id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0907.1375 | Francois Pellegrini | C\'edric Chevalier (LaBRI, INRIA Bordeaux - Sud-Ouest), Fran\c{c}ois
Pellegrini (LaBRI, INRIA Bordeaux - Sud-Ouest) | PT-Scotch: A tool for efficient parallel graph ordering | null | Parallel Computing 34, 6-8 (2008) 318-331 | 10.1016/j.parco.2007.12.001 | null | cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The parallel ordering of large graphs is a difficult problem, because on the
one hand minimum degree algorithms do not parallelize well, and on the other
hand the obtainment of high quality orderings with the nested dissection
algorithm requires efficient graph bipartitioning heuristics, the best
sequential implementations of which are also hard to parallelize. This paper
presents a set of algorithms, implemented in the PT-Scotch software package,
which allows one to order large graphs in parallel, yielding orderings the
quality of which is only slightly worse than the one of state-of-the-art
sequential algorithms. Our implementation uses the classical nested dissection
approach but relies on several novel features to solve the parallel graph
bipartitioning problem. Thanks to these improvements, PT-Scotch produces
consistently better orderings than ParMeTiS on large numbers of processors.
| [
{
"version": "v1",
"created": "Wed, 8 Jul 2009 15:11:00 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Chevalier",
"Cédric",
"",
"LaBRI, INRIA Bordeaux - Sud-Ouest"
],
[
"Pellegrini",
"François",
"",
"LaBRI, INRIA Bordeaux - Sud-Ouest"
]
]
| [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0907.1413 | Anand Sarwate | Kamalika Chaudhuri, Anand D. Sarwate | Privacy constraints in regularized convex optimization | This paper has been withdrawn by the authors due to some errors.
Corrections have been included in arXiv:0912.0071v4 | null | null | null | cs.CR cs.DB cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper is withdrawn due to some errors, which are corrected in
arXiv:0912.0071v4 [cs.LG].
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 06:51:54 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jun 2010 20:36:43 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jun 2011 17:05:53 GMT"
}
]
| 2011-06-22T00:00:00 | [
[
"Chaudhuri",
"Kamalika",
""
],
[
"Sarwate",
"Anand D.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.1432 | Adnan Raja | Adnan Raja, Vinod M. Prabhakaran, and Pramod Viswanath | Reciprocity in Linear Deterministic Networks under Linear Coding | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The linear deterministic model has been used recently to get a first order
understanding of many wireless communication network problems. In many of these
cases, it has been pointed out that the capacity regions of the network and its
reciprocal (where the communication links are reversed and the roles of the
sources and the destinations are swapped) are the same. In this paper, we
consider a linear deterministic communication network with multiple unicast
information flows. For this model and under the restriction to the class of
linear coding, we show that the rate regions for a network and its reciprocal
are the same. This can be viewed as a generalization of the linear
reversibility of wireline networks, already known in the network coding
literature.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 07:38:16 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Raja",
"Adnan",
""
],
[
"Prabhakaran",
"Vinod M.",
""
],
[
"Viswanath",
"Pramod",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1455 | Anthony van Raan | Rodrigo Costas, Thed N. van Leeuwen, and Anthony F.J. van Raan | Is scientific literature subject to a sell-by-date? A general
methodology to analyze the durability of scientific documents | 26 pages, 9 tables, 5 figures | null | null | null | physics.soc-ph cs.DL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The study of the citation histories and ageing of documents are topics that
have been addressed from several perspectives, especially in the analysis of
documents with delayed recognition or sleeping beauties. However, there is no
general methodology that can be extensively applied for different time periods
and/or research fields. In this paper a new methodology for the general
analysis of the ageing and durability of scientific papers is presented. This
methodology classifies documents into three general types: Delayed documents,
which receive the main part of their citations later than normal documents;
Flash in the pans, which receive citations immediately after their publication
but they are not cited in the long term; and Normal documents, documents with a
typical distribution of citations over time. These three types of durability
have been analyzed considering the whole population of documents in the Web of
Science with at least 5 external citations (i.e. not considering
self-citations). Several patterns related to the three types of durability have
been found and the potential for further research of the developed methodology
is discussed.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 08:52:04 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Costas",
"Rodrigo",
""
],
[
"van Leeuwen",
"Thed N.",
""
],
[
"van Raan",
"Anthony F. J.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0907.1482 | Arno Pauly | Arno Pauly | How discontinuous is Computing Nash Equilibria? | to be presented at CCA 2009 | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the degree of discontinuity of several solution concepts from
non-cooperative game theory. While the consideration of Nash equilibria forms
the core of our work, also pure and correlated equilibria are dealt with.
Formally, we restrict the treatment to two player games, but results and proofs
extend to the n-player case. As a side result, the degree of discontinuity of
solving systems of linear inequalities is settled.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 18:45:25 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Pauly",
"Arno",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0907.1523 | Federico Penna | Federico Penna, Roberto Garello | Theoretical Performance Analysis of Eigenvalue-based Detection | 31 pages, 12 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we develop a complete analytical framework based on Random
Matrix Theory for the performance evaluation of Eigenvalue-based Detection.
While, up to now, analysis was limited to false-alarm probability, we have
obtained an analytical expression also for the probability of missed detection,
by using the theory of spiked population models. A general scenario with
multiple signals present at the same time is considered. The theoretical
results of this paper allow to predict the error probabilities, and to set the
decision threshold accordingly, by means of a few mathematical formulae. In
this way the design of an eigenvalue-based detector is made conceptually
identical to that of a traditional energy detector. As additional results, the
paper discusses the conditions of signal identifiability for single and
multiple sources. All the analytical results are validated through numerical
simulations, covering also convergence, identifiabilty and non-Gaussian
practical modulations.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 12:49:45 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Sep 2009 07:38:54 GMT"
}
]
| 2009-09-23T00:00:00 | [
[
"Penna",
"Federico",
""
],
[
"Garello",
"Roberto",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1540 | Sonja Georgievska | Sonja Georgievska and Suzana Andova | Testing Probabilistic Processes: Can Random Choices Be Unobservable? | 24 pages | null | null | null | cs.LO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A central paradigm behind process semantics based on observability and
testing is that the exact moment of occurring of an internal nondeterministic
choice is unobservable. It is natural, therefore, for this property to hold
when the internal choice is quantified with probabilities. However, ever since
probabilities have been introduced in process semantics, it has been a
challenge to preserve the unobservability of the random choice, while not
violating the other laws of process theory and probability theory. This paper
addresses this problem. It proposes two semantics for processes where the
internal nondeterminism has been quantified with probabilities. The first one
is based on the notion of testing, i.e. interaction between the process and its
environment. The second one, the probabilistic ready trace semantics, is based
on the notion of observability. Both are shown to coincide. They are also
preserved under the standard operators.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 13:29:25 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Georgievska",
"Sonja",
""
],
[
"Andova",
"Suzana",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
]
|
0907.1545 | Se Baek Oh | Se Baek Oh, George Barbastathis, and Ramesh Raskar | Augmenting Light Field to model Wave Optics effects | Covering some of the topics presented in CVPR 2009 short course on
light field: Present and Future | null | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The ray-based 4D light field representation cannot be directly used to
analyze diffractive or phase--sensitive optical elements. In this paper, we
exploit tools from wave optics and extend the light field representation via a
novel "light field transform". We introduce a key modification to the
ray--based model to support the transform. We insert a "virtual light source",
with potentially negative valued radiance for certain emitted rays. We create a
look-up table of light field transformers of canonical optical elements. The
two key conclusions are that (i) in free space, the 4D light field completely
represents wavefront propagation via rays with real (positive as well as
negative) valued radiance and (ii) at occluders, a light field composed of
light field transformers plus insertion of (ray--based) virtual light sources
represents resultant phase and amplitude of wavefronts. For free--space
propagation, we analyze different wavefronts and coherence possibilities. For
occluders, we show that the light field transform is simply based on a
convolution followed by a multiplication operation. This formulation brings
powerful concepts from wave optics to computer vision and graphics. We show
applications in cubic-phase plate imaging and holographic displays.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 13:43:12 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Oh",
"Se Baek",
""
],
[
"Barbastathis",
"George",
""
],
[
"Raskar",
"Ramesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0907.1558 | Marcelo A. Montemurro | Marcelo A. Montemurro and Damian Zanette | Towards the quantification of the semantic information encoded in
written language | 19 pages, 4 figures | Advances in Complex Systems, Volume 13, Issue 2 (2010), pp.
135-153 | 10.1142/S0219525910002530 | null | physics.soc-ph cs.CL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Written language is a complex communication signal capable of conveying
information encoded in the form of ordered sequences of words. Beyond the local
order ruled by grammar, semantic and thematic structures affect long-range
patterns in word usage. Here, we show that a direct application of information
theory quantifies the relationship between the statistical distribution of
words and the semantic content of the text. We show that there is a
characteristic scale, roughly around a few thousand words, which establishes
the typical size of the most informative segments in written language.
Moreover, we find that the words whose contributions to the overall information
is larger, are the ones more closely associated with the main subjects and
topics of the text. This scenario can be explained by a model of word usage
that assumes that words are distributed along the text in domains of a
characteristic size where their frequency is higher than elsewhere. Our
conclusions are based on the analysis of a large database of written language,
diverse in subjects and styles, and thus are likely to be applicable to general
language sequences encoding complex information.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 14:36:47 GMT"
},
{
"version": "v2",
"created": "Fri, 10 Jul 2009 11:35:08 GMT"
},
{
"version": "v3",
"created": "Mon, 27 Jul 2009 06:40:04 GMT"
}
]
| 2010-05-17T00:00:00 | [
[
"Montemurro",
"Marcelo A.",
""
],
[
"Zanette",
"Damian",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0907.1579 | Jacob Biamonte | Jacob D. Biamonte | The Computational Power of Minkowski Spacetime | 6 pages, LaTeX, feedback welcome | J.Phys.Conf.Ser.229:012020,2010 | 10.1088/1742-6596/229/1/012020 | null | quant-ph cs.CC gr-qc physics.class-ph | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Lorentzian length of a timelike curve connecting both endpoints of a
classical computation is a function of the path taken through Minkowski
spacetime. The associated runtime difference is due to time-dilation: the
phenomenon whereby an observer finds that another's physically identical ideal
clock has ticked at a different rate than their own clock. Using ideas
appearing in the framework of computational complexity theory, time-dilation is
quantified as an algorithmic resource by relating relativistic energy to an
$n$th order polynomial time reduction at the completion of an observer's
journey. These results enable a comparison between the optimal quadratic
\emph{Grover speedup} from quantum computing and an $n=2$ speedup using
classical computers and relativistic effects. The goal is not to propose a
practical model of computation, but to probe the ultimate limits physics places
on computation.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 14:46:59 GMT"
}
]
| 2011-06-27T00:00:00 | [
[
"Biamonte",
"Jacob D.",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
]
|
0907.1586 | David South | David M. South | Data Preservation and Long Term Analysis in High Energy Physics | To appear in the proceedings of 44th Rencontres de Moriond on QCD and
High Energy Interactions, La Thuile, Valle d'Aosta, Italy, 14-21 Mar 2009. 4
pages, 2 figures + 1 photo, 1 style file | null | null | null | hep-ex cs.DL physics.data-an | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | High energy physics data is a long term investment and contains the potential
for physics results beyond the lifetime of a collaboration. Many existing
experiments are concluding their physics programs, and looking at ways to
preserve their data heritage. Preservation of high-energy physics data and data
analysis structures is a challenge, and past experience has shown it can be
difficult if adequate planning and resources are not provided. A study group
has been formed to provide guidelines for such data preservation efforts in the
future. Key areas to be investigated were identified at a workshop at DESY in
January 2009, to be followed by a workshop at SLAC in May 2009. More
information can be found at http://dphep.org
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 15:32:35 GMT"
}
]
| 2009-12-09T00:00:00 | [
[
"South",
"David M.",
""
]
]
| [
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
]
|
0907.1587 | Thomas Fischbacher | Thomas Fischbacher and Hans Fangohr | Continuum multi-physics modeling with scripting languages: the Nsim
simulation compiler prototype for classical field theory | 50 pages, 5 figures | null | null | null | physics.comp-ph cond-mat.mes-hall cs.DC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We demonstrate that for a broad class of physical systems that can be
described using classical field theory, automated runtime translation of the
physical equations to parallelized finite-element numerical simulation code is
feasible. This allows the implementation of multiphysics extension modules to
popular scripting languages (such as Python) that handle the complete
specification of the physical system at script level. We discuss two example
applications that utilize this framework: the micromagnetic simulation package
"Nmag" as well as a short Python script to study morphogenesis in a
reaction-diffusion model.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 15:32:47 GMT"
}
]
| 2009-07-12T00:00:00 | [
[
"Fischbacher",
"Thomas",
""
],
[
"Fangohr",
"Hans",
""
]
]
| [
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "cond-mat.mes-hall",
"description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures",
"span": "(Mesoscale and Nanoscale Physics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
]
|
0907.1597 | Thomas Hinton | James A. R. Marshall and Thomas G. Hinton | Beyond No Free Lunch: Realistic Algorithms for Arbitrary Problem Classes | (V3 fixed some other typos and improved some results) | null | null | null | cs.IT cs.NE math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how the necessary and sufficient conditions for the NFL to apply can
be reduced to the single requirement of the set of objective functions under
consideration being closed under permutation, and quantify the extent to which
a set of objectives not closed under permutation can give rise to a performance
difference between two algorithms. Then we provide a more refined definition of
performance under which we show that revisiting algorithms are always trumped
by enumerative ones.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 16:10:43 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jul 2009 09:21:22 GMT"
},
{
"version": "v3",
"created": "Tue, 16 Mar 2010 15:44:37 GMT"
}
]
| 2010-03-17T00:00:00 | [
[
"Marshall",
"James A. R.",
""
],
[
"Hinton",
"Thomas G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1632 | Naveen Ashish | Naveen Ashish, Sharad Mehrotra, Pouria Pirzadeh | Incorporating Integrity Constraints in Uncertain Databases | null | null | null | null | cs.DB cs.IR | http://creativecommons.org/licenses/publicdomain/ | We develop an approach to incorporate additional knowledge, in the form of
general purpose integrity constraints (ICs), to reduce uncertainty in
probabilistic databases. While incorporating ICs improves data quality (and
hence quality of answers to a query), it significantly complicates query
processing. To overcome the additional complexity, we develop an approach to
map an uncertain relation U with ICs to another uncertain relation U', that
approximates the set of consistent worlds represented by U. Queries over U can
instead be evaluated over U' achieving higher quality (due to reduced
uncertainty in U') without additional complexity in query processing due to
ICs. We demonstrate the effectiveness and scalability of our approach to large
data-sets with complex constraints. We also present experimental results
demonstrating the utility of incorporating integrity constraints in uncertain
relations, in the context of an information extraction application.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 18:45:29 GMT"
}
]
| 2009-07-10T00:00:00 | [
[
"Ashish",
"Naveen",
""
],
[
"Mehrotra",
"Sharad",
""
],
[
"Pirzadeh",
"Pouria",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0907.1678 | Chen Avin | Chen Avin, Yuval Lando, Zvi Lotker | Simple Random Walks on Radio Networks (Simple Random Walks on
Hyper-Graphs) | null | null | null | null | cs.NI cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In recent years, protocols that are based on the properties of random walks
on graphs have found many applications in communication and information
networks, such as wireless networks, peer-to-peer networks and the Web. For
wireless networks (and other networks), graphs are actually not the correct
model of the communication; instead hyper-graphs better capture the
communication over a wireless shared channel. Motivated by this example, we
study in this paper random walks on hyper-graphs. First, we formalize the
random walk process on hyper-graphs and generalize key notions from random
walks on graphs. We then give the novel definition of radio cover time, namely,
the expected time of a random walk to be heard (as opposed to visit) by all
nodes. We then provide some basic bounds on the radio cover, in particular, we
show that while on graphs the radio cover time is O(mn), in hyper-graphs it is
O(mnr) where n, m and r are the number of nodes, the number of edges and the
rank of the hyper-graph, respectively. In addition, we define radio hitting
times and give a polynomial algorithm to compute them. We conclude the paper
with results on specific hyper-graphs that model wireless networks in one and
two dimensions.
| [
{
"version": "v1",
"created": "Thu, 9 Jul 2009 21:32:07 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Avin",
"Chen",
""
],
[
"Lando",
"Yuval",
""
],
[
"Lotker",
"Zvi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.1721 | Samar Agnihotri | Samar Agnihotri, Rajesh Venkatachalapathy | Distributed Function Computation in Asymmetric Communication Scenarios | 10 pages, 6 figures, 2 tables | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the distributed function computation problem in asymmetric
communication scenarios, where the sink computes some deterministic function of
the data split among N correlated informants. The distributed function
computation problem is addressed as a generalization of distributed source
coding (DSC) problem. We are mainly interested in minimizing the number of
informant bits required, in the worst-case, to allow the sink to exactly
compute the function. We provide a constructive solution for this in terms of
an interactive communication protocol and prove its optimality. The proposed
protocol also allows us to compute the worst-case achievable rate-region for
the computation of any function. We define two classes of functions: lossy and
lossless. We show that, in general, the lossy functions can be computed at the
sink with fewer number of informant bits than the DSC problem, while
computation of the lossless functions requires as many informant bits as the
DSC problem.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 04:50:22 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Agnihotri",
"Samar",
""
],
[
"Venkatachalapathy",
"Rajesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1722 | Dai Tri Man Le | Ryszard Janicki, Dai Tri Man Le | Modelling Concurrency with Comtraces and Generalized Comtraces | 49 pages | null | 10.1016/j.ic.2011.08.001 | null | cs.LO cs.DC cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Comtraces (combined traces) are extensions of Mazurkiewicz traces that can
model the "not later than" relationship. In this paper, we first introduce the
novel notion of generalized comtraces, extensions of comtraces that can
additionally model the "non-simultaneously" relationship. Then we study some
basic algebraic properties and canonical reprentations of comtraces and
generalized comtraces. Finally we analyze the relationship between generalized
comtraces and generalized stratified order structures. The major technical
contribution of this paper is a proof showing that generalized comtraces can be
represented by generalized stratified order structures.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 04:36:37 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Jul 2009 06:13:21 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Sep 2009 15:16:01 GMT"
},
{
"version": "v4",
"created": "Mon, 18 Jul 2011 17:55:40 GMT"
},
{
"version": "v5",
"created": "Wed, 31 Aug 2011 16:00:34 GMT"
}
]
| 2011-09-01T00:00:00 | [
[
"Janicki",
"Ryszard",
""
],
[
"Le",
"Dai Tri Man",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0907.1723 | Samar Agnihotri | Samar Agnihotri and Rajesh Venkatachalapathy | Worst-case Compressibility of Discrete and Finite Distributions | 5 pages, 3 figures | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In the worst-case distributed source coding (DSC) problem of [1], the smaller
cardinality of the support-set describing the correlation in informant data,
may neither imply that fewer informant bits are required nor that fewer
informants need to be queried, to finish the data-gathering at the sink. It is
important to formally address these observations for two reasons: first, to
develop good worst-case information measures and second, to perform meaningful
worst-case information-theoretic analysis of various distributed data-gathering
problems. Towards this goal, we introduce the notions of bit-compressibility
and informant-compressibility of support-sets. We consider DSC and distributed
function computation problems and provide results on computing the bit- and
informant- compressibilities regions of the support-sets as a function of their
cardinality.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 04:39:52 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Agnihotri",
"Samar",
""
],
[
"Venkatachalapathy",
"Rajesh",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1724 | Mark Jerrum | Leslie Ann Goldberg and Mark Jerrum | Inapproximability of the Tutte polynomial of a planar graph | In this revision, significant changes have been made to the structure
of the paper to clarify the presentation. Extra detail has been provided at
certain points in the proofs, and on at least one occasion the exposition has
been made more systematic. Some typos have been corrected. The results are
unchanged. 28 pages and 5 figures | Computational Complexity, 2012 | 10.1007/s00037-012-0046-4 | null | cs.CC math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Tutte polynomial of a graph G is a two-variable polynomial T(G;x,y) that
encodes many interesting properties of the graph. We study the complexity of
the following problem, for rationals x and y: given as input a planar graph G,
determine T(G;x,y). Vertigan completely mapped the complexity of exactly
computing the Tutte polynomial of a planar graph. He showed that the problem
can be solved in polynomial time if (x,y) is on the hyperbola H_q given by
(x-1)(y-1)=q for q=1 or q=2 or if (x,y) is one of the two special points
(x,y)=(-1,-1) or (x,y)=(1,1). Otherwise, the problem is #P-hard. In this paper,
we consider the problem of approximating T(G;x,y), in the usual sense of "fully
polynomial randomised approximation scheme" or FPRAS. Roughly speaking, an
FPRAS is required to produce, in polynomial time and with high probability, an
answer that has small relative error. Assuming that NP is different from RP, we
show that there is no FPRAS for the Tutte polynomial in a large portion of the
(x,y) plane. In particular, there is no FPRAS if x>1, y<-1 or if y>1, x<-1 or
if x<0, y<0 and q>5. Also, there is no FPRAS if x<1, y<1 and q=3. For q>5, our
result is intriguing because it shows that there is no FPRAS at
(x,y)=(1-q/(1+epsilon),-epsilon) for any positive epsilon but it leaves open
the limit point epsilon=0, which corresponds to approximately counting
q-colourings of a planar graph.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 04:55:35 GMT"
},
{
"version": "v2",
"created": "Sun, 6 Sep 2009 09:00:54 GMT"
},
{
"version": "v3",
"created": "Sat, 26 Mar 2011 08:49:06 GMT"
}
]
| 2012-10-03T00:00:00 | [
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jerrum",
"Mark",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0907.1728 | Tao Zhou | Linyuan Lu and Tao Zhou | Role of Weak Ties in Link Prediction of Complex Networks | 4 pages, 1 figure and 2 tables. Accepted by CIKM workshop, see
http://www.dcs.bbk.ac.uk/~dell/cnikm09/#programme | null | null | null | cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Plenty of algorithms for link prediction have been proposed and were applied
to various real networks. Among these works, the weights of links are rarely
taken into account. In this paper, we use local similarity indices to estimate
the likelihood of the existence of links in weighted networks, including Common
Neighbor, Adamic-Adar Index, Resource Allocation Index, and their weighted
versions. In both the unweighted and weighted cases, the resource allocation
index performs the best. To our surprise, the weighted indices perform worse,
which reminds us of the well-known Weak Tie Theory. Further extensive
experimental study shows that the weak ties play a significant role in the link
prediction problem, and to emphasize the contribution of weak ties can
remarkably enhance the predicting accuracy.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 19:25:20 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Aug 2009 17:38:16 GMT"
}
]
| 2009-08-14T00:00:00 | [
[
"Lu",
"Linyuan",
""
],
[
"Zhou",
"Tao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0907.1737 | Pingyi Fan Professor | Qing Wang, Pingyi Fan and Khaled Ben Letaief | Throughput Improvement and Its Tradeoff with The Queuing Delay in the
Diamond Relay Networks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Diamond relay channel model, as a basic transmission model, has recently been
attracting considerable attention in wireless Ad Hoc networks. Node cooperation
and opportunistic scheduling scheme are two important techniques to improve the
performance in wireless scenarios. In the paper we consider such a problem how
to efficiently combine opportunistic scheduling and cooperative modes in the
Rayleigh fading scenarios. To do so, we first compare the throughput of SRP
(Spatial Reused Pattern) and AFP (Amplify Forwarding Pattern) in the
half-duplex case with the assumption that channel side information is known to
all and then come up with a new scheduling scheme. It will that that only
switching between SRP and AFP simply does little help to obtain an expected
improvement because SRP is always superior to AFP on average due to its
efficient spatial reuse. To improve the throughput further, we put forward a
new processing strategy in which buffers are employed at both relays in SRP
mode. By efficiently utilizing the links with relatively higher gains, the
throughput can be greatly improved at a cost of queuing delay. Furthermore, we
shall quantitatively evaluate the queuing delay and the tradeoff between the
throughput and the additional queuing delay. Finally, to realize our developed
strategy and make sure it always run at stable status, we present two criteria
and an algorithm on the selection and adjustment of the switching thresholds.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 06:29:23 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Wang",
"Qing",
""
],
[
"Fan",
"Pingyi",
""
],
[
"Letaief",
"Khaled Ben",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1739 | Pingyi Fan Professor | Pingyi Fan, Pei Sun, and Khaled Ben Letaief | Efficient Signal-Time Coding Design and its Application in Wireless
Gaussian Relay Networks | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Signal-time coding, which combines the traditional encoding/modulation mode
in the signal domain with signal pulse phase modulation in the time domain, was
proposed to improve the information flow rate in relay networks. In this paper,
we mainly focus on the efficient signal-time coding design. We first derive an
explicit iterative algorithm to estimate the maximum number of available codes
given the code length of signal-time coding, and then present an iterative
construction method of codebooks. It is shown that compared with conventional
computer search, the proposed iterative construction method can reduce the
complexity greatly. Numerical results will also indicate that the new
constructed codebook is optimal in terms of coding rate. To minimize the buffer
size needed to store the codebook while keeping a relatively high efficiency,
we shall propose a combinatorial construction method. We will then consider
applications in wireless Gaussian relay networks. It will be shown that in the
three node network model, the mixed transmission by using two-hop and direct
transmissions is not always a good option.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 06:44:52 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Fan",
"Pingyi",
""
],
[
"Sun",
"Pei",
""
],
[
"Letaief",
"Khaled Ben",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1755 | Khnykin Ivan Gennadyevich | R.T. Faizullin, I.G. Khnykin, V.I.Dylkeyt | The SAT solving method as applied to cryptographic analysis of
asymmetric ciphers | 10 pages, 3 figures | null | null | null | cs.CR cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The one of the most interesting problem of discrete mathematics is the SAT
(satisfiability) problem. Good way in SAT solver developing is to transform the
SAT problem to the problem of continuous search of global minimums of the
functional associated with the CNF. This article proves the special
construction of the functional and offers to solve the system of non-linear
algebraic equation that determines functional stationary points via modified
method of consecutive approximation. The article describes parallel versions of
the method. Also gives the schema of using the method to important problems of
cryptographic analysis of asymmetric ciphers, including determining concrete
bits of multipliers (in binary form) in large factorization problems and
concrete bits of exponent of discrete logarithm problem.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 08:18:17 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Faizullin",
"R. T.",
""
],
[
"Khnykin",
"I. G.",
""
],
[
"Dylkeyt",
"V. I.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.1779 | Chien-Chung Huang | Chien-Chung Huang | Classified Stable Matching | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the {\sc classified stable matching} problem, a problem
motivated by academic hiring. Suppose that a number of institutes are hiring
faculty members from a pool of applicants. Both institutes and applicants have
preferences over the other side. An institute classifies the applicants based
on their research areas (or any other criterion), and, for each class, it sets
a lower bound and an upper bound on the number of applicants it would hire in
that class. The objective is to find a stable matching from which no group of
participants has reason to deviate. Moreover, the matching should respect the
upper/lower bounds of the classes.
In the first part of the paper, we study classified stable matching problems
whose classifications belong to a fixed set of ``order types.'' We show that if
the set consists entirely of downward forests, there is a polynomial-time
algorithm; otherwise, it is NP-complete to decide the existence of a stable
matching.
In the second part, we investigate the problem using a polyhedral approach.
Suppose that all classifications are laminar families and there is no lower
bound. We propose a set of linear inequalities to describe stable matching
polytope and prove that it is integral. This integrality allows us to find
various optimal stable matchings using Ellipsoid algorithm. A further
ramification of our result is the description of the stable matching polytope
for the many-to-many (unclassified) stable matching problem. This answers an
open question posed by Sethuraman, Teo and Qian.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 10:37:22 GMT"
},
{
"version": "v2",
"created": "Sun, 25 Oct 2009 07:37:19 GMT"
}
]
| 2009-10-25T00:00:00 | [
[
"Huang",
"Chien-Chung",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.1788 | Alexandre Soro | Alexandre Soro, Jerome Lacan | FNT-based Reed-Solomon Erasure Codes | submitted in CCNC'10 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper presents a new construction of Maximum-Distance Separable (MDS)
Reed-Solomon erasure codes based on Fermat Number Transform (FNT). Thanks to
FNT, these codes support practical coding and decoding algorithms with
complexity O(n log n), where n is the number of symbols of a codeword. An
open-source implementation shows that the encoding speed can reach 150Mbps for
codes of length up to several 10,000s of symbols. These codes can be used as
the basic component of the Information Dispersal Algorithm (IDA) system used in
a several P2P systems.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 12:02:11 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Soro",
"Alexandre",
""
],
[
"Lacan",
"Jerome",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1812 | Hal Daum\'e III | Hal Daum\'e III | Fast search for Dirichlet process mixture models | null | AIStats 2007 | null | null | cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Dirichlet process (DP) mixture models provide a flexible Bayesian framework
for density estimation. Unfortunately, their flexibility comes at a cost:
inference in DP mixture models is computationally expensive, even when
conjugate distributions are used. In the common case when one seeks only a
maximum a posteriori assignment of data points to clusters, we show that search
algorithms provide a practical alternative to expensive MCMC and variational
techniques. When a true posterior sample is desired, the solution found by
search can serve as a good initializer for MCMC. Experimental results show that
using these techniques is it possible to apply DP mixture models to very large
data sets.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 13:23:37 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Daumé",
"Hal",
"III"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.1814 | Hal Daum\'e III | Hal Daum\'e III | Bayesian Query-Focused Summarization | null | ACL 2006 | null | null | cs.CL cs.IR cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present BayeSum (for ``Bayesian summarization''), a model for sentence
extraction in query-focused summarization. BayeSum leverages the common case in
which multiple documents are relevant to a single query. Using these documents
as reinforcement for query terms, BayeSum is not afflicted by the paucity of
information in short queries. We show that approximate inference in BayeSum is
possible on large data sets and results in a state-of-the-art summarization
system. Furthermore, we show how BayeSum can be understood as a justified query
expansion technique in the language modeling for IR framework.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 13:24:55 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Daumé",
"Hal",
"III"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.1815 | Hal Daum\'e III | Hal Daum\'e III | Frustratingly Easy Domain Adaptation | null | ACL 2007 | null | null | cs.LG cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We describe an approach to domain adaptation that is appropriate exactly in
the case when one has enough ``target'' data to do slightly better than just
using only ``source'' data. Our approach is incredibly simple, easy to
implement as a preprocessing step (10 lines of Perl!) and outperforms
state-of-the-art approaches on a range of datasets. Moreover, it is trivially
extended to a multi-domain adaptation problem, where one has data from a
variety of different domains.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 13:25:48 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Daumé",
"Hal",
"III"
]
]
| [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.1817 | Sheng-Gwo Chen | Sheng-Gwo Chen, Mei-Hsiu Chi and Jyh-Yang Wu | A new intrinsic numerical method for PDE on surfaces | 14 pages, 11 figures | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this note we shall introduce a simple, effective numerical method for
solving partial differential equations for scalar and vector-valued data
defined on surfaces. Even though we shall follow the traditional way to
approximate the regular surfaces under consideration by triangular meshes, the
key idea of our algorithm is to develop an intrinsic and unified way to compute
directly the partial derivatives of functions defined on triangular meshes. We
shall present examples in computer graphics and image processing applications.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 13:28:13 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Chen",
"Sheng-Gwo",
""
],
[
"Chi",
"Mei-Hsiu",
""
],
[
"Wu",
"Jyh-Yang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0907.1839 | Michael Palmer | Michael E. Palmer, Daniel B. Miller | An Evolved Neural Controller for Bipdedal Walking with Dynamic Balance | 6 pages, 7 figures. In Proceedings of the Genetic and Evolutionary
Computation Conference (GECCO) 2009, Montreal | Palmer, M.E. and Miller, D.B. An Evolved Neural Controller for
Bipdedal Walking with Dynamic Balance. In Proceedings of the Genetic and
Evolutionary Computation Conference (GECCO) 2009, Montreal, July 8-12, 2009 | null | null | cs.NE cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We successfully evolved a neural network controller that produces dynamic
walking in a simulated bipedal robot with compliant actuators, a difficult
control problem. The evolutionary evaluation uses a detailed software
simulation of a physical robot. We describe: 1) a novel theoretical method to
encourage populations to evolve "around" local optima, which employs multiple
demes and fitness functions of progressively increasing difficulty, and 2) the
novel genetic representation of the neural controller.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 15:21:56 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Palmer",
"Michael E.",
""
],
[
"Miller",
"Daniel B.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0907.1840 | Gianluca Della Vedova | Paola Bonizzoni, Gianluca Della Vedova, Riccardo Dondi | A PTAS for the Minimum Consensus Clustering Problem with a Fixed Number
of Clusters | null | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Consensus Clustering problem has been introduced as an effective way to
analyze the results of different microarray experiments. The problem consists
of looking for a partition that best summarizes a set of input partitions (each
corresponding to a different microarray experiment) under a simple and
intuitive cost function. The problem admits polynomial time algorithms on two
input partitions, but is APX-hard on three input partitions. We investigate the
restriction of Consensus Clustering when the output partition is required to
contain at most k sets, giving a polynomial time approximation scheme (PTAS)
while proving the NP-hardness of this restriction.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 15:16:43 GMT"
}
]
| 2009-07-13T00:00:00 | [
[
"Bonizzoni",
"Paola",
""
],
[
"Della Vedova",
"Gianluca",
""
],
[
"Dondi",
"Riccardo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.1888 | Syed Qaseem | Syed T. Qaseem, Tareq Y. Al-Naffouri | Compressive Sensing for Feedback Reduction in MIMO Broadcast Channels | Submitted to IEEE Transactions on Wireless Communications, April 2009 | null | 10.1109/ICTEL.2010.5478770 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We propose a generalized feedback model and compressive sensing based
opportunistic feedback schemes for feedback resource reduction in MIMO
Broadcast Channels under the assumption that both uplink and downlink channels
undergo block Rayleigh fading. Feedback resources are shared and are
opportunistically accessed by users who are strong, i.e. users whose channel
quality information is above a certain fixed threshold. Strong users send same
feedback information on all shared channels. They are identified by the base
station via compressive sensing. Both analog and digital feedbacks are
considered. The proposed analog & digital opportunistic feedback schemes are
shown to achieve the same sum-rate throughput as that achieved by dedicated
feedback schemes, but with feedback channels growing only logarithmically with
number of users. Moreover, there is also a reduction in the feedback load. In
the analog feedback case, we show that the propose scheme reduces the feedback
noise which eventually results in better throughput, whereas in the digital
feedback case the proposed scheme in a noisy scenario achieves almost the
throughput obtained in a noiseless dedicated feedback scenario. We also show
that for a fixed given budget of feedback bits, there exist a trade-off between
the number of shared channels and thresholds accuracy of the feedback SINR.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 19:29:21 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Qaseem",
"Syed T.",
""
],
[
"Al-Naffouri",
"Tareq Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1916 | Johanne Cohen | Olivier Bournez and Johanne Cohen | Learning Equilibria in Games by Stochastic Distributed Algorithms | null | null | null | null | cs.GT cs.LG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider a class of fully stochastic and fully distributed algorithms,
that we prove to learn equilibria in games.
Indeed, we consider a family of stochastic distributed dynamics that we prove
to converge weakly (in the sense of weak convergence for probabilistic
processes) towards their mean-field limit, i.e an ordinary differential
equation (ODE) in the general case. We focus then on a class of stochastic
dynamics where this ODE turns out to be related to multipopulation replicator
dynamics.
Using facts known about convergence of this ODE, we discuss the convergence
of the initial stochastic dynamics: For general games, there might be
non-convergence, but when convergence of the ODE holds, considered stochastic
algorithms converge towards Nash equilibria. For games admitting Lyapunov
functions, that we call Lyapunov games, the stochastic dynamics converge. We
prove that any ordinal potential game, and hence any potential game is a
Lyapunov game, with a multiaffine Lyapunov function. For Lyapunov games with a
multiaffine Lyapunov function, we prove that this Lyapunov function is a
super-martingale over the stochastic dynamics. This leads a way to provide
bounds on their time of convergence by martingale arguments. This applies in
particular for many classes of games that have been considered in literature,
including several load balancing game scenarios and congestion games.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 21:26:54 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Bournez",
"Olivier",
""
],
[
"Cohen",
"Johanne",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.1925 | Carlos Gershenson | Carlos Gershenson and David A. Rosenblueth | Modeling self-organizing traffic lights with elementary cellular
automata | 33 pages, 11 Figures, 3 Tables | Complex Systems: 19(4):305-322, 2011 | null | C3 Report No. 2009.06 | nlin.CG cond-mat.stat-mech cs.AI nlin.AO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | There have been several highway traffic models proposed based on cellular
automata. The simplest one is elementary cellular automaton rule 184. We extend
this model to city traffic with cellular automata coupled at intersections
using only rules 184, 252, and 136. The simplicity of the model offers a clear
understanding of the main properties of city traffic and its phase transitions.
We use the proposed model to compare two methods for coordinating traffic
lights: a green-wave method that tries to optimize phases according to expected
flows and a self-organizing method that adapts to the current traffic
conditions. The self-organizing method delivers considerable improvements over
the green-wave method. For low densities, the self-organizing method promotes
the formation and coordination of platoons that flow freely in four directions,
i.e. with a maximum velocity and no stops. For medium densities, the method
allows a constant usage of the intersections, exploiting their maximum flux
capacity. For high densities, the method prevents gridlocks and promotes the
formation and coordination of "free-spaces" that flow in the opposite direction
of traffic.
| [
{
"version": "v1",
"created": "Fri, 10 Jul 2009 22:41:08 GMT"
}
]
| 2011-09-06T00:00:00 | [
[
"Gershenson",
"Carlos",
""
],
[
"Rosenblueth",
"David A.",
""
]
]
| [
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
]
|
0907.1948 | Shaddin Dughmi | Shaddin Dughmi, Hu Fu, Robert Kleinberg | Amplified Hardness of Approximation for VCG-Based Mechanisms | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | If a two-player social welfare maximization problem does not admit a PTAS, we
prove that any maximal-in-range truthful mechanism that runs in polynomial time
cannot achieve an approximation factor better than 1/2. Moreover, for the
k-player version of the same problem, the hardness of approximation improves to
1/k under the same two-player hardness assumption. (We note that 1/k is
achievable by a trivial deterministic maximal-in-range mechanism.) This
hardness result encompasses not only deterministic maximal-in-range mechanisms,
but also all universally-truthful randomized maximal in range algorithms, as
well as a class of strictly more powerful truthful-in-expectation randomized
mechanisms recently introduced by Dobzinski and Dughmi. Our result applies to
any class of valuation functions that satisfies some minimal closure
properties. These properties are satisfied by the valuation functions in all
well-studied APX-hard social welfare maximization problems, such as coverage,
submodular, and subadditive valuations.
We also prove a stronger result for universally-truthful maximal-in-range
mechanisms. Namely, even for the class of budgeted additive valuations, which
admits an FPTAS, no such mechanism can achieve an approximation factor better
than 1/k in polynomial time.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 16:57:24 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Dec 2009 06:37:34 GMT"
}
]
| 2009-12-18T00:00:00 | [
[
"Dughmi",
"Shaddin",
""
],
[
"Fu",
"Hu",
""
],
[
"Kleinberg",
"Robert",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0907.1955 | Matthew C. Clarke | Matthew C. Clarke | On the Chances of Completing the Game of "Perpetual Motion" | 3 pages, 3 figures | null | null | null | cs.GT | http://creativecommons.org/licenses/by-nc-sa/3.0/ | This brief paper describes the single-player card game called "Perpetual
Motion" and reports on a computational analysis of the game's outcome. The
analysis follows a Monte Carlo methodology based on a sample of 10,000 randomly
generated games. The key result is that 54.55% +/- 0.89% of games can be
completed (by a patient player!) but that the remaining 45.45% result in
non-terminating cycles. The lengths of these non-terminating cycles leave some
outstanding questions.
| [
{
"version": "v1",
"created": "Sat, 11 Jul 2009 10:19:11 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Clarke",
"Matthew C.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0907.1956 | Haim Permuter Henry | Lei Zhao and Haim Permuter | Zero-error feedback capacity via dynamic programming | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we study the zero-error capacity for finite state channels
with feedback when channel state information is known to both the transmitter
and the receiver. We prove that the zero-error capacity in this case can be
obtained through the solution of a dynamic programming problem. Each iteration
of the dynamic programming provides lower and upper bounds on the zero-error
capacity, and in the limit, the lower bound coincides with the zero-error
feedback capacity. Furthermore, a sufficient condition for solving the dynamic
programming problem is provided through a fixed-point equation. Analytical
solutions for several examples are provided.
| [
{
"version": "v1",
"created": "Sat, 11 Jul 2009 10:20:12 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Zhao",
"Lei",
""
],
[
"Permuter",
"Haim",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1975 | Sergei Fedorenko | Sergei V. Fedorenko | On semifast Fourier transform algorithms | 8 pages. Proceedings of the XII international symposium on problems
of redundancy in information and control systems at St.Petersburg, Russia,
May 2009, pp.65-70 | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the relations between well-known Fourier transform algorithms.
| [
{
"version": "v1",
"created": "Sat, 11 Jul 2009 17:13:50 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Nov 2010 19:48:58 GMT"
}
]
| 2010-11-30T00:00:00 | [
[
"Fedorenko",
"Sergei V.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.1978 | Matteo Magnani | Matteo Magnani, Danilo Montesi | BPDMN: A Conservative Extension of BPMN with Enhanced Data
Representation Capabilities | 17 pages | null | null | null | cs.SE cs.DB | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The design of business processes involves the usage of modeling languages,
tools and methodologies. In this paper we highlight and address a relevant
limitation of the Business Process Modeling Notation (BPMN): its weak data
representation capabilities. In particular, we extend it with data-specific
constructs derived from existing data modeling notations and adapted to blend
gracefully into BPMN diagrams. The extension has been developed taking existing
modeling languages and requirement analyses into account: we characterize our
notation using the Workfl ow Data Patterns and provide mappings to the main
XML-based business process languages.
| [
{
"version": "v1",
"created": "Sat, 11 Jul 2009 17:34:55 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Magnani",
"Matteo",
""
],
[
"Montesi",
"Danilo",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
]
|
0907.1990 | Oktie Hassanzadeh | Oktie Hassanzadeh | Automated Protein Structure Classification: A Survey | 14 pages, Technical Report CSRG-589, University of Toronto | null | null | CSRG-589 | cs.CE q-bio.BM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Classification of proteins based on their structure provides a valuable
resource for studying protein structure, function and evolutionary
relationships. With the rapidly increasing number of known protein structures,
manual and semi-automatic classification is becoming ever more difficult and
prohibitively slow. Therefore, there is a growing need for automated, accurate
and efficient classification methods to generate classification databases or
increase the speed and accuracy of semi-automatic techniques. Recognizing this
need, several automated classification methods have been developed. In this
survey, we overview recent developments in this area. We classify different
methods based on their characteristics and compare their methodology, accuracy
and efficiency. We then present a few open problems and explain future
directions.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 18:40:38 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Hassanzadeh",
"Oktie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.BM",
"description": "DNA, RNA, proteins, lipids, etc.; molecular structures and folding kinetics; molecular interactions; single-molecule manipulation.",
"span": "(Biomolecules)"
}
]
|
0907.1992 | Zhi Quan | Zhi Quan, Stephen J. Shellhammer, Wenyi Zhang, and Ali H. Sayed | Spectrum sensing by cognitive radios at very low SNR | IEEE Global Communications Conference 2009 | null | 10.1109/GLOCOM.2009.5426262 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Spectrum sensing is one of the enabling functionalities for cognitive radio
(CR) systems to operate in the spectrum white space. To protect the primary
incumbent users from interference, the CR is required to detect incumbent
signals at very low signal-to-noise ratio (SNR). In this paper, we present a
spectrum sensing technique based on correlating spectra for detection of
television (TV) broadcasting signals. The basic strategy is to correlate the
periodogram of the received signal with the a priori known spectral features of
the primary signal. We show that according to the Neyman-Pearson criterion,
this spectral correlation-based sensing technique is asymptotically optimal at
very low SNR and with a large sensing time. From the system design perspective,
we analyze the effect of the spectral features on the spectrum sensing
performance. Through the optimization analysis, we obtain useful insights on
how to choose effective spectral features to achieve reliable sensing.
Simulation results show that the proposed sensing technique can reliably detect
analog and digital TV signals at SNR as low as -20 dB.
| [
{
"version": "v1",
"created": "Sat, 11 Jul 2009 20:38:37 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Jul 2009 05:15:30 GMT"
}
]
| 2016-11-15T00:00:00 | [
[
"Quan",
"Zhi",
""
],
[
"Shellhammer",
"Stephen J.",
""
],
[
"Zhang",
"Wenyi",
""
],
[
"Sayed",
"Ali H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2019 | Tshilidzi Marwala | Tshilidzi Marwala | Foundations for a Developmental State: A case for technical education | 5 pages | null | null | null | cs.CY | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper studies the viability of making a country a developmental state.
In particular it studies the characteristics of a developmental state and how
they are linked to technology. It then identifies technical education, as a
vital force for the creation of a developmental state. In particular it
identifies analytical, numeracy, computational and communication skills as
vital forces for a society to create a developmental society.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 09:35:02 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Marwala",
"Tshilidzi",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
]
|
0907.2039 | David D\'eharbe | David Deharbe, Bruno E.G. Gomes and Anamaria M. Moreira | Refining interfaces: the case of the B method | 18 pages, submitted to ICFEM 2009 | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Model-driven design of software for safety-critical applications often relies
on mathematically grounded techniques such as the B method. Such techniques
consist in the successive applications of refinements to derive a concrete
implementation from an abstract specification. Refinement theory defines
verification conditions to guarantee that such operations preserve the intended
behaviour of the abstract specifications. One of these conditions requires
however that concrete operations have exactly the same signatures as their
abstract counterpart, which is not always a practical requirement. This paper
shows how changes of signatures can be achieved while still staying within the
bounds of refinement theory. This makes it possible to take advantage of the
mathematical guarantees and tool support provided for the current
refinement-based techniques, such as the B method.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 12:31:58 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Deharbe",
"David",
""
],
[
"Gomes",
"Bruno E. G.",
""
],
[
"Moreira",
"Anamaria M.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0907.2049 | Ariel Procaccia | Noga Alon, Michal Feldman, Ariel D. Procaccia, Moshe Tennenholtz | Strategyproof Approximation Mechanisms for Location on Networks | null | null | null | null | cs.GT cs.MA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the problem of locating a facility on a network, represented by a
graph. A set of strategic agents have different ideal locations for the
facility; the cost of an agent is the distance between its ideal location and
the facility. A mechanism maps the locations reported by the agents to the
location of the facility. Specifically, we are interested in social choice
mechanisms that do not utilize payments. We wish to design mechanisms that are
strategyproof, in the sense that agents can never benefit by lying, or, even
better, group strategyproof, in the sense that a coalition of agents cannot all
benefit by lying. At the same time, our mechanisms must provide a small
approximation ratio with respect to one of two optimization targets: the social
cost or the maximum cost.
We give an almost complete characterization of the feasible truthful
approximation ratio under both target functions, deterministic and randomized
mechanisms, and with respect to different network topologies. Our main results
are: We show that a simple randomized mechanism is group strategyproof and
gives a (2-2/n)-approximation for the social cost, where n is the number of
agents, when the network is a circle (known as a ring in the case of computer
networks); we design a novel "hybrid" strategyproof randomized mechanism that
provides a tight approximation ratio of 3/2 for the maximum cost when the
network is a circle; and we show that no randomized SP mechanism can provide an
approximation ratio better than 2-o(1) to the maximum cost even when the
network is a tree, thereby matching a trivial upper bound of two.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 16:13:52 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Alon",
"Noga",
""
],
[
"Feldman",
"Michal",
""
],
[
"Procaccia",
"Ariel D.",
""
],
[
"Tennenholtz",
"Moshe",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
]
|
0907.2050 | {\L}ukasz Je\.z | {\L}ukasz Je\.z | Randomised Buffer Management with Bounded Delay against Adaptive
Adversary | Obsolete; improved upon by arXiv:1102.1273 [cs.DS]. This comment is
the only difference from previous version | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We give a new analysis of the RMix algorithm by Chin et al. for the Buffer
Management with Bounded Delay problem (or online scheduling of unit jobs to
maximise weighted throughput). Unlike the original proof of
e/(e-1)-competitiveness, the new one holds even in adaptive-online adversary
model. In fact, the proof works also for a slightly more general problem
studied by Bie{\'n}kowski et al.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 16:11:45 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Feb 2011 09:29:06 GMT"
}
]
| 2011-02-09T00:00:00 | [
[
"Jeż",
"Łukasz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.2059 | Sylvain Lebresne | Sylvain Lebresne | A Type System For Call-By-Name Exceptions | 25 pages | Logical Methods in Computer Science, Volume 5, Issue 4 (November
2, 2009) lmcs:817 | 10.2168/LMCS-5(4:1)2009 | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We present an extension of System F with call-by-name exceptions. The type
system is enriched with two syntactic constructs: a union type for programs
whose execution may raise an exception at top level, and a corruption type for
programs that may raise an exception in any evaluation context (not necessarily
at top level). We present the syntax and reduction rules of the system, as well
as its typing and subtyping rules. We then study its properties, such as
confluence. Finally, we construct a realizability model using orthogonality
techniques, from which we deduce that well-typed programs are weakly
normalizing and that the ones who have the type of natural numbers really
compute a natural number, without raising exceptions.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 18:30:31 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Nov 2009 15:11:52 GMT"
}
]
| 2015-07-01T00:00:00 | [
[
"Lebresne",
"Sylvain",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0907.2071 | John Howat | Prosenjit Bose, Karim Dou\"ieb, Vida Dujmovi\'c and John Howat | Layered Working-Set Trees | 10 pages, 3 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The working-set bound [Sleator and Tarjan, J. ACM, 1985] roughly states that
searching for an element is fast if the element was accessed recently. Binary
search trees, such as splay trees, can achieve this property in the amortized
sense, while data structures that are not binary search trees are known to have
this property in the worst case. We close this gap and present a binary search
tree called a layered working-set tree that guarantees the working-set property
in the worst case. The unified bound [Badoiu et al., TCS, 2007] roughly states
that searching for an element is fast if it is near (in terms of rank distance)
to a recently accessed element. We show how layered working-set trees can be
used to achieve the unified bound to within a small additive term in the
amortized sense while maintaining in the worst case an access time that is both
logarithmic and within a small multiplicative factor of the working-set bound.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 18:11:05 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Bose",
"Prosenjit",
""
],
[
"Douïeb",
"Karim",
""
],
[
"Dujmović",
"Vida",
""
],
[
"Howat",
"John",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.2072 | Lucas Cordeiro Carvalho | Lucas Cordeiro, Bernd Fischer, Joao Marques-Silva | SMT-Based Bounded Model Checking for Embedded ANSI-C Software | 12 pages | null | null | null | cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Propositional bounded model checking has been applied successfully to verify
embedded software but is limited by the increasing propositional formula size
and the loss of structure during the translation. These limitations can be
reduced by encoding word-level information in theories richer than
propositional logic and using SMT solvers for the generated verification
conditions. Here, we investigate the application of different SMT solvers to
the verification of embedded software written in ANSI-C. We have extended the
encodings from previous SMT-based bounded model checkers to provide more
accurate support for finite variables, bit-vector operations, arrays,
structures, unions and pointers. We have integrated the CVC3, Boolector, and Z3
solvers with the CBMC front-end and evaluated them using both standard software
model checking benchmarks and typical embedded applications from
telecommunications, control systems and medical devices. The experiments show
that our approach can analyze larger problems and substantially reduce the
verification time.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 21:49:21 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Jul 2009 20:20:59 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Cordeiro",
"Lucas",
""
],
[
"Fischer",
"Bernd",
""
],
[
"Marques-Silva",
"Joao",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0907.2075 | Ula\c{s} Ba\u{g}ci | Ulas Bagci and Li Bai | Multiresolution Elastic Medical Image Registration in Standard Intensity
Scale | IEEE Sibgrapi 2007 submission | IEEE 20th Brazilian Symposium on Computer Graphics and Image
Processing (SIBGRAPI-07), Belo Horizonte-Minas Gerais, Brasil, October 7-10,
2007 | null | null | cs.CV | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Medical image registration is a difficult problem. Not only a registration
algorithm needs to capture both large and small scale image deformations, it
also has to deal with global and local image intensity variations. In this
paper we describe a new multiresolution elastic image registration method that
challenges these difficulties in image registration. To capture large and small
scale image deformations, we use both global and local affine transformation
algorithms. To address global and local image intensity variations, we apply an
image intensity standardization algorithm to correct image intensity
variations. This transforms image intensities into a standard intensity scale,
which allows highly accurate registration of medical images.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 22:39:34 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Bagci",
"Ulas",
""
],
[
"Bai",
"Li",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
]
|
0907.2076 | Francesco Biscani Ph.D. | Francesco Biscani | The Piranha algebraic manipulator | 24 pages, 2 figures | null | null | null | cs.SC | http://creativecommons.org/licenses/by-nc-sa/3.0/ | In this paper we present a specialised algebraic manipulation package devoted
to Celestial Mechanics. The system, called Piranha, is built on top of a
generic and extensible framework, which allows to treat efficiently and in a
unified way the algebraic structures most commonly encountered in Celestial
Mechanics (such as multivariate polynomials and Poisson series). In this
contribution we explain the architecture of the software, with special focus on
the implementation of series arithmetics, show its current capabilities, and
present benchmarks indicating that Piranha is competitive, performance-wise,
with other specialised manipulators.
| [
{
"version": "v1",
"created": "Sun, 12 Jul 2009 23:41:03 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Biscani",
"Francesco",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0907.2079 | Yong Zhang | Zhaosong Lu and Yong Zhang | An Augmented Lagrangian Approach for Sparse Principal Component Analysis | 42 pages | null | null | null | math.OC cs.LG math.ST stat.AP stat.CO stat.ME stat.ML stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Principal component analysis (PCA) is a widely used technique for data
analysis and dimension reduction with numerous applications in science and
engineering. However, the standard PCA suffers from the fact that the principal
components (PCs) are usually linear combinations of all the original variables,
and it is thus often difficult to interpret the PCs. To alleviate this
drawback, various sparse PCA approaches were proposed in literature [15, 6, 17,
28, 8, 25, 18, 7, 16]. Despite success in achieving sparsity, some important
properties enjoyed by the standard PCA are lost in these methods such as
uncorrelation of PCs and orthogonality of loading vectors. Also, the total
explained variance that they attempt to maximize can be too optimistic. In this
paper we propose a new formulation for sparse PCA, aiming at finding sparse and
nearly uncorrelated PCs with orthogonal loading vectors while explaining as
much of the total variance as possible. We also develop a novel augmented
Lagrangian method for solving a class of nonsmooth constrained optimization
problems, which is well suited for our formulation of sparse PCA. We show that
it converges to a feasible point, and moreover under some regularity
assumptions, it converges to a stationary point. Additionally, we propose two
nonmonotone gradient methods for solving the augmented Lagrangian subproblems,
and establish their global and local convergence. Finally, we compare our
sparse PCA approach with several existing methods on synthetic, random, and
real data, respectively. The computational results demonstrate that the sparse
PCs produced by our approach substantially outperform those by other methods in
terms of total explained variance, correlation of PCs, and orthogonality of
loading vectors.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 00:45:51 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Lu",
"Zhaosong",
""
],
[
"Zhang",
"Yong",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0907.2083 | Vivek Goyal | Adam C. Zelinski, Vivek K Goyal, and Elfar Adalsteinsson | Simultaneously Sparse Solutions to Linear Inverse Problems with Multiple
System Matrices and a Single Observation Vector | 36 pages; manuscript unchanged from July 21, 2008, except for updated
references; content appears in September 2008 PhD thesis | SIAM J. Scientific Computing, vol. 31, no. 5, pp. 4533-4579,
January 2010 | 10.1137/080730822 | null | cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A linear inverse problem is proposed that requires the determination of
multiple unknown signal vectors. Each unknown vector passes through a different
system matrix and the results are added to yield a single observation vector.
Given the matrices and lone observation, the objective is to find a
simultaneously sparse set of unknown vectors that solves the system. We will
refer to this as the multiple-system single-output (MSSO) simultaneous sparsity
problem. This manuscript contrasts the MSSO problem with other simultaneous
sparsity problems and conducts a thorough initial exploration of algorithms
with which to solve it. Seven algorithms are formulated that approximately
solve this NP-Hard problem. Three greedy techniques are developed (matching
pursuit, orthogonal matching pursuit, and least squares matching pursuit) along
with four methods based on a convex relaxation (iteratively reweighted least
squares, two forms of iterative shrinkage, and formulation as a second-order
cone program). The algorithms are evaluated across three experiments: the first
and second involve sparsity profile recovery in noiseless and noisy scenarios,
respectively, while the third deals with magnetic resonance imaging
radio-frequency excitation pulse design.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 01:38:06 GMT"
}
]
| 2010-09-03T00:00:00 | [
[
"Zelinski",
"Adam C.",
""
],
[
"Goyal",
"Vivek K",
""
],
[
"Adalsteinsson",
"Elfar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0907.2089 | Sebastian Maneth | A. Arroyuelo, F. Claude, S. Maneth, V. M\"akinen, G. Navarro, K.
Nguyen, J. Siren, N. V\"alim\"aki | Fast In-Memory XPath Search over Compressed Text and Tree Indexes | null | null | null | null | cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A large fraction of an XML document typically consists of text data. The
XPath query language allows text search via the equal, contains, and
starts-with predicates. Such predicates can efficiently be implemented using a
compressed self-index of the document's text nodes. Most queries, however,
contain some parts of querying the text of the document, plus some parts of
querying the tree structure. It is therefore a challenge to choose an
appropriate evaluation order for a given query, which optimally leverages the
execution speeds of the text and tree indexes. Here the SXSI system is
introduced; it stores the tree structure of an XML document using a bit array
of opening and closing brackets, and stores the text nodes of the document
using a global compressed self-index. On top of these indexes sits an XPath
query engine that is based on tree automata. The engine uses fast counting
queries of the text index in order to dynamically determine whether to evaluate
top-down or bottom-up with respect to the tree structure. The resulting system
has several advantages over existing systems: (1) on pure tree queries (without
text search) such as the XPathMark queries, the SXSI system performs on par or
better than the fastest known systems MonetDB and Qizx, (2) on queries that use
text search, SXSI outperforms the existing systems by 1--3 orders of magnitude
(depending on the size of the result set), and (3) with respect to memory
consumption, SXSI outperforms all other systems for counting-only queries.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 03:19:23 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Oct 2011 11:09:37 GMT"
}
]
| 2011-10-06T00:00:00 | [
[
"Arroyuelo",
"A.",
""
],
[
"Claude",
"F.",
""
],
[
"Maneth",
"S.",
""
],
[
"Mäkinen",
"V.",
""
],
[
"Navarro",
"G.",
""
],
[
"Nguyen",
"K.",
""
],
[
"Siren",
"J.",
""
],
[
"Välimäki",
"N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0907.2090 | Brijesh Rai Kumar | Brijesh Kumar Rai, Bikash Kumar Dey and Sagar Shenvi | Some bounds on the capacity of communicating the sum of sources | Revised version | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider directed acyclic networks with multiple sources and multiple
terminals where each source generates one i.i.d. random process over an abelian
group and all the terminals want to recover the sum of these random processes.
The different source processes are assumed to be independent. The solvability
of such networks has been considered in some previous works. In this paper we
investigate on the capacity of such networks, referred as {\it sum-networks},
and present some bounds in terms of min-cut, and the numbers of sources and
terminals.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 03:33:44 GMT"
},
{
"version": "v2",
"created": "Tue, 25 Aug 2009 10:51:22 GMT"
}
]
| 2009-08-25T00:00:00 | [
[
"Rai",
"Brijesh Kumar",
""
],
[
"Dey",
"Bikash Kumar",
""
],
[
"Shenvi",
"Sagar",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2093 | Man-On Pun | Chandrashekhar Thejaswi P. S., Junshan Zhang, Man-On Pun, H. Vincent
Poor and Dong Zheng | Distributed Opportunistic Scheduling With Two-Level Probing | Submitted to IEEE Trans. Networking | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Distributed opportunistic scheduling (DOS) is studied for wireless ad-hoc
networks in which many links contend for the channel using random access before
data transmissions. Simply put, DOS involves a process of joint channel probing
and distributed scheduling for ad-hoc (peer-to-peer) communications. Since, in
practice, link conditions are estimated with noisy observations, the
transmission rate has to be backed off from the estimated rate to avoid
transmission outages. Then, a natural question to ask is whether it is
worthwhile for the link with successful contention to perform further channel
probing to mitigate estimation errors, at the cost of additional probing. Thus
motivated, this work investigates DOS with two-level channel probing by
optimizing the tradeoff between the throughput gain from more accurate rate
estimation and the resulting additional delay. Capitalizing on optimal stopping
theory with incomplete information, we show that the optimal scheduling policy
is threshold-based and is characterized by either one or two thresholds,
depending on network settings. Necessary and sufficient conditions for both
cases are rigorously established. In particular, our analysis reveals that
performing second-level channel probing is optimal when the first-level
estimated channel condition falls in between the two thresholds. Numerical
results are provided to illustrate the effectiveness of the proposed DOS with
two-level channel probing. We also extend our study to the case with limited
feedback, where the feedback from the receiver to its transmitter takes the
form of (0,1,e).
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 18:01:41 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"S.",
"Chandrashekhar Thejaswi P.",
""
],
[
"Zhang",
"Junshan",
""
],
[
"Pun",
"Man-On",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Zheng",
"Dong",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2121 | Sergio Rodriguez | Sergio R. Rodriguez | Topology Discovery Using Cisco Discovery Protocol | null | null | null | TR-200903-013 | cs.NI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper we address the problem of discovering network topology in
proprietary networks. Namely, we investigate topology discovery in Cisco-based
networks. Cisco devices run Cisco Discovery Protocol (CDP) which holds
information about these devices. We first compare properties of topologies that
can be obtained from networks deploying CDP versus Spanning Tree Protocol (STP)
and Management Information Base (MIB) Forwarding Database (FDB). Then we
describe a method of discovering topology of CDP-based networks. Our
experiments show that the physical topology of the network including links that
are in Forwarding Block state can be discovered.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 09:56:16 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Rodriguez",
"Sergio R.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0907.2130 | Stefano Crespi Reghizzi | Stefano Crespi Reghizzi and Dino Mandrioli | Algebraic properties of structured context-free languages: old
approaches and novel developments | Extended version of paper presented at WORDS2009, Salerno,Italy,
September 2009 | null | null | null | cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The historical research line on the algebraic properties of structured CF
languages initiated by McNaughton's Parenthesis Languages has recently
attracted much renewed interest with the Balanced Languages, the Visibly
Pushdown Automata languages (VPDA), the Synchronized Languages, and the
Height-deterministic ones. Such families preserve to a varying degree the basic
algebraic properties of Regular languages: boolean closure, closure under
reversal, under concatenation, and Kleene star. We prove that the VPDA family
is strictly contained within the Floyd Grammars (FG) family historically known
as operator precedence. Languages over the same precedence matrix are known to
be closed under boolean operations, and are recognized by a machine whose pop
or push operations on the stack are purely determined by terminal letters. We
characterize VPDA's as the subclass of FG having a peculiarly structured set of
precedence relations, and balanced grammars as a further restricted case. The
non-counting invariance property of FG has a direct implication for VPDA too.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 10:49:34 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Reghizzi",
"Stefano Crespi",
""
],
[
"Mandrioli",
"Dino",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0907.2139 | Mai-Anh Phan | Mai-Anh Phan, J\"org Huschke | Adaptive Point-to-Multipoint Transmission for Multimedia Broadcast
Multicast Services in LTE | 6 pages, 7 figures | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper investigates point-to-multipoint (PTM) transmission supporting
adaptive modulation and coding (AMC) as well as retransmissions based on
incremental redundancy. In contrast to the classical PTM transmission which was
introduced by the Multimedia Broadcast Multicast Service (MBMS), the
adaptiveness requires user individual feedback channels that allow the
receivers to report their radio conditions and send positive or negative
acknowledgments (ACK/NACK) for a Layer 1 transport block to the eNodeB. In this
work, an adaptive PTM scheme based on feedback from multiple users is presented
and evaluated. Furthermore, a simple NACK-oriented feedback mechanism is
introduced to relieve the feedback channel that is used in the uplink. Finally,
the performance of different single-cell MBMS transmission modes is evaluated
by dynamic radio network simulations. It is shown that adaptive PTM
transmission outperforms the conventional MBMS configurations in terms of radio
resource consumption and user satisfaction rate.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 11:21:23 GMT"
}
]
| 2009-09-30T00:00:00 | [
[
"Phan",
"Mai-Anh",
""
],
[
"Huschke",
"Jörg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0907.2157 | Jakub Radoszewski | Maxime Crochemore, Costas Iliopoulos, Marcin Kubica, Jakub
Radoszewski, Wojciech Rytter, Tomasz Walen | On the maximal number of highly periodic runs in a string | 8 pages, 2 figures | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A run is a maximal occurrence of a repetition $v$ with a period $p$ such that
$2p \le |v|$. The maximal number of runs in a string of length $n$ was studied
by several authors and it is known to be between $0.944 n$ and $1.029 n$. We
investigate highly periodic runs, in which the shortest period $p$ satisfies
$3p \le |v|$. We show the upper bound $0.5n$ on the maximal number of such runs
in a string of length $n$ and construct a sequence of words for which we obtain
the lower bound $0.406 n$.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 13:29:23 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Crochemore",
"Maxime",
""
],
[
"Iliopoulos",
"Costas",
""
],
[
"Kubica",
"Marcin",
""
],
[
"Radoszewski",
"Jakub",
""
],
[
"Rytter",
"Wojciech",
""
],
[
"Walen",
"Tomasz",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.2165 | Serge Gaspers | St\'ephane Bessy, Fedor V. Fomin, Serge Gaspers, Christophe Paul,
Anthony Perez, Saket Saurabh, and St\'ephan Thomass\'e | Kernels for Feedback Arc Set In Tournaments | null | null | null | null | cs.DS cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A tournament T=(V,A) is a directed graph in which there is exactly one arc
between every pair of distinct vertices. Given a digraph on n vertices and an
integer parameter k, the Feedback Arc Set problem asks whether the given
digraph has a set of k arcs whose removal results in an acyclic digraph. The
Feedback Arc Set problem restricted to tournaments is known as the k-Feedback
Arc Set in Tournaments (k-FAST) problem. In this paper we obtain a linear
vertex kernel for k-FAST. That is, we give a polynomial time algorithm which
given an input instance T to k-FAST obtains an equivalent instance T' on O(k)
vertices. In fact, given any fixed e>0, the kernelized instance has at most
(2+e)k vertices. Our result improves the previous known bound of O(k^2) on the
kernel size for k-FAST. Our kernelization algorithm solves the problem on a
subclass of tournaments in polynomial time and uses a known polynomial time
approximation scheme for k-FAST.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 13:48:22 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Oct 2009 20:00:59 GMT"
}
]
| 2009-10-29T00:00:00 | [
[
"Bessy",
"Stéphane",
""
],
[
"Fomin",
"Fedor V.",
""
],
[
"Gaspers",
"Serge",
""
],
[
"Paul",
"Christophe",
""
],
[
"Perez",
"Anthony",
""
],
[
"Saurabh",
"Saket",
""
],
[
"Thomassé",
"Stéphan",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.2173 | Oleg Mazonka | Oleg Mazonka | Bit Copying - The Ultimate Computational Simplicity | null | Complex Systems Journal 2011, Vol 19, N3 | null | null | cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A computational abstract machine based on two operations: referencing and bit
copying is presented. These operations are sufficient for carrying out any
computation. They can be used as the primitives for a Turing-complete
programming language. The interesting point is that the computation can be done
without logic operations such as AND or OR. The compiler and emulator of this
language with sample programs are available on the Internet.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 14:15:01 GMT"
},
{
"version": "v2",
"created": "Mon, 6 Jun 2011 00:35:43 GMT"
}
]
| 2011-06-07T00:00:00 | [
[
"Mazonka",
"Oleg",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
]
|
0907.2209 | Andrew Krizhanovsky A | A. A. Krizhanovsky, Feiyu Lin | Related terms search based on WordNet / Wiktionary and its application
in Ontology Matching | 7 pages, 2 tables, 3 figures; In: RCDL 2009. September 17-21,
Petrozavodsk, Russia. - pp. 363-369 | null | null | null | cs.IR | http://creativecommons.org/licenses/publicdomain/ | A set of ontology matching algorithms (for finding correspondences between
concepts) is based on a thesaurus that provides the source data for the
semantic distance calculations. In this wiki era, new resources may spring up
and improve this kind of semantic search. In the paper a solution of this task
based on Russian Wiktionary is compared to WordNet based algorithms. Metrics
are estimated using the test collection, containing 353 English word pairs with
a relatedness score assigned by human evaluators. The experiment shows that the
proposed method is capable in principle of calculating a semantic distance
between pair of words in any language presented in Russian Wiktionary. The
calculation of Wiktionary based metric had required the development of the
open-source Wiktionary parser software.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 16:58:22 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Oct 2009 16:15:13 GMT"
}
]
| 2009-10-12T00:00:00 | [
[
"Krizhanovsky",
"A. A.",
""
],
[
"Lin",
"Feiyu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0907.2210 | Kalyanapuram R. Parthasarathy | K. R. Parthasarathy | On the philosophy of Cram\'er-Rao-Bhattacharya Inequalities in Quantum
Statistics | null | null | null | null | math.PR cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To any parametric family of states of a finite level quantum system we
associate a space of Fisher maps and introduce the natural notions of
Cram\'er-Rao-Bhattacharya tensor and Fisher information form. This leads us to
an abstract Cram\'er-Rao-Bhattacharya lower bound for the covariance matrix of
any finite number of unbiased estimators of parameteric functions. A number of
illustrative examples is included. Modulo technical assumptions of various
kinds our methods can be applied to infinite level quantum systems as well as
parametric families of classical probability distributions on Borel spaces.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 16:46:15 GMT"
}
]
| 2009-07-14T00:00:00 | [
[
"Parthasarathy",
"K. R.",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0907.2222 | Dilip Krishnaswamy | Dilip Krishnaswamy, Shanyu Zhao | Network-aware Adaptation with Real-Time Channel Statistics for Wireless
LAN Multimedia Transmissions in the Digital Home | 6 pages, 12 figures | IEEE COMSWARE 2008, Jan 6-10 2008, Pages 714-719 | 10.1109/COMSWA.2008.4554505 | null | cs.NI cs.LG | http://creativecommons.org/licenses/by/3.0/ | This paper suggests the use of intelligent network-aware processing agents in
wireless local area network drivers to generate metrics for bandwidth
estimation based on real-time channel statistics to enable wireless multimedia
application adaptation. Various configurations in the wireless digital home are
studied and the experimental results with performance variations are presented.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 18:18:28 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Krishnaswamy",
"Dilip",
""
],
[
"Zhao",
"Shanyu",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
]
|
0907.2252 | Dilip Krishnaswamy | Dilip Krishnaswamy | AWiMA: An architecture for Adhoc Wireless Mobile internet Access | 5 pages, 3 figures, submitted to IEEE Globecom 2008 | null | 10.1109/GLOCOM.2008.ECP.1083 | null | cs.NI | http://creativecommons.org/licenses/by/3.0/ | This paper suggests a system architecture for wireless widearea- networking
access using adhoc networking between a mobile Client node without direct
connectivity to a wirelesswide- area-network and a mobile Service Provider node
with connectivity to a wireless-wide-area-network. It provides a means for
securely providing such adhoc wireless networking services using a Server for
tunneling and routing, registration and authentication. The architecture also
provides support for handoff of a Client node from one Service Provider to
another with persistence of a tunnel between the Client and the Server enabling
a soft-handoff. Different wireless protocols may be used for adhoc networking,
with filtered interconnection of authenticated Clients implemented at a Service
Provider node. The architecture is applicable across different wide-areanetwork
protocols, and provides simultaneous support for multiple wide-area-network
protocols.
| [
{
"version": "v1",
"created": "Mon, 13 Jul 2009 20:10:29 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Krishnaswamy",
"Dilip",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
]
|
0907.2268 | Martin Klein | Martin Klein, Michael L Nelson | Evaluating Methods to Rediscover Missing Web Pages from the Web
Infrastructure | 10 pages, 11 figures, 5 tables, 40 references, accepted for
publication at JCDL 2010 in Brisbane, Australia | null | null | null | cs.IR cs.DL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Missing web pages (pages that return the 404 "Page Not Found" error) are part
of the browsing experience. The manual use of search engines to rediscover
missing pages can be frustrating and unsuccessful. We compare four automated
methods for rediscovering web pages. We extract the page's title, generate the
page's lexical signature (LS), obtain the page's tags from the bookmarking
website delicious.com and generate a LS from the page's link neighborhood. We
use the output of all methods to query Internet search engines and analyze
their retrieval performance. Our results show that both LSs and titles perform
fairly well with over 60% URIs returned top ranked from Yahoo!. However, the
combination of methods improves the retrieval performance. Considering the
complexity of the LS generation, querying the title first and in case of
insufficient results querying the LSs second is the preferable setup. This
combination accounts for more than 75% top ranked URIs.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 15:47:57 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Apr 2010 03:27:17 GMT"
}
]
| 2010-04-19T00:00:00 | [
[
"Klein",
"Martin",
""
],
[
"Nelson",
"Michael L",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
]
|
0907.2300 | Yao Sun | Yao Sun and Dingkang Wang | An Efficient Algorithm for Factoring Polynomials over Algebraic
Extension Field | null | null | null | null | cs.SC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A new efficient algorithm is proposed for factoring polynomials over an
algebraic extension field. The extension field is defined by a polynomial ring
modulo a maximal ideal. If the maximal ideal is given by its Groebner basis, no
extra Groebner basis computation is needed for factoring a polynomial over this
extension field. Nothing more than linear algebraic technique is used to get a
polynomial over the ground field by a generic linear map. Then this polynomial
is factorized over the ground field. From these factors, the factorization of
the polynomial over the extension field is obtained. The new algorithm has been
implemented and computer experiments indicate that the new algorithm is very
efficient, particularly in complicated examples.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 07:25:07 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Oct 2010 10:15:16 GMT"
}
]
| 2010-10-04T00:00:00 | [
[
"Sun",
"Yao",
""
],
[
"Wang",
"Dingkang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
]
|
0907.2309 | Peter Rost | Peter Rost and Gerhard Fettweis | Protocols and Performance Limits for Half-Duplex Relay Networks | Submitted to IEEE Transactions on Communications | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, protocols for the half-duplex relay channel are introduced and
performance limits are analyzed. Relay nodes underly an orthogonality
constraint, which prohibits simultaneous receiving and transmitting on the same
time-frequency resource. Based upon this practical consideration, different
protocols are discussed and evaluated using a Gaussian system model. For the
considered scenarios compress-and-forward based protocols dominate for a wide
range of parameters decode-and-forward protocols. In this paper, a protocol
with one compress-and-forward and one decode-and-forward based relay is
introduced. Just as the cut-set bound, which operates in a mode where relays
transmit alternately, both relays support each other. Furthermore, it is shown
that in practical systems a random channel access provides only marginal
performance gains if any.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 09:01:54 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Feb 2010 08:40:07 GMT"
}
]
| 2010-02-02T00:00:00 | [
[
"Rost",
"Peter",
""
],
[
"Fettweis",
"Gerhard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2315 | Feng Zhang feng | Hu Yupu, Zhang Fengrong and Zhang Yiwei | Hard Fault Analysis of Trivium | 10 pages | null | null | null | cs.CR cs.IT math.IT | http://creativecommons.org/licenses/by/3.0/ | Fault analysis is a powerful attack to stream ciphers. Up to now, the major
idea of fault analysis is to simplify the cipher system by injecting some soft
faults. We call it soft fault analysis. As a hardware-oriented stream cipher,
Trivium is weak under soft fault analysis.
In this paper we consider another type of fault analysis of stream cipher,
which is to simplify the cipher system by injecting some hard faults. We call
it hard fault analysis. We present the following results about such attack to
Trivium. In Case 1 with the probability not smaller than 0.2396, the attacker
can obtain 69 bits of 80-bits-key. In Case 2 with the probability not smaller
than 0.2291, the attacker can obtain all of 80-bits-key. In Case 3 with the
probability not smaller than 0.2291, the attacker can partially solve the key.
In Case 4 with non-neglectable probability, the attacker can obtain a
simplified cipher, with smaller number of state bits and slower
non-linearization procedure. In Case 5 with non-neglectable probability, the
attacker can obtain another simplified cipher. Besides, these 5 cases can be
checked out by observing the key-stream.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 09:47:02 GMT"
}
]
| 2009-07-15T00:00:00 | [
[
"Yupu",
"Hu",
""
],
[
"Fengrong",
"Zhang",
""
],
[
"Yiwei",
"Zhang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2324 | Laurent Bienvenu | Laurent Bienvenu, Rupert Hoelzl, Thorsten Kraling, Wolfgang Merkle | Separations of non-monotonic randomness notions | A preliminary version of this paper was presented at the Sixth
International Conference on Computability and Complexity in Analysis, August
18-22, 2009, Ljubljana, Slovenia | null | null | null | cs.CC | http://creativecommons.org/licenses/by/3.0/ | In the theory of algorithmic randomness, several notions of random sequence
are defined via a game-theoretic approach, and the notions that received most
attention are perhaps Martin-Loef randomness and computable randomness. The
latter notion was introduced by Schnorr and is rather natural: an infinite
binary sequence is computably random if no total computable strategy succeeds
on it by betting on bits in order. However, computably random sequences can
have properties that one may consider to be incompatible with being random, in
particular, there are computably random sequences that are highly compressible.
The concept of Martin-Loef randomness is much better behaved in this and other
respects, on the other hand its definition in terms of martingales is
considerably less natural. Muchnik, elaborating on ideas of Kolmogorov and
Loveland, refined Schnorr's model by also allowing non-monotonic strategies,
i.e. strategies that do not bet on bits in order. The subsequent
``non-monotonic'' notion of randomness, now called Kolmogorov-Loveland
randomness, has been shown to be quite close to Martin-Loef randomness, but
whether these two classes coincide remains a fundamental open question. As
suggested by Miller and Nies, we study in this paper weak versions of
Kolmogorov-Loveland randomness, where the betting strategies are non-adaptive
(i.e., the positions of the bits to bet on should be decided before the game).
We obtain a full classification of the different notions we consider.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 10:41:08 GMT"
}
]
| 2009-07-15T00:00:00 | [
[
"Bienvenu",
"Laurent",
""
],
[
"Hoelzl",
"Rupert",
""
],
[
"Kraling",
"Thorsten",
""
],
[
"Merkle",
"Wolfgang",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.2376 | Elisha Peterson | Elisha Peterson | Cooperation in Subset Team Games: Altruism and Selfishness | null | null | null | null | cs.GT cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper extends the theory of subset team games, a generalization of
cooperative game theory requiring a payoff function that is defined for all
subsets of players. This subset utility is used to define both altruistic and
selfish contributions of a player to the team. We investigate properties of
these games, and analyze the implications of altruism and selfishness for
general situations, for prisoner's dilemma, and for a specific game with a
Cobb-Douglas utility.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 14:55:38 GMT"
}
]
| 2009-07-15T00:00:00 | [
[
"Peterson",
"Elisha",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.2391 | Pedro Coronel | Pedro Coronel and Helmut B\"olcskei | Optimal Diversity-Multiplexing Tradeoff in Selective-Fading MIMO
Channels | null | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We establish the optimal diversity-multiplexing (DM) tradeoff of coherent
time, frequency, and time-frequency selective-fading multiple-input
multiple-output (MIMO) channels and provide a code design criterion for DM
tradeoff optimality. Our results are based on the new concept of the "Jensen
channel" associated to a given selective-fading MIMO channel. While the
original problem seems analytically intractable due to the mutual information
between channel input and output being a sum of correlated random variables,
the Jensen channel is equivalent to the original channel in the sense of the DM
tradeoff and lends itself nicely to analytical treatment. We formulate a
systematic procedure for designing DM tradeoff optimal codes for general
selective-fading MIMO channels by demonstrating that the design problem can be
separated into two simpler and independent problems: the design of an inner
code, or precoder, adapted to the channel statistics (i.e., the selectivity
characteristics) and an outer code independent of the channel statistics. Our
results are supported by appealing geometric intuition, first pointed out for
the flat-fading case by Zheng and Tse, IEEE Trans. Inf. Theory, 2003.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 15:57:30 GMT"
}
]
| 2009-07-15T00:00:00 | [
[
"Coronel",
"Pedro",
""
],
[
"Bölcskei",
"Helmut",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2393 | Paul Slater | Paul B. Slater | Multiscale Network Reduction Methodologies: Bistochastic and Disparity
Filtering of Human Migration Flows between 3,000+ U. S. Counties | 35 pages, 12 figures, some rewriting. Dendrogram included as EPAPS
file | null | null | null | physics.soc-ph cs.SI physics.data-an stat.AP | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | To control for multiscale effects in networks, one can transform the matrix
of (in general) weighted, directed internodal flows to bistochastic
(doubly-stochastic) form, using the iterative proportional fitting
(Sinkhorn-Knopp) procedure, which alternatively scales row and column sums to
all equal 1. The dominant entries in the bistochasticized table can then be
employed for network reduction, using strong component hierarchical clustering.
We illustrate various facets of this well-established, widely-applied two-stage
algorithm with the 3, 107 x 3, 107 (asymmetric) 1995-2000 intercounty migration
flow table for the United States. We compare the results obtained with ones
using the disparity filter, for "extracting the "multiscale backbone of complex
weighted networks", recently put forth by Serrano, Boguna and Vespignani (SBV)
(Proc. Natl. Acad. Sci. 106 [2009], 6483), upon which we have briefly commented
(Proc. Natl. Acad. Sci. 106 [2009], E66). The performance of the bistochastic
filter appears to be superior-at least in this specific case-in two respects:
(1) it requires far fewer links to complete a stongly-connected network
backbone; and (2) it "belittles" small flows and nodes less-a principal
desideratum of SBV-in the sense that the correlations of the nonzero raw flows
are considerably weaker with the corresponding bistochastized links than with
the significance levels yielded by the disparity filter. Additional comparative
studies--as called for by SBV-of these two filtering procedures, in particular
as regards their topological properties, should be of considerable interest.
Relatedly, in its many geographic applications, the two-stage procedure
has--with rare exceptions-clustered contiguous areas, often reconstructing
traditional regions (islands, for example), even though no contiguity
constraints, at all, are imposed beforehand.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 16:00:00 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Aug 2009 18:22:34 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Jan 2010 20:04:58 GMT"
},
{
"version": "v4",
"created": "Tue, 23 Mar 2010 18:13:13 GMT"
},
{
"version": "v5",
"created": "Thu, 20 May 2010 17:52:39 GMT"
},
{
"version": "v6",
"created": "Fri, 24 Sep 2010 21:41:35 GMT"
}
]
| 2015-03-13T00:00:00 | [
[
"Slater",
"Paul B.",
""
]
]
| [
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.SI",
"description": "Covers the design, analysis, and modeling of social and information networks, including their applications for on-line information access, communication, and interaction, and their roles as datasets in the exploration of questions in these and other domains, including connections to the social and biological sciences. Analysis and modeling of such networks includes topics in ACM Subject classes F.2, G.2, G.3, H.2, and I.2; applications in computing include topics in H.3, H.4, and H.5; and applications at the interface of computing and other disciplines include topics in J.1--J.7. Papers on computer communication systems and network protocols (e.g. TCP/IP) are generally a closer fit to the Networking and Internet Architecture (cs.NI) category.",
"span": "(Social and Information Networks)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
]
|
0907.2412 | Edwin Hammerich | Edwin Hammerich | Design of Pulse Shapes and Digital Filters Based on Gaussian Functions | 14 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Two new pulse shapes for communications are presented. The first pulse shape
is ISI-free and identical with the interpolating function (or ISI-free kernel)
of a reconstruction formula in shift-invariant spaces with Gaussian generator.
Several closed form representations in time and frequency domain are given
including one for an approximation that is particularly simple. The second
pulse shape is the root of the former and obtained by spectral factorization.
As a consequence, shifted versions of it form an orthonormal system in the
Hilbert space of finite-energy signals. The latter pulse shape is described as
the response of an infinite-order digital FIR filter on a Gaussian function as
input signal. Several equivalent versions of the digital filter including their
finite-order approximations are presented. All filters enjoy the property that
explicit formulas for their coefficients and poles are available. The filters
are fully parametrizable with respect to bandwidth and sampling rate of the
digital data.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 17:12:31 GMT"
}
]
| 2009-07-15T00:00:00 | [
[
"Hammerich",
"Edwin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2423 | Afra Zomorodian | Gunnar Carlsson, Gurjeet Singh, and Afra Zomorodian | Computing Multidimensional Persistence | This paper has been withdrawn by the authors. Journal of
Computational Geometry, 1(1) 2010, pages 72-100.
http://jocg.org/index.php/jocg/article/view/19 | null | null | null | cs.CG cs.NA | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The theory of multidimensional persistence captures the topology of a
multifiltration -- a multiparameter family of increasing spaces.
Multifiltrations arise naturally in the topological analysis of scientific
data. In this paper, we give a polynomial time algorithm for computing
multidimensional persistence. We recast this computation as a problem within
computational algebraic geometry and utilize algorithms from this area to solve
it. While the resulting problem is Expspace-complete and the standard
algorithms take doubly-exponential time, we exploit the structure inherent
withing multifiltrations to yield practical algorithms. We implement all
algorithms in the paper and provide statistical experiments to demonstrate
their feasibility.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 18:29:49 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Oct 2009 22:31:15 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Nov 2010 18:17:03 GMT"
}
]
| 2010-11-22T00:00:00 | [
[
"Carlsson",
"Gunnar",
""
],
[
"Singh",
"Gurjeet",
""
],
[
"Zomorodian",
"Afra",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
]
|
0907.2435 | Shuchi Chawla | Shuchi Chawla and Jason Hartline and David Malec and Balasubramanian
Sivan | Sequential Posted Pricing and Multi-parameter Mechanism Design | null | null | null | null | cs.GT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the classical mathematical economics problem of {\em Bayesian
optimal mechanism design} where a principal aims to optimize expected revenue
when allocating resources to self-interested agents with preferences drawn from
a known distribution. In single-parameter settings (i.e., where each agent's
preference is given by a single private value for being served and zero for not
being served) this problem is solved [Myerson '81]. Unfortunately, these single
parameter optimal mechanisms are impractical and rarely employed [Ausubel and
Milgrom '06], and furthermore the underlying economic theory fails to
generalize to the important, relevant, and unsolved multi-dimensional setting
(i.e., where each agent's preference is given by multiple values for each of
the multiple services available) [Manelli and Vincent '07]. In contrast to the
theory of optimal mechanisms we develop a theory of sequential posted price
mechanisms, where agents in sequence are offered take-it-or-leave-it prices.
These mechanisms are approximately optimal in single-dimensional settings, and
avoid many of the properties that make optimal mechanisms impractical.
Furthermore, these mechanisms generalize naturally to give the first known
approximations to the elusive optimal multi-dimensional mechanism design
problem. In particular, we solve multi-dimensional multi-unit auction problems
and generalizations to matroid feasibility constraints. The constant
approximations we obtain range from 1.5 to 8. For all but one case, our posted
price sequences can be computed in polynomial time.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 19:51:10 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Jan 2010 20:18:43 GMT"
}
]
| 2010-01-15T00:00:00 | [
[
"Chawla",
"Shuchi",
""
],
[
"Hartline",
"Jason",
""
],
[
"Malec",
"David",
""
],
[
"Sivan",
"Balasubramanian",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
]
|
0907.2452 | Laurent Romary | Koichi Takeuchi (NII), Kyo Kageura (NII), Teruo Koyama (NII),
B\'eatrice Daille (LINA), Laurent Romary (INRIA Lorraine - LORIA) | Pattern Based Term Extraction Using ACABIT System | null | IEIC Technical Report 103, 280 (2003) 31-36 | null | null | cs.CL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a pattern-based term extraction approach for
Japanese, applying ACABIT system originally developed for French. The proposed
approach evaluates termhood using morphological patterns of basic terms and
term variants. After extracting term candidates, ACABIT system filters out
non-terms from the candidates based on log-likelihood. This approach is
suitable for Japanese term extraction because most of Japanese terms are
compound nouns or simple phrasal patterns.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 21:02:14 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Takeuchi",
"Koichi",
"",
"NII"
],
[
"Kageura",
"Kyo",
"",
"NII"
],
[
"Koyama",
"Teruo",
"",
"NII"
],
[
"Daille",
"Béatrice",
"",
"LINA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
]
]
| [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
]
|
0907.2455 | Won-Yong Shin | Won-Yong Shin, Sae-Young Chung, Yong H. Lee | Parallel Opportunistic Routing in Wireless Networks | 18 pages, 7 figures, Under Review for Possible Publication in IEEE
Transactions on Information Theory | null | 10.1109/TIT.2013.2272884 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study benefits of opportunistic routing in a large wireless ad hoc network
by examining how the power, delay, and total throughput scale as the number of
source- destination pairs increases up to the operating maximum. Our
opportunistic routing is novel in a sense that it is massively parallel, i.e.,
it is performed by many nodes simultaneously to maximize the opportunistic gain
while controlling the inter-user interference. The scaling behavior of
conventional multi-hop transmission that does not employ opportunistic routing
is also examined for comparison. Our results indicate that our opportunistic
routing can exhibit a net improvement in overall power--delay trade-off over
the conventional routing by providing up to a logarithmic boost in the scaling
law. Such a gain is possible since the receivers can tolerate more interference
due to the increased received signal power provided by the multi-user diversity
gain, which means that having more simultaneous transmissions is possible.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 21:27:14 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Jul 2011 14:48:17 GMT"
}
]
| 2016-11-18T00:00:00 | [
[
"Shin",
"Won-Yong",
""
],
[
"Chung",
"Sae-Young",
""
],
[
"Lee",
"Yong H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2465 | Subhash Kak | Subhash Kak | The Transactional Nature of Quantum Information | Presented at the 11th International Conference on Squeezed States and
Uncertainty Relations and 4th Feynman Festival, Olomouc, Czech Republic, June
22-26, 2009 | null | null | null | quant-ph cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information, in its communications sense, is a transactional property. If the
received signals communicate choices made by the sender of the signals, then
information has been transmitter by the sender to the receiver. Given this
reality, the potential information in an unknown pure quantum state should be
non-zero. We examine transactional quantum information, which unlike von
Neumann entropy, depends on the mutuality of the relationship between the
sender and the receiver, associating information with an unknown pure state.
The information that can be obtained from a pure state in repeated experiments
is potentially infinite.
| [
{
"version": "v1",
"created": "Tue, 14 Jul 2009 22:27:13 GMT"
}
]
| 2012-08-07T00:00:00 | [
[
"Kak",
"Subhash",
""
]
]
| [
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2471 | Oktie Hassanzadeh | Oktie Hassanzadeh | Benchmarking Declarative Approximate Selection Predicates | 75 pages, 7 figures, February 2007, Masters Thesis at University of
Toronto | null | null | null | cs.DB cs.IR | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Declarative data quality has been an active research topic. The fundamental
principle behind a declarative approach to data quality is the use of
declarative statements to realize data quality primitives on top of any
relational data source. A primary advantage of such an approach is the ease of
use and integration with existing applications. Several similarity predicates
have been proposed in the past for common quality primitives (approximate
selections, joins, etc.) and have been fully expressed using declarative SQL
statements. In this thesis, new similarity predicates are proposed along with
their declarative realization, based on notions of probabilistic information
retrieval. Then, full declarative specifications of previously proposed
similarity predicates in the literature are presented, grouped into classes
according to their primary characteristics. Finally, a thorough performance and
accuracy study comparing a large number of similarity predicates for data
cleaning operations is performed.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 00:40:06 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Hassanzadeh",
"Oktie",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
]
|
0907.2479 | Craig Weidert | Craig Weidert | Extremal problems in ordered graphs | Thesis for Master Degree, Simon Fraser University | null | null | null | cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this thesis we consider ordered graphs (that is, graphs with a fixed
linear ordering on their vertices). We summarize and further investigations on
the number of edges an ordered graph may have while avoiding a fixed forbidden
ordered graph as a subgraph. In particular, we take a step toward confirming a
conjecture of Pach and Tardos regarding the number of edges allowed when the
forbidden pattern is a tree by establishing an upper bound for a particular
ordered graph for which existing techniques have failed. We also generalize a
theorem of Geneson by establishing an upper bound on the number of edges
allowed if the forbidden graphs fit a generalized notion of a matching.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 01:37:11 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Weidert",
"Craig",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.2485 | Gerard Briscoe Mr | Alexandros Marinos and Gerard Briscoe | Community Cloud Computing | 11 Pages, 5 figures | null | 10.1007/978-3-642-10665-1_43 | null | cs.NI cs.DC cs.SE | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Cloud Computing is rising fast, with its data centres growing at an
unprecedented rate. However, this has come with concerns over privacy,
efficiency at the expense of resilience, and environmental sustainability,
because of the dependence on Cloud vendors such as Google, Amazon and
Microsoft. Our response is an alternative model for the Cloud
conceptualisation, providing a paradigm for Clouds in the community, utilising
networked personal computers for liberation from the centralised vendor model.
Community Cloud Computing (C3) offers an alternative architecture, created by
combing the Cloud with paradigms from Grid Computing, principles from Digital
Ecosystems, and sustainability from Green Computing, while remaining true to
the original vision of the Internet. It is more technically challenging than
Cloud Computing, having to deal with distributed computing issues, including
heterogeneous nodes, varying quality of service, and additional security
constraints. However, these are not insurmountable challenges, and with the
need to retain control over our digital lives and the potential environmental
consequences, it is a challenge we must pursue.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 04:26:32 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 02:33:59 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Oct 2009 07:15:07 GMT"
}
]
| 2015-05-13T00:00:00 | [
[
"Marinos",
"Alexandros",
""
],
[
"Briscoe",
"Gerard",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0907.2510 | Sang-Woon Jeon | Sang-Woon Jeon and Sae-Young Chung | Capacity of a Class of Linear Binary Field Multi-source Relay Networks | 19 pages, 7 figures, submitted to IEEE trans. on Information Theory | IEEE Transactions on Information Theory, vol. 59, no. 10, pp.
6405-6420, Oct. 2013 | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Characterizing the capacity region of multi-source wireless relay networks is
one of the fundamental issues in network information theory. The problem is,
however, quite challenging due to inter-user interference when there exist
multiple source--destination (S--D) pairs in the network. By focusing on a
special class of networks, we show that the capacity can be found. Namely, we
study a layered linear binary field network with time-varying channels, which
is a simplified model reflecting broadcast, interference, and fading natures of
wireless communications. We observe that fading can play an important role in
mitigating inter-user interference effectively for both single-hop and
multi-hop networks. We propose new encoding and relaying schemes with
randomized channel pairing, which exploit such channel variations, and derive
their achievable rates. By comparing them with the cut-set upper bound, the
capacity region of single-hop networks and the sum capacity of multi-hop
networks can be characterized for some classes of channel distributions and
network topologies. For these classes, we show that the capacity region or sum
capacity can be interpreted as the max-flow min-cut theorem.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 07:40:12 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Feb 2011 09:51:30 GMT"
}
]
| 2013-10-29T00:00:00 | [
[
"Jeon",
"Sang-Woon",
""
],
[
"Chung",
"Sae-Young",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2557 | Johannes Bluemlein | J. Bl\"umlein, D.J. Broadhurst, J.A.M. Vermaseren | The Multiple Zeta Value Data Mine | null | Comput.Phys.Commun.181:582-625,2010 | 10.1016/j.cpc.2009.11.007 | DESY 09-003, SFB/CPP-09-65 | math-ph cs.MS hep-ph hep-th math.AG math.MP math.NT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We provide a data mine of proven results for multiple zeta values (MZVs) of
the form $\zeta(s_1,s_2,...,s_k)=\sum_{n_1>n_2>...>n_k>0}^\infty \{1/(n_1^{s_1}
>... n_k^{s_k})\}$ with weight $w=\sum_{i=1}^k s_i$ and depth $k$ and for Euler
sums of the form $\sum_{n_1>n_2>...>n_k>0}^\infty t\{(\epsilon_1^{n_1}
>...\epsilon_1 ^{n_k})/ (n_1^{s_1} ... n_k^{s_k}) \}$ with signs
$\epsilon_i=\pm1$. Notably, we achieve explicit proven reductions of all MZVs
with weights $w\le22$, and all Euler sums with weights $w\le12$, to bases whose
dimensions, bigraded by weight and depth, have sizes in precise agreement with
the Broadhurst--Kreimer and Broadhurst conjectures. Moreover, we lend further
support to these conjectures by studying even greater weights ($w\le30$), using
modular arithmetic. To obtain these results we derive a new type of relation
for Euler sums, the Generalized Doubling Relations. We elucidate the "pushdown"
mechanism, whereby the ornate enumeration of primitive MZVs, by weight and
depth, is reconciled with the far simpler enumeration of primitive Euler sums.
There is some evidence that this pushdown mechanism finds its origin in
doubling relations. We hope that our data mine, obtained by exploiting the
unique power of the computer algebra language {\sc form}, will enable the study
of many more such consequences of the double-shuffle algebra of MZVs, and their
Euler cousins, which are already the subject of keen interest, to practitioners
of quantum field theory, and to mathematicians alike.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 11:14:37 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Nov 2009 18:08:24 GMT"
}
]
| 2010-01-21T00:00:00 | [
[
"Blümlein",
"J.",
""
],
[
"Broadhurst",
"D. J.",
""
],
[
"Vermaseren",
"J. A. M.",
""
]
]
| [
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
]
|
0907.2563 | Ioannis Koukoutsidis | Eva Jaho, Ioannis Koukoutsidis, Siyu Tang, Ioannis Stavrakakis, Piet
Van Mieghem | Gossip-based Search in Multipeer Communication Networks | preprint (18 pages, 6 figures) | null | null | null | cs.NI cs.PF | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study a gossip-based algorithm for searching data objects in a multipeer
communication network. All of the nodes in the network are able to communicate
with each other. There exists an initiator node that starts a round of searches
by randomly querying one or more of its neighbors for a desired object. The
queried nodes can also be activated and look for the object. We examine several
behavioural patterns of nodes with respect to their willingness to cooperate in
the search. We derive mathematical models for the search process based on the
balls and bins model, as well as known approximations for the rumour-spreading
problem. All models are validated with simulations. We also evaluate the
performance of the algorithm and examine the impact of search parameters.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 12:05:27 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Jaho",
"Eva",
""
],
[
"Koukoutsidis",
"Ioannis",
""
],
[
"Tang",
"Siyu",
""
],
[
"Stavrakakis",
"Ioannis",
""
],
[
"Van Mieghem",
"Piet",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
]
|
0907.2585 | Yifan Hu | Emden R. Gansner, Yifan Hu, Stephen G. Kobourov | GMap: Drawing Graphs as Maps | 19 pages | null | null | null | cs.CG | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Information visualization is essential in making sense out of large data
sets. Often, high-dimensional data are visualized as a collection of points in
2-dimensional space through dimensionality reduction techniques. However, these
traditional methods often do not capture well the underlying structural
information, clustering, and neighborhoods. In this paper, we describe GMap: a
practical tool for visualizing relational data with geographic-like maps. We
illustrate the effectiveness of this approach with examples from several
domains All the maps referenced in this paper can be found in
http://www.research.att.com/~yifanhu/GMap
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 13:41:32 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Gansner",
"Emden R.",
""
],
[
"Hu",
"Yifan",
""
],
[
"Kobourov",
"Stephen G.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
]
|
0907.2599 | Hung Ly | Hung D. Ly, Tie Liu, Yingbin Liang | Multiple-Input Multiple-Output Gaussian Broadcast Channels with Common
and Confidential Messages | Submitted to the IEEE Transactions on Information Theory, July 2009 | null | 10.1109/TIT.2010.2069190 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This paper considers the problem of the multiple-input multiple-output (MIMO)
Gaussian broadcast channel with two receivers (receivers 1 and 2) and two
messages: a common message intended for both receivers and a confidential
message intended only for receiver 1 but needing to be kept asymptotically
perfectly secure from receiver 2. A matrix characterization of the secrecy
capacity region is established via a channel enhancement argument. The enhanced
channel is constructed by first splitting receiver 1 into two virtual receivers
and then enhancing only the virtual receiver that decodes the confidential
message. The secrecy capacity region of the enhanced channel is characterized
using an extremal entropy inequality previously established for characterizing
the capacity region of a degraded compound MIMO Gaussian broadcast channel.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 14:35:13 GMT"
}
]
| 2016-11-17T00:00:00 | [
[
"Ly",
"Hung D.",
""
],
[
"Liu",
"Tie",
""
],
[
"Liang",
"Yingbin",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2601 | Nicolas Le Bihan | Salem Said, Christian Lageman, Nicolas Le Bihan and Jonathan H. Manton | Decompounding on compact Lie groups | 26 pages, 3 figures, 25 references | IEEE Transactions on Information Theory, Vol. 56, Issue 6, pp.
2766-2777, 2010 | 10.1109/TIT.2010.2046216 | null | cs.IT math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Noncommutative harmonic analysis is used to solve a nonparametric estimation
problem stated in terms of compound Poisson processes on compact Lie groups.
This problem of decompounding is a generalization of a similar classical
problem. The proposed solution is based on a char- acteristic function method.
The treated problem is important to recent models of the physical inverse
problem of multiple scattering.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 14:36:38 GMT"
}
]
| 2012-02-06T00:00:00 | [
[
"Said",
"Salem",
""
],
[
"Lageman",
"Christian",
""
],
[
"Bihan",
"Nicolas Le",
""
],
[
"Manton",
"Jonathan H.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
]
|
0907.2621 | Pavel Hrubes | Pavel Hrubes, Amir Yehudayoff | Homogeneous formulas and symmetric polynomials | null | null | null | null | cs.CC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We investigate the arithmetic formula complexity of the elementary symmetric
polynomials S(k,n). We show that every multilinear homogeneous formula
computing S(k,n) has size at least k^(Omega(log k))n, and that product-depth d
multilinear homogeneous formulas for S(k,n) have size at least
2^(Omega(k^{1/d}))n. Since S(n,2n) has a multilinear formula of size O(n^2), we
obtain a superpolynomial separation between multilinear and multilinear
homogeneous formulas. We also show that S(k,n) can be computed by homogeneous
formulas of size k^(O(log k))n, answering a question of Nisan and Wigderson.
Finally, we present a superpolynomial separation between monotone and
non-monotone formulas in the noncommutative setting, answering a question of
Nisan.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 18:49:20 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Hrubes",
"Pavel",
""
],
[
"Yehudayoff",
"Amir",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
]
|
0907.2627 | Paul Bonsma | Paul Bonsma and Felix Breuer | Finding Fullerene Patches in Polynomial Time | null | null | null | null | cs.DM cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We consider the following question, motivated by the enumeration of
fullerenes. A fullerene patch is a 2-connected plane graph G in which inner
faces have length 5 or 6, non-boundary vertices have degree 3, and boundary
vertices have degree 2 or 3. The degree sequence along the boundary is called
the boundary code of G. We show that the question whether a given sequence S is
a boundary code of some fullerene patch can be answered in polynomial time when
such patches have at most five 5-faces. We conjecture that our algorithm gives
the correct answer for any number of 5-faces, and sketch how to extend the
algorithm to the problem of counting the number of different patches with a
given boundary code.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 15:39:00 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Bonsma",
"Paul",
""
],
[
"Breuer",
"Felix",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.2639 | Gabor Pataki | Gabor Pataki and Mustafa Tural | Basis Reduction, and the Complexity of Branch-and-Bound | 15 pages, 1 figure | null | null | null | math.OC cs.CC cs.DS math.CO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The classical branch-and-bound algorithm for the integer feasibility problem
has exponential worst case complexity.
We prove that it is surprisingly efficient on reformulated problems, in which
the columns of the constraint matrix are short, and near orthogonal, i.e. a
reduced basis of the generated lattice; when the entries of A (the dense part
of the constraint matrix) are from {1, ..., M} for a large enough M,
branch-and-bound solves almost all reformulated instances at the rootnode. We
also prove an upper bound on the width of the reformulations along the last
unit vector.
The analysis builds on the ideas of Furst and Kannan to bound the number of
integral matrices for which the shortest vectors of certain lattices are long,
and also uses a bound on the size of the branch-and-bound tree based on the
norms of the Gram-Schmidt vectors of the constraint matrix.
We explore practical aspects of these results. First, we compute numerical
values of M which guarantee that 90, and 99 percent of the reformulated
problems solve at the root: these turn out to be surprisingly small when the
problem size is moderate. Second, we confirm with a computational study that
random integer programs become easier, as the coefficients grow.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 16:39:57 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jul 2009 16:11:06 GMT"
}
]
| 2009-08-06T00:00:00 | [
[
"Pataki",
"Gabor",
""
],
[
"Tural",
"Mustafa",
""
]
]
| [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
]
|
0907.2640 | Serguei Mokhov | Serguei A. Mokhov | Towards Hybrid Intensional Programming with JLucid, Objective Lucid, and
General Imperative Compiler Framework in the GIPSY | 222 pages, 82 figures, 2 tables, index, appendices; Master's thesis,
October 2005. Also appears at http://clues.concordia.ca/record=b2222169~S0
and at http://books.google.com/books?id=A2QvOzOxtC8C ; this revision fixes
empty Nat42.tex example | null | null | null | cs.PL cs.SE | http://creativecommons.org/licenses/by/3.0/ | Pure Lucid programs are concurrent with very fine granularity. Sequential
Threads (STs) are functions introduced to enlarge the grain size; they are
passed from server to workers by Communication Procedures (CPs) in the General
Intensional Programming System (GIPSY). A JLucid program combines Java code for
the STs with Lucid code for parallel control. Thus first, in this thesis, we
describe the way in which the new JLucid compiler generates STs and CPs. JLucid
also introduces array support.
Further exploration goes through the additional transformations that the
Lucid family of languages has undergone to enable the use of Java objects and
their members, in the Generic Intensional Programming Language (GIPL), and
Indexical Lucid: first, in the form of JLucid allowing the use of
pseudo-objects, and then through the specifically-designed the Objective Lucid
language. The syntax and semantic definitions of Objective Lucid and the
meaning of Java objects within an intensional program are provided with
discussions and examples.
Finally, there are many useful scientific and utility routines written in
many imperative programming languages other than Java, for example in C, C++,
Fortran, Perl, etc. Therefore, it is wise to provide a framework to facilitate
inclusion of these languages into the GIPSY and their use by Lucid programs. A
General Imperative Compiler Framework and its concrete implementation is
proposed to address this issue.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 16:24:05 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Jul 2009 18:18:21 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Dec 2009 04:17:15 GMT"
}
]
| 2009-12-21T00:00:00 | [
[
"Mokhov",
"Serguei A.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
]
|
0907.2663 | David Richerby | Martin Dyer, Leslie Ann Goldberg, Markus Jalsenius, David Richerby | The Complexity of Approximating Bounded-Degree Boolean \sharp CSP | 22 pages. Full classification now applies to degree bounds of at
least 6 (formerly at least 25) but no other significant changes from previous
version (reduction in page count is just different typesetting) | null | null | null | cs.CC cs.DM | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The degree of a CSP instance is the maximum number of times that any variable
appears in the scopes of constraints. We consider the approximate counting
problem for Boolean CSP with bounded-degree instances, for constraint languages
containing the two unary constant relations {0} and {1}. When the maximum
allowed degree is large enough (at least 6) we obtain a complete classification
of the complexity of this problem. It is exactly solvable in polynomial-time if
every relation in the constraint language is affine. It is equivalent to the
problem of approximately counting independent sets in bipartite graphs if every
relation can be expressed as conjunctions of {0}, {1} and binary implication.
Otherwise, there is no FPRAS unless NP=RP. For lower degree bounds, additional
cases arise, where the complexity is related to the complexity of approximately
counting independent sets in hypergraphs.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 17:25:43 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Sep 2011 14:06:45 GMT"
}
]
| 2011-09-19T00:00:00 | [
[
"Dyer",
"Martin",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jalsenius",
"Markus",
""
],
[
"Richerby",
"David",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
]
|
0907.2682 | Torleiv Kl{\o}ve | Torleiv Kl{\o}ve, Te-Tsung Lin, Shi-Chun Tsai, Wen-Guey Tzeng | Permutation Arrays Under the Chebyshev Distance | 14 pages | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | An (n,d) permutation array (PA) is a set of permutations of length n with the
property that the distance (under some metric) between any two permutations in
the array is at least d. They became popular recently for communication over
power lines. Motivated by an application to flash memories, in this paper the
metric used is the Chebyshev metric. A number of different constructions are
given as well as bounds on the size of such PA.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 19:12:58 GMT"
}
]
| 2009-07-16T00:00:00 | [
[
"Kløve",
"Torleiv",
""
],
[
"Lin",
"Te-Tsung",
""
],
[
"Tsai",
"Shi-Chun",
""
],
[
"Tzeng",
"Wen-Guey",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2702 | Vinod M. Prabhakaran | Vinod M. Prabhakaran and Pramod Viswanath | Interference Channels with Destination Cooperation | revised based on reviewers' comments | IEEE Trans. Inform. Theory 57 (2011) 187-209 | 10.1109/TIT.2010.2090237 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Interference is a fundamental feature of the wireless channel. To better
understand the role of cooperation in interference management, the two-user
Gaussian interference channel where the destination nodes can cooperate by
virtue of being able to both transmit and receive is studied. The sum-capacity
of this channel is characterized up to a constant number of bits. The coding
scheme employed builds up on the superposition scheme of Han and Kobayashi
(1981) for two-user interference channels without cooperation. New upperbounds
to the sum-capacity are also derived.
| [
{
"version": "v1",
"created": "Wed, 15 Jul 2009 20:52:46 GMT"
},
{
"version": "v2",
"created": "Sat, 6 Nov 2010 05:50:42 GMT"
}
]
| 2011-01-28T00:00:00 | [
[
"Prabhakaran",
"Vinod M.",
""
],
[
"Viswanath",
"Pramod",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
]
|
0907.2741 | Stanley P. Y. Fung | Stanley P. Y. Fung | Bounded Delay Packet Scheduling in a Bounded Buffer | 5 pages, 0 figures | null | null | null | cs.DS | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We study the problem of buffer management in QoS-enabled network switches in
the bounded delay model where each packet is associated with a weight and a
deadline. We consider the more realistic situation where the network switch has
a finite buffer size. A 9.82-competitive algorithm is known for the case of
multiple buffers (Azar and Levy, SWAT'06). Recently, for the case of a single
buffer, a 3-competitive deterministic algorithm and a 2.618-competitive
randomized algorithm was known (Li, INFOCOM'09). In this paper we give a simple
deterministic 2-competitive algorithm for the case of a single buffer.
| [
{
"version": "v1",
"created": "Thu, 16 Jul 2009 04:05:05 GMT"
}
]
| 2009-07-17T00:00:00 | [
[
"Fung",
"Stanley P. Y.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
]
|
0907.2755 | Avraham Trahtman N | A.N. Trahtman, T. Bauer, N. Cohen | The Visualization of the Road Coloring Algorithm in the package TESTAS | 12 pages | null | null | null | cs.DM cs.FL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | A synchronizing word of a deterministic automaton is a word in the alphabet
of colors of its edges that maps the automaton to a single state. A coloring of
edges of a directed graph is synchronizing if the coloring turns the graph into
a deterministic finite automaton possessing a synchronizing word.
The road coloring problem is the problem of synchronizing coloring of a
directed finite strongly connected graph with constant outdegree of all its
vertices if the greatest common divisor of the lengths of all its cycles is
one. A polynomial time algorithm of the road coloring has been based on recent
positive solution of this old famous problem.
One can use our new visualization program for demonstration of the algorithm
as well as for visualization of the transition graph of any finite automaton.
The visual image presents some structure properties of the transition graph.
This help tool is linear in the size of the automaton.
| [
{
"version": "v1",
"created": "Thu, 16 Jul 2009 05:42:06 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 06:31:44 GMT"
},
{
"version": "v3",
"created": "Tue, 23 Nov 2010 11:00:51 GMT"
}
]
| 2010-11-24T00:00:00 | [
[
"Trahtman",
"A. N.",
""
],
[
"Bauer",
"T.",
""
],
[
"Cohen",
"N.",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
]
|
0907.2759 | Fr\'ed\'erique Oggier | Frederique Oggier and Alfred Bruckstein | On Cyclic and Nearly Cyclic Multiagent Interactions in the Plane | null | null | null | null | cs.MA cs.RO | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss certain types of cyclic and nearly cyclic interactions among N
"point"-agents in the plane, leading to formations of interesting limiting
geometric configurations. Cyclic pursuit and local averaging interactions have
been analyzed in the context of multi-agent gathering. In this paper, we
consider some nearly cyclic interactions that break symmetry leading to factor
circulants rather than circulant interaction matrices.
| [
{
"version": "v1",
"created": "Thu, 16 Jul 2009 07:10:17 GMT"
}
]
| 2009-07-17T00:00:00 | [
[
"Oggier",
"Frederique",
""
],
[
"Bruckstein",
"Alfred",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
]
|
0907.2775 | Dai Tri Man Le | Dai Tri Man Le | Modelling Concurrent Behaviors in the Process Specification Language | null | null | null | null | cs.AI | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | In this paper, we propose a first-order ontology for generalized stratified
order structure. We then classify the models of the theory using
model-theoretic techniques. An ontology mapping from this ontology to the core
theory of Process Specification Language is also discussed.
| [
{
"version": "v1",
"created": "Thu, 16 Jul 2009 08:20:32 GMT"
}
]
| 2009-07-17T00:00:00 | [
[
"Le",
"Dai Tri Man",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
]
|
0907.2850 | J. M. Landsberg | Peter Buergisser, J.M. Landsberg, Laurent Manivel and Jerzy Weyman | An overview of mathematical issues arising in the Geometric complexity
theory approach to VP v.s. VNP | 29 pages, v2: role of symmetric Kronecker coefficients explained | null | null | null | cs.CC math.AG math.RT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We discuss the geometry of orbit closures and the asymptotic behavior of
Kronecker coefficients in the context of the Geometric Complexity Theory
program to prove a variant of Valiant's algebraic analog of the P not equal to
NP conjecture. We also describe the precise separation of complexity classes
that their program proposes to demonstrate.
| [
{
"version": "v1",
"created": "Thu, 16 Jul 2009 17:47:41 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jan 2011 14:12:04 GMT"
}
]
| 2011-01-10T00:00:00 | [
[
"Buergisser",
"Peter",
""
],
[
"Landsberg",
"J. M.",
""
],
[
"Manivel",
"Laurent",
""
],
[
"Weyman",
"Jerzy",
""
]
]
| [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
},
{
"class": "Mathematics",
"code": "math.RT",
"description": "Linear representations of algebras and groups, Lie theory, associative algebras, multilinear algebra",
"span": "(Representation Theory)"
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.