ { "version": "v1", "created": "Sun, 12 Jul 2009 23:41:03 GMT" } ]
2009-07-14T00:00:00
[ [ "Biscani", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0907.2079
Yong Zhang
Zhaosong Lu and Yong Zhang
An Augmented Lagrangian Approach for Sparse Principal Component Analysis
42 pages
null
null
null
math.OC cs.LG math.ST stat.AP stat.CO stat.ME stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Principal component analysis (PCA) is a widely used technique for data analysis and dimension reduction with numerous applications in science and engineering. However, the standard PCA suffers from the fact that the principal components (PCs) are usually linear combinations of all the original variables, and it is thus often difficult to interpret the PCs. To alleviate this drawback, various sparse PCA approaches were proposed in literature [15, 6, 17, 28, 8, 25, 18, 7, 16]. Despite success in achieving sparsity, some important properties enjoyed by the standard PCA are lost in these methods such as uncorrelation of PCs and orthogonality of loading vectors. Also, the total explained variance that they attempt to maximize can be too optimistic. In this paper we propose a new formulation for sparse PCA, aiming at finding sparse and nearly uncorrelated PCs with orthogonal loading vectors while explaining as much of the total variance as possible. We also develop a novel augmented Lagrangian method for solving a class of nonsmooth constrained optimization problems, which is well suited for our formulation of sparse PCA. We show that it converges to a feasible point, and moreover under some regularity assumptions, it converges to a stationary point. Additionally, we propose two nonmonotone gradient methods for solving the augmented Lagrangian subproblems, and establish their global and local convergence. Finally, we compare our sparse PCA approach with several existing methods on synthetic, random, and real data, respectively. The computational results demonstrate that the sparse PCs produced by our approach substantially outperform those by other methods in terms of total explained variance, correlation of PCs, and orthogonality of loading vectors.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 00:45:51 GMT" } ]
2009-07-14T00:00:00
[ [ "Lu", "Zhaosong", "" ], [ "Zhang", "Yong", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0907.2083
Vivek Goyal
Adam C. Zelinski, Vivek K Goyal, and Elfar Adalsteinsson
Simultaneously Sparse Solutions to Linear Inverse Problems with Multiple System Matrices and a Single Observation Vector
36 pages; manuscript unchanged from July 21, 2008, except for updated references; content appears in September 2008 PhD thesis
SIAM J. Scientific Computing, vol. 31, no. 5, pp. 4533-4579, January 2010
10.1137/080730822
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A linear inverse problem is proposed that requires the determination of multiple unknown signal vectors. Each unknown vector passes through a different system matrix and the results are added to yield a single observation vector. Given the matrices and lone observation, the objective is to find a simultaneously sparse set of unknown vectors that solves the system. We will refer to this as the multiple-system single-output (MSSO) simultaneous sparsity problem. This manuscript contrasts the MSSO problem with other simultaneous sparsity problems and conducts a thorough initial exploration of algorithms with which to solve it. Seven algorithms are formulated that approximately solve this NP-Hard problem. Three greedy techniques are developed (matching pursuit, orthogonal matching pursuit, and least squares matching pursuit) along with four methods based on a convex relaxation (iteratively reweighted least squares, two forms of iterative shrinkage, and formulation as a second-order cone program). The algorithms are evaluated across three experiments: the first and second involve sparsity profile recovery in noiseless and noisy scenarios, respectively, while the third deals with magnetic resonance imaging radio-frequency excitation pulse design.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 01:38:06 GMT" } ]
2010-09-03T00:00:00
[ [ "Zelinski", "Adam C.", "" ], [ "Goyal", "Vivek K", "" ], [ "Adalsteinsson", "Elfar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0907.2089
Sebastian Maneth
A. Arroyuelo, F. Claude, S. Maneth, V. M\"akinen, G. Navarro, K. Nguyen, J. Siren, N. V\"alim\"aki
Fast In-Memory XPath Search over Compressed Text and Tree Indexes
null
null
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A large fraction of an XML document typically consists of text data. The XPath query language allows text search via the equal, contains, and starts-with predicates. Such predicates can efficiently be implemented using a compressed self-index of the document's text nodes. Most queries, however, contain some parts of querying the text of the document, plus some parts of querying the tree structure. It is therefore a challenge to choose an appropriate evaluation order for a given query, which optimally leverages the execution speeds of the text and tree indexes. Here the SXSI system is introduced; it stores the tree structure of an XML document using a bit array of opening and closing brackets, and stores the text nodes of the document using a global compressed self-index. On top of these indexes sits an XPath query engine that is based on tree automata. The engine uses fast counting queries of the text index in order to dynamically determine whether to evaluate top-down or bottom-up with respect to the tree structure. The resulting system has several advantages over existing systems: (1) on pure tree queries (without text search) such as the XPathMark queries, the SXSI system performs on par or better than the fastest known systems MonetDB and Qizx, (2) on queries that use text search, SXSI outperforms the existing systems by 1--3 orders of magnitude (depending on the size of the result set), and (3) with respect to memory consumption, SXSI outperforms all other systems for counting-only queries.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 03:19:23 GMT" }, { "version": "v2", "created": "Wed, 5 Oct 2011 11:09:37 GMT" } ]
2011-10-06T00:00:00
[ [ "Arroyuelo", "A.", "" ], [ "Claude", "F.", "" ], [ "Maneth", "S.", "" ], [ "Mäkinen", "V.", "" ], [ "Navarro", "G.", "" ], [ "Nguyen", "K.", "" ], [ "Siren", "J.", "" ], [ "Välimäki", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.2090
Brijesh Rai Kumar
Brijesh Kumar Rai, Bikash Kumar Dey and Sagar Shenvi
Some bounds on the capacity of communicating the sum of sources
Revised version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider directed acyclic networks with multiple sources and multiple terminals where each source generates one i.i.d. random process over an abelian group and all the terminals want to recover the sum of these random processes. The different source processes are assumed to be independent. The solvability of such networks has been considered in some previous works. In this paper we investigate on the capacity of such networks, referred as {\it sum-networks}, and present some bounds in terms of min-cut, and the numbers of sources and terminals.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 03:33:44 GMT" }, { "version": "v2", "created": "Tue, 25 Aug 2009 10:51:22 GMT" } ]
2009-08-25T00:00:00
[ [ "Rai", "Brijesh Kumar", "" ], [ "Dey", "Bikash Kumar", "" ], [ "Shenvi", "Sagar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2093
Man-On Pun
Chandrashekhar Thejaswi P. S., Junshan Zhang, Man-On Pun, H. Vincent Poor and Dong Zheng
Distributed Opportunistic Scheduling With Two-Level Probing
Submitted to IEEE Trans. Networking
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc networks in which many links contend for the channel using random access before data transmissions. Simply put, DOS involves a process of joint channel probing and distributed scheduling for ad-hoc (peer-to-peer) communications. Since, in practice, link conditions are estimated with noisy observations, the transmission rate has to be backed off from the estimated rate to avoid transmission outages. Then, a natural question to ask is whether it is worthwhile for the link with successful contention to perform further channel probing to mitigate estimation errors, at the cost of additional probing. Thus motivated, this work investigates DOS with two-level channel probing by optimizing the tradeoff between the throughput gain from more accurate rate estimation and the resulting additional delay. Capitalizing on optimal stopping theory with incomplete information, we show that the optimal scheduling policy is threshold-based and is characterized by either one or two thresholds, depending on network settings. Necessary and sufficient conditions for both cases are rigorously established. In particular, our analysis reveals that performing second-level channel probing is optimal when the first-level estimated channel condition falls in between the two thresholds. Numerical results are provided to illustrate the effectiveness of the proposed DOS with two-level channel probing. We also extend our study to the case with limited feedback, where the feedback from the receiver to its transmitter takes the form of (0,1,e).
[ { "version": "v1", "created": "Mon, 13 Jul 2009 18:01:41 GMT" } ]
2009-07-14T00:00:00
[ [ "S.", "Chandrashekhar Thejaswi P.", "" ], [ "Zhang", "Junshan", "" ], [ "Pun", "Man-On", "" ], [ "Poor", "H. Vincent", "" ], [ "Zheng", "Dong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2121
Sergio Rodriguez
Sergio R. Rodriguez
Topology Discovery Using Cisco Discovery Protocol
null
null
null
TR-200903-013
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address the problem of discovering network topology in proprietary networks. Namely, we investigate topology discovery in Cisco-based networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds information about these devices. We first compare properties of topologies that can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP) and Management Information Base (MIB) Forwarding Database (FDB). Then we describe a method of discovering topology of CDP-based networks. Our experiments show that the physical topology of the network including links that are in Forwarding Block state can be discovered.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 09:56:16 GMT" } ]
2009-07-14T00:00:00
[ [ "Rodriguez", "Sergio R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.2130
Stefano Crespi Reghizzi
Stefano Crespi Reghizzi and Dino Mandrioli
Algebraic properties of structured context-free languages: old approaches and novel developments
Extended version of paper presented at WORDS2009, Salerno,Italy, September 2009
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The historical research line on the algebraic properties of structured CF languages initiated by McNaughton's Parenthesis Languages has recently attracted much renewed interest with the Balanced Languages, the Visibly Pushdown Automata languages (VPDA), the Synchronized Languages, and the Height-deterministic ones. Such families preserve to a varying degree the basic algebraic properties of Regular languages: boolean closure, closure under reversal, under concatenation, and Kleene star. We prove that the VPDA family is strictly contained within the Floyd Grammars (FG) family historically known as operator precedence. Languages over the same precedence matrix are known to be closed under boolean operations, and are recognized by a machine whose pop or push operations on the stack are purely determined by terminal letters. We characterize VPDA's as the subclass of FG having a peculiarly structured set of precedence relations, and balanced grammars as a further restricted case. The non-counting invariance property of FG has a direct implication for VPDA too.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 10:49:34 GMT" } ]
2009-07-14T00:00:00
[ [ "Reghizzi", "Stefano Crespi", "" ], [ "Mandrioli", "Dino", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.2139
Mai-Anh Phan
Mai-Anh Phan, J\"org Huschke
Adaptive Point-to-Multipoint Transmission for Multimedia Broadcast Multicast Services in LTE
6 pages, 7 figures
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates point-to-multipoint (PTM) transmission supporting adaptive modulation and coding (AMC) as well as retransmissions based on incremental redundancy. In contrast to the classical PTM transmission which was introduced by the Multimedia Broadcast Multicast Service (MBMS), the adaptiveness requires user individual feedback channels that allow the receivers to report their radio conditions and send positive or negative acknowledgments (ACK/NACK) for a Layer 1 transport block to the eNodeB. In this work, an adaptive PTM scheme based on feedback from multiple users is presented and evaluated. Furthermore, a simple NACK-oriented feedback mechanism is introduced to relieve the feedback channel that is used in the uplink. Finally, the performance of different single-cell MBMS transmission modes is evaluated by dynamic radio network simulations. It is shown that adaptive PTM transmission outperforms the conventional MBMS configurations in terms of radio resource consumption and user satisfaction rate.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 11:21:23 GMT" } ]
2009-09-30T00:00:00
[ [ "Phan", "Mai-Anh", "" ], [ "Huschke", "Jörg", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0907.2157
Jakub Radoszewski
Maxime Crochemore, Costas Iliopoulos, Marcin Kubica, Jakub Radoszewski, Wojciech Rytter, Tomasz Walen
On the maximal number of highly periodic runs in a string
8 pages, 2 figures
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A run is a maximal occurrence of a repetition $v$ with a period $p$ such that $2p \le |v|$. The maximal number of runs in a string of length $n$ was studied by several authors and it is known to be between $0.944 n$ and $1.029 n$. We investigate highly periodic runs, in which the shortest period $p$ satisfies $3p \le |v|$. We show the upper bound $0.5n$ on the maximal number of such runs in a string of length $n$ and construct a sequence of words for which we obtain the lower bound $0.406 n$.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 13:29:23 GMT" } ]
2009-07-14T00:00:00
[ [ "Crochemore", "Maxime", "" ], [ "Iliopoulos", "Costas", "" ], [ "Kubica", "Marcin", "" ], [ "Radoszewski", "Jakub", "" ], [ "Rytter", "Wojciech", "" ], [ "Walen", "Tomasz", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.2165
Serge Gaspers
St\'ephane Bessy, Fedor V. Fomin, Serge Gaspers, Christophe Paul, Anthony Perez, Saket Saurabh, and St\'ephan Thomass\'e
Kernels for Feedback Arc Set In Tournaments
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A tournament T=(V,A) is a directed graph in which there is exactly one arc between every pair of distinct vertices. Given a digraph on n vertices and an integer parameter k, the Feedback Arc Set problem asks whether the given digraph has a set of k arcs whose removal results in an acyclic digraph. The Feedback Arc Set problem restricted to tournaments is known as the k-Feedback Arc Set in Tournaments (k-FAST) problem. In this paper we obtain a linear vertex kernel for k-FAST. That is, we give a polynomial time algorithm which given an input instance T to k-FAST obtains an equivalent instance T' on O(k) vertices. In fact, given any fixed e>0, the kernelized instance has at most (2+e)k vertices. Our result improves the previous known bound of O(k^2) on the kernel size for k-FAST. Our kernelization algorithm solves the problem on a subclass of tournaments in polynomial time and uses a known polynomial time approximation scheme for k-FAST.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 13:48:22 GMT" }, { "version": "v2", "created": "Thu, 29 Oct 2009 20:00:59 GMT" } ]
2009-10-29T00:00:00
[ [ "Bessy", "Stéphane", "" ], [ "Fomin", "Fedor V.", "" ], [ "Gaspers", "Serge", "" ], [ "Paul", "Christophe", "" ], [ "Perez", "Anthony", "" ], [ "Saurabh", "Saket", "" ], [ "Thomassé", "Stéphan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.2173
Oleg Mazonka
Oleg Mazonka
Bit Copying - The Ultimate Computational Simplicity
null
Complex Systems Journal 2011, Vol 19, N3
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A computational abstract machine based on two operations: referencing and bit copying is presented. These operations are sufficient for carrying out any computation. They can be used as the primitives for a Turing-complete programming language. The interesting point is that the computation can be done without logic operations such as AND or OR. The compiler and emulator of this language with sample programs are available on the Internet.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 14:15:01 GMT" }, { "version": "v2", "created": "Mon, 6 Jun 2011 00:35:43 GMT" } ]
2011-06-07T00:00:00
[ [ "Mazonka", "Oleg", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0907.2209
Andrew Krizhanovsky A
A. A. Krizhanovsky, Feiyu Lin
Related terms search based on WordNet / Wiktionary and its application in Ontology Matching
7 pages, 2 tables, 3 figures; In: RCDL 2009. September 17-21, Petrozavodsk, Russia. - pp. 363-369
null
null
null
cs.IR
http://creativecommons.org/licenses/publicdomain/
A set of ontology matching algorithms (for finding correspondences between concepts) is based on a thesaurus that provides the source data for the semantic distance calculations. In this wiki era, new resources may spring up and improve this kind of semantic search. In the paper a solution of this task based on Russian Wiktionary is compared to WordNet based algorithms. Metrics are estimated using the test collection, containing 353 English word pairs with a relatedness score assigned by human evaluators. The experiment shows that the proposed method is capable in principle of calculating a semantic distance between pair of words in any language presented in Russian Wiktionary. The calculation of Wiktionary based metric had required the development of the open-source Wiktionary parser software.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 16:58:22 GMT" }, { "version": "v2", "created": "Mon, 12 Oct 2009 16:15:13 GMT" } ]
2009-10-12T00:00:00
[ [ "Krizhanovsky", "A. A.", "" ], [ "Lin", "Feiyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.2210
Kalyanapuram R. Parthasarathy
K. R. Parthasarathy
On the philosophy of Cram\'er-Rao-Bhattacharya Inequalities in Quantum Statistics
null
null
null
null
math.PR cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To any parametric family of states of a finite level quantum system we associate a space of Fisher maps and introduce the natural notions of Cram\'er-Rao-Bhattacharya tensor and Fisher information form. This leads us to an abstract Cram\'er-Rao-Bhattacharya lower bound for the covariance matrix of any finite number of unbiased estimators of parameteric functions. A number of illustrative examples is included. Modulo technical assumptions of various kinds our methods can be applied to infinite level quantum systems as well as parametric families of classical probability distributions on Borel spaces.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 16:46:15 GMT" } ]
2009-07-14T00:00:00
[ [ "Parthasarathy", "K. R.", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0907.2222
Dilip Krishnaswamy
Dilip Krishnaswamy, Shanyu Zhao
Network-aware Adaptation with Real-Time Channel Statistics for Wireless LAN Multimedia Transmissions in the Digital Home
6 pages, 12 figures
IEEE COMSWARE 2008, Jan 6-10 2008, Pages 714-719
10.1109/COMSWA.2008.4554505
null
cs.NI cs.LG
http://creativecommons.org/licenses/by/3.0/
This paper suggests the use of intelligent network-aware processing agents in wireless local area network drivers to generate metrics for bandwidth estimation based on real-time channel statistics to enable wireless multimedia application adaptation. Various configurations in the wireless digital home are studied and the experimental results with performance variations are presented.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 18:18:28 GMT" } ]
2016-11-18T00:00:00
[ [ "Krishnaswamy", "Dilip", "" ], [ "Zhao", "Shanyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.2252
Dilip Krishnaswamy
Dilip Krishnaswamy
AWiMA: An architecture for Adhoc Wireless Mobile internet Access
5 pages, 3 figures, submitted to IEEE Globecom 2008
null
10.1109/GLOCOM.2008.ECP.1083
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
This paper suggests a system architecture for wireless widearea- networking access using adhoc networking between a mobile Client node without direct connectivity to a wirelesswide- area-network and a mobile Service Provider node with connectivity to a wireless-wide-area-network. It provides a means for securely providing such adhoc wireless networking services using a Server for tunneling and routing, registration and authentication. The architecture also provides support for handoff of a Client node from one Service Provider to another with persistence of a tunnel between the Client and the Server enabling a soft-handoff. Different wireless protocols may be used for adhoc networking, with filtered interconnection of authenticated Clients implemented at a Service Provider node. The architecture is applicable across different wide-areanetwork protocols, and provides simultaneous support for multiple wide-area-network protocols.
[ { "version": "v1", "created": "Mon, 13 Jul 2009 20:10:29 GMT" } ]
2016-11-17T00:00:00
[ [ "Krishnaswamy", "Dilip", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.2268
Martin Klein
Martin Klein, Michael L Nelson
Evaluating Methods to Rediscover Missing Web Pages from the Web Infrastructure
10 pages, 11 figures, 5 tables, 40 references, accepted for publication at JCDL 2010 in Brisbane, Australia
null
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Missing web pages (pages that return the 404 "Page Not Found" error) are part of the browsing experience. The manual use of search engines to rediscover missing pages can be frustrating and unsuccessful. We compare four automated methods for rediscovering web pages. We extract the page's title, generate the page's lexical signature (LS), obtain the page's tags from the bookmarking website delicious.com and generate a LS from the page's link neighborhood. We use the output of all methods to query Internet search engines and analyze their retrieval performance. Our results show that both LSs and titles perform fairly well with over 60% URIs returned top ranked from Yahoo!. However, the combination of methods improves the retrieval performance. Considering the complexity of the LS generation, querying the title first and in case of insufficient results querying the LSs second is the preferable setup. This combination accounts for more than 75% top ranked URIs.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 15:47:57 GMT" }, { "version": "v2", "created": "Fri, 16 Apr 2010 03:27:17 GMT" } ]
2010-04-19T00:00:00
[ [ "Klein", "Martin", "" ], [ "Nelson", "Michael L", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0907.2300
Yao Sun
Yao Sun and Dingkang Wang
An Efficient Algorithm for Factoring Polynomials over Algebraic Extension Field
null
null
null
null
cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new efficient algorithm is proposed for factoring polynomials over an algebraic extension field. The extension field is defined by a polynomial ring modulo a maximal ideal. If the maximal ideal is given by its Groebner basis, no extra Groebner basis computation is needed for factoring a polynomial over this extension field. Nothing more than linear algebraic technique is used to get a polynomial over the ground field by a generic linear map. Then this polynomial is factorized over the ground field. From these factors, the factorization of the polynomial over the extension field is obtained. The new algorithm has been implemented and computer experiments indicate that the new algorithm is very efficient, particularly in complicated examples.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 07:25:07 GMT" }, { "version": "v2", "created": "Fri, 1 Oct 2010 10:15:16 GMT" } ]
2010-10-04T00:00:00
[ [ "Sun", "Yao", "" ], [ "Wang", "Dingkang", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0907.2309
Peter Rost
Peter Rost and Gerhard Fettweis
Protocols and Performance Limits for Half-Duplex Relay Networks
Submitted to IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, protocols for the half-duplex relay channel are introduced and performance limits are analyzed. Relay nodes underly an orthogonality constraint, which prohibits simultaneous receiving and transmitting on the same time-frequency resource. Based upon this practical consideration, different protocols are discussed and evaluated using a Gaussian system model. For the considered scenarios compress-and-forward based protocols dominate for a wide range of parameters decode-and-forward protocols. In this paper, a protocol with one compress-and-forward and one decode-and-forward based relay is introduced. Just as the cut-set bound, which operates in a mode where relays transmit alternately, both relays support each other. Furthermore, it is shown that in practical systems a random channel access provides only marginal performance gains if any.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 09:01:54 GMT" }, { "version": "v2", "created": "Tue, 2 Feb 2010 08:40:07 GMT" } ]
2010-02-02T00:00:00
[ [ "Rost", "Peter", "" ], [ "Fettweis", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2315
Feng Zhang feng
Hu Yupu, Zhang Fengrong and Zhang Yiwei
Hard Fault Analysis of Trivium
10 pages
null
null
null
cs.CR cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
Fault analysis is a powerful attack to stream ciphers. Up to now, the major idea of fault analysis is to simplify the cipher system by injecting some soft faults. We call it soft fault analysis. As a hardware-oriented stream cipher, Trivium is weak under soft fault analysis. In this paper we consider another type of fault analysis of stream cipher, which is to simplify the cipher system by injecting some hard faults. We call it hard fault analysis. We present the following results about such attack to Trivium. In Case 1 with the probability not smaller than 0.2396, the attacker can obtain 69 bits of 80-bits-key. In Case 2 with the probability not smaller than 0.2291, the attacker can obtain all of 80-bits-key. In Case 3 with the probability not smaller than 0.2291, the attacker can partially solve the key. In Case 4 with non-neglectable probability, the attacker can obtain a simplified cipher, with smaller number of state bits and slower non-linearization procedure. In Case 5 with non-neglectable probability, the attacker can obtain another simplified cipher. Besides, these 5 cases can be checked out by observing the key-stream.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 09:47:02 GMT" } ]
2009-07-15T00:00:00
[ [ "Yupu", "Hu", "" ], [ "Fengrong", "Zhang", "" ], [ "Yiwei", "Zhang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2324
Laurent Bienvenu
Laurent Bienvenu, Rupert Hoelzl, Thorsten Kraling, Wolfgang Merkle
Separations of non-monotonic randomness notions
A preliminary version of this paper was presented at the Sixth International Conference on Computability and Complexity in Analysis, August 18-22, 2009, Ljubljana, Slovenia
null
null
null
cs.CC
http://creativecommons.org/licenses/by/3.0/
In the theory of algorithmic randomness, several notions of random sequence are defined via a game-theoretic approach, and the notions that received most attention are perhaps Martin-Loef randomness and computable randomness. The latter notion was introduced by Schnorr and is rather natural: an infinite binary sequence is computably random if no total computable strategy succeeds on it by betting on bits in order. However, computably random sequences can have properties that one may consider to be incompatible with being random, in particular, there are computably random sequences that are highly compressible. The concept of Martin-Loef randomness is much better behaved in this and other respects, on the other hand its definition in terms of martingales is considerably less natural. Muchnik, elaborating on ideas of Kolmogorov and Loveland, refined Schnorr's model by also allowing non-monotonic strategies, i.e. strategies that do not bet on bits in order. The subsequent ``non-monotonic'' notion of randomness, now called Kolmogorov-Loveland randomness, has been shown to be quite close to Martin-Loef randomness, but whether these two classes coincide remains a fundamental open question. As suggested by Miller and Nies, we study in this paper weak versions of Kolmogorov-Loveland randomness, where the betting strategies are non-adaptive (i.e., the positions of the bits to bet on should be decided before the game). We obtain a full classification of the different notions we consider.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 10:41:08 GMT" } ]
2009-07-15T00:00:00
[ [ "Bienvenu", "Laurent", "" ], [ "Hoelzl", "Rupert", "" ], [ "Kraling", "Thorsten", "" ], [ "Merkle", "Wolfgang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.2376
Elisha Peterson
Elisha Peterson
Cooperation in Subset Team Games: Altruism and Selfishness
null
null
null
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper extends the theory of subset team games, a generalization of cooperative game theory requiring a payoff function that is defined for all subsets of players. This subset utility is used to define both altruistic and selfish contributions of a player to the team. We investigate properties of these games, and analyze the implications of altruism and selfishness for general situations, for prisoner's dilemma, and for a specific game with a Cobb-Douglas utility.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 14:55:38 GMT" } ]
2009-07-15T00:00:00
[ [ "Peterson", "Elisha", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.2391
Pedro Coronel
Pedro Coronel and Helmut B\"olcskei
Optimal Diversity-Multiplexing Tradeoff in Selective-Fading MIMO Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish the optimal diversity-multiplexing (DM) tradeoff of coherent time, frequency, and time-frequency selective-fading multiple-input multiple-output (MIMO) channels and provide a code design criterion for DM tradeoff optimality. Our results are based on the new concept of the "Jensen channel" associated to a given selective-fading MIMO channel. While the original problem seems analytically intractable due to the mutual information between channel input and output being a sum of correlated random variables, the Jensen channel is equivalent to the original channel in the sense of the DM tradeoff and lends itself nicely to analytical treatment. We formulate a systematic procedure for designing DM tradeoff optimal codes for general selective-fading MIMO channels by demonstrating that the design problem can be separated into two simpler and independent problems: the design of an inner code, or precoder, adapted to the channel statistics (i.e., the selectivity characteristics) and an outer code independent of the channel statistics. Our results are supported by appealing geometric intuition, first pointed out for the flat-fading case by Zheng and Tse, IEEE Trans. Inf. Theory, 2003.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 15:57:30 GMT" } ]
2009-07-15T00:00:00
[ [ "Coronel", "Pedro", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2393
Paul Slater
Paul B. Slater
Multiscale Network Reduction Methodologies: Bistochastic and Disparity Filtering of Human Migration Flows between 3,000+ U. S. Counties
35 pages, 12 figures, some rewriting. Dendrogram included as EPAPS file
null
null
null
physics.soc-ph cs.SI physics.data-an stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To control for multiscale effects in networks, one can transform the matrix of (in general) weighted, directed internodal flows to bistochastic (doubly-stochastic) form, using the iterative proportional fitting (Sinkhorn-Knopp) procedure, which alternatively scales row and column sums to all equal 1. The dominant entries in the bistochasticized table can then be employed for network reduction, using strong component hierarchical clustering. We illustrate various facets of this well-established, widely-applied two-stage algorithm with the 3, 107 x 3, 107 (asymmetric) 1995-2000 intercounty migration flow table for the United States. We compare the results obtained with ones using the disparity filter, for "extracting the "multiscale backbone of complex weighted networks", recently put forth by Serrano, Boguna and Vespignani (SBV) (Proc. Natl. Acad. Sci. 106 [2009], 6483), upon which we have briefly commented (Proc. Natl. Acad. Sci. 106 [2009], E66). The performance of the bistochastic filter appears to be superior-at least in this specific case-in two respects: (1) it requires far fewer links to complete a stongly-connected network backbone; and (2) it "belittles" small flows and nodes less-a principal desideratum of SBV-in the sense that the correlations of the nonzero raw flows are considerably weaker with the corresponding bistochastized links than with the significance levels yielded by the disparity filter. Additional comparative studies--as called for by SBV-of these two filtering procedures, in particular as regards their topological properties, should be of considerable interest. Relatedly, in its many geographic applications, the two-stage procedure has--with rare exceptions-clustered contiguous areas, often reconstructing traditional regions (islands, for example), even though no contiguity constraints, at all, are imposed beforehand.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 16:00:00 GMT" }, { "version": "v2", "created": "Wed, 19 Aug 2009 18:22:34 GMT" }, { "version": "v3", "created": "Tue, 19 Jan 2010 20:04:58 GMT" }, { "version": "v4", "created": "Tue, 23 Mar 2010 18:13:13 GMT" }, { "version": "v5", "created": "Thu, 20 May 2010 17:52:39 GMT" }, { "version": "v6", "created": "Fri, 24 Sep 2010 21:41:35 GMT" } ]
2015-03-13T00:00:00
[ [ "Slater", "Paul B.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.SI", "description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.", "span": "(Social and Information Networks)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0907.2412
Edwin Hammerich
Edwin Hammerich
Design of Pulse Shapes and Digital Filters Based on Gaussian Functions
14 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Two new pulse shapes for communications are presented. The first pulse shape is ISI-free and identical with the interpolating function (or ISI-free kernel) of a reconstruction formula in shift-invariant spaces with Gaussian generator. Several closed form representations in time and frequency domain are given including one for an approximation that is particularly simple. The second pulse shape is the root of the former and obtained by spectral factorization. As a consequence, shifted versions of it form an orthonormal system in the Hilbert space of finite-energy signals. The latter pulse shape is described as the response of an infinite-order digital FIR filter on a Gaussian function as input signal. Several equivalent versions of the digital filter including their finite-order approximations are presented. All filters enjoy the property that explicit formulas for their coefficients and poles are available. The filters are fully parametrizable with respect to bandwidth and sampling rate of the digital data.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 17:12:31 GMT" } ]
2009-07-15T00:00:00
[ [ "Hammerich", "Edwin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2423
Afra Zomorodian
Gunnar Carlsson, Gurjeet Singh, and Afra Zomorodian
Computing Multidimensional Persistence
This paper has been withdrawn by the authors. Journal of Computational Geometry, 1(1) 2010, pages 72-100. http://jocg.org/index.php/jocg/article/view/19
null
null
null
cs.CG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The theory of multidimensional persistence captures the topology of a multifiltration -- a multiparameter family of increasing spaces. Multifiltrations arise naturally in the topological analysis of scientific data. In this paper, we give a polynomial time algorithm for computing multidimensional persistence. We recast this computation as a problem within computational algebraic geometry and utilize algorithms from this area to solve it. While the resulting problem is Expspace-complete and the standard algorithms take doubly-exponential time, we exploit the structure inherent withing multifiltrations to yield practical algorithms. We implement all algorithms in the paper and provide statistical experiments to demonstrate their feasibility.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 18:29:49 GMT" }, { "version": "v2", "created": "Fri, 2 Oct 2009 22:31:15 GMT" }, { "version": "v3", "created": "Fri, 19 Nov 2010 18:17:03 GMT" } ]
2010-11-22T00:00:00
[ [ "Carlsson", "Gunnar", "" ], [ "Singh", "Gurjeet", "" ], [ "Zomorodian", "Afra", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0907.2435
Shuchi Chawla
Shuchi Chawla and Jason Hartline and David Malec and Balasubramanian Sivan
Sequential Posted Pricing and Multi-parameter Mechanism Design
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the classical mathematical economics problem of {\em Bayesian optimal mechanism design} where a principal aims to optimize expected revenue when allocating resources to self-interested agents with preferences drawn from a known distribution. In single-parameter settings (i.e., where each agent's preference is given by a single private value for being served and zero for not being served) this problem is solved [Myerson '81]. Unfortunately, these single parameter optimal mechanisms are impractical and rarely employed [Ausubel and Milgrom '06], and furthermore the underlying economic theory fails to generalize to the important, relevant, and unsolved multi-dimensional setting (i.e., where each agent's preference is given by multiple values for each of the multiple services available) [Manelli and Vincent '07]. In contrast to the theory of optimal mechanisms we develop a theory of sequential posted price mechanisms, where agents in sequence are offered take-it-or-leave-it prices. These mechanisms are approximately optimal in single-dimensional settings, and avoid many of the properties that make optimal mechanisms impractical. Furthermore, these mechanisms generalize naturally to give the first known approximations to the elusive optimal multi-dimensional mechanism design problem. In particular, we solve multi-dimensional multi-unit auction problems and generalizations to matroid feasibility constraints. The constant approximations we obtain range from 1.5 to 8. For all but one case, our posted price sequences can be computed in polynomial time.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 19:51:10 GMT" }, { "version": "v2", "created": "Fri, 15 Jan 2010 20:18:43 GMT" } ]
2010-01-15T00:00:00
[ [ "Chawla", "Shuchi", "" ], [ "Hartline", "Jason", "" ], [ "Malec", "David", "" ], [ "Sivan", "Balasubramanian", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.2452
Laurent Romary
Koichi Takeuchi (NII), Kyo Kageura (NII), Teruo Koyama (NII), B\'eatrice Daille (LINA), Laurent Romary (INRIA Lorraine - LORIA)
Pattern Based Term Extraction Using ACABIT System
null
IEIC Technical Report 103, 280 (2003) 31-36
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a pattern-based term extraction approach for Japanese, applying ACABIT system originally developed for French. The proposed approach evaluates termhood using morphological patterns of basic terms and term variants. After extracting term candidates, ACABIT system filters out non-terms from the candidates based on log-likelihood. This approach is suitable for Japanese term extraction because most of Japanese terms are compound nouns or simple phrasal patterns.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 21:02:14 GMT" } ]
2009-07-16T00:00:00
[ [ "Takeuchi", "Koichi", "", "NII" ], [ "Kageura", "Kyo", "", "NII" ], [ "Koyama", "Teruo", "", "NII" ], [ "Daille", "Béatrice", "", "LINA" ], [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.2455
Won-Yong Shin
Won-Yong Shin, Sae-Young Chung, Yong H. Lee
Parallel Opportunistic Routing in Wireless Networks
18 pages, 7 figures, Under Review for Possible Publication in IEEE Transactions on Information Theory
null
10.1109/TIT.2013.2272884
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study benefits of opportunistic routing in a large wireless ad hoc network by examining how the power, delay, and total throughput scale as the number of source- destination pairs increases up to the operating maximum. Our opportunistic routing is novel in a sense that it is massively parallel, i.e., it is performed by many nodes simultaneously to maximize the opportunistic gain while controlling the inter-user interference. The scaling behavior of conventional multi-hop transmission that does not employ opportunistic routing is also examined for comparison. Our results indicate that our opportunistic routing can exhibit a net improvement in overall power--delay trade-off over the conventional routing by providing up to a logarithmic boost in the scaling law. Such a gain is possible since the receivers can tolerate more interference due to the increased received signal power provided by the multi-user diversity gain, which means that having more simultaneous transmissions is possible.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 21:27:14 GMT" }, { "version": "v2", "created": "Tue, 5 Jul 2011 14:48:17 GMT" } ]
2016-11-18T00:00:00
[ [ "Shin", "Won-Yong", "" ], [ "Chung", "Sae-Young", "" ], [ "Lee", "Yong H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2465
Subhash Kak
Subhash Kak
The Transactional Nature of Quantum Information
Presented at the 11th International Conference on Squeezed States and Uncertainty Relations and 4th Feynman Festival, Olomouc, Czech Republic, June 22-26, 2009
null
null
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information, in its communications sense, is a transactional property. If the received signals communicate choices made by the sender of the signals, then information has been transmitter by the sender to the receiver. Given this reality, the potential information in an unknown pure quantum state should be non-zero. We examine transactional quantum information, which unlike von Neumann entropy, depends on the mutuality of the relationship between the sender and the receiver, associating information with an unknown pure state. The information that can be obtained from a pure state in repeated experiments is potentially infinite.
[ { "version": "v1", "created": "Tue, 14 Jul 2009 22:27:13 GMT" } ]
2012-08-07T00:00:00
[ [ "Kak", "Subhash", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2471
Oktie Hassanzadeh
Oktie Hassanzadeh
Benchmarking Declarative Approximate Selection Predicates
75 pages, 7 figures, February 2007, Masters Thesis at University of Toronto
null
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Declarative data quality has been an active research topic. The fundamental principle behind a declarative approach to data quality is the use of declarative statements to realize data quality primitives on top of any relational data source. A primary advantage of such an approach is the ease of use and integration with existing applications. Several similarity predicates have been proposed in the past for common quality primitives (approximate selections, joins, etc.) and have been fully expressed using declarative SQL statements. In this thesis, new similarity predicates are proposed along with their declarative realization, based on notions of probabilistic information retrieval. Then, full declarative specifications of previously proposed similarity predicates in the literature are presented, grouped into classes according to their primary characteristics. Finally, a thorough performance and accuracy study comparing a large number of similarity predicates for data cleaning operations is performed.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 00:40:06 GMT" } ]
2009-07-16T00:00:00
[ [ "Hassanzadeh", "Oktie", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.2479
Craig Weidert
Craig Weidert
Extremal problems in ordered graphs
Thesis for Master Degree, Simon Fraser University
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this thesis we consider ordered graphs (that is, graphs with a fixed linear ordering on their vertices). We summarize and further investigations on the number of edges an ordered graph may have while avoiding a fixed forbidden ordered graph as a subgraph. In particular, we take a step toward confirming a conjecture of Pach and Tardos regarding the number of edges allowed when the forbidden pattern is a tree by establishing an upper bound for a particular ordered graph for which existing techniques have failed. We also generalize a theorem of Geneson by establishing an upper bound on the number of edges allowed if the forbidden graphs fit a generalized notion of a matching.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 01:37:11 GMT" } ]
2009-07-16T00:00:00
[ [ "Weidert", "Craig", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.2485
Gerard Briscoe Mr
Alexandros Marinos and Gerard Briscoe
Community Cloud Computing
11 Pages, 5 figures
null
10.1007/978-3-642-10665-1_43
null
cs.NI cs.DC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud Computing is rising fast, with its data centres growing at an unprecedented rate. However, this has come with concerns over privacy, efficiency at the expense of resilience, and environmental sustainability, because of the dependence on Cloud vendors such as Google, Amazon and Microsoft. Our response is an alternative model for the Cloud conceptualisation, providing a paradigm for Clouds in the community, utilising networked personal computers for liberation from the centralised vendor model. Community Cloud Computing (C3) offers an alternative architecture, created by combing the Cloud with paradigms from Grid Computing, principles from Digital Ecosystems, and sustainability from Green Computing, while remaining true to the original vision of the Internet. It is more technically challenging than Cloud Computing, having to deal with distributed computing issues, including heterogeneous nodes, varying quality of service, and additional security constraints. However, these are not insurmountable challenges, and with the need to retain control over our digital lives and the potential environmental consequences, it is a challenge we must pursue.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 04:26:32 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 02:33:59 GMT" }, { "version": "v3", "created": "Mon, 12 Oct 2009 07:15:07 GMT" } ]
2015-05-13T00:00:00
[ [ "Marinos", "Alexandros", "" ], [ "Briscoe", "Gerard", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.2510
Sang-Woon Jeon
Sang-Woon Jeon and Sae-Young Chung
Capacity of a Class of Linear Binary Field Multi-source Relay Networks
19 pages, 7 figures, submitted to IEEE trans. on Information Theory
IEEE Transactions on Information Theory, vol. 59, no. 10, pp. 6405-6420, Oct. 2013
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Characterizing the capacity region of multi-source wireless relay networks is one of the fundamental issues in network information theory. The problem is, however, quite challenging due to inter-user interference when there exist multiple source--destination (S--D) pairs in the network. By focusing on a special class of networks, we show that the capacity can be found. Namely, we study a layered linear binary field network with time-varying channels, which is a simplified model reflecting broadcast, interference, and fading natures of wireless communications. We observe that fading can play an important role in mitigating inter-user interference effectively for both single-hop and multi-hop networks. We propose new encoding and relaying schemes with randomized channel pairing, which exploit such channel variations, and derive their achievable rates. By comparing them with the cut-set upper bound, the capacity region of single-hop networks and the sum capacity of multi-hop networks can be characterized for some classes of channel distributions and network topologies. For these classes, we show that the capacity region or sum capacity can be interpreted as the max-flow min-cut theorem.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 07:40:12 GMT" }, { "version": "v2", "created": "Thu, 24 Feb 2011 09:51:30 GMT" } ]
2013-10-29T00:00:00
[ [ "Jeon", "Sang-Woon", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2557
Johannes Bluemlein
J. Bl\"umlein, D.J. Broadhurst, J.A.M. Vermaseren
The Multiple Zeta Value Data Mine
null
Comput.Phys.Commun.181:582-625,2010
10.1016/j.cpc.2009.11.007
DESY 09-003, SFB/CPP-09-65
math-ph cs.MS hep-ph hep-th math.AG math.MP math.NT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a data mine of proven results for multiple zeta values (MZVs) of the form $\zeta(s_1,s_2,...,s_k)=\sum_{n_1>n_2>...>n_k>0}^\infty \{1/(n_1^{s_1} >... n_k^{s_k})\}$ with weight $w=\sum_{i=1}^k s_i$ and depth $k$ and for Euler sums of the form $\sum_{n_1>n_2>...>n_k>0}^\infty t\{(\epsilon_1^{n_1} >...\epsilon_1 ^{n_k})/ (n_1^{s_1} ... n_k^{s_k}) \}$ with signs $\epsilon_i=\pm1$. Notably, we achieve explicit proven reductions of all MZVs with weights $w\le22$, and all Euler sums with weights $w\le12$, to bases whose dimensions, bigraded by weight and depth, have sizes in precise agreement with the Broadhurst--Kreimer and Broadhurst conjectures. Moreover, we lend further support to these conjectures by studying even greater weights ($w\le30$), using modular arithmetic. To obtain these results we derive a new type of relation for Euler sums, the Generalized Doubling Relations. We elucidate the "pushdown" mechanism, whereby the ornate enumeration of primitive MZVs, by weight and depth, is reconciled with the far simpler enumeration of primitive Euler sums. There is some evidence that this pushdown mechanism finds its origin in doubling relations. We hope that our data mine, obtained by exploiting the unique power of the computer algebra language {\sc form}, will enable the study of many more such consequences of the double-shuffle algebra of MZVs, and their Euler cousins, which are already the subject of keen interest, to practitioners of quantum field theory, and to mathematicians alike.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 11:14:37 GMT" }, { "version": "v2", "created": "Sat, 14 Nov 2009 18:08:24 GMT" } ]
2010-01-21T00:00:00
[ [ "Blümlein", "J.", "" ], [ "Broadhurst", "D. J.", "" ], [ "Vermaseren", "J. A. M.", "" ] ]
[ { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Physics", "code": "hep-ph", "description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.", "span": "(High Energy Physics - Phenomenology)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0907.2563
Ioannis Koukoutsidis
Eva Jaho, Ioannis Koukoutsidis, Siyu Tang, Ioannis Stavrakakis, Piet Van Mieghem
Gossip-based Search in Multipeer Communication Networks
preprint (18 pages, 6 figures)
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a gossip-based algorithm for searching data objects in a multipeer communication network. All of the nodes in the network are able to communicate with each other. There exists an initiator node that starts a round of searches by randomly querying one or more of its neighbors for a desired object. The queried nodes can also be activated and look for the object. We examine several behavioural patterns of nodes with respect to their willingness to cooperate in the search. We derive mathematical models for the search process based on the balls and bins model, as well as known approximations for the rumour-spreading problem. All models are validated with simulations. We also evaluate the performance of the algorithm and examine the impact of search parameters.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 12:05:27 GMT" } ]
2009-07-16T00:00:00
[ [ "Jaho", "Eva", "" ], [ "Koukoutsidis", "Ioannis", "" ], [ "Tang", "Siyu", "" ], [ "Stavrakakis", "Ioannis", "" ], [ "Van Mieghem", "Piet", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0907.2585
Yifan Hu
Emden R. Gansner, Yifan Hu, Stephen G. Kobourov
GMap: Drawing Graphs as Maps
19 pages
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Information visualization is essential in making sense out of large data sets. Often, high-dimensional data are visualized as a collection of points in 2-dimensional space through dimensionality reduction techniques. However, these traditional methods often do not capture well the underlying structural information, clustering, and neighborhoods. In this paper, we describe GMap: a practical tool for visualizing relational data with geographic-like maps. We illustrate the effectiveness of this approach with examples from several domains All the maps referenced in this paper can be found in http://www.research.att.com/~yifanhu/GMap
[ { "version": "v1", "created": "Wed, 15 Jul 2009 13:41:32 GMT" } ]
2009-07-16T00:00:00
[ [ "Gansner", "Emden R.", "" ], [ "Hu", "Yifan", "" ], [ "Kobourov", "Stephen G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0907.2599
Hung Ly
Hung D. Ly, Tie Liu, Yingbin Liang
Multiple-Input Multiple-Output Gaussian Broadcast Channels with Common and Confidential Messages
Submitted to the IEEE Transactions on Information Theory, July 2009
null
10.1109/TIT.2010.2069190
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of the multiple-input multiple-output (MIMO) Gaussian broadcast channel with two receivers (receivers 1 and 2) and two messages: a common message intended for both receivers and a confidential message intended only for receiver 1 but needing to be kept asymptotically perfectly secure from receiver 2. A matrix characterization of the secrecy capacity region is established via a channel enhancement argument. The enhanced channel is constructed by first splitting receiver 1 into two virtual receivers and then enhancing only the virtual receiver that decodes the confidential message. The secrecy capacity region of the enhanced channel is characterized using an extremal entropy inequality previously established for characterizing the capacity region of a degraded compound MIMO Gaussian broadcast channel.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 14:35:13 GMT" } ]
2016-11-17T00:00:00
[ [ "Ly", "Hung D.", "" ], [ "Liu", "Tie", "" ], [ "Liang", "Yingbin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2601
Nicolas Le Bihan
Salem Said, Christian Lageman, Nicolas Le Bihan and Jonathan H. Manton
Decompounding on compact Lie groups
26 pages, 3 figures, 25 references
IEEE Transactions on Information Theory, Vol. 56, Issue 6, pp. 2766-2777, 2010
10.1109/TIT.2010.2046216
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Noncommutative harmonic analysis is used to solve a nonparametric estimation problem stated in terms of compound Poisson processes on compact Lie groups. This problem of decompounding is a generalization of a similar classical problem. The proposed solution is based on a char- acteristic function method. The treated problem is important to recent models of the physical inverse problem of multiple scattering.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 14:36:38 GMT" } ]
2012-02-06T00:00:00
[ [ "Said", "Salem", "" ], [ "Lageman", "Christian", "" ], [ "Bihan", "Nicolas Le", "" ], [ "Manton", "Jonathan H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0907.2621
Pavel Hrubes
Pavel Hrubes, Amir Yehudayoff
Homogeneous formulas and symmetric polynomials
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the arithmetic formula complexity of the elementary symmetric polynomials S(k,n). We show that every multilinear homogeneous formula computing S(k,n) has size at least k^(Omega(log k))n, and that product-depth d multilinear homogeneous formulas for S(k,n) have size at least 2^(Omega(k^{1/d}))n. Since S(n,2n) has a multilinear formula of size O(n^2), we obtain a superpolynomial separation between multilinear and multilinear homogeneous formulas. We also show that S(k,n) can be computed by homogeneous formulas of size k^(O(log k))n, answering a question of Nisan and Wigderson. Finally, we present a superpolynomial separation between monotone and non-monotone formulas in the noncommutative setting, answering a question of Nisan.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 18:49:20 GMT" } ]
2009-07-16T00:00:00
[ [ "Hrubes", "Pavel", "" ], [ "Yehudayoff", "Amir", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.2627
Paul Bonsma
Paul Bonsma and Felix Breuer
Finding Fullerene Patches in Polynomial Time
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the following question, motivated by the enumeration of fullerenes. A fullerene patch is a 2-connected plane graph G in which inner faces have length 5 or 6, non-boundary vertices have degree 3, and boundary vertices have degree 2 or 3. The degree sequence along the boundary is called the boundary code of G. We show that the question whether a given sequence S is a boundary code of some fullerene patch can be answered in polynomial time when such patches have at most five 5-faces. We conjecture that our algorithm gives the correct answer for any number of 5-faces, and sketch how to extend the algorithm to the problem of counting the number of different patches with a given boundary code.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 15:39:00 GMT" } ]
2009-07-16T00:00:00
[ [ "Bonsma", "Paul", "" ], [ "Breuer", "Felix", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.2639
Gabor Pataki
Gabor Pataki and Mustafa Tural
Basis Reduction, and the Complexity of Branch-and-Bound
15 pages, 1 figure
null
null
null
math.OC cs.CC cs.DS math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The classical branch-and-bound algorithm for the integer feasibility problem has exponential worst case complexity. We prove that it is surprisingly efficient on reformulated problems, in which the columns of the constraint matrix are short, and near orthogonal, i.e. a reduced basis of the generated lattice; when the entries of A (the dense part of the constraint matrix) are from {1, ..., M} for a large enough M, branch-and-bound solves almost all reformulated instances at the rootnode. We also prove an upper bound on the width of the reformulations along the last unit vector. The analysis builds on the ideas of Furst and Kannan to bound the number of integral matrices for which the shortest vectors of certain lattices are long, and also uses a bound on the size of the branch-and-bound tree based on the norms of the Gram-Schmidt vectors of the constraint matrix. We explore practical aspects of these results. First, we compute numerical values of M which guarantee that 90, and 99 percent of the reformulated problems solve at the root: these turn out to be surprisingly small when the problem size is moderate. Second, we confirm with a computational study that random integer programs become easier, as the coefficients grow.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 16:39:57 GMT" }, { "version": "v2", "created": "Mon, 27 Jul 2009 16:11:06 GMT" } ]
2009-08-06T00:00:00
[ [ "Pataki", "Gabor", "" ], [ "Tural", "Mustafa", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0907.2640
Serguei Mokhov
Serguei A. Mokhov
Towards Hybrid Intensional Programming with JLucid, Objective Lucid, and General Imperative Compiler Framework in the GIPSY
222 pages, 82 figures, 2 tables, index, appendices; Master's thesis, October 2005. Also appears at http://clues.concordia.ca/record=b2222169~S0 and at http://books.google.com/books?id=A2QvOzOxtC8C ; this revision fixes empty Nat42.tex example
null
null
null
cs.PL cs.SE
http://creativecommons.org/licenses/by/3.0/
Pure Lucid programs are concurrent with very fine granularity. Sequential Threads (STs) are functions introduced to enlarge the grain size; they are passed from server to workers by Communication Procedures (CPs) in the General Intensional Programming System (GIPSY). A JLucid program combines Java code for the STs with Lucid code for parallel control. Thus first, in this thesis, we describe the way in which the new JLucid compiler generates STs and CPs. JLucid also introduces array support. Further exploration goes through the additional transformations that the Lucid family of languages has undergone to enable the use of Java objects and their members, in the Generic Intensional Programming Language (GIPL), and Indexical Lucid: first, in the form of JLucid allowing the use of pseudo-objects, and then through the specifically-designed the Objective Lucid language. The syntax and semantic definitions of Objective Lucid and the meaning of Java objects within an intensional program are provided with discussions and examples. Finally, there are many useful scientific and utility routines written in many imperative programming languages other than Java, for example in C, C++, Fortran, Perl, etc. Therefore, it is wise to provide a framework to facilitate inclusion of these languages into the GIPSY and their use by Lucid programs. A General Imperative Compiler Framework and its concrete implementation is proposed to address this issue.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 16:24:05 GMT" }, { "version": "v2", "created": "Fri, 24 Jul 2009 18:18:21 GMT" }, { "version": "v3", "created": "Mon, 21 Dec 2009 04:17:15 GMT" } ]
2009-12-21T00:00:00
[ [ "Mokhov", "Serguei A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.2663
David Richerby
Martin Dyer, Leslie Ann Goldberg, Markus Jalsenius, David Richerby
The Complexity of Approximating Bounded-Degree Boolean \sharp CSP
22 pages. Full classification now applies to degree bounds of at least 6 (formerly at least 25) but no other significant changes from previous version (reduction in page count is just different typesetting)
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The degree of a CSP instance is the maximum number of times that any variable appears in the scopes of constraints. We consider the approximate counting problem for Boolean CSP with bounded-degree instances, for constraint languages containing the two unary constant relations {0} and {1}. When the maximum allowed degree is large enough (at least 6) we obtain a complete classification of the complexity of this problem. It is exactly solvable in polynomial-time if every relation in the constraint language is affine. It is equivalent to the problem of approximately counting independent sets in bipartite graphs if every relation can be expressed as conjunctions of {0}, {1} and binary implication. Otherwise, there is no FPRAS unless NP=RP. For lower degree bounds, additional cases arise, where the complexity is related to the complexity of approximately counting independent sets in hypergraphs.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 17:25:43 GMT" }, { "version": "v2", "created": "Fri, 16 Sep 2011 14:06:45 GMT" } ]
2011-09-19T00:00:00
[ [ "Dyer", "Martin", "" ], [ "Goldberg", "Leslie Ann", "" ], [ "Jalsenius", "Markus", "" ], [ "Richerby", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.2682
Torleiv Kl{\o}ve
Torleiv Kl{\o}ve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng
Permutation Arrays Under the Chebyshev Distance
14 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An (n,d) permutation array (PA) is a set of permutations of length n with the property that the distance (under some metric) between any two permutations in the array is at least d. They became popular recently for communication over power lines. Motivated by an application to flash memories, in this paper the metric used is the Chebyshev metric. A number of different constructions are given as well as bounds on the size of such PA.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 19:12:58 GMT" } ]
2009-07-16T00:00:00
[ [ "Kløve", "Torleiv", "" ], [ "Lin", "Te-Tsung", "" ], [ "Tsai", "Shi-Chun", "" ], [ "Tzeng", "Wen-Guey", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2702
Vinod M. Prabhakaran
Vinod M. Prabhakaran and Pramod Viswanath
Interference Channels with Destination Cooperation
revised based on reviewers' comments
IEEE Trans. Inform. Theory 57 (2011) 187-209
10.1109/TIT.2010.2090237
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interference is a fundamental feature of the wireless channel. To better understand the role of cooperation in interference management, the two-user Gaussian interference channel where the destination nodes can cooperate by virtue of being able to both transmit and receive is studied. The sum-capacity of this channel is characterized up to a constant number of bits. The coding scheme employed builds up on the superposition scheme of Han and Kobayashi (1981) for two-user interference channels without cooperation. New upperbounds to the sum-capacity are also derived.
[ { "version": "v1", "created": "Wed, 15 Jul 2009 20:52:46 GMT" }, { "version": "v2", "created": "Sat, 6 Nov 2010 05:50:42 GMT" } ]
2011-01-28T00:00:00
[ [ "Prabhakaran", "Vinod M.", "" ], [ "Viswanath", "Pramod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2741
Stanley P. Y. Fung
Stanley P. Y. Fung
Bounded Delay Packet Scheduling in a Bounded Buffer
5 pages, 0 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of buffer management in QoS-enabled network switches in the bounded delay model where each packet is associated with a weight and a deadline. We consider the more realistic situation where the network switch has a finite buffer size. A 9.82-competitive algorithm is known for the case of multiple buffers (Azar and Levy, SWAT'06). Recently, for the case of a single buffer, a 3-competitive deterministic algorithm and a 2.618-competitive randomized algorithm was known (Li, INFOCOM'09). In this paper we give a simple deterministic 2-competitive algorithm for the case of a single buffer.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 04:05:05 GMT" } ]
2009-07-17T00:00:00
[ [ "Fung", "Stanley P. Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.2755
Avraham Trahtman N
A.N. Trahtman, T. Bauer, N. Cohen
The Visualization of the Road Coloring Algorithm in the package TESTAS
12 pages
null
null
null
cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A synchronizing word of a deterministic automaton is a word in the alphabet of colors of its edges that maps the automaton to a single state. A coloring of edges of a directed graph is synchronizing if the coloring turns the graph into a deterministic finite automaton possessing a synchronizing word. The road coloring problem is the problem of synchronizing coloring of a directed finite strongly connected graph with constant outdegree of all its vertices if the greatest common divisor of the lengths of all its cycles is one. A polynomial time algorithm of the road coloring has been based on recent positive solution of this old famous problem. One can use our new visualization program for demonstration of the algorithm as well as for visualization of the transition graph of any finite automaton. The visual image presents some structure properties of the transition graph. This help tool is linear in the size of the automaton.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 05:42:06 GMT" }, { "version": "v2", "created": "Mon, 23 Nov 2009 06:31:44 GMT" }, { "version": "v3", "created": "Tue, 23 Nov 2010 11:00:51 GMT" } ]
2010-11-24T00:00:00
[ [ "Trahtman", "A. N.", "" ], [ "Bauer", "T.", "" ], [ "Cohen", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.2759
Fr\'ed\'erique Oggier
Frederique Oggier and Alfred Bruckstein
On Cyclic and Nearly Cyclic Multiagent Interactions in the Plane
null
null
null
null
cs.MA cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss certain types of cyclic and nearly cyclic interactions among N "point"-agents in the plane, leading to formations of interesting limiting geometric configurations. Cyclic pursuit and local averaging interactions have been analyzed in the context of multi-agent gathering. In this paper, we consider some nearly cyclic interactions that break symmetry leading to factor circulants rather than circulant interaction matrices.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 07:10:17 GMT" } ]
2009-07-17T00:00:00
[ [ "Oggier", "Frederique", "" ], [ "Bruckstein", "Alfred", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0907.2775
Dai Tri Man Le
Dai Tri Man Le
Modelling Concurrent Behaviors in the Process Specification Language
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a first-order ontology for generalized stratified order structure. We then classify the models of the theory using model-theoretic techniques. An ontology mapping from this ontology to the core theory of Process Specification Language is also discussed.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 08:20:32 GMT" } ]
2009-07-17T00:00:00
[ [ "Le", "Dai Tri Man", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.2850
J. M. Landsberg
Peter Buergisser, J.M. Landsberg, Laurent Manivel and Jerzy Weyman
An overview of mathematical issues arising in the Geometric complexity theory approach to VP v.s. VNP
29 pages, v2: role of symmetric Kronecker coefficients explained
null
null
null
cs.CC math.AG math.RT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss the geometry of orbit closures and the asymptotic behavior of Kronecker coefficients in the context of the Geometric Complexity Theory program to prove a variant of Valiant's algebraic analog of the P not equal to NP conjecture. We also describe the precise separation of complexity classes that their program proposes to demonstrate.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 17:47:41 GMT" }, { "version": "v2", "created": "Fri, 7 Jan 2011 14:12:04 GMT" } ]
2011-01-10T00:00:00
[ [ "Buergisser", "Peter", "" ], [ "Landsberg", "J. M.", "" ], [ "Manivel", "Laurent", "" ], [ "Weyman", "Jerzy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" }, { "class": "Mathematics", "code": "math.RT", "description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra", "span": "(Representation Theory)" } ]