id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0907.2859
Sheng-Yuan Tu
Sheng-Yuan Tu and Kwang-Cheng Chen
General Spectrum Sensing in Cognitive Radio Networks
26 pages, 7 figures, 47 references, submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The successful operation of cognitive radio (CR) between CR transmitter and CR receiver (CR link) relies on reliable spectrum sensing. To network CRs requires spectrum sensing at CR transmitter and further information regarding the spectrum availability at CR receiver. Redefining the spectrum sensing along with statistical inference suitable for cognitive radio networks (CRN), we mathematically derive conditions to allow CR transmitter forwarding packets to CR receiver under guaranteed outage probability, and prove that the correlation of localized spectrum availability between a cooperative node and CR receiver determines effectiveness of the cooperative scheme. Applying our novel mathematical model to potential hidden terminals in CRN, we illustrate that the allowable transmission region of a CR, defined as neighborhood, is no longer circular shape even in a pure path loss channel model. This results in asymmetric CR links to make bidirectional links generally inappropriate in CRN, though this challenge can be alleviated by cooperative sensing. Therefore, spectrum sensing capability determines CRN topology. For multiple cooperative nodes, to fully utilize spectrum availability, the selection methodology of cooperative nodes is developed due to limited overhead of information exchange. Defining reliability as information of spectrum availability at CR receiver provided by a cooperative node and by applying neighborhood area, we can compare sensing capability of cooperative nodes from both link and network perspectives. In addition, due to lack of centralized coordination in dynamic CRN, CRs can only acquire local and partial information within limited sensing duration, robust spectrum sensing is therefore proposed. Limits of cooperative schemes and their impacts on network operation are also derived.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 15:04:15 GMT" } ]
2009-07-17T00:00:00
[ [ "Tu", "Sheng-Yuan", "" ], [ "Chen", "Kwang-Cheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2868
Thomas Bernecker
Thomas Bernecker, Hans-Peter Kriegel, Nikos Mamoulis, Matthias Renz and Andreas Zuefle
Scalable Probabilistic Similarity Ranking in Uncertain Databases (Technical Report)
null
null
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a scalable approach for probabilistic top-k similarity ranking on uncertain vector data. Each uncertain object is represented by a set of vector instances that are assumed to be mutually-exclusive. The objective is to rank the uncertain data according to their distance to a reference object. We propose a framework that incrementally computes for each object instance and ranking position, the probability of the object falling at that ranking position. The resulting rank probability distribution can serve as input for several state-of-the-art probabilistic ranking models. Existing approaches compute this probability distribution by applying a dynamic programming approach of quadratic complexity. In this paper we theoretically as well as experimentally show that our framework reduces this to a linear-time complexity while having the same memory requirements, facilitated by incremental accessing of the uncertain vector instances in increasing order of their distance to the reference object. Furthermore, we show how the output of our method can be used to apply probabilistic top-k ranking for the objects, according to different state-of-the-art definitions. We conduct an experimental evaluation on synthetic and real data, which demonstrates the efficiency of our approach.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 15:25:50 GMT" } ]
2009-07-17T00:00:00
[ [ "Bernecker", "Thomas", "" ], [ "Kriegel", "Hans-Peter", "" ], [ "Mamoulis", "Nikos", "" ], [ "Renz", "Matthias", "" ], [ "Zuefle", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.2896
Michal Kaliszan
S{\l}awomir Sta\'nczak, Micha{\l} Kaliszan and Nicholas Bambos
Decentralized Admission Control for Power-Controlled Wireless Links
Section IV extended, Section V shortened; some corrections
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with the problem of admission control/channel access in power-controlled decentralized wireless networks, in which the quality-of-service (QoS) is expressed in terms of the signal-to-interference ratio (SIR). We analyze a previously proposed admission control algorithm, which was designed to maintain the SIR of operational (active) links above some given threshold at all times (protection of active links). This protection property ensures that as new users attempt to join the network, the already established links sustain their quality. The considered scheme may be thus applicable in some cognitive radio networks, where the fundamental premise is that secondary users may be granted channel access only if it does not cause disturbance to primary users. The admission control algorithm was previously analyzed under the assumption of affine interference functions. This paper extends all the previous results to arbitrary standard interference functions, which capture many important receiver designs, including optimal linear reception in the sense of maximizing the SIR and the worst-case receiver design. Furthermore, we provide novel conditions for protection of active users under the considered control scheme when individual power constraints are imposed on each link. Finally, we consider the possibility of a joint optimization of transmitters and receivers in networks with linear transceivers, which includes linear beamforming in multiple antenna systems. Transmitter optimization is performed alternately with receiver optimization to generate non-decreasing sequences of SIRs. Numerical evaluations show that additional transmitter side optimization has potential for significant performance gains.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 17:46:06 GMT" }, { "version": "v2", "created": "Wed, 6 Jan 2010 18:33:32 GMT" } ]
2010-01-06T00:00:00
[ [ "Stańczak", "Sławomir", "" ], [ "Kaliszan", "Michał", "" ], [ "Bambos", "Nicholas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2914
Richard H. Cyburt
Richard H. Cyburt, Sam M. Austin, Timothy C. Beers, Alfredo Estrade, Ryan M. Ferguson, A. Sakharuk, Karl Smith and Scott Warren
Managing Information for Sparsely Distributed Articles and Readers: The Virtual Journals of the Joint Institute for Nuclear Astrophysics (JINA)
submitted, 9 pages, 5 figures, 1 table. http://groups.nscl.msu.edu/jina/journals
null
null
null
astro-ph.IM astro-ph.GA astro-ph.SR cs.DL nucl-ex nucl-th
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The research area of nuclear astrophysics is characterized by a need for information published in tens of journals in several fields and an extremely dilute distribution of researchers. For these reasons it is difficult for researchers, especially students, to be adequately informed of the relevant published research. For example, the commonly employed journal club is inefficient for a group consisting of a professor and his two students. In an attempt to address this problem, we have developed a virtual journal (VJ), a process for collecting and distributing a weekly compendium of articles of interest to researchers in nuclear astrophysics. Subscribers are notified of each VJ issue using an email-list server or an RSS feed. The VJ data base is searchable by topics assigned by the editors, or by keywords. There are two related VJs: the Virtual Journal of Nuclear Astrophysics (JINA VJ), and the SEGUE Virtual Journal (SEGUE VJ). The JINA VJ also serves as a source of new experimental and theoretical information for the JINA REACLIB reaction rate database. References to review articles and popular level articles provide an introduction to the literature for students. The VJs and support information are available at http://groups.nscl.msu.edu/jina/journals
[ { "version": "v1", "created": "Thu, 16 Jul 2009 20:00:05 GMT" } ]
2009-07-22T00:00:00
[ [ "Cyburt", "Richard H.", "" ], [ "Austin", "Sam M.", "" ], [ "Beers", "Timothy C.", "" ], [ "Estrade", "Alfredo", "" ], [ "Ferguson", "Ryan M.", "" ], [ "Sakharuk", "A.", "" ], [ "Smith", "Karl", "" ], [ "Warren", "Scott", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Physics", "code": "astro-ph.GA", "description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents", "span": "(Astrophysics of Galaxies)" }, { "class": "Physics", "code": "astro-ph.SR", "description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems", "span": "(Solar and Stellar Astrophysics)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "nucl-ex", "description": "Nuclear Experiment Results from experimental nuclear physics including the areas of fundamental interactions, measurements at low- and medium-energy, as well as relativistic heavy-ion collisions. Does not include: detectors and instrumentation nor analysis methods to conduct experiments; descriptions of experimental programs (present or future); comments on published results", "span": "(Nuclear Experiment)" }, { "class": "Physics", "code": "nucl-th", "description": "Nuclear Theory Theory of nuclear structure covering wide area from models of hadron structure to neutron stars. Nuclear equation of states at different external conditions. Theory of nuclear reactions including heavy-ion reactions at low and high energies. It does not include problems of data analysis, physics of nuclear reactors, problems of safety, reactor construction", "span": "(Nuclear Theory)" } ]
0907.2929
Hassan Gobjuka
Hassan Gobjuka
4G Wireless Networks: Opportunities and Challenges
null
null
null
VZ-TR-G1005309
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With the major wireless service providers planning to start deployment of 4G wireless networks by mid 2010, research and industry communities are racing against time to find solutions for some of the prominent still open issues in 4G networks. The growing interest in 4G networks is driven by the set of new services will be made available for the first time such as accessing the Internet anytime from anywhere, global roaming, and wider support for multimedia applications. In this paper describe some of the key opportunities will be made available by 4G networks, present key challenges and point to some proposed solutions.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 20:16:02 GMT" } ]
2009-07-20T00:00:00
[ [ "Gobjuka", "Hassan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.2949
Alexander Olshevsky
Julien M. Hendrickx, Alex Olshevsky, John N. Tsitsiklis
Distributed anonymous function computation in information fusion and multiagent systems
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a model for deterministic distributed function computation by a network of identical and anonymous nodes, with bounded computation and storage capabilities that do not scale with the network size. Our goal is to characterize the class of functions that can be computed within this model. In our main result, we exhibit a class of non-computable functions, and prove that every function outside this class can at least be approximated. The problem of computing averages in a distributed manner plays a central role in our development.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 22:42:40 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 04:07:34 GMT" } ]
2009-07-28T00:00:00
[ [ "Hendrickx", "Julien M.", "" ], [ "Olshevsky", "Alex", "" ], [ "Tsitsiklis", "John N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.2951
Luca Foschini
Chiranjeeb Buragohain, Luca Foschini and Subhash Suri
Untangling the Braid: Finding Outliers in a Set of Streams
null
null
null
null
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Monitoring the performance of large shared computing systems such as the cloud computing infrastructure raises many challenging algorithmic problems. One common problem is to track users with the largest deviation from the norm (outliers), for some measure of performance. Taking a stream-computing perspective, we can think of each user's performance profile as a stream of numbers (such as response times), and the aggregate performance profile of the shared infrastructure as a "braid" of these intermixed streams. The monitoring system's goal then is to untangle this braid sufficiently to track the top k outliers. This paper investigates the space complexity of one-pass algorithms for approximating outliers of this kind, proves lower bounds using multi-party communication complexity, and proposes small-memory heuristic algorithms. On one hand, stream outliers are easily tracked for simple measures, such as max or min, but our theoretical results rule out even good approximations for most of the natural measures such as average, median, or the quantiles. On the other hand, we show through simulation that our proposed heuristics perform quite well for a variety of synthetic data.
[ { "version": "v1", "created": "Thu, 16 Jul 2009 22:57:53 GMT" } ]
2009-07-20T00:00:00
[ [ "Buragohain", "Chiranjeeb", "" ], [ "Foschini", "Luca", "" ], [ "Suri", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.2955
Matthew Herman
Matthew A. Herman and Thomas Strohmer
General Deviants: An Analysis of Perturbations in Compressed Sensing
11 pages, 1 figure, preprint
null
10.1109/JSTSP.2009.2039170
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We analyze the Basis Pursuit recovery of signals with general perturbations. Previous studies have only considered partially perturbed observations Ax + e. Here, x is a signal which we wish to recover, A is a full-rank matrix with more columns than rows, and e is simple additive noise. Our model also incorporates perturbations E to the matrix A which result in multiplicative noise. This completely perturbed framework extends the prior work of Candes, Romberg and Tao on stable signal recovery from incomplete and inaccurate measurements. Our results show that, under suitable conditions, the stability of the recovered signal is limited by the noise level in the observation. Moreover, this accuracy is within a constant multiple of the best-case reconstruction using the technique of least squares. In the absence of additive noise numerical simulations essentially confirm that this error is a linear function of the relative perturbation.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 00:16:09 GMT" } ]
2015-05-13T00:00:00
[ [ "Herman", "Matthew A.", "" ], [ "Strohmer", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2974
Serguei Mokhov
Serguei A. Mokhov, Shahriar Rostami, Hammad Ali, Min Chen and Yuhong Yan
Service-Oriented Architectures and Web Services: Course Tutorial and Lab Notes
v19 (Winter 2015): 55 pages; TOC; index; course lab/tutorial notes (SOEN487); NOTE: a source of these notes is also maintained on SourceForge
null
null
null
cs.DC cs.SE
http://creativecommons.org/licenses/by/4.0/
This document presents a number of quick-step instructions to get started on writing mini-service-oriented web services-based applications using OpenESB 2.31, Tomcat 6, GlassFish 2.x/3.0.1 with BPEL support, and Java 1.6+ primarily in Scientific Linux 6.6 with user quota restrictions. While the tutorial notes are oriented towards the students taking the SOEN487 on service-oriented architectures (SOA) at Computer Science and Software Engineering (CSE) Department, Faculty of Engineering and Computer Science (ENCS), other may find some of it useful as well outside of CSE or Concordia. The notes are compiled mostly based on the students' needs and feedback.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 03:36:56 GMT" }, { "version": "v10", "created": "Wed, 2 Feb 2011 20:53:30 GMT" }, { "version": "v11", "created": "Tue, 8 Feb 2011 20:58:18 GMT" }, { "version": "v12", "created": "Wed, 9 Feb 2011 05:43:52 GMT" }, { "version": "v13", "created": "Thu, 10 Feb 2011 20:02:04 GMT" }, { "version": "v14", "created": "Wed, 9 Mar 2011 20:17:58 GMT" }, { "version": "v15", "created": "Wed, 30 Mar 2011 19:59:10 GMT" }, { "version": "v16", "created": "Mon, 26 Sep 2011 20:00:05 GMT" }, { "version": "v17", "created": "Wed, 19 Oct 2011 19:57:13 GMT" }, { "version": "v18", "created": "Mon, 24 Oct 2011 22:32:28 GMT" }, { "version": "v19", "created": "Tue, 29 Dec 2015 01:38:57 GMT" }, { "version": "v2", "created": "Mon, 20 Jul 2009 19:59:35 GMT" }, { "version": "v3", "created": "Tue, 21 Jul 2009 08:30:01 GMT" }, { "version": "v4", "created": "Tue, 21 Jul 2009 22:06:01 GMT" }, { "version": "v5", "created": "Sat, 25 Jul 2009 03:05:36 GMT" }, { "version": "v6", "created": "Tue, 28 Jul 2009 22:32:54 GMT" }, { "version": "v7", "created": "Thu, 13 Jan 2011 19:40:58 GMT" }, { "version": "v8", "created": "Mon, 17 Jan 2011 21:00:00 GMT" }, { "version": "v9", "created": "Wed, 26 Jan 2011 20:34:21 GMT" } ]
2015-12-31T00:00:00
[ [ "Mokhov", "Serguei A.", "" ], [ "Rostami", "Shahriar", "" ], [ "Ali", "Hammad", "" ], [ "Chen", "Min", "" ], [ "Yan", "Yuhong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.2984
Zheng Wang
Zheng Wang, Jie Luo
Fountain Communication using Concatenated Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper extends linear-complexity concatenated coding schemes to fountain communication over the discrete-time memoryless channel. Achievable fountain error exponents for one-level and multi-level concatenated fountain codes are derived. It is also shown that concatenated coding schemes possess interesting properties in several multi-user fountain communication scenarios.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 06:08:18 GMT" }, { "version": "v2", "created": "Tue, 4 Aug 2009 03:22:04 GMT" }, { "version": "v3", "created": "Mon, 9 May 2011 06:06:25 GMT" }, { "version": "v4", "created": "Thu, 9 Jun 2011 22:54:06 GMT" } ]
2011-06-13T00:00:00
[ [ "Wang", "Zheng", "" ], [ "Luo", "Jie", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.2990
Martin Josef Geiger
Martin Josef Geiger
The Single Machine Total Weighted Tardiness Problem - Is it (for Metaheuristics) a Solved Problem ?
null
Proceedings of the 8th Metaheuristics International Conference MIC 2009, July 13-16, Hamburg, Germany, pp. 141.1-141.10
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article presents a study of rather simple local search heuristics for the single machine total weighted tardiness problem (SMTWTP), namely hillclimbing and Variable Neighborhood Search. In particular, we revisit these approaches for the SMTWTP as there appears to be a lack of appropriate/challenging benchmark instances in this case. The obtained results are impressive indeed. Only few instances remain unsolved, and even those are approximated within 1% of the optimal/best known solutions. Our experiments support the claim that metaheuristics for the SMTWTP are very likely to lead to good results, and that, before refining search strategies, more work must be done with regard to the proposition of benchmark data. Some recommendations for the construction of such data sets are derived from our investigations.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 06:45:46 GMT" } ]
2009-07-20T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.2993
Martin Josef Geiger
Martin Josef Geiger
Improvements for multi-objective flow shop scheduling by Pareto Iterated Local Search
null
Proceedings of the 8th Metaheuristics International Conference MIC 2009, July 13-16, 2009, Hamburg, Germany, pp 195.1-195.10
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The article describes the proposition and application of a local search metaheuristic for multi-objective optimization problems. It is based on two main principles of heuristic search, intensification through variable neighborhoods, and diversification through perturbations and successive iterations in favorable regions of the search space. The concept is successfully tested on permutation flow shop scheduling problems under multiple objectives and compared to other local search approaches. While the obtained results are encouraging in terms of their quality, another positive attribute of the approach is its simplicity as it does require the setting of only very few parameters.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 06:53:02 GMT" } ]
2009-07-20T00:00:00
[ [ "Geiger", "Martin Josef", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.3005
Flavio D'Alessandro
Flavio D'Alessandro, Benedetto Intrigila, Stefano Varricchio
On some counting problems for semi-linear sets
34 pages
null
null
null
cs.DM cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $X$ be a subset of $\N^t$ or $\Z^t$. We can associate with $X$ a function ${\cal G}_X:\N^t\longrightarrow\N$ which returns, for every $(n_1, ..., n_t)\in \N^t$, the number ${\cal G}_X(n_1, ..., n_t)$ of all vectors $x\in X$ such that, for every $i=1,..., t, |x_{i}| \leq n_{i}$. This function is called the {\em growth function} of $X$. The main result of this paper is that the growth function of a semi-linear set of $\N^t$ or $\Z^t$ is a box spline. By using this result and some theorems on semi-linear sets, we give a new proof of combinatorial flavour of a well-known theorem by Dahmen and Micchelli on the counting function of a system of Diophantine linear equations.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 07:47:22 GMT" } ]
2009-07-20T00:00:00
[ [ "D'Alessandro", "Flavio", "" ], [ "Intrigila", "Benedetto", "" ], [ "Varricchio", "Stefano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.3016
Arash Rafiey
Arash Rafiey and Pavol Hell
Duality for Min-Max Orderings and Dichotomy for Min Cost Homomorphisms
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Min-Max orderings correspond to conservative lattice polymorphisms. Digraphs with Min-Max orderings have polynomial time solvable minimum cost homomorphism problems. They can also be viewed as digraph analogues of proper interval graphs and bigraphs. We give a forbidden structure characterization of digraphs with a Min-Max ordering which implies a polynomial time recognition algorithm. We also similarly characterize digraphs with an extended Min-Max ordering, and we apply this characterization to prove a conjectured form of dichotomy for minimum cost homomorphism problems.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 08:14:15 GMT" } ]
2009-07-20T00:00:00
[ [ "Rafiey", "Arash", "" ], [ "Hell", "Pavol", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.3019
Dana Fisman
Dana Fisman, Orna Kupferman and Yoad Lustig
Rational Synthesis
14 pages
null
null
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Synthesis is the automated construction of a system from its specification. The system has to satisfy its specification in all possible environments. Modern systems often interact with other systems, or agents. Many times these agents have objectives of their own, other than to fail the system. Thus, it makes sense to model system environments not as hostile, but as composed of rational agents; i.e., agents that act to achieve their own objectives. We introduce the problem of synthesis in the context of rational agents (rational synthesis, for short). The input consists of a temporal-logic formula specifying the system and temporal-logic formulas specifying the objectives of the agents. The output is an implementation T of the system and a profile of strategies, suggesting a behavior for each of the agents. The output should satisfy two conditions. First, the composition of T with the strategy profile should satisfy the specification. Second, the strategy profile should be an equilibria in the sense that, in view of their objectives, agents have no incentive to deviate from the strategies assigned to them. We solve the rational-synthesis problem for various definitions of equilibria studied in game theory. We also consider the multi-valued case in which the objectives of the system and the agents are still temporal logic formulas, but involve payoffs from a finite lattice.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 08:51:23 GMT" } ]
2009-07-20T00:00:00
[ [ "Fisman", "Dana", "" ], [ "Kupferman", "Orna", "" ], [ "Lustig", "Yoad", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.3045
Abdelkader Lahmadi
Abdelkader Lahmadi (INRIA Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA)
SecSip: A Stateful Firewall for SIP-based Networks
null
11th IFIP/IEEE International Symposium on Integrated Network Management (2009)
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
SIP-based networks are becoming the de-facto standard for voice, video and instant messaging services. Being exposed to many threats while playing an major role in the operation of essential services, the need for dedicated security management approaches is rapidly increasing. In this paper we present an original security management approach based on a specific vulnerability aware SIP stateful firewall. Through known attack descriptions, we illustrate the power of the configuration language of the firewall which uses the capability to specify stateful objects that track data from multiple SIP elements within their lifetime. We demonstrate through measurements on a real implementation of the firewall its efficiency and performance.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 11:28:11 GMT" } ]
2009-07-20T00:00:00
[ [ "Lahmadi", "Abdelkader", "", "INRIA Lorraine - LORIA" ], [ "Festor", "Olivier", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.3047
Abdelkader Lahmadi
Abdelkader Lahmadi (INRIA Lorraine - LORIA), Laurent Andrey (INRIA Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA)
Performance of Network and Service Monitoring Frameworks
null
11th IFIP/IEEE International Symposium on Integrated Network Management (2009)
null
null
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The efficiency and the performance of anagement systems is becoming a hot research topic within the networks and services management community. This concern is due to the new challenges of large scale managed systems, where the management plane is integrated within the functional plane and where management activities have to carry accurate and up-to-date information. We defined a set of primary and secondary metrics to measure the performance of a management approach. Secondary metrics are derived from the primary ones and quantifies mainly the efficiency, the scalability and the impact of management activities. To validate our proposals, we have designed and developed a benchmarking platform dedicated to the measurement of the performance of a JMX manager-agent based management system. The second part of our work deals with the collection of measurement data sets from our JMX benchmarking platform. We mainly studied the effect of both load and the number of agents on the scalability, the impact of management activities on the user perceived performance of a managed server and the delays of JMX operations when carrying variables values. Our findings show that most of these delays follow a Weibull statistical distribution. We used this statistical model to study the behavior of a monitoring algorithm proposed in the literature, under heavy tail delays distribution. In this case, the view of the managed system on the manager side becomes noisy and out of date.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 11:35:46 GMT" } ]
2009-07-20T00:00:00
[ [ "Lahmadi", "Abdelkader", "", "INRIA Lorraine - LORIA" ], [ "Andrey", "Laurent", "", "INRIA\n Lorraine - LORIA" ], [ "Festor", "Olivier", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0907.3068
Giorgos Christodoulou
George Christodoulou and Annamaria Kovacs
A deterministic truthful PTAS for scheduling related machines
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scheduling on related machines ($Q||C_{\max}$) is one of the most important problems in the field of Algorithmic Mechanism Design. Each machine is controlled by a selfish agent and her valuation can be expressed via a single parameter, her {\em speed}. In contrast to other similar problems, Archer and Tardos \cite{AT01} showed that an algorithm that minimizes the makespan can be truthfully implemented, although in exponential time. On the other hand, if we leave out the game-theoretic issues, the complexity of the problem has been completely settled -- the problem is strongly NP-hard, while there exists a PTAS \cite{HS88,ES04}. This problem is the most well studied in single-parameter algorithmic mechanism design. It gives an excellent ground to explore the boundary between truthfulness and efficient computation. Since the work of Archer and Tardos, quite a lot of deterministic and randomized mechanisms have been suggested. Recently, a breakthrough result \cite{DDDR08} showed that a randomized truthful PTAS exists. On the other hand, for the deterministic case, the best known approximation factor is 2.8 \cite{Kov05,Kov07}. It has been a major open question whether there exists a deterministic truthful PTAS, or whether truthfulness has an essential, negative impact on the computational complexity of the problem. In this paper we give a definitive answer to this important question by providing a truthful {\em deterministic} PTAS.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 13:13:07 GMT" } ]
2009-07-20T00:00:00
[ [ "Christodoulou", "George", "" ], [ "Kovacs", "Annamaria", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.3076
Stephan Kreutzer
Stephan Kreutzer and Siamak Tazari
On Brambles, Grid-Like Minors, and Parameterized Intractability of Monadic Second-Order Logic
null
null
null
null
cs.DM cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Brambles were introduced as the dual notion to treewidth, one of the most central concepts of the graph minor theory of Robertson and Seymour. Recently, Grohe and Marx showed that there are graphs G, in which every bramble of order larger than the square root of the treewidth is of exponential size in |G|. On the positive side, they show the existence of polynomial-sized brambles of the order of the square root of the treewidth, up to log factors. We provide the first polynomial time algorithm to construct a bramble in general graphs and achieve this bound, up to log-factors. We use this algorithm to construct grid-like minors, a replacement structure for grid-minors recently introduced by Reed and Wood, in polynomial time. Using the grid-like minors, we introduce the notion of a perfect bramble and an algorithm to find one in polynomial time. Perfect brambles are brambles with a particularly simple structure and they also provide us with a subgraph that has bounded degree and still large treewidth; we use them to obtain a meta-theorem on deciding certain parameterized subgraph-closed problems on general graphs in time singly exponential in the parameter. The second part of our work deals with providing a lower bound to Courcelle's famous theorem, stating that every graph property that can be expressed by a sentence in monadic second-order logic (MSO), can be decided by a linear time algorithm on classes of graphs of bounded treewidth. Using our results from the first part of our work we establish a strong lower bound for tractability of MSO on classes of colored graphs.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 13:45:20 GMT" } ]
2009-07-20T00:00:00
[ [ "Kreutzer", "Stephan", "" ], [ "Tazari", "Siamak", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.3085
Matteo Pradella
Matteo Pradella, Angelo Morzenti, Pierluigi San Pietro
A Metric Encoding for Bounded Model Checking (extended version)
null
null
10.1007/978-3-642-05089-3_47
null
cs.LO cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Bounded Model Checking both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique which is particularly optimized for managing quantitative future and past metric temporal operators, typically found in properties of hard real time systems. The encoding is simple and intuitive in principle, but it is made more complex by the presence, typical of the Bounded Model Checking technique, of backward and forward loops used to represent an ultimately periodic infinite domain by a finite structure. We report and comment on the new encoding technique and on an extensive set of experiments carried out to assess its feasibility and effectiveness.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 14:51:10 GMT" }, { "version": "v2", "created": "Mon, 27 Jul 2009 09:51:03 GMT" } ]
2015-05-13T00:00:00
[ [ "Pradella", "Matteo", "" ], [ "Morzenti", "Angelo", "" ], [ "Pietro", "Pierluigi San", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.3095
Kamal Ahmat
Kamal Ahmat
Ethernet Topology Discovery: A Survey
null
null
null
TR-20091966
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ethernet networks have undergone impressive growth since the past few decades. This growth can be appreciated in terms of the equipment, such as switches and links, that have been added, as well as in the number of users that it supports. In parallel to this expansion, over the past decade the networking research community has shown a growing interest in discovering and analyzing the Ethernet topology. Research in this area has concentrated on the theoretical analysis of Ethernet topology as well as developing tools and methods for mapping the network layout. These efforts have brought us to a crucial juncture for Ethernet topology measurement infrastructures: while, previously, these were both small (in terms of number of measurement points), we are starting to see the deployment of large-scale distributed systems composed of hundreds or thousands of monitors. As we look forward to this next generation of systems, we take stock of what has been achieved so far. In this survey, we discuss past and current mechanisms for discovering the Ethernet topology from theoretical and practical prospective. In addition to discovery techniques, we provide insights into some of the well known open issues related to Ethernet topology discovery.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 15:31:38 GMT" } ]
2009-07-20T00:00:00
[ [ "Ahmat", "Kamal", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.3099
Kamal Ahmat
Kamal Ahmat
Graph Theory and Optimization Problems for Very Large Networks
null
null
null
TR-20091970
cs.NI cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graph theory provides a primary tool for analyzing and designing computer communication networks. In the past few decades, Graph theory has been used to study various types of networks, including the Internet, wide Area Networks, Local Area Networks, and networking protocols such as border Gateway Protocol, Open shortest Path Protocol, and Networking Networks. In this paper, we present some key graph theory concepts used to represent different types of networks. Then we describe how networks are modeled to investigate problems related to network protocols. Finally, we present some of the tools used to generate graph for representing practical networks.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 16:33:30 GMT" } ]
2009-07-20T00:00:00
[ [ "Ahmat", "Kamal", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.3117
Olivier Bournez
Olivier Bournez and Manuel Campagnolo
A Survey on Continuous Time Computations
null
New Computational Paradigms. Changing Conceptions of What is Computable. (Cooper, S.B. and L{\"o}we, B. and Sorbi, A., Eds.). New York, Springer-Verlag, pages 383-423. 2008
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide an overview of theories of continuous time computation. These theories allow us to understand both the hardness of questions related to continuous time dynamical systems and the computational power of continuous time analog models. We survey the existing models, summarizing results, and point to relevant references in the literature.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 17:17:20 GMT" } ]
2009-07-20T00:00:00
[ [ "Bournez", "Olivier", "" ], [ "Campagnolo", "Manuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.3118
Olivier Bournez
Olivier Bournez, Philippe Chassaing, Johanne Cohen, Lucas Gerin and Xavier Koegler
On the Convergence of Population Protocols When Population Goes to Infinity
Submitted to Applied Mathematics and Computation. 2009
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Population protocols have been introduced as a model of sensor networks consisting of very limited mobile agents with no control over their own movement. A population protocol corresponds to a collection of anonymous agents, modeled by finite automata, that interact with one another to carry out computations, by updating their states, using some rules. Their computational power has been investigated under several hypotheses but always when restricted to finite size populations. In particular, predicates stably computable in the original model have been characterized as those definable in Presburger arithmetic. We study mathematically the convergence of population protocols when the size of the population goes to infinity. We do so by giving general results, that we illustrate through the example of a particular population protocol for which we even obtain an asymptotic development. This example shows in particular that these protocols seem to have a rather different computational power when a huge population hypothesis is considered.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 17:22:12 GMT" } ]
2009-07-20T00:00:00
[ [ "Bournez", "Olivier", "" ], [ "Chassaing", "Philippe", "" ], [ "Cohen", "Johanne", "" ], [ "Gerin", "Lucas", "" ], [ "Koegler", "Xavier", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.3123
Olivier Bournez
Emmanuel Beffara, Olivier Bournez, Hassen Kacem, Claude Kirchner
Verification of Timed Automata Using Rewrite Rules and Strategies
In the Proceedings BISFAI 2001, Seventh Biennial Bar-Ilan International Symposium on the Foundations of Artificial Intelligence. Ramat-Gan, 2001
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
ELAN is a powerful language and environment for specifying and prototyping deduction systems in a language based on rewrite rules controlled by strategies. Timed automata is a class of continuous real-time models of reactive systems for which efficient model-checking algorithms have been devised. In this paper, we show that these algorithms can very easily be prototyped in the ELAN system. This paper argues through this example that rewriting based systems relying on rules and strategies are a good framework to prototype, study and test rather efficiently symbolic model-checking algorithms, i.e. algorithms which involve combination of graph exploration rules, deduction rules, constraint solving techniques and decision procedures.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 17:40:04 GMT" } ]
2009-07-20T00:00:00
[ [ "Beffara", "Emmanuel", "" ], [ "Bournez", "Olivier", "" ], [ "Kacem", "Hassen", "" ], [ "Kirchner", "Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.3126
Olivier Bournez
Olivier Bournez, Jeremie Chalopin, Johanne Cohen, Xavier Koegler
Population Protocols that Correspond to Symmetric Games
null
null
null
null
cs.GT cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Population protocols have been introduced by Angluin et {al.} as a model of networks consisting of very limited mobile agents that interact in pairs but with no control over their own movement. A collection of anonymous agents, modeled by finite automata, interact pairwise according to some rules that update their states. The model has been considered as a computational model in several papers. Input values are initially distributed among the agents, and the agents must eventually converge to the the correct output. Predicates on the initial configurations that can be computed by such protocols have been characterized under various hypotheses. In an orthogonal way, several distributed systems have been termed in literature as being realizations of games in the sense of game theory. In this paper, we investigate under which conditions population protocols, or more generally pairwise interaction rules, can be considered as the result of a symmetric game. We prove that not all rules can be considered as symmetric games.% We prove that some basic protocols can be realized using symmetric games. As a side effect of our study, we also prove that any population protocol can be simulated by a symmetric one (but not necessarily a game).
[ { "version": "v1", "created": "Fri, 17 Jul 2009 18:06:13 GMT" } ]
2009-07-20T00:00:00
[ [ "Bournez", "Olivier", "" ], [ "Chalopin", "Jeremie", "" ], [ "Cohen", "Johanne", "" ], [ "Koegler", "Xavier", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.3135
Philip Bille
Philip Bille
Fast Searching in Packed Strings
To appear in Journal of Discrete Algorithms. Special Issue on CPM 2009
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given strings $P$ and $Q$ the (exact) string matching problem is to find all positions of substrings in $Q$ matching $P$. The classical Knuth-Morris-Pratt algorithm [SIAM J. Comput., 1977] solves the string matching problem in linear time which is optimal if we can only read one character at the time. However, most strings are stored in a computer in a packed representation with several characters in a single word, giving us the opportunity to read multiple characters simultaneously. In this paper we study the worst-case complexity of string matching on strings given in packed representation. Let $m \leq n$ be the lengths $P$ and $Q$, respectively, and let $\sigma$ denote the size of the alphabet. On a standard unit-cost word-RAM with logarithmic word size we present an algorithm using time $$ O\left(\frac{n}{\log_\sigma n} + m + \occ\right). $$ Here $\occ$ is the number of occurrences of $P$ in $Q$. For $m = o(n)$ this improves the $O(n)$ bound of the Knuth-Morris-Pratt algorithm. Furthermore, if $m = O(n/\log_\sigma n)$ our algorithm is optimal since any algorithm must spend at least $\Omega(\frac{(n+m)\log \sigma}{\log n} + \occ) = \Omega(\frac{n}{\log_\sigma n} + \occ)$ time to read the input and report all occurrences. The result is obtained by a novel automaton construction based on the Knuth-Morris-Pratt algorithm combined with a new compact representation of subautomata allowing an optimal tabulation-based simulation.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 19:29:13 GMT" }, { "version": "v2", "created": "Tue, 7 Sep 2010 19:43:47 GMT" } ]
2010-09-08T00:00:00
[ [ "Bille", "Philip", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.3154
Stevan Harnad
Stevan Harnad
COMMENTARY ON: Citing and Reading Behavours in High-Energy Physics (arXiv:0906.5418)
2 pages
null
null
null
cs.DL
http://creativecommons.org/licenses/by-nc-sa/3.0/
Evidence confirming that OA increases impact will not be sufficient to induce enough researchers to provide OA; only mandates from their institutions and funders can ensure that. HEP researchers continue to submit their papers to peer-reviewed journals, as they always did, depositing both their unrefereed preprints and their refereed postprints. None of that has changed. In fields like HEP and astrophysics, the journal affordability/accessibility problem is not as great as in many other fields, where it the HEP Early Access impact advantage translates into the OA impact advantage itself. Almost no one has ever argued that Gold OA provides a greater OA advantage than Green OA. The OA advantage is the OA advantage, whether Green or Gold.
[ { "version": "v1", "created": "Fri, 17 Jul 2009 20:29:11 GMT" } ]
2009-09-30T00:00:00
[ [ "Harnad", "Stevan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0907.3177
Chengqing Li
Chengqing Li, David Arroyo, and Kwok-Tung Lo
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps
9 pages, 7 figures
null
10.1142/S0218127410027192
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, a chaotic cryptographic scheme based on composition maps was proposed. This paper studies the security of the scheme and reports the following findings: 1) the scheme can be broken by a differential attack with $6+\lceil\log_L(MN)\rceil$ chosen-plaintext, where $MN$ is the size of plaintext and $L$ is the number of different elements in plain-text; 2) the scheme is not sensitive to the changes of plaintext; 3) the two composition maps do not work well as a secure and efficient random number source.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 03:47:49 GMT" } ]
2015-05-13T00:00:00
[ [ "Li", "Chengqing", "" ], [ "Arroyo", "David", "" ], [ "Lo", "Kwok-Tung", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.3183
Shivnath Babu
Nedyalko Borisov, Shivnath Babu, Sandeep Uttamchandani, Ramani Routray, Aameek Singh
Why Did My Query Slow Down?
A conference version of this work was published as: Why Did My Query Slow Down, By Nedyalko Borisov, Sandeep Uttamchandani, Ramani Routray, and Aameek Singh, In the Proc. of the 4th Biennial Conference on Innovative Data Systems Research, Asilomar, CA, USA, Jan 4-7, 2009
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many enterprise environments have databases running on network-attached server-storage infrastructure (referred to as Storage Area Networks or SANs). Both the database and the SAN are complex systems that need their own separate administrative teams. This paper puts forth the vision of an innovative management framework to simplify administrative tasks that require an in-depth understanding of both the database and the SAN. As a concrete instance, we consider the task of diagnosing the slowdown in performance of a database query that is executed multiple times (e.g., in a periodic report-generation setting). This task is very challenging because the space of possible causes includes problems specific to the database, problems specific to the SAN, and problems that arise due to interactions between the two systems. In addition, the monitoring data available from these systems can be noisy. We describe the design of DIADS which is an integrated diagnosis tool for database and SAN administrators. DIADS generates and uses a powerful abstraction called Annotated Plan Graphs (APGs) that ties together the execution path of queries in the database and the SAN. Using an innovative workflow that combines domain-specific knowledge with machine-learning techniques, DIADS was applied successfully to diagnose query slowdowns caused by complex combinations of events across a PostgreSQL database and a production SAN.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 06:37:37 GMT" }, { "version": "v2", "created": "Sat, 22 Oct 2011 05:23:52 GMT" } ]
2011-10-25T00:00:00
[ [ "Borisov", "Nedyalko", "" ], [ "Babu", "Shivnath", "" ], [ "Uttamchandani", "Sandeep", "" ], [ "Routray", "Ramani", "" ], [ "Singh", "Aameek", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0907.3200
Yong-Hyuk Kim
Yourim Yoon, Yong-Hyuk Kim, Alberto Moraglio, Byung-Ro Moon
A Mathematical Unification of Geometric Crossovers Defined on Phenotype Space
20 pages, 2 figures
null
null
null
cs.NE cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geometric crossover is a representation-independent definition of crossover based on the distance of the search space interpreted as a metric space. It generalizes the traditional crossover for binary strings and other important recombination operators for the most frequently used representations. Using a distance tailored to the problem at hand, the abstract definition of crossover can be used to design new problem specific crossovers that embed problem knowledge in the search. This paper is motivated by the fact that genotype-phenotype mapping can be theoretically interpreted using the concept of quotient space in mathematics. In this paper, we study a metric transformation, the quotient metric space, that gives rise to the notion of quotient geometric crossover. This turns out to be a very versatile notion. We give many example applications of the quotient geometric crossover.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 10:15:49 GMT" } ]
2009-07-21T00:00:00
[ [ "Yoon", "Yourim", "" ], [ "Kim", "Yong-Hyuk", "" ], [ "Moraglio", "Alberto", "" ], [ "Moon", "Byung-Ro", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.3202
Yong-Hyuk Kim
Yourim Yoon, Yong-Hyuk Kim, Alberto Moraglio, and Byung-Ro Moon
Mathematical Interpretation between Genotype and Phenotype Spaces and Induced Geometric Crossovers
21 pages, 3 figures
null
null
null
cs.NE cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present that genotype-phenotype mapping can be theoretically interpreted using the concept of quotient space in mathematics. Quotient space can be considered as mathematically-defined phenotype space in the evolutionary computation theory. The quotient geometric crossover has the effect of reducing the search space actually searched by geometric crossover, and it introduces problem knowledge in the search by using a distance better tailored to the specific solution interpretation. Quotient geometric crossovers are directly applied to the genotype space but they have the effect of the crossovers performed on phenotype space. We give many example applications of the quotient geometric crossover.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 10:31:07 GMT" } ]
2009-07-21T00:00:00
[ [ "Yoon", "Yourim", "" ], [ "Kim", "Yong-Hyuk", "" ], [ "Moraglio", "Alberto", "" ], [ "Moon", "Byung-Ro", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.3208
Serge Gaspers
Fedor V. Fomin, Serge Gaspers, Saket Saurabh, and St\'ephan Thomass\'e
A Linear Vertex Kernel for Maximum Internal Spanning Tree
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a polynomial time algorithm that for any graph G and integer k >= 0, either finds a spanning tree with at least k internal vertices, or outputs a new graph G' on at most 3k vertices and an integer k' such that G has a spanning tree with at least k internal vertices if and only if G' has a spanning tree with at least k' internal vertices. In other words, we show that the Maximum Internal Spanning Tree problem parameterized by the number of internal vertices k, has a 3k-vertex kernel. Our result is based on an innovative application of a classical min-max result about hypertrees in hypergraphs which states that "a hypergraph H contains a hypertree if and only if H is partition connected."
[ { "version": "v1", "created": "Mon, 20 Jul 2009 18:50:55 GMT" }, { "version": "v2", "created": "Sat, 3 Mar 2012 18:23:27 GMT" } ]
2012-03-06T00:00:00
[ [ "Fomin", "Fedor V.", "" ], [ "Gaspers", "Serge", "" ], [ "Saurabh", "Saket", "" ], [ "Thomassé", "Stéphan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.3209
Ula\c{s} Ba\u{g}ci
Ulas Bagci and Li Bai
Registration of Standardized Histological Images in Feature Space
SPIE Medical Imaging 2008 - submission
SPIE Medical Imaging 2008: Image Processing. Edited by Reinhardt, Joseph M.; Pluim, Josien P. W. Proceedings of the SPIE, Volume 6914, pp. 69142V-69142V-9 (2008)
10.1117/12.770219
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose three novel and important methods for the registration of histological images for 3D reconstruction. First, possible intensity variations and nonstandardness in images are corrected by an intensity standardization process which maps the image scale into a standard scale where the similar intensities correspond to similar tissues meaning. Second, 2D histological images are mapped into a feature space where continuous variables are used as high confidence image features for accurate registration. Third, we propose an automatic best reference slice selection algorithm that improves reconstruction quality based on both image entropy and mean square error of the registration process. We demonstrate that the choice of reference slice has a significant impact on registration error, standardization, feature space and entropy information. After 2D histological slices are registered through an affine transformation with respect to an automatically chosen reference, the 3D volume is reconstructed by co-registering 2D slices elastically.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 11:28:41 GMT" } ]
2009-07-21T00:00:00
[ [ "Bagci", "Ulas", "" ], [ "Bai", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.3215
Ula\c{s} Ba\u{g}ci
Ulas Bagci and Li Bai
Fully Automatic 3D Reconstruction of Histological Images
IEEE ISBI-08 Submission
5th IEEE International Symposium on Biomedical Imaging: From Nano to Macro ISBI-08, pp. 591-594. 2008
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose a computational framework for 3D volume reconstruction from 2D histological slices using registration algorithms in feature space. To improve the quality of reconstructed 3D volume, first, intensity variations in images are corrected by an intensity standardization process which maps image intensity scale to a standard scale where similar intensities correspond to similar tissues. Second, a subvolume approach is proposed for 3D reconstruction by dividing standardized slices into groups. Third, in order to improve the quality of the reconstruction process, an automatic best reference slice selection algorithm is developed based on an iterative assessment of image entropy and mean square error of the registration process. Finally, we demonstrate that the choice of the reference slice has a significant impact on registration quality and subsequent 3D reconstruction.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 12:32:27 GMT" } ]
2009-07-21T00:00:00
[ [ "Bagci", "Ulas", "" ], [ "Bai", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.3218
Ula\c{s} Ba\u{g}ci
Ulas Bagci and Li Bai
Parallel AdaBoost Algorithm for Gabor Wavelet Selection in Face Recognition
IEEE ICIP 2008 Submission
IEEE International Conference on Image Processing (ICIP-08), San Diego, CA, U.S.A, 12-15 October, 2008
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the problem of automatic Gabor wavelet selection for face recognition is tackled by introducing an automatic algorithm based on Parallel AdaBoosting method. Incorporating mutual information into the algorithm leads to the selection procedure not only based on classification accuracy but also on efficiency. Effective image features are selected by using properly chosen Gabor wavelets optimised with Parallel AdaBoost method and mutual information to get high recognition rates with low computational cost. Experiments are conducted using the well-known FERET face database. In proposed framework, memory and computation costs are reduced significantly and high classification accuracy is obtained.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 13:03:19 GMT" } ]
2009-07-21T00:00:00
[ [ "Bagci", "Ulas", "" ], [ "Bai", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.3220
Ula\c{s} Ba\u{g}ci
Ulas Bagci and Engin Erzin
Inter Genre Similarity Modelling For Automatic Music Genre Classification
Dafx 2006 submission
9th International Conference on Digital Audio Effects (DAFx-06), Montreal, Canada, September 18-20, 2006
null
null
cs.SD cs.AI stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Music genre classification is an essential tool for music information retrieval systems and it has been finding critical applications in various media platforms. Two important problems of the automatic music genre classification are feature extraction and classifier design. This paper investigates inter-genre similarity modelling (IGS) to improve the performance of automatic music genre classification. Inter-genre similarity information is extracted over the mis-classified feature population. Once the inter-genre similarity is modelled, elimination of the inter-genre similarity reduces the inter-genre confusion and improves the identification rates. Inter-genre similarity modelling is further improved with iterative IGS modelling(IIGS) and score modelling for IGS elimination(SMIGS). Experimental results with promising classification improvements are provided.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 13:25:59 GMT" } ]
2018-10-18T00:00:00
[ [ "Bagci", "Ulas", "" ], [ "Erzin", "Engin", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0907.3226
Walid Belkhir
Walid Belkhir
From Causal Semantics To Duration Timed Models
14 pages
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The interleaving semantics is not compatible with both action refinement and durational actions. Since many true concurrency semantics are congruent w.r.t. action refinement, notably the causality and the maximality ones, this has challenged us to study the dense time behavior - where the actions are of arbitrary fixed duration - within the causality semantics of Da Costa. We extend the causal transition systems with the clocks and the timed constraints, and thus we obtain an over class of timed automata where the actions need not to be atomic. We define a real time extension of the formal description technique CSP, called duration-CSP, by attributing the duration to actions. We give the operational timed causal semantics of duration-CSP as well as its denotational semantics over the class of timed causal transition systems. Afterwards, we prove that the two semantics are equivalent. Finally we extend the duration-CSP language with a refinement operator $\rho$ - that allows to replace an action with a process - and prove that it preserves the timed causal bisimulation.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 15:27:45 GMT" }, { "version": "v2", "created": "Tue, 13 Apr 2010 08:56:45 GMT" } ]
2010-04-14T00:00:00
[ [ "Belkhir", "Walid", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.3230
Arno Pauly
Arno Pauly
Infinite Oracle Queries in Type-2 Machines (Extended Abstract)
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define Oracle-Type-2-Machine capable of writing infinite oracle queries. In contrast to finite oracle queries, this extends the realm of oracle-computable functions into the discontinuous realm. Our definition is conservative; access to a computable oracle does not increase the computational power. Other models of real hypercomputation such as Ziegler's (finitely) revising computation or Type-2-Nondeterminism are shown to be special cases of Oracle-Type-2-Machines. Our approach offers an intuitive definition of the weakest machine model capable to simulate both Type-2-Machines and BSS machines.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 15:06:12 GMT" } ]
2009-07-21T00:00:00
[ [ "Pauly", "Arno", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.3246
Martyn Amos
Alan Gibbons and Martyn Amos
Wave propagation in filamental cellular automata
To appear in the International Journal of Natural Computing Research. Changes to previous version: (1) Made title more specific, (2) added several explanatory figures, (3) improved background material, (4) several clarifications as requested by referees
null
null
null
cs.FL nlin.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by questions in biology and distributed computing, we investigate the behaviour of particular cellular automata, modelled as one-dimensional arrays of identical finite automata. We investigate what sort of self-stabilising cooperative behaviour these can induce in terms of waves of cellular state changes along a filament of cells. We discover what the minimum requirements are, in terms of numbers of states and the range of communication between automata, to observe this for individual filaments. We also discover that populations of growing filaments may have useful features that the individual filament does not have, and we give the results of numerical simulations.
[ { "version": "v1", "created": "Sat, 18 Jul 2009 22:18:24 GMT" }, { "version": "v2", "created": "Sat, 14 Nov 2009 00:27:17 GMT" } ]
2009-11-14T00:00:00
[ [ "Gibbons", "Alan", "" ], [ "Amos", "Martyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Physics", "code": "nlin.CG", "description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases", "span": "(Cellular Automata and Lattice Gases)" } ]
0907.3291
Satish Babu Korada
S. Hamed Hassani, Satish Babu Korada, Ruediger Urbanke
The Compound Capacity of Polar Codes
5 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the compound capacity of polar codes under successive cancellation decoding for a collection of binary-input memoryless output-symmetric channels. By deriving a sequence of upper and lower bounds, we show that in general the compound capacity under successive decoding is strictly smaller than the unrestricted compound capacity.
[ { "version": "v1", "created": "Sun, 19 Jul 2009 14:27:01 GMT" } ]
2009-07-21T00:00:00
[ [ "Hassani", "S. Hamed", "" ], [ "Korada", "Satish Babu", "" ], [ "Urbanke", "Ruediger", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3315
Zi-Ke Zhang Mr.
Zi-Ke Zhang, Tao Zhou
Effective Personalized Recommendation in Collaborative Tagging Systems
null
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, collaborative tagging systems have attracted more and more attention and have been widely applied in web systems. Tags provide highly abstracted information about personal preferences and item content, and are therefore potential to help in improving better personalized recommendations. In this paper, we propose a tag-based recommendation algorithm considering the personal vocabulary and evaluate it in a real-world dataset: Del.icio.us. Experimental results demonstrate that the usage of tag information can significantly improve the accuracy of personalized recommendations.
[ { "version": "v1", "created": "Sun, 19 Jul 2009 18:56:37 GMT" } ]
2009-07-21T00:00:00
[ [ "Zhang", "Zi-Ke", "" ], [ "Zhou", "Tao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.3330
Carl Hewitt
Carl Hewitt
Inconsistency Robustness in Foundations: Mathematics self proves its own Consistency and Other Matters
Notation was made consistent with other articles. arXiv admin note: substantial text overlap with arXiv:0812.4852
null
null
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inconsistency Robustness is performance of information systems with pervasively inconsistent information. Inconsistency Robustness of the community of professional mathematicians is their performance repeatedly repairing contradictions over the centuries. In the Inconsistency Robustness paradigm, deriving contradictions have been a progressive development and not "game stoppers." Contradictions can be helpful instead of being something to be "swept under the rug" by denying their existence, which has been repeatedly attempted by Establishment Philosophers (beginning with some Pythagoreans). Such denial has delayed mathematical development. This article reports how considerations of Inconsistency Robustness have recently influenced the foundations of mathematics for Computer Science continuing a tradition developing the sociological basis for foundations. The current common understanding is that G\"odel proved "Mathematics cannot prove its own consistency, if it is consistent." However, the consistency of mathematics is proved by a simple argument in this article. Consequently, the current common understanding that G\"odel proved "Mathematics cannot prove its own consistency, if it is consistent" is inaccurate. Wittgenstein long ago showed that contradiction in mathematics results from the kind of "self-referential" sentence that G\"odel used in his argument that mathematics cannot prove its own consistency. However, using a typed grammar for mathematical sentences, it can be proved that the kind "self-referential" sentence that G\"odel used in his argument cannot be constructed because required the fixed point that G\"odel used to the construct the "self-referential" sentence does not exist. In this way, consistency of mathematics is preserved without giving up power.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 01:44:33 GMT" }, { "version": "v10", "created": "Fri, 20 Nov 2009 21:32:18 GMT" }, { "version": "v11", "created": "Mon, 14 Dec 2009 20:41:52 GMT" }, { "version": "v12", "created": "Tue, 15 Dec 2009 06:42:36 GMT" }, { "version": "v13", "created": "Tue, 29 Dec 2009 22:47:55 GMT" }, { "version": "v14", "created": "Thu, 31 Dec 2009 18:11:14 GMT" }, { "version": "v15", "created": "Tue, 12 Jan 2010 13:35:17 GMT" }, { "version": "v16", "created": "Mon, 8 Mar 2010 15:43:27 GMT" }, { "version": "v17", "created": "Thu, 11 Mar 2010 18:45:30 GMT" }, { "version": "v18", "created": "Mon, 22 Mar 2010 15:06:23 GMT" }, { "version": "v19", "created": "Tue, 23 Mar 2010 06:44:32 GMT" }, { "version": "v2", "created": "Wed, 29 Jul 2009 14:30:08 GMT" }, { "version": "v20", "created": "Wed, 24 Mar 2010 15:33:13 GMT" }, { "version": "v21", "created": "Thu, 8 Apr 2010 10:27:18 GMT" }, { "version": "v22", "created": "Wed, 21 Apr 2010 17:38:39 GMT" }, { "version": "v23", "created": "Thu, 22 Apr 2010 11:40:50 GMT" }, { "version": "v24", "created": "Tue, 27 Apr 2010 02:15:43 GMT" }, { "version": "v25", "created": "Tue, 4 May 2010 16:34:52 GMT" }, { "version": "v26", "created": "Thu, 6 May 2010 20:46:16 GMT" }, { "version": "v27", "created": "Wed, 12 May 2010 16:20:38 GMT" }, { "version": "v28", "created": "Wed, 19 May 2010 18:15:24 GMT" }, { "version": "v29", "created": "Sat, 22 May 2010 14:41:14 GMT" }, { "version": "v3", "created": "Mon, 17 Aug 2009 14:29:50 GMT" }, { "version": "v30", "created": "Mon, 7 Jun 2010 23:11:19 GMT" }, { "version": "v31", "created": "Mon, 21 Jun 2010 16:43:08 GMT" }, { "version": "v32", "created": "Wed, 30 Jun 2010 06:16:43 GMT" }, { "version": "v33", "created": "Mon, 12 Jul 2010 15:51:20 GMT" }, { "version": "v34", "created": "Thu, 15 Jul 2010 17:36:15 GMT" }, { "version": "v35", "created": "Mon, 19 Jul 2010 07:48:43 GMT" }, { "version": "v36", "created": "Mon, 26 Jul 2010 16:48:39 GMT" }, { "version": "v37", "created": "Mon, 9 Aug 2010 08:44:32 GMT" }, { "version": "v38", "created": "Wed, 18 Aug 2010 17:28:42 GMT" }, { "version": "v39", "created": "Mon, 23 Aug 2010 14:48:39 GMT" }, { "version": "v4", "created": "Mon, 24 Aug 2009 14:30:19 GMT" }, { "version": "v40", "created": "Mon, 6 Sep 2010 13:37:37 GMT" }, { "version": "v41", "created": "Fri, 5 Nov 2010 19:37:11 GMT" }, { "version": "v42", "created": "Sat, 8 Jan 2011 03:38:48 GMT" }, { "version": "v43", "created": "Thu, 11 Oct 2012 16:31:11 GMT" }, { "version": "v44", "created": "Mon, 29 Dec 2014 19:46:13 GMT" }, { "version": "v45", "created": "Mon, 9 Feb 2015 05:18:48 GMT" }, { "version": "v46", "created": "Tue, 17 Feb 2015 18:32:13 GMT" }, { "version": "v5", "created": "Sun, 6 Sep 2009 00:43:37 GMT" }, { "version": "v6", "created": "Sun, 4 Oct 2009 16:59:37 GMT" }, { "version": "v7", "created": "Sun, 11 Oct 2009 16:52:58 GMT" }, { "version": "v8", "created": "Tue, 20 Oct 2009 17:59:23 GMT" }, { "version": "v9", "created": "Wed, 4 Nov 2009 16:44:00 GMT" } ]
2015-02-18T00:00:00
[ [ "Hewitt", "Carl", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.3340
Rachael Tappenden Miss
R. Broughton, I. Coope, P. Renaud, R. Tappenden
A Barzilai-Borwein $l_1$-Regularized Least Squares Algorithm for Compressed Sensing
null
null
null
null
cs.NA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Problems in signal processing and medical imaging often lead to calculating sparse solutions to under-determined linear systems. Methodologies for solving this problem are presented as background to the method used in this work where the problem is reformulated as an unconstrained convex optimization problem. The least squares approach is modified by an $l_1$-regularization term. A sparse solution is sought using a Barzilai-Borwein type projection algorithm with an adaptive step length. New insight into the choice of step length is provided through a study of the special structure of the underlying problem. Numerical experiments are conducted and results given, comparing this algorithm with a number of other current algorithms.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 05:45:11 GMT" } ]
2009-07-21T00:00:00
[ [ "Broughton", "R.", "" ], [ "Coope", "I.", "" ], [ "Renaud", "P.", "" ], [ "Tappenden", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3341
Onur Ozan Koyluoglu
Karim Khalil, O. Ozan Koyluoglu, Hesham El Gamal, and Moustafa Youssef
Opportunistic Secrecy with a Strict Delay Constraint
Submitted to IEEE Transactions on Information Theory
null
10.1109/TCOMM.2013.101113.130356
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the delay limited secrecy capacity of the flat fading channel under two different assumptions on the available transmitter channel state information (CSI). The first scenario assumes perfect prior knowledge of both the main and eavesdropper channel gains. Here, upper and lower bounds on the delay limited secrecy capacity are derived, and shown to be tight in the high signal-to-noise ratio (SNR) regime. In the second scenario, only the main channel CSI is assumed to be available at the transmitter where, remarkably, we establish the achievability of a non-zero delay-limited secure rate, for a wide class of channel distributions, with a high probability. In the two cases, our achievability arguments are based on a novel two-stage key-sharing approach that overcomes the secrecy outage phenomenon observed in earlier works.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 05:07:30 GMT" } ]
2016-11-17T00:00:00
[ [ "Khalil", "Karim", "" ], [ "Koyluoglu", "O. Ozan", "" ], [ "Gamal", "Hesham El", "" ], [ "Youssef", "Moustafa", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3342
Gerard Bloch
Mustapha Ouladsine (LSIS), G\'erard Bloch (CRAN), Xavier Dovifaaz (CRAN)
Neural Modeling and Control of Diesel Engine with Pollution Constraints
15 pages
Journal of Intelligent and Robotic Systems 41, 2-3 (2005) 157-171
10.1007/s10846-005-3806-y
null
cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper describes a neural approach for modelling and control of a turbocharged Diesel engine. A neural model, whose structure is mainly based on some physical equations describing the engine behaviour, is built for the rotation speed and the exhaust gas opacity. The model is composed of three interconnected neural submodels, each of them constituting a nonlinear multi-input single-output error model. The structural identification and the parameter estimation from data gathered on a real engine are described. The neural direct model is then used to determine a neural controller of the engine, in a specialized training scheme minimising a multivariable criterion. Simulations show the effect of the pollution constraint weighting on a trajectory tracking of the engine speed. Neural networks, which are flexible and parsimonious nonlinear black-box models, with universal approximation capabilities, can accurately describe or control complex nonlinear systems, with little a priori theoretical knowledge. The presented work extends optimal neuro-control to the multivariable case and shows the flexibility of neural optimisers. Considering the preliminary results, it appears that neural networks can be used as embedded models for engine control, to satisfy the more and more restricting pollutant emission legislation. Particularly, they are able to model nonlinear dynamics and outperform during transients the control schemes based on static mappings.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 05:58:24 GMT" } ]
2019-08-24T00:00:00
[ [ "Ouladsine", "Mustapha", "", "LSIS" ], [ "Bloch", "Gérard", "", "CRAN" ], [ "Dovifaaz", "Xavier", "", "CRAN" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0907.3348
Alexander Kholosha
Tor Helleseth and Alexander Kholosha
New Binomial Bent Function over the Finite Fields of Odd Characteristic
13 pages
null
null
null
cs.DM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The $p$-ary function $f(x)$ mapping $\mathrm{GF}(p^{4k})$ to $\mathrm{GF}(p)$ given by $f(x)={\rm Tr}_{4k}\big(x^{p^{3k}+p^{2k}-p^k+1}+x^2\big)$ is proven to be a weakly regular bent function and the exact values of its Walsh transform coefficients are found. The proof is based on a few new results in the area of exponential sums and polynomials over finite fields that may also be interesting as independent problems.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 07:12:29 GMT" } ]
2009-07-21T00:00:00
[ [ "Helleseth", "Tor", "" ], [ "Kholosha", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.3387
Moshe Schwartz
Itzhak Tamo and Moshe Schwartz
Correcting Limited-Magnitude Errors in the Rank-Modulation Scheme
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study error-correcting codes for permutations under the infinity norm, motivated by a novel storage scheme for flash memories call rank modulation. In this scheme, a set of $n$ flash cells are combined to create a single virtual multi-level cell. Information is stored in the permutation induced by the cell charge levels. Spike errors, which are characterized by a limited-magnitude change in cell charge levels, correspond to a low-distance change under the infinity norm. We define codes protecting against spike errors, called limited-magnitude rank-modulation codes (LMRM codes), and present several constructions for these codes, some resulting in optimal codes. These codes admit simple recursive, and sometimes direct, encoding and decoding procedures. We also provide lower and upper bounds on the maximal size of LMRM codes both in the general case, and in the case where the codes form a subgroup of the symmetric group. In the asymptotic analysis, the codes we construct out-perform the Gilbert-Varshamov-like bound estimate.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 12:59:30 GMT" }, { "version": "v2", "created": "Sun, 2 Aug 2009 06:17:11 GMT" } ]
2009-08-02T00:00:00
[ [ "Tamo", "Itzhak", "" ], [ "Schwartz", "Moshe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3397
Somphong Jitman
Somphong Jitman, Patanee Udomkavanich
The Gray Image of Codes over Finite Chain Rings
Submit to Discrete Mathematics
null
null
null
math.RA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The results of J. F. Qiann et al. [4] on $(1-\gamma)$-cyclic codes over finite chain rings of nilpotency index 2 are extended to $(1-\gamma^e)$-cyclic codes over finite chain rings of arbitrary nilpotency index $e+1$. The Gray map is introduced for this type of rings. We prove that the Gray image of a linear $(1 - \gamma^{e})$-cyclic code over a finite chain ring is a distance-invariant quasi-cyclic code over its residue field. When the length of codes and the characteristic of a ring are relatively prime, the Gray images of a linear cyclic code and a linear $(1+\gamma^e)$-cyclic code are permutatively to quasi-cyclic codes over its residue field.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 13:37:11 GMT" }, { "version": "v2", "created": "Tue, 21 Jul 2009 03:14:55 GMT" }, { "version": "v3", "created": "Wed, 29 Jul 2009 03:53:01 GMT" }, { "version": "v4", "created": "Fri, 2 Oct 2009 17:24:20 GMT" } ]
2009-10-02T00:00:00
[ [ "Jitman", "Somphong", "" ], [ "Udomkavanich", "Patanee", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3402
Matteo Dell'Amico
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
Measuring Password Strength: An Empirical Analysis
15 pages, 9 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an in-depth analysis on the strength of the almost 10,000 passwords from users of an instant messaging server in Italy. We estimate the strength of those passwords, and compare the effectiveness of state-of-the-art attack methods such as dictionaries and Markov chain-based techniques. We show that the strength of passwords chosen by users varies enormously, and that the cost of attacks based on password strength grows very quickly when the attacker wants to obtain a higher success percentage. In accordance with existing studies we observe that, in the absence of measures for enforcing password strength, weak passwords are common. On the other hand we discover that there will always be a subset of users with extremely strong passwords that are very unlikely to be broken. The results of our study will help in evaluating the security of password-based authentication means, and they provide important insights for inspiring new and better proactive password checkers and password recovery tools.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 13:53:56 GMT" } ]
2009-07-21T00:00:00
[ [ "Dell'Amico", "Matteo", "" ], [ "Michiardi", "Pietro", "" ], [ "Roudier", "Yves", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.3414
Ashutosh Trivedi
Marcin Jurdzi\'nski and Ashutosh Trivedi
Reachability-time games on timed automata
null
In ICALP, Volume 4596 of LNCS, pages 838--849, Springer 2007
10.1007/978-3-540-73420-8_72
null
cs.CC cs.DS cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a reachability-time game, players Min and Max choose moves so that the time to reach a final state in a timed automaton is minimised or maximised, respectively. Asarin and Maler showed decidability of reachability-time games on strongly non-Zeno timed automata using a value iteration algorithm. This paper complements their work by providing a strategy improvement algorithm for the problem. It also generalizes their decidability result because the proposed strategy improvement algorithm solves reachability-time games on all timed automata. The exact computational complexity of solving reachability-time games is also established: the problem is EXPTIME-complete for timed automata with at least two clocks.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 14:57:38 GMT" } ]
2020-01-16T00:00:00
[ [ "Jurdziński", "Marcin", "" ], [ "Trivedi", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.3445
Martin Klein
Martin Klein, Michael L. Nelson
Investigating the Change of Web Pages' Titles Over Time
6 pages, 8 figures, 1 table, 1 appendix
null
null
null
cs.IR cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inaccessible web pages are part of the browsing experience. The content of these pages however is often not completely lost but rather missing. Lexical signatures (LS) generated from the web pages' textual content have been shown to be suitable as search engine queries when trying to discover a (missing) web page. Since LSs are expensive to generate, we investigate the potential of web pages' titles as they are available at a lower cost. We present the results from studying the change of titles over time. We take titles from copies provided by the Internet Archive of randomly sampled web pages and show the frequency of change as well as the degree of change in terms of the Levenshtein score. We found very low frequencies of change and high Levenshtein scores indicating that titles, on average, change little from their original, first observed values (rooted comparison) and even less from the values of their previous observation (sliding).
[ { "version": "v1", "created": "Mon, 20 Jul 2009 16:56:51 GMT" } ]
2009-07-21T00:00:00
[ [ "Klein", "Martin", "" ], [ "Nelson", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0907.3456
Scott Turner
Scott Turner, Manuel A. Perez-Quinones
Exploring Peer Review in the Computer Science Classroom
69 pages
null
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In computer science, students could benefit from more opportunities to learn important, high-level concepts and to improve their learning skills. Peer review is one method to encourage this by providing students with the opportunity to evaluate other people's work and to receive feedback on their own projects. This allows for rich learning experience but it is not immediately obvious how to create a programming project review that will improve the students' conceptual understanding, require higher level thinking, and be engaging. The current literature does not typically address differences between review implementations or provide reasons for design decisions. This work explored how two different types of reviews affected the students' learning of concepts, high-level thinking, and engagement. There were indications that the type of review affected how well students addressed the concept they were reviewing and the comments' length. This shows that the review's type may affect student engagement and conceptual learning. There were also differences in how they reviewed the concepts of Abstraction, Decomposition, and Encapsulation, suggesting that the concepts are being learned in different ways. Both of these results have an impact on the use of peer review computer science but need further investigation.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 18:10:41 GMT" } ]
2009-07-21T00:00:00
[ [ "Turner", "Scott", "" ], [ "Perez-Quinones", "Manuel A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0907.3493
Salim El Rouayheb
Salim El Rouayheb, Emina Soljanin and Alex Sprintson
Secure Network Coding for Wiretap Networks of Type II
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of securing a multicast network against a wiretapper that can intercept the packets on a limited number of arbitrary network edges of its choice. We assume that the network employs the network coding technique to simultaneously deliver the packets available at the source to all the receivers. We show that this problem can be looked at as a network generalization of the wiretap channel of type II introduced in a seminal paper by Ozarow and Wyner. In particular, we show that the transmitted information can be secured by using the Ozarow-Wyner approach of coset coding at the source on top of the existing network code. This way, we quickly and transparently recover some of the results available in the literature on secure network coding for wiretap networks. Moreover, we derive new bounds on the required alphabet size that are independent of the network size and devise an algorithm for the construction of secure network codes. We also look at the dual problem and analyze the amount of information that can be gained by the wiretapper as a function of the number of wiretapped edges.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 20:52:16 GMT" } ]
2009-07-22T00:00:00
[ [ "Rouayheb", "Salim El", "" ], [ "Soljanin", "Emina", "" ], [ "Sprintson", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3497
Chinh Hoang
Daniel Bruce, Chinh T. Hoang, Joe Sawada
A certifying algorithm for 3-colorability of P5-free graphs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a certifying algorithm for the problem of deciding whether a P5- free graph is 3-colorable by showing there are exactly six finite graphs that are P5-free and not 3-colorable and minimal with respect to this property.
[ { "version": "v1", "created": "Mon, 20 Jul 2009 21:33:25 GMT" } ]
2009-07-22T00:00:00
[ [ "Bruce", "Daniel", "" ], [ "Hoang", "Chinh T.", "" ], [ "Sawada", "Joe", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.3520
George Djorgovski
S. G. Djorgovski, P. Hut, S. McMillan, E. Vesperini, R. Knop, W. Farr, M. J. Graham
Exploring the Use of Virtual Worlds as a Scientific Research Platform: The Meta-Institute for Computational Astrophysics (MICA)
15 pages, to appear in the refereed proceedings of "Facets of Virtual Environments" (FaVE 2009), eds. F. Lehmann-Grube, J. Sablating, et al., ICST Lecture Notes Ser., Berlin: Springer Verlag (2009); version with full resolution color figures is available at http://www.mica-vw.org/wiki/index.php/Publications
null
10.1007/978-3-642-11743-5_3
null
astro-ph.IM cs.CY physics.ed-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the Meta-Institute for Computational Astrophysics (MICA), the first professional scientific organization based exclusively in virtual worlds (VWs). The goals of MICA are to explore the utility of the emerging VR and VWs technologies for scientific and scholarly work in general, and to facilitate and accelerate their adoption by the scientific research community. MICA itself is an experiment in academic and scientific practices enabled by the immersive VR technologies. We describe the current and planned activities and research directions of MICA, and offer some thoughts as to what the future developments in this arena may be.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 00:43:24 GMT" } ]
2015-05-13T00:00:00
[ [ "Djorgovski", "S. G.", "" ], [ "Hut", "P.", "" ], [ "McMillan", "S.", "" ], [ "Vesperini", "E.", "" ], [ "Knop", "R.", "" ], [ "Farr", "W.", "" ], [ "Graham", "M. J.", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.ed-ph", "description": "Report of results of a research study, laboratory experience, assessment or classroom practice that represents a way to improve teaching and learning in physics. Also, report on misconceptions of students, textbook errors, and other similar information relative to promoting physics understanding.", "span": "(Physics Education)" } ]
0907.3563
Jaroslaw Byrka
Jaroslaw Byrka, Andreas Karrenbauer, Laura Sanita
The interval constrained 3-coloring problem
minor revision
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we settle the open complexity status of interval constrained coloring with a fixed number of colors. We prove that the problem is already NP-complete if the number of different colors is 3. Previously, it has only been known that it is NP-complete, if the number of colors is part of the input and that the problem is solvable in polynomial time, if the number of colors is at most 2. We also show that it is hard to satisfy almost all of the constraints for a feasible instance.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 07:39:50 GMT" }, { "version": "v2", "created": "Thu, 17 Dec 2009 14:30:22 GMT" } ]
2009-12-17T00:00:00
[ [ "Byrka", "Jaroslaw", "" ], [ "Karrenbauer", "Andreas", "" ], [ "Sanita", "Laura", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.3574
Andrea Montanari
David L. Donoho and Arian Maleki and Andrea Montanari
Message Passing Algorithms for Compressed Sensing
6 pages paper + 9 pages supplementary information, 13 eps figure. Submitted to Proc. Natl. Acad. Sci. USA
null
10.1073/pnas.0909892106
null
cs.IT cond-mat.dis-nn math.IT stat.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Compressed sensing aims to undersample certain high-dimensional signals, yet accurately reconstruct them by exploiting signal characteristics. Accurate reconstruction is possible when the object to be recovered is sufficiently sparse in a known basis. Currently, the best known sparsity-undersampling tradeoff is achieved when reconstructing by convex optimization -- which is expensive in important large-scale applications. Fast iterative thresholding algorithms have been intensively studied as alternatives to convex optimization for large-scale problems. Unfortunately known fast algorithms offer substantially worse sparsity-undersampling tradeoffs than convex optimization. We introduce a simple costless modification to iterative thresholding making the sparsity-undersampling tradeoff of the new algorithms equivalent to that of the corresponding convex optimization procedures. The new iterative-thresholding algorithms are inspired by belief propagation in graphical models. Our empirical measurements of the sparsity-undersampling tradeoff for the new algorithms agree with theoretical calculations. We show that a state evolution formalism correctly derives the true sparsity-undersampling tradeoff. There is a surprising agreement between earlier calculations based on random convex polytopes and this new, apparently very different theoretical formalism.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 14:47:47 GMT" } ]
2015-05-13T00:00:00
[ [ "Donoho", "David L.", "" ], [ "Maleki", "Arian", "" ], [ "Montanari", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" } ]
0907.3576
Volker Pohl
Yonina C. Eldar, Volker Pohl
Recovering Signals from Lowpass Data
submitted to IEEE Trans. Signal Process. Jul. 2009
IEEE Signal Process., vol. 58, no. 5, pp. 2636-2646 , May 2010
10.1109/TSP.2010.2041278
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of recovering a signal from its low frequency components occurs often in practical applications due to the lowpass behavior of many physical systems. Here we study in detail conditions under which a signal can be determined from its low-frequency content. We focus on signals in shift-invariant spaces generated by multiple generators. For these signals, we derive necessary conditions on the cutoff frequency of the lowpass filter as well as necessary and sufficient conditions on the generators such that signal recovery is possible. When the lowpass content is not sufficient to determine the signal, we propose appropriate pre-processing that can improve the reconstruction ability. In particular, we show that modulating the signal with one or more mixing functions prior to lowpass filtering, can ensure the recovery of the signal in many cases, and reduces the necessary bandwidth of the filter.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 08:27:24 GMT" } ]
2013-02-20T00:00:00
[ [ "Eldar", "Yonina C.", "" ], [ "Pohl", "Volker", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3583
Yoo Chung
Yoo Chung and Dongman Lee
Web of Lossy Adapters for Interface Interoperability: An Algorithm and NP-completeness of Minimization
7 pages
Proc. of ICSESS 2010
10.1109/ICSESS.2010.5552291
null
cs.SE cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By using different interface adapters for different methods, it is possible to construct a maximally covering web of interface adapters which incurs minimum loss during interface adaptation. We introduce a polynomial-time algorithm that can achieve this. However, we also show that minimizing the number of adapters included in a maximally covering web of interface adapters is an NP-complete problem.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 08:58:06 GMT" } ]
2010-12-01T00:00:00
[ [ "Chung", "Yoo", "" ], [ "Lee", "Dongman", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.3599
Jean-Francois Monin
Jean-Fran\c{c}ois Monin (VERIMAG - Imag), Cristian Ene (VERIMAG - Imag), Micha\"el P\'erin (VERIMAG - Imag)
Gentzen-Prawitz Natural Deduction as a Teaching Tool
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report a four-years experiment in teaching reasoning to undergraduate students, ranging from weak to gifted, using Gentzen-Prawitz's style natural deduction. We argue that this pedagogical approach is a good alternative to the use of Boolean algebra for teaching reasoning, especially for computer scientists and formal methods practionners.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 09:58:12 GMT" } ]
2009-07-22T00:00:00
[ [ "Monin", "Jean-François", "", "VERIMAG - Imag" ], [ "Ene", "Cristian", "", "VERIMAG -\n Imag" ], [ "Périn", "Michaël", "", "VERIMAG - Imag" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.3604
Mark Grundland
Mark Grundland, Jiri Patera, Zuzana Masakova and Neil A. Dodgson
Image Sampling with Quasicrystals
For a full resolution version of this paper, along with supplementary materials, please visit at http://www.Eyemaginary.com/Portfolio/Publications.html
SIGMA 5 (2009), 075, 23 pages
10.3842/SIGMA.2009.075
null
cs.CV cs.GR
http://creativecommons.org/licenses/by-nc-sa/3.0/
We investigate the use of quasicrystals in image sampling. Quasicrystals produce space-filling, non-periodic point sets that are uniformly discrete and relatively dense, thereby ensuring the sample sites are evenly spread out throughout the sampled image. Their self-similar structure can be attractive for creating sampling patterns endowed with a decorative symmetry. We present a brief general overview of the algebraic theory of cut-and-project quasicrystals based on the geometry of the golden ratio. To assess the practical utility of quasicrystal sampling, we evaluate the visual effects of a variety of non-adaptive image sampling strategies on photorealistic image reconstruction and non-photorealistic image rendering used in multiresolution image representations. For computer visualization of point sets used in image sampling, we introduce a mosaic rendering technique.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 10:08:48 GMT" } ]
2009-07-22T00:00:00
[ [ "Grundland", "Mark", "" ], [ "Patera", "Jiri", "" ], [ "Masakova", "Zuzana", "" ], [ "Dodgson", "Neil A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0907.3616
Venkatesh Ramaiyan
Venkatesh Ramaiyan, Anurag Kumar, and Eitan Altman,
Optimal Routing and Power Control for a Single Cell, Dense, Ad Hoc Wireless Network
Technical report of WiOpt 2007 paper
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a dense, ad hoc wireless network, confined to a small region. The wireless network is operated as a single cell, i.e., only one successful transmission is supported at a time. Data packets are sent between sourcedestination pairs by multihop relaying. We assume that nodes self-organise into a multihop network such that all hops are of length d meters, where d is a design parameter. There is a contention based multiaccess scheme, and it is assumed that every node always has data to send, either originated from it or a transit packet (saturation assumption). In this scenario, we seek to maximize a measure of the transport capacity of the network (measured in bit-meters per second) over power controls (in a fading environment) and over the hop distance d, subject to an average power constraint. We first argue that for a dense collection of nodes confined to a small region, single cell operation is efficient for single user decoding transceivers. Then, operating the dense ad hoc wireless network (described above) as a single cell, we study the hop length and power control that maximizes the transport capacity for a given network power constraint.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 11:13:54 GMT" } ]
2009-07-22T00:00:00
[ [ "Ramaiyan", "Venkatesh", "" ], [ "Kumar", "Anurag", "" ], [ "Altman", "Eitan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3631
Uriel Feige
Reid Andersen and Uriel Feige
Interchanging distance and capacity in probabilistic mappings
16 pages, no figures
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Harald Racke [STOC 2008] described a new method to obtain hierarchical decompositions of networks in a way that minimizes the congestion. Racke's approach is based on an equivalence that he discovered between minimizing congestion and minimizing stretch (in a certain setting). Here we present Racke's equivalence in an abstract setting that is more general than the one described in Racke's work, and clarifies the power of Racke's result. In addition, we present a related (but different) equivalence that was developed by Yuval Emek [ESA 2009] and is only known to apply to planar graphs.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 12:33:36 GMT" } ]
2009-07-22T00:00:00
[ [ "Andersen", "Reid", "" ], [ "Feige", "Uriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.3654
J\'er\^ome Gauthier
Jerome Gauthier, Laurent Duval and Jean-Christophe Pesquet
Optimization of Synthesis Oversampled Complex Filter Banks
null
IEEE Transactions on Signal Processing, October 2009, Volume 57, Issue 10, p. 3827-3843
10.1109/TSP.2009.2023947
null
cs.IT cs.SY eess.SY math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An important issue with oversampled FIR analysis filter banks (FBs) is to determine inverse synthesis FBs, when they exist. Given any complex oversampled FIR analysis FB, we first provide an algorithm to determine whether there exists an inverse FIR synthesis system. We also provide a method to ensure the Hermitian symmetry property on the synthesis side, which is serviceable to processing real-valued signals. As an invertible analysis scheme corresponds to a redundant decomposition, there is no unique inverse FB. Given a particular solution, we parameterize the whole family of inverses through a null space projection. The resulting reduced parameter set simplifies design procedures, since the perfect reconstruction constrained optimization problem is recast as an unconstrained optimization problem. The design of optimized synthesis FBs based on time or frequency localization criteria is then investigated, using a simple yet efficient gradient algorithm.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 13:41:45 GMT" } ]
2023-01-19T00:00:00
[ [ "Gauthier", "Jerome", "" ], [ "Duval", "Laurent", "" ], [ "Pesquet", "Jean-Christophe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Electrical Engineering and Systems Science", "code": "eess.SY", "description": "This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0907.3666
Mihailo Stojnic
Mihailo Stojnic
Various thresholds for $\ell_1$-optimization in compressed sensing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, \cite{CRT,DonohoPol} theoretically analyzed the success of a polynomial $\ell_1$-optimization algorithm in solving an under-determined system of linear equations. In a large dimensional and statistical context \cite{CRT,DonohoPol} proved that if the number of equations (measurements in the compressed sensing terminology) in the system is proportional to the length of the unknown vector then there is a sparsity (number of non-zero elements of the unknown vector) also proportional to the length of the unknown vector such that $\ell_1$-optimization succeeds in solving the system. In this paper, we provide an alternative performance analysis of $\ell_1$-optimization and obtain the proportionality constants that in certain cases match or improve on the best currently known ones from \cite{DonohoPol,DT}.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 14:40:27 GMT" } ]
2009-07-22T00:00:00
[ [ "Stojnic", "Mihailo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3679
Mihailo Stojnic
Mihailo Stojnic
Block-length dependent thresholds in block-sparse compressed sensing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most basic problems in compressed sensing is solving an under-determined system of linear equations. Although this problem seems rather hard certain $\ell_1$-optimization algorithm appears to be very successful in solving it. The recent work of \cite{CRT,DonohoPol} rigorously proved (in a large dimensional and statistical context) that if the number of equations (measurements in the compressed sensing terminology) in the system is proportional to the length of the unknown vector then there is a sparsity (number of non-zero elements of the unknown vector) also proportional to the length of the unknown vector such that $\ell_1$-optimization algorithm succeeds in solving the system. In more recent papers \cite{StojnicICASSP09block,StojnicJSTSP09} we considered the setup of the so-called \textbf{block}-sparse unknown vectors. In a large dimensional and statistical context, we determined sharp lower bounds on the values of allowable sparsity for any given number (proportional to the length of the unknown vector) of equations such that an $\ell_2/\ell_1$-optimization algorithm succeeds in solving the system. The results established in \cite{StojnicICASSP09block,StojnicJSTSP09} assumed a fairly large block-length of the block-sparse vectors. In this paper we consider the block-length to be a parameter of the system. Consequently, we then establish sharp lower bounds on the values of the allowable block-sparsity as functions of the block-length.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 15:13:07 GMT" } ]
2009-07-22T00:00:00
[ [ "Stojnic", "Mihailo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3710
Andrei Sukhov M
A.V. Sukhov, T.G. Sultanov, M.V. Strizhov, A.P. Platonov
Throughput metrics and packet delay in TCP/IP networks
6 pages, 3 figures
RIPE 59, Lissabon, 2009
null
null
cs.NI cs.PF
http://creativecommons.org/licenses/by/3.0/
In the paper the method for estimation of throughput metrics like available bandwidth and end-t-end capacity is supposed. This method is based on measurement of network delay $D_i$ for packets of different sizes $W_i$. The simple expression for available bandwidth $B_{av} =(W_2-W_1)/(D_2-D_1)$ is substantiated. The number of experiments on matching of the results received new and traditional methods is spent. The received results testify to possibility of application of new model.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 17:35:44 GMT" } ]
2009-07-22T00:00:00
[ [ "Sukhov", "A. V.", "" ], [ "Sultanov", "T. G.", "" ], [ "Strizhov", "M. V.", "" ], [ "Platonov", "A. P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0907.3754
Moritz Hardt
Moritz Hardt, Kunal Talwar
On the Geometry of Differential Privacy
27 pages
null
null
null
cs.CC cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the noise complexity of differentially private mechanisms in the setting where the user asks $d$ linear queries $f\colon\Rn\to\Re$ non-adaptively. Here, the database is represented by a vector in $\Rn$ and proximity between databases is measured in the $\ell_1$-metric. We show that the noise complexity is determined by two geometric parameters associated with the set of queries. We use this connection to give tight upper and lower bounds on the noise complexity for any $d \leq n$. We show that for $d$ random linear queries of sensitivity~1, it is necessary and sufficient to add $\ell_2$-error $\Theta(\min\{d\sqrt{d}/\epsilon,d\sqrt{\log (n/d)}/\epsilon\})$ to achieve $\epsilon$-differential privacy. Assuming the truth of a deep conjecture from convex geometry, known as the Hyperplane conjecture, we can extend our results to arbitrary linear queries giving nearly matching upper and lower bounds. Our bound translates to error $O(\min\{d/\epsilon,\sqrt{d\log(n/d)}/\epsilon\})$ per answer. The best previous upper bound (Laplacian mechanism) gives a bound of $O(\min\{d/\eps,\sqrt{n}/\epsilon\})$ per answer, while the best known lower bound was $\Omega(\sqrt{d}/\epsilon)$. In contrast, our lower bound is strong enough to separate the concept of differential privacy from the notion of approximate differential privacy where an upper bound of $O(\sqrt{d}/\epsilon)$ can be achieved.
[ { "version": "v1", "created": "Tue, 21 Jul 2009 22:26:02 GMT" }, { "version": "v2", "created": "Thu, 17 Sep 2009 00:40:40 GMT" }, { "version": "v3", "created": "Mon, 9 Nov 2009 20:53:59 GMT" } ]
2009-11-09T00:00:00
[ [ "Hardt", "Moritz", "" ], [ "Talwar", "Kunal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.3777
Katia Jaffres-Runser
Katia Jaffres-Runser (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes, EA 3720, WNET, CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes), Jean-Marie Gorce (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes), Cristina Comaniciu (WNET)
A multiobjective Tabu framework for the optimization and evaluation of wireless systems
null
Local Search Techniques: Focus on Tabu Search I-Tech Education and Publishing (Ed.) (2008)
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This chapter will focus on the multiobjective formulation of an optimization problem and highlight the assets of a multiobjective Tabu implementation for such problems. An illustration of a specific Multiobjective Tabu heuristic (referred to as MO Tabu in the following) will be given for 2 particular problems arising in wireless systems. The first problem addresses the planning of access points for a WLAN network with some Quality of Service requirements and the second one provides an evaluation mean to assess the performance evaluation of a wireless sensor network. The chapter will begin with an overview of multiobjective (MO) optimization featuring the definitions and concepts of the domain (e.g. Dominance, Pareto front,...) and the main MO search heuristics available so far. We will then emphasize on the definition of a problem as a multiobjective optimization problem and illustrate it by the two examples from the field of wireless networking. The next part will focus on MO Tabu, a Tabu-inspired multiobjective heuristic and describe its assets compared to other MO heuristics. The last part of the chapter will show the results obtained with this MO Tabu strategy on the 2 wireless networks related problems. Conclusion on the use of Tabu as a multiobjective heuristic will be drawn based on the results presented so far.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 06:02:53 GMT" } ]
2009-07-23T00:00:00
[ [ "Jaffres-Runser", "Katia", "", "CITI Insa Lyon / INRIA Grenoble Rhône-Alpes,\n EA 3720, WNET, CITI Insa Lyon / INRIA Grenoble Rhône-Alpes" ], [ "Gorce", "Jean-Marie", "", "CITI Insa Lyon / INRIA Grenoble Rhône-Alpes" ], [ "Comaniciu", "Cristina", "", "WNET" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.3780
Srikanth Srinivasan
V. Arvind, Pushkar S. Joglekar, Srikanth Srinivasan
On Lower Bounds for Constant Width Arithmetic Circuits
16 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The motivation for this paper is to study the complexity of constant-width arithmetic circuits. Our main results are the following. 1. For every k > 1, we provide an explicit polynomial that can be computed by a linear-sized monotone circuit of width 2k but has no subexponential-sized monotone circuit of width k. It follows, from the definition of the polynomial, that the constant-width and the constant-depth hierarchies of monotone arithmetic circuits are infinite, both in the commutative and the noncommutative settings. 2. We prove hardness-randomness tradeoffs for identity testing constant-width commutative circuits analogous to [KI03,DSY08].
[ { "version": "v1", "created": "Wed, 22 Jul 2009 06:21:30 GMT" }, { "version": "v2", "created": "Fri, 14 Aug 2009 07:10:01 GMT" } ]
2009-08-14T00:00:00
[ [ "Arvind", "V.", "" ], [ "Joglekar", "Pushkar S.", "" ], [ "Srinivasan", "Srikanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.3781
Stephanie Leon
St\'ephanie L\'eon (LIRMM)
Un syst\`eme modulaire d'acquisition automatique de traductions \`a partir du Web
null
TALN'09 (Traitement Automatique des Langues Naturelles), France (2009)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method of automatic translation (French/English) of Complex Lexical Units (CLU) for aiming at extracting a bilingual lexicon. Our modular system is based on linguistic properties (compositionality, polysemy, etc.). Different aspects of the multilingual Web are used to validate candidate translations and collect new terms. We first build a French corpus of Web pages to collect CLU. Three adapted processing stages are applied for each linguistic property : compositional and non polysemous translations, compositional polysemous translations and non compositional translations. Our evaluation on a sample of CLU shows that our technique based on the Web can reach a very high precision.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 06:25:59 GMT" } ]
2009-07-23T00:00:00
[ [ "Léon", "Stéphanie", "", "LIRMM" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.3793
Ayman Khalil
Ayman Khalil (IETR), Matthieu Crussi\`ere (IETR), Jean-Fran\c{c}ois H\'elard (IETR)
Cross-layer Resource Allocation Scheme for Multi-band High Rate UWB Systems
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we investigate the use of a cross-layer allocation mechanism for the high-rate ultra-wideband (UWB) systems. The aim of this paper is twofold. First, through the cross-layer approach that provides a new service differentiation approach to the fully distributed UWB systems, we support traffic with quality of service (QoS) guarantee in a multi-user context. Second, we exploit the effective SINR method that represents the characteristics of multiple sub-carrier SINRs in the multi-band WiMedia solution proposed for UWB systems, in order to provide the channel state information needed for the multi-user sub-band allocation. This new approach improves the system performance and optimizes the spectrum utilization with a low cost data exchange between the different users while guaranteeing the required QoS. In addition, this new approach solves the problem of the cohabitation of more than three users in the same WiMedia channel.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 08:10:39 GMT" } ]
2009-07-23T00:00:00
[ [ "Khalil", "Ayman", "", "IETR" ], [ "Crussière", "Matthieu", "", "IETR" ], [ "Hélard", "Jean-François", "", "IETR" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.3801
Eric Sopena
Eric Sopena (LaBRI), Jiaojiao Wu (LaBRI)
The Incidence Chromatic Number of Toroidal Grids
16 pages
Discussiones Mathematicae Graph Theory 33 (2013) 315-327
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An incidence in a graph $G$ is a pair $(v,e)$ with $v \in V(G)$ and $e \in E(G)$, such that $v$ and $e$ are incident. Two incidences $(v,e)$ and $(w,f)$ are adjacent if $v=w$, or $e=f$, or the edge $vw$ equals $e$ or $f$. The incidence chromatic number of $G$ is the smallest $k$ for which there exists a mapping from the set of incidences of $G$ to a set of $k$ colors that assigns distinct colors to adjacent incidences. In this paper, we prove that the incidence chromatic number of the toroidal grid $T_{m,n}=C_m\Box C_n$ equals 5 when $m,n \equiv 0 \pmod 5$ and 6 otherwise.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 09:08:11 GMT" }, { "version": "v2", "created": "Mon, 27 Sep 2010 07:12:42 GMT" }, { "version": "v3", "created": "Sun, 6 May 2012 05:50:59 GMT" } ]
2013-04-12T00:00:00
[ [ "Sopena", "Eric", "", "LaBRI" ], [ "Wu", "Jiaojiao", "", "LaBRI" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.3804
Colin Stirling
Colin Stirling
Decidability of higher-order matching
appears in LMCS (Logical Methods in Computer Science)
Logical Methods in Computer Science, Volume 5, Issue 3 (July 30, 2009) lmcs:757
10.2168/LMCS-5(3:2)2009
null
cs.LO cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that the higher-order matching problem is decidable using a game-theoretic argument.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 09:17:30 GMT" }, { "version": "v2", "created": "Thu, 30 Jul 2009 12:42:31 GMT" }, { "version": "v3", "created": "Fri, 31 Jul 2009 11:37:46 GMT" } ]
2015-07-01T00:00:00
[ [ "Stirling", "Colin", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.3819
Thomas Guyet
Thomas Guyet (Agrocampus Ouest, INRIA - IRISA), Ren\'e Quiniou (INRIA - IRISA), Wei Wang (NTNU), Marie-Odile Cordier (INRIA - IRISA)
Self-adaptive web intrusion detection system
null
null
null
RR-6989
cs.NI cs.AI cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The evolution of the web server contents and the emergence of new kinds of intrusions make necessary the adaptation of the intrusion detection systems (IDS). Nowadays, the adaptation of the IDS requires manual -- tedious and unreactive -- actions from system administrators. In this paper, we present a self-adaptive intrusion detection system which relies on a set of local model-based diagnosers. The redundancy of diagnoses is exploited, online, by a meta-diagnoser to check the consistency of computed partial diagnoses, and to trigger the adaptation of defective diagnoser models (or signatures) in case of inconsistency. This system is applied to the intrusion detection from a stream of HTTP requests. Our results show that our system 1) detects intrusion occurrences sensitively and precisely, 2) accurately self-adapts diagnoser model, thus improving its detection accuracy.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 11:45:02 GMT" } ]
2009-07-23T00:00:00
[ [ "Guyet", "Thomas", "", "Agrocampus Ouest, INRIA - IRISA" ], [ "Quiniou", "René", "", "INRIA\n - IRISA" ], [ "Wang", "Wei", "", "NTNU" ], [ "Cordier", "Marie-Odile", "", "INRIA - IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.3823
Ravindranath Chowdary C Dr.
C Ravindranath Chowdary, P Sreenivasa Kumar
USUM: Update Summary Generation System
null
Advances in Computational Linguistics, Research in Computing Science Vol. 41, 2009, pp. 229-240
null
null
cs.IR
http://creativecommons.org/licenses/by-nc-sa/3.0/
Huge amount of information is present in the World Wide Web and a large amount is being added to it frequently. A query-specific summary of multiple documents is very helpful to the user in this context. Currently, few systems have been proposed for query-specific, extractive multi-document summarization. If a summary is available for a set of documents on a given query and if a new document is added to the corpus, generating an updated summary from the scratch is time consuming and many a times it is not practical/possible. In this paper we propose a solution to this problem. This is especially useful in a scenario where the source documents are not accessible. We cleverly embed the sentences of the current summary into the new document and then perform query-specific summary generation on that document. Our experimental results show that the performance of the proposed approach is good in terms of both quality and efficiency.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 12:00:06 GMT" }, { "version": "v2", "created": "Thu, 30 Jul 2009 12:08:31 GMT" } ]
2015-01-20T00:00:00
[ [ "Chowdary", "C Ravindranath", "" ], [ "Kumar", "P Sreenivasa", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0907.3826
Takao Namiki
Takao Namiki, Hiraku Kuroda and Shunsuke Naruse
Experimental DML over digital repositories in Japan
null
Proceedings of Towards a Digital Mathematics Library 2009, Grand Bend, Ontario, Canada (2009)
null
null
cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the authors show an overview of Virtual Digital Mathematics Library in Japan (DML-JP), contents of which consist of metadata harvested from institutional repositories in Japan and digital repositories in the world. DML-JP is, in a sense, a subject specific repository which collaborate with various digital repositories. Beyond portal website, DML-JP provides subject-specific metadata through OAI-ORE. By the schema it is enabled that digital repositories can load the rich metadata which were added by mathematicians.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 12:40:35 GMT" } ]
2009-07-23T00:00:00
[ [ "Namiki", "Takao", "" ], [ "Kuroda", "Hiraku", "" ], [ "Naruse", "Shunsuke", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0907.3867
Uwe Aickelin
Julie Greensmith and Uwe Aickelin
Artificial Dendritic Cells: Multi-faceted Perspectives
24 pages, 6 figures,
Human-Centric Information Processing Through Granular Modelling, 182, 375-395, 2009
null
null
cs.AI cs.CR cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dendritic cells are the crime scene investigators of the human immune system. Their function is to correlate potentially anomalous invading entities with observed damage to the body. The detection of such invaders by dendritic cells results in the activation of the adaptive immune system, eventually leading to the removal of the invader from the host body. This mechanism has provided inspiration for the development of a novel bio-inspired algorithm, the Dendritic Cell Algorithm. This algorithm processes information at multiple levels of resolution, resulting in the creation of information granules of variable structure. In this chapter we examine the multi-faceted nature of immunology and how research in this field has shaped the function of the resulting Dendritic Cell Algorithm. A brief overview of the algorithm is given in combination with the details of the processes used for its development. The chapter is concluded with a discussion of the parallels between our understanding of the human immune system and how such knowledge influences the design of artificial immune systems.
[ { "version": "v1", "created": "Wed, 22 Jul 2009 15:46:18 GMT" }, { "version": "v2", "created": "Thu, 23 Jul 2009 15:21:39 GMT" } ]
2010-07-05T00:00:00
[ [ "Greensmith", "Julie", "" ], [ "Aickelin", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.3874
Nikolaos Laoutaris
Ruben Cuevas, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos, Pablo Rodriguez
Deep Diving into BitTorrent Locality
Please cite the conference version of this paper appearing in the Proceedings of IEEE INFOCOM'11
null
null
null
cs.NI cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A substantial amount of work has recently gone into localizing BitTorrent traffic within an ISP in order to avoid excessive and often times unnecessary transit costs. Several architectures and systems have been proposed and the initial results from specific ISPs and a few torrents have been encouraging. In this work we attempt to deepen and scale our understanding of locality and its potential. Looking at specific ISPs, we consider tens of thousands of concurrent torrents, and thus capture ISP-wide implications that cannot be appreciated by looking at only a handful of torrents. Secondly, we go beyond individual case studies and present results for the top 100 ISPs in terms of number of users represented in our dataset of up to 40K torrents involving more than 3.9M concurrent peers and more than 20M in the course of a day spread in 11K ASes. We develop scalable methodologies that permit us to process this huge dataset and answer questions such as: "\emph{what is the minimum and the maximum transit traffic reduction across hundreds of ISPs?}", "\emph{what are the win-win boundaries for ISPs and their users?}", "\emph{what is the maximum amount of transit traffic that can be localized without requiring fine-grained control of inter-AS overlay connections?}", "\emph{what is the impact to transit traffic from upgrades of residential broadband speeds?}".
[ { "version": "v1", "created": "Wed, 22 Jul 2009 16:18:44 GMT" }, { "version": "v2", "created": "Thu, 23 Jul 2009 08:35:39 GMT" }, { "version": "v3", "created": "Tue, 10 Nov 2009 19:40:27 GMT" }, { "version": "v4", "created": "Tue, 1 Feb 2011 19:01:18 GMT" } ]
2011-02-02T00:00:00
[ [ "Cuevas", "Ruben", "" ], [ "Laoutaris", "Nikolaos", "" ], [ "Yang", "Xiaoyuan", "" ], [ "Siganos", "Georgos", "" ], [ "Rodriguez", "Pablo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0907.3920
Sergey Bravyi
Sergey Bravyi, Aram W. Harrow, and Avinatan Hassidim
Quantum algorithms for testing properties of distributions
20 pages
IEEE. Trans. Inf. Th., vol. 57, no. 6, pp. 3971--3981, June 2011
10.1109/TIT.2011.2134250
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppose one has access to oracles generating samples from two unknown probability distributions P and Q on some N-element set. How many samples does one need to test whether the two distributions are close or far from each other in the L_1-norm ? This and related questions have been extensively studied during the last years in the field of property testing. In the present paper we study quantum algorithms for testing properties of distributions. It is shown that the L_1-distance between P and Q can be estimated with a constant precision using approximately N^{1/2} queries in the quantum settings, whereas classical computers need \Omega(N) queries. We also describe quantum algorithms for testing Uniformity and Orthogonality with query complexity O(N^{1/3}). The classical query complexity of these problems is known to be \Omega(N^{1/2}).
[ { "version": "v1", "created": "Wed, 22 Jul 2009 20:05:29 GMT" } ]
2011-12-01T00:00:00
[ [ "Bravyi", "Sergey", "" ], [ "Harrow", "Aram W.", "" ], [ "Hassidim", "Avinatan", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.3942
Megan Owen
Megan Owen and J. Scott Provan
A Fast Algorithm for Computing Geodesic Distances in Tree Space
20 pages, 5 figures. Added new section on including common edges and leaf edge-lengths in the algorithm, clarified starting point for algorithm, added references, other minor improvements. To appear in IEEE/ACM Transactions on Computational Biology and Bioinformatics
null
null
null
q-bio.PE cs.CG cs.DM math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Comparing and computing distances between phylogenetic trees are important biological problems, especially for models where edge lengths play an important role. The geodesic distance measure between two phylogenetic trees with edge lengths is the length of the shortest path between them in the continuous tree space introduced by Billera, Holmes, and Vogtmann. This tree space provides a powerful tool for studying and comparing phylogenetic trees, both in exhibiting a natural distance measure and in providing a Euclidean-like structure for solving optimization problems on trees. An important open problem is to find a polynomial time algorithm for finding geodesics in tree space. This paper gives such an algorithm, which starts with a simple initial path and moves through a series of successively shorter paths until the geodesic is attained.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 15:39:16 GMT" }, { "version": "v2", "created": "Thu, 5 Nov 2009 01:14:54 GMT" } ]
2009-11-05T00:00:00
[ [ "Owen", "Megan", "" ], [ "Provan", "J. Scott", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0907.3965
Andr\'e Luiz Barbosa
Andr\'e Luiz Barbosa
P != NP Proof
25 pages and 3 new great ideas!
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper demonstrates that P \not= NP. The way was to generalize the traditional definitions of the classes P and NP, to construct an artificial problem (a generalization to SAT: The XG-SAT, much more difficult than the former) and then to demonstrate that it is in NP but not in P (where the classes P and NP are generalized and called too simply P and NP in this paper, and then it is explained why the traditional classes P and NP should be fixed and replaced by these generalized ones into Theory of Computer Science). The demonstration consists of: 1. Definition of Restricted Type X Program; 2. Definition of the General Extended Problem of Satisfiability of a Boolean Formula - XG-SAT; 3. Generalization to classes P and NP; 4. Demonstration that the XG-SAT is in NP; 5. Demonstration that the XG-SAT is not in P; 6. Demonstration that the Baker-Gill-Solovay Theorem does not refute the proof; 7. Demonstration that the Razborov-Rudich Theorem does not refute the proof; 8. Demonstration that the Aaronson-Wigderson Theorem does not refute the proof.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 00:30:29 GMT" }, { "version": "v10", "created": "Mon, 4 Jan 2010 00:35:26 GMT" }, { "version": "v11", "created": "Fri, 22 Jan 2010 02:01:46 GMT" }, { "version": "v12", "created": "Wed, 24 Feb 2010 04:47:54 GMT" }, { "version": "v13", "created": "Mon, 12 Apr 2010 17:06:12 GMT" }, { "version": "v14", "created": "Tue, 13 Apr 2010 17:21:48 GMT" }, { "version": "v15", "created": "Wed, 14 Apr 2010 02:06:53 GMT" }, { "version": "v16", "created": "Thu, 29 Apr 2010 06:13:04 GMT" }, { "version": "v17", "created": "Fri, 30 Apr 2010 16:21:33 GMT" }, { "version": "v18", "created": "Mon, 7 Jun 2010 14:45:07 GMT" }, { "version": "v19", "created": "Sun, 20 Jun 2010 21:45:38 GMT" }, { "version": "v2", "created": "Tue, 4 Aug 2009 23:07:16 GMT" }, { "version": "v20", "created": "Fri, 2 Jul 2010 16:20:50 GMT" }, { "version": "v21", "created": "Wed, 7 Jul 2010 04:45:16 GMT" }, { "version": "v22", "created": "Sat, 17 Jul 2010 21:53:57 GMT" }, { "version": "v23", "created": "Wed, 21 Jul 2010 15:41:24 GMT" }, { "version": "v24", "created": "Thu, 29 Jul 2010 06:09:12 GMT" }, { "version": "v25", "created": "Tue, 3 Aug 2010 22:28:20 GMT" }, { "version": "v26", "created": "Sun, 8 Aug 2010 04:23:20 GMT" }, { "version": "v27", "created": "Fri, 13 Aug 2010 17:12:50 GMT" }, { "version": "v28", "created": "Mon, 11 Oct 2010 16:45:13 GMT" }, { "version": "v29", "created": "Mon, 1 Nov 2010 16:47:12 GMT" }, { "version": "v3", "created": "Mon, 12 Oct 2009 16:43:46 GMT" }, { "version": "v30", "created": "Sat, 11 Dec 2010 06:48:08 GMT" }, { "version": "v31", "created": "Thu, 30 Dec 2010 18:02:57 GMT" }, { "version": "v32", "created": "Mon, 24 Jan 2011 00:03:06 GMT" }, { "version": "v33", "created": "Tue, 25 Jan 2011 20:35:07 GMT" }, { "version": "v34", "created": "Mon, 14 Feb 2011 19:27:02 GMT" }, { "version": "v35", "created": "Thu, 31 Mar 2011 15:33:46 GMT" }, { "version": "v36", "created": "Fri, 15 Apr 2011 06:20:46 GMT" }, { "version": "v37", "created": "Tue, 3 May 2011 05:55:35 GMT" }, { "version": "v38", "created": "Sat, 21 May 2011 05:47:38 GMT" }, { "version": "v39", "created": "Sun, 12 Jun 2011 17:29:30 GMT" }, { "version": "v4", "created": "Tue, 20 Oct 2009 05:36:45 GMT" }, { "version": "v40", "created": "Sun, 19 Jun 2011 20:48:53 GMT" }, { "version": "v41", "created": "Wed, 22 Jun 2011 18:51:43 GMT" }, { "version": "v42", "created": "Tue, 5 Jul 2011 13:04:12 GMT" }, { "version": "v43", "created": "Sun, 10 Jul 2011 16:32:48 GMT" }, { "version": "v44", "created": "Sun, 24 Jul 2011 17:01:12 GMT" }, { "version": "v45", "created": "Wed, 27 Jul 2011 03:54:24 GMT" }, { "version": "v46", "created": "Mon, 1 Aug 2011 16:16:56 GMT" }, { "version": "v47", "created": "Wed, 3 Aug 2011 23:13:30 GMT" }, { "version": "v48", "created": "Mon, 15 Aug 2011 23:25:09 GMT" }, { "version": "v49", "created": "Mon, 26 Sep 2011 03:31:48 GMT" }, { "version": "v5", "created": "Wed, 4 Nov 2009 23:16:40 GMT" }, { "version": "v50", "created": "Fri, 30 Sep 2011 19:54:37 GMT" }, { "version": "v51", "created": "Fri, 21 Oct 2011 19:10:29 GMT" }, { "version": "v52", "created": "Tue, 25 Oct 2011 02:31:57 GMT" }, { "version": "v53", "created": "Tue, 1 Nov 2011 02:13:21 GMT" }, { "version": "v54", "created": "Thu, 3 Nov 2011 19:18:57 GMT" }, { "version": "v55", "created": "Sun, 5 Feb 2012 04:19:05 GMT" }, { "version": "v56", "created": "Fri, 9 Mar 2012 02:32:22 GMT" }, { "version": "v57", "created": "Wed, 21 Mar 2012 18:07:38 GMT" }, { "version": "v58", "created": "Mon, 26 Mar 2012 22:46:59 GMT" }, { "version": "v59", "created": "Fri, 30 Mar 2012 06:06:13 GMT" }, { "version": "v6", "created": "Fri, 6 Nov 2009 13:42:43 GMT" }, { "version": "v60", "created": "Thu, 5 Apr 2012 00:42:53 GMT" }, { "version": "v61", "created": "Sun, 29 Apr 2012 23:14:47 GMT" }, { "version": "v62", "created": "Fri, 4 May 2012 23:27:23 GMT" }, { "version": "v63", "created": "Thu, 28 Jun 2012 22:14:08 GMT" }, { "version": "v64", "created": "Thu, 12 Jul 2012 21:43:11 GMT" }, { "version": "v65", "created": "Sun, 5 Aug 2012 17:46:26 GMT" }, { "version": "v66", "created": "Mon, 27 Aug 2012 06:35:09 GMT" }, { "version": "v67", "created": "Tue, 20 Nov 2012 14:06:51 GMT" }, { "version": "v68", "created": "Sun, 25 Nov 2012 06:54:21 GMT" }, { "version": "v69", "created": "Thu, 27 Dec 2012 05:17:06 GMT" }, { "version": "v7", "created": "Sat, 7 Nov 2009 04:03:12 GMT" }, { "version": "v70", "created": "Thu, 5 Dec 2013 19:02:03 GMT" }, { "version": "v71", "created": "Wed, 8 Jan 2014 23:09:50 GMT" }, { "version": "v72", "created": "Tue, 14 Jan 2014 13:42:50 GMT" }, { "version": "v73", "created": "Tue, 21 Jan 2014 21:13:15 GMT" }, { "version": "v74", "created": "Tue, 10 Feb 2015 00:31:07 GMT" }, { "version": "v75", "created": "Mon, 3 Aug 2015 06:29:04 GMT" }, { "version": "v76", "created": "Fri, 4 Dec 2015 15:10:07 GMT" }, { "version": "v77", "created": "Sun, 6 Nov 2016 15:44:34 GMT" }, { "version": "v78", "created": "Sat, 10 Nov 2018 19:15:44 GMT" }, { "version": "v79", "created": "Mon, 17 Dec 2018 15:08:10 GMT" }, { "version": "v8", "created": "Mon, 30 Nov 2009 10:13:43 GMT" }, { "version": "v80", "created": "Fri, 28 Jun 2019 16:30:04 GMT" }, { "version": "v9", "created": "Thu, 3 Dec 2009 16:03:44 GMT" } ]
2019-07-01T00:00:00
[ [ "Barbosa", "André Luiz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.3970
Dae San Kim
Dae San Kim
Infinite Families of Recursive Formulas Generating Power Moments of Kloosterman Sums: Symplectic Case
21 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct two infinite families of binary linear codes associated with double cosets with respect to certain maximal parabolic subgroup of the symplectic group Sp(2n,q) Here q is a power of two. Then we obtain an infinite family of recursive formulas for the power moments of Kloosterman sums and those of 2-dimensional Kloosterman sums in terms of the frequencies of weights in the codes. This is done via Pless power moment identity and by utilizing the explicit expressions of exponential sums over those double cosets related to the evaluations of "Gauss sums" for the symplectic groups Sp(2n,q).
[ { "version": "v1", "created": "Thu, 23 Jul 2009 02:22:16 GMT" } ]
2009-07-24T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3972
Dae San Kim
Dae San Kim
Infinite Families of Recursive Formulas Generating Power Moments of Kloosterman Sums: O\^{+}(2n, 2\^{r}) Case
21pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct four infinite families of binary linear codes associated with double cosets with respect to certain maximal parabolic subgroup of the orthogonal group O^+(2n,2^r). Here q is a power of two. Then we obtain two infinite families of recursive formulas for the power moments of Kloosterman sums and those of 2-dimensional Kloosterman sums in terms of the frequencies of weights in the codes. This is done via Pless power moment identity and by utilizing the explicit expressions of exponential sums over those double cosets related to the evaluations of "Gauss sums" for the orthogonal groups O^+(2n,2^r).
[ { "version": "v1", "created": "Thu, 23 Jul 2009 02:36:30 GMT" } ]
2009-07-24T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3974
Dae San Kim
Dae San Kim
Simple Recursive Formulas Generating Power Moments of Kloosterman Sums
8 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct four binary linear codes closely connected with certain exponential sums over the finite field F_q and F_q-{0,1}. Here q is a power of two. Then we obtain four recursive formulas for the power moments of Kloosterman sums in terms of the frequencies of weights in the codes. This is done via Pless power moment identity and by utilizing the explicit expressions of the exponential sums obtained earlier.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 02:45:16 GMT" } ]
2009-07-24T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.3977
Lei Ying
Shihuan Liu, Lei Ying and R. Srikant
Throughput-Optimal Opportunistic Scheduling in the Presence of Flow-Level Dynamics
15 pages
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider multiuser scheduling in wireless networks with channel variations and flow-level dynamics. Recently, it has been shown that the MaxWeight algorithm, which is throughput-optimal in networks with a fixed number users, fails to achieve the maximum throughput in the presence of flow-level dynamics. In this paper, we propose a new algorithm, called workload-based scheduling with learning, which is provably throughput-optimal, requires no prior knowledge of channels and user demands, and performs significantly better than previously suggested algorithms.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 03:50:01 GMT" }, { "version": "v2", "created": "Fri, 31 Jul 2009 04:47:26 GMT" }, { "version": "v3", "created": "Sun, 15 Aug 2010 02:07:30 GMT" } ]
2010-08-17T00:00:00
[ [ "Liu", "Shihuan", "" ], [ "Ying", "Lei", "" ], [ "Srikant", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.3983
Wenguang Wang
Wenguang Wang, Wenguang Yu, Qun Li, Weiping Wang, Xichun Liu (College of Information System and Management, National University of Defense Technology, Changsha, China)
Service-oriented high level architecture
12 pages, 3 figures, 2 tables, Proceedings of 2008 European Simulation Interoperability Workshop, 08E-SIW-022
null
null
08E-SIW-022
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Service-oriented High Level Architecture (SOHLA) refers to the high level architecture (HLA) enabled by Service-Oriented Architecture (SOA) and Web Services etc. techniques which supports distributed interoperating services. The detailed comparisons between HLA and SOA are made to illustrate the importance of their combination. Then several key enhancements and changes of HLA Evolved Web Service API are introduced in comparison with native APIs, such as Federation Development and Execution Process, communication mechanisms, data encoding, session handling, testing environment and performance analysis. Some approaches are summarized including Web-Enabling HLA at the communication layer, HLA interface specification layer, federate interface layer and application layer. Finally the problems of current research are discussed, and the future directions are pointed out.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 04:39:37 GMT" }, { "version": "v2", "created": "Thu, 6 Aug 2009 11:23:28 GMT" } ]
2009-08-06T00:00:00
[ [ "Wang", "Wenguang", "", "College\n of Information System and Management, National University of Defense\n Technology, Changsha, China" ], [ "Yu", "Wenguang", "", "College\n of Information System and Management, National University of Defense\n Technology, Changsha, China" ], [ "Li", "Qun", "", "College\n of Information System and Management, National University of Defense\n Technology, Changsha, China" ], [ "Wang", "Weiping", "", "College\n of Information System and Management, National University of Defense\n Technology, Changsha, China" ], [ "Liu", "Xichun", "", "College\n of Information System and Management, National University of Defense\n Technology, Changsha, China" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.3986
Aleksandrs Slivkins
Aleksandrs Slivkins
Contextual Bandits with Similarity Information
This is the full version of a conference paper in COLT 2011, to appear in JMLR in 2014. A preliminary version of this manuscript (with all the results) has been posted to arXiv in February 2011. An earlier version on arXiv, which does not include the results in Section 6, dates back to July 2009. The present revision addresses various presentation issues pointed out by journal referees
null
null
null
cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a multi-armed bandit (MAB) problem, an online algorithm makes a sequence of choices. In each round it chooses from a time-invariant set of alternatives and receives the payoff associated with this alternative. While the case of small strategy sets is by now well-understood, a lot of recent work has focused on MAB problems with exponentially or infinitely large strategy sets, where one needs to assume extra structure in order to make the problem tractable. In particular, recent literature considered information on similarity between arms. We consider similarity information in the setting of "contextual bandits", a natural extension of the basic MAB problem where before each round an algorithm is given the "context" -- a hint about the payoffs in this round. Contextual bandits are directly motivated by placing advertisements on webpages, one of the crucial problems in sponsored search. A particularly simple way to represent similarity information in the contextual bandit setting is via a "similarity distance" between the context-arm pairs which gives an upper bound on the difference between the respective expected payoffs. Prior work on contextual bandits with similarity uses "uniform" partitions of the similarity space, which is potentially wasteful. We design more efficient algorithms that are based on adaptive partitions adjusted to "popular" context and "high-payoff" arms.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 06:41:33 GMT" }, { "version": "v2", "created": "Wed, 16 Feb 2011 00:49:41 GMT" }, { "version": "v3", "created": "Thu, 2 Jun 2011 17:32:29 GMT" }, { "version": "v4", "created": "Mon, 13 Jan 2014 17:30:07 GMT" }, { "version": "v5", "created": "Tue, 20 May 2014 03:52:46 GMT" } ]
2014-05-21T00:00:00
[ [ "Slivkins", "Aleksandrs", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0907.4006
Pushkar Joglekar
V. Arvind, Pushkar S. Joglekar, Srikanth Srinivasan
Arithmetic Circuits and the Hadamard Product of Polynomials
20 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the Hadamard product of matrices we define the Hadamard product of multivariate polynomials and study its arithmetic circuit and branching program complexity. We also give applications and connections to polynomial identity testing. Our main results are the following. 1. We show that noncommutative polynomial identity testing for algebraic branching programs over rationals is complete for the logspace counting class $\ceql$, and over fields of characteristic $p$ the problem is in $\ModpL/\Poly$. 2.We show an exponential lower bound for expressing the Raz-Yehudayoff polynomial as the Hadamard product of two monotone multilinear polynomials. In contrast the Permanent can be expressed as the Hadamard product of two monotone multilinear formulas of quadratic size.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 08:52:50 GMT" } ]
2009-07-24T00:00:00
[ [ "Arvind", "V.", "" ], [ "Joglekar", "Pushkar S.", "" ], [ "Srinivasan", "Srikanth", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.4031
Omar Mehanna
Omar Mehanna, Ahmed Sultan and Hesham El Gamal
Cognitive MAC Protocols for General Primary Network Models
12 pages, 8 figures, submitted to IEEE Transactions on Mobile Computing
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the design of cognitive Medium Access Control (MAC) protocols enabling a secondary (unlicensed) transmitter-receiver pair to communicate over the idle periods of a set of primary (licensed) channels. More specifically, we propose cognitive MAC protocols optimized for both slotted and un-slotted primary networks. For the slotted structure, the objective is to maximize the secondary throughput while maintaining synchronization between the secondary pair and not causing interference to the primary network. Our investigations differentiate between two sensing scenarios. In the first, the secondary transmitter is capable of sensing all the primary channels, whereas it senses only a subset of the primary channels in the second scenario. In both cases, we propose blind MAC protocols that efficiently learn the statistics of the primary traffic on-line and asymptotically achieve the throughput obtained when prior knowledge of primary traffic statistics is available. For the un-slotted structure, the objective is to maximize the secondary throughput while satisfying an interference constraint on the primary network. Sensing-dependent periods are optimized for each primary channel yielding a MAC protocol which outperforms previously proposed techniques that rely on a single sensing period optimization.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 11:31:16 GMT" } ]
2009-07-25T00:00:00
[ [ "Mehanna", "Omar", "" ], [ "Sultan", "Ahmed", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.4036
Derek Groen
D. Groen, S. Harfst, S. Portegies Zwart
The Living Application: a Self-Organising System for Complex Grid Tasks
26 pages, 3 figures, accepted by IJHPCA
International Journal of High Performance Computing Applications May 2010 vol. 24 no. 2 185-193
10.1177/1094342009347891
null
cs.DC astro-ph.GA cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the living application, a method to autonomously manage applications on the grid. During its execution on the grid, the living application makes choices on the resources to use in order to complete its tasks. These choices can be based on the internal state, or on autonomously acquired knowledge from external sensors. By giving limited user capabilities to a living application, the living application is able to port itself from one resource topology to another. The application performs these actions at run-time without depending on users or external workflow tools. We demonstrate this new concept in a special case of a living application: the living simulation. Today, many simulations require a wide range of numerical solvers and run most efficiently if specialized nodes are matched to the solvers. The idea of the living simulation is that it decides itself which grid machines to use based on the numerical solver currently in use. In this paper we apply the living simulation to modelling the collision between two galaxies in a test setup with two specialized computers. This simulation switces at run-time between a GPU-enabled computer in the Netherlands and a GRAPE-enabled machine that resides in the United States, using an oct-tree N-body code whenever it runs in the Netherlands and a direct N-body solver in the United States.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 12:00:21 GMT" } ]
2011-09-27T00:00:00
[ [ "Groen", "D.", "" ], [ "Harfst", "S.", "" ], [ "Zwart", "S. Portegies", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Physics", "code": "astro-ph.GA", "description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents", "span": "(Astrophysics of Galaxies)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4068
Masud Hasan
Syed Ishtiaque Ahmed, Masud Hasan, and Md. Ariful Islam
Cutting a Convex Polyhedron Out of a Sphere
10 pages
null
null
null
cs.CG cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a convex polyhedron $P$ of $n$ vertices inside a sphere $Q$, we give an $O(n^3)$-time algorithm that cuts $P$ out of $Q$ by using guillotine cuts and has cutting cost $O((\log n)^2)$ times the optimal.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 14:11:59 GMT" }, { "version": "v2", "created": "Tue, 9 Mar 2010 17:26:51 GMT" } ]
2010-03-10T00:00:00
[ [ "Ahmed", "Syed Ishtiaque", "" ], [ "Hasan", "Masud", "" ], [ "Islam", "Md. Ariful", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.4085
Amitabh Saxena
Amitabh Saxena
A Secure Wireless Routing Protocol Using Enhanced Chain Signatures
Extended version
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a routing protocol for wireless networks. Wireless routing protocols allow hosts within a network to have some knowledge of the topology in order to know when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of a network, it is a lucrative target for many attacks, all of which attempt to disrupt network traffic by corrupting routing tables of neighboring routers using false updates. Secure routing protocols designed for wired networks (such as S-BGP) are not scalable in an ad-hoc wireless environment because of two main drawbacks: (1) the need to maintain knowledge about all immediate neighbors (which requires a discovery protocol), and (2) the need to transmit the same update several times, one for each neighbor. Although information about neighbors is readily available in a fairly static and wired network, such information is often not updated or available in an ad-hoc wireless network with mobile devices. Our protocol is a variant of S-BGP called SS-BGP and allows a single broadcast for routing updates without having the need to be aware of every neighboring router. The protocol is based on a novel authentication primitive called Enhanced Chain Signatures (ECS).
[ { "version": "v1", "created": "Thu, 23 Jul 2009 14:47:31 GMT" } ]
2009-07-24T00:00:00
[ [ "Saxena", "Amitabh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4100
Kurt Ammon
Kurt Ammon
Beyond Turing Machines
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses "computational" systems capable of "computing" functions not computable by predefined Turing machines if the systems are not isolated from their environment. Roughly speaking, these systems can change their finite descriptions by interacting with their environment.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 15:45:10 GMT" } ]
2009-08-03T00:00:00
[ [ "Ammon", "Kurt", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.4128
Stefan Woltran
Miroslaw Truszczy\'nski, Stefan Woltran
Relativized hyperequivalence of logic programs for modular programming
null
null
null
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A recent framework of relativized hyperequivalence of programs offers a unifying generalization of strong and uniform equivalence. It seems to be especially well suited for applications in program optimization and modular programming due to its flexibility that allows us to restrict, independently of each other, the head and body alphabets in context programs. We study relativized hyperequivalence for the three semantics of logic programs given by stable, supported and supported minimal models. For each semantics, we identify four types of contexts, depending on whether the head and body alphabets are given directly or as the complement of a given set. Hyperequivalence relative to contexts where the head and body alphabets are specified directly has been studied before. In this paper, we establish the complexity of deciding relativized hyperequivalence with respect to the three other types of context programs. To appear in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Thu, 23 Jul 2009 17:31:45 GMT" } ]
2009-07-24T00:00:00
[ [ "Truszczyński", "Miroslaw", "" ], [ "Woltran", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.4130
Xi Chen
Xi Chen, Shang-Hua Teng
Spending is not Easier than Trading: On the Computational Equivalence of Fisher and Arrow-Debreu Equilibria
null
null
null
null
cs.GT cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is a common belief that computing a market equilibrium in Fisher's spending model is easier than computing a market equilibrium in Arrow-Debreu's exchange model. This belief is built on the fact that we have more algorithmic success in Fisher equilibria than Arrow-Debreu equilibria. For example, a Fisher equilibrium in a Leontief market can be found in polynomial time, while it is PPAD-hard to compute an approximate Arrow-Debreu equilibrium in a Leontief market. In this paper, we show that even when all the utilities are additively separable, piecewise-linear, and concave functions, finding an approximate equilibrium in Fisher's model is complete in PPAD. Our result solves a long-term open question on the complexity of market equilibria. To the best of our knowledge, this is the first PPAD-completeness result for Fisher's model.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 17:49:12 GMT" } ]
2009-07-24T00:00:00
[ [ "Chen", "Xi", "" ], [ "Teng", "Shang-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.4166
Kamesh Munagala
Sayan Bhattacharya, Gagan Goel, Sreenivas Gollapudi and Kamesh Munagala
Budget Constrained Auctions with Heterogeneous Items
Final version accepted to STOC '10. Incorporates significant reviewer comments
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the first approximation algorithms for the problem of designing revenue optimal Bayesian incentive compatible auctions when there are multiple (heterogeneous) items and when bidders can have arbitrary demand and budget constraints. Our mechanisms are surprisingly simple: We show that a sequential all-pay mechanism is a 4 approximation to the revenue of the optimal ex-interim truthful mechanism with discrete correlated type space for each bidder. We also show that a sequential posted price mechanism is a O(1) approximation to the revenue of the optimal ex-post truthful mechanism when the type space of each bidder is a product distribution that satisfies the standard hazard rate condition. We further show a logarithmic approximation when the hazard rate condition is removed, and complete the picture by showing that achieving a sub-logarithmic approximation, even for regular distributions and one bidder, requires pricing bundles of items. Our results are based on formulating novel LP relaxations for these problems, and developing generic rounding schemes from first principles. We believe this approach will be useful in other Bayesian mechanism design contexts.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 12:39:22 GMT" }, { "version": "v2", "created": "Thu, 13 Aug 2009 12:21:58 GMT" }, { "version": "v3", "created": "Sat, 22 Aug 2009 12:29:45 GMT" }, { "version": "v4", "created": "Sat, 3 Oct 2009 19:07:11 GMT" }, { "version": "v5", "created": "Tue, 6 Oct 2009 12:19:00 GMT" }, { "version": "v6", "created": "Mon, 29 Mar 2010 11:45:54 GMT" } ]
2010-03-30T00:00:00
[ [ "Bhattacharya", "Sayan", "" ], [ "Goel", "Gagan", "" ], [ "Gollapudi", "Sreenivas", "" ], [ "Munagala", "Kamesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.4169
Victor Yodaiken
Victor Yodaiken
Primitive Recursive Presentations of Automata and their Products
11 pages
null
null
null
cs.FL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Methods for specifying Moore type state machines (transducers) abstractly via primitive recursive functions and for defining parallel composition via simultaneous primitive recursion are discussed. The method is mostly of interest as a concise and convenient way of working with the complex state systems found in computer programming and engineering, but a short section indicates connections to algebraic automata theory and the theorem of Krohn and Rhodes.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 20:56:05 GMT" }, { "version": "v2", "created": "Sun, 10 Jan 2010 12:58:03 GMT" } ]
2010-01-10T00:00:00
[ [ "Yodaiken", "Victor", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.4176
Renuka Kandregula
Renuka Kandregula
The Basic Discrete Hilbert Transform with an Information Hiding Application
13 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents several experimental findings related to the basic discrete Hilbert transform. The errors in the use of a finite set of the transform values have been tabulated for the more commonly used functions. The error can be quite small and, for example, it is of the order of 10^{-17} for the chirp signal. The use of the discrete Hilbert transform in hiding information is presented.
[ { "version": "v1", "created": "Thu, 23 Jul 2009 21:47:12 GMT" } ]
2009-07-27T00:00:00
[ [ "Kandregula", "Renuka", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]