id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0907.2859
|
Sheng-Yuan Tu
|
Sheng-Yuan Tu and Kwang-Cheng Chen
|
General Spectrum Sensing in Cognitive Radio Networks
|
26 pages, 7 figures, 47 references, submitted to IEEE Trans. on
Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The successful operation of cognitive radio (CR) between CR transmitter and
CR receiver (CR link) relies on reliable spectrum sensing. To network CRs
requires spectrum sensing at CR transmitter and further information regarding
the spectrum availability at CR receiver. Redefining the spectrum sensing along
with statistical inference suitable for cognitive radio networks (CRN), we
mathematically derive conditions to allow CR transmitter forwarding packets to
CR receiver under guaranteed outage probability, and prove that the correlation
of localized spectrum availability between a cooperative node and CR receiver
determines effectiveness of the cooperative scheme. Applying our novel
mathematical model to potential hidden terminals in CRN, we illustrate that the
allowable transmission region of a CR, defined as neighborhood, is no longer
circular shape even in a pure path loss channel model. This results in
asymmetric CR links to make bidirectional links generally inappropriate in CRN,
though this challenge can be alleviated by cooperative sensing. Therefore,
spectrum sensing capability determines CRN topology. For multiple cooperative
nodes, to fully utilize spectrum availability, the selection methodology of
cooperative nodes is developed due to limited overhead of information exchange.
Defining reliability as information of spectrum availability at CR receiver
provided by a cooperative node and by applying neighborhood area, we can
compare sensing capability of cooperative nodes from both link and network
perspectives. In addition, due to lack of centralized coordination in dynamic
CRN, CRs can only acquire local and partial information within limited sensing
duration, robust spectrum sensing is therefore proposed. Limits of cooperative
schemes and their impacts on network operation are also derived.
|
[
{
"version": "v1",
"created": "Thu, 16 Jul 2009 15:04:15 GMT"
}
] | 2009-07-17T00:00:00 |
[
[
"Tu",
"Sheng-Yuan",
""
],
[
"Chen",
"Kwang-Cheng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.2868
|
Thomas Bernecker
|
Thomas Bernecker, Hans-Peter Kriegel, Nikos Mamoulis, Matthias Renz
and Andreas Zuefle
|
Scalable Probabilistic Similarity Ranking in Uncertain Databases
(Technical Report)
| null | null | null | null |
cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a scalable approach for probabilistic top-k similarity
ranking on uncertain vector data. Each uncertain object is represented by a set
of vector instances that are assumed to be mutually-exclusive. The objective is
to rank the uncertain data according to their distance to a reference object.
We propose a framework that incrementally computes for each object instance and
ranking position, the probability of the object falling at that ranking
position. The resulting rank probability distribution can serve as input for
several state-of-the-art probabilistic ranking models. Existing approaches
compute this probability distribution by applying a dynamic programming
approach of quadratic complexity. In this paper we theoretically as well as
experimentally show that our framework reduces this to a linear-time complexity
while having the same memory requirements, facilitated by incremental accessing
of the uncertain vector instances in increasing order of their distance to the
reference object. Furthermore, we show how the output of our method can be used
to apply probabilistic top-k ranking for the objects, according to different
state-of-the-art definitions. We conduct an experimental evaluation on
synthetic and real data, which demonstrates the efficiency of our approach.
|
[
{
"version": "v1",
"created": "Thu, 16 Jul 2009 15:25:50 GMT"
}
] | 2009-07-17T00:00:00 |
[
[
"Bernecker",
"Thomas",
""
],
[
"Kriegel",
"Hans-Peter",
""
],
[
"Mamoulis",
"Nikos",
""
],
[
"Renz",
"Matthias",
""
],
[
"Zuefle",
"Andreas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0907.2896
|
Michal Kaliszan
|
S{\l}awomir Sta\'nczak, Micha{\l} Kaliszan and Nicholas Bambos
|
Decentralized Admission Control for Power-Controlled Wireless Links
|
Section IV extended, Section V shortened; some corrections
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with the problem of admission control/channel access in
power-controlled decentralized wireless networks, in which the
quality-of-service (QoS) is expressed in terms of the signal-to-interference
ratio (SIR). We analyze a previously proposed admission control algorithm,
which was designed to maintain the SIR of operational (active) links above some
given threshold at all times (protection of active links). This protection
property ensures that as new users attempt to join the network, the already
established links sustain their quality. The considered scheme may be thus
applicable in some cognitive radio networks, where the fundamental premise is
that secondary users may be granted channel access only if it does not cause
disturbance to primary users.
The admission control algorithm was previously analyzed under the assumption
of affine interference functions. This paper extends all the previous results
to arbitrary standard interference functions, which capture many important
receiver designs, including optimal linear reception in the sense of maximizing
the SIR and the worst-case receiver design. Furthermore, we provide novel
conditions for protection of active users under the considered control scheme
when individual power constraints are imposed on each link. Finally, we
consider the possibility of a joint optimization of transmitters and receivers
in networks with linear transceivers, which includes linear beamforming in
multiple antenna systems. Transmitter optimization is performed alternately
with receiver optimization to generate non-decreasing sequences of SIRs.
Numerical evaluations show that additional transmitter side optimization has
potential for significant performance gains.
|
[
{
"version": "v1",
"created": "Thu, 16 Jul 2009 17:46:06 GMT"
},
{
"version": "v2",
"created": "Wed, 6 Jan 2010 18:33:32 GMT"
}
] | 2010-01-06T00:00:00 |
[
[
"Stańczak",
"Sławomir",
""
],
[
"Kaliszan",
"Michał",
""
],
[
"Bambos",
"Nicholas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.2914
|
Richard H. Cyburt
|
Richard H. Cyburt, Sam M. Austin, Timothy C. Beers, Alfredo Estrade,
Ryan M. Ferguson, A. Sakharuk, Karl Smith and Scott Warren
|
Managing Information for Sparsely Distributed Articles and Readers: The
Virtual Journals of the Joint Institute for Nuclear Astrophysics (JINA)
|
submitted, 9 pages, 5 figures, 1 table.
http://groups.nscl.msu.edu/jina/journals
| null | null | null |
astro-ph.IM astro-ph.GA astro-ph.SR cs.DL nucl-ex nucl-th
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The research area of nuclear astrophysics is characterized by a need for
information published in tens of journals in several fields and an extremely
dilute distribution of researchers. For these reasons it is difficult for
researchers, especially students, to be adequately informed of the relevant
published research. For example, the commonly employed journal club is
inefficient for a group consisting of a professor and his two students. In an
attempt to address this problem, we have developed a virtual journal (VJ), a
process for collecting and distributing a weekly compendium of articles of
interest to researchers in nuclear astrophysics. Subscribers are notified of
each VJ issue using an email-list server or an RSS feed. The VJ data base is
searchable by topics assigned by the editors, or by keywords. There are two
related VJs: the Virtual Journal of Nuclear Astrophysics (JINA VJ), and the
SEGUE Virtual Journal (SEGUE VJ). The JINA VJ also serves as a source of new
experimental and theoretical information for the JINA REACLIB reaction rate
database. References to review articles and popular level articles provide an
introduction to the literature for students. The VJs and support information
are available at http://groups.nscl.msu.edu/jina/journals
|
[
{
"version": "v1",
"created": "Thu, 16 Jul 2009 20:00:05 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Cyburt",
"Richard H.",
""
],
[
"Austin",
"Sam M.",
""
],
[
"Beers",
"Timothy C.",
""
],
[
"Estrade",
"Alfredo",
""
],
[
"Ferguson",
"Ryan M.",
""
],
[
"Sakharuk",
"A.",
""
],
[
"Smith",
"Karl",
""
],
[
"Warren",
"Scott",
""
]
] |
[
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.GA",
"description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents",
"span": "(Astrophysics of Galaxies)"
},
{
"class": "Physics",
"code": "astro-ph.SR",
"description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems",
"span": "(Solar and Stellar Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "nucl-ex",
"description": "Nuclear Experiment Results from experimental nuclear physics including the areas of fundamental interactions, measurements at low- and medium-energy, as well as relativistic heavy-ion collisions. Does not include: detectors and instrumentation nor analysis methods to conduct experiments; descriptions of experimental programs (present or future); comments on published results",
"span": "(Nuclear Experiment)"
},
{
"class": "Physics",
"code": "nucl-th",
"description": "Nuclear Theory Theory of nuclear structure covering wide area from models of hadron structure to neutron stars. Nuclear equation of states at different external conditions. Theory of nuclear reactions including heavy-ion reactions at low and high energies. It does not include problems of data analysis, physics of nuclear reactors, problems of safety, reactor construction",
"span": "(Nuclear Theory)"
}
] |
0907.2929
|
Hassan Gobjuka
|
Hassan Gobjuka
|
4G Wireless Networks: Opportunities and Challenges
| null | null | null |
VZ-TR-G1005309
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With the major wireless service providers planning to start deployment of 4G
wireless networks by mid 2010, research and industry communities are racing
against time to find solutions for some of the prominent still open issues in
4G networks. The growing interest in 4G networks is driven by the set of new
services will be made available for the first time such as accessing the
Internet anytime from anywhere, global roaming, and wider support for
multimedia applications. In this paper describe some of the key opportunities
will be made available by 4G networks, present key challenges and point to some
proposed solutions.
|
[
{
"version": "v1",
"created": "Thu, 16 Jul 2009 20:16:02 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Gobjuka",
"Hassan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.2949
|
Alexander Olshevsky
|
Julien M. Hendrickx, Alex Olshevsky, John N. Tsitsiklis
|
Distributed anonymous function computation in information fusion and
multiagent systems
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a model for deterministic distributed function computation by a
network of identical and anonymous nodes, with bounded computation and storage
capabilities that do not scale with the network size. Our goal is to
characterize the class of functions that can be computed within this model. In
our main result, we exhibit a class of non-computable functions, and prove that
every function outside this class can at least be approximated. The problem of
computing averages in a distributed manner plays a central role in our
development.
|
[
{
"version": "v1",
"created": "Thu, 16 Jul 2009 22:42:40 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 04:07:34 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Hendrickx",
"Julien M.",
""
],
[
"Olshevsky",
"Alex",
""
],
[
"Tsitsiklis",
"John N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0907.2951
|
Luca Foschini
|
Chiranjeeb Buragohain, Luca Foschini and Subhash Suri
|
Untangling the Braid: Finding Outliers in a Set of Streams
| null | null | null | null |
cs.DB cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Monitoring the performance of large shared computing systems such as the
cloud computing infrastructure raises many challenging algorithmic problems.
One common problem is to track users with the largest deviation from the norm
(outliers), for some measure of performance. Taking a stream-computing
perspective, we can think of each user's performance profile as a stream of
numbers (such as response times), and the aggregate performance profile of the
shared infrastructure as a "braid" of these intermixed streams. The monitoring
system's goal then is to untangle this braid sufficiently to track the top k
outliers. This paper investigates the space complexity of one-pass algorithms
for approximating outliers of this kind, proves lower bounds using multi-party
communication complexity, and proposes small-memory heuristic algorithms. On
one hand, stream outliers are easily tracked for simple measures, such as max
or min, but our theoretical results rule out even good approximations for most
of the natural measures such as average, median, or the quantiles. On the other
hand, we show through simulation that our proposed heuristics perform quite
well for a variety of synthetic data.
|
[
{
"version": "v1",
"created": "Thu, 16 Jul 2009 22:57:53 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Buragohain",
"Chiranjeeb",
""
],
[
"Foschini",
"Luca",
""
],
[
"Suri",
"Subhash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.2955
|
Matthew Herman
|
Matthew A. Herman and Thomas Strohmer
|
General Deviants: An Analysis of Perturbations in Compressed Sensing
|
11 pages, 1 figure, preprint
| null |
10.1109/JSTSP.2009.2039170
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We analyze the Basis Pursuit recovery of signals with general perturbations.
Previous studies have only considered partially perturbed observations Ax + e.
Here, x is a signal which we wish to recover, A is a full-rank matrix with more
columns than rows, and e is simple additive noise. Our model also incorporates
perturbations E to the matrix A which result in multiplicative noise. This
completely perturbed framework extends the prior work of Candes, Romberg and
Tao on stable signal recovery from incomplete and inaccurate measurements. Our
results show that, under suitable conditions, the stability of the recovered
signal is limited by the noise level in the observation. Moreover, this
accuracy is within a constant multiple of the best-case reconstruction using
the technique of least squares. In the absence of additive noise numerical
simulations essentially confirm that this error is a linear function of the
relative perturbation.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 00:16:09 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Herman",
"Matthew A.",
""
],
[
"Strohmer",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.2974
|
Serguei Mokhov
|
Serguei A. Mokhov, Shahriar Rostami, Hammad Ali, Min Chen and Yuhong
Yan
|
Service-Oriented Architectures and Web Services: Course Tutorial and Lab
Notes
|
v19 (Winter 2015): 55 pages; TOC; index; course lab/tutorial notes
(SOEN487); NOTE: a source of these notes is also maintained on SourceForge
| null | null | null |
cs.DC cs.SE
|
http://creativecommons.org/licenses/by/4.0/
|
This document presents a number of quick-step instructions to get started on
writing mini-service-oriented web services-based applications using OpenESB
2.31, Tomcat 6, GlassFish 2.x/3.0.1 with BPEL support, and Java 1.6+ primarily
in Scientific Linux 6.6 with user quota restrictions. While the tutorial notes
are oriented towards the students taking the SOEN487 on service-oriented
architectures (SOA) at Computer Science and Software Engineering (CSE)
Department, Faculty of Engineering and Computer Science (ENCS), other may find
some of it useful as well outside of CSE or Concordia. The notes are compiled
mostly based on the students' needs and feedback.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 03:36:56 GMT"
},
{
"version": "v10",
"created": "Wed, 2 Feb 2011 20:53:30 GMT"
},
{
"version": "v11",
"created": "Tue, 8 Feb 2011 20:58:18 GMT"
},
{
"version": "v12",
"created": "Wed, 9 Feb 2011 05:43:52 GMT"
},
{
"version": "v13",
"created": "Thu, 10 Feb 2011 20:02:04 GMT"
},
{
"version": "v14",
"created": "Wed, 9 Mar 2011 20:17:58 GMT"
},
{
"version": "v15",
"created": "Wed, 30 Mar 2011 19:59:10 GMT"
},
{
"version": "v16",
"created": "Mon, 26 Sep 2011 20:00:05 GMT"
},
{
"version": "v17",
"created": "Wed, 19 Oct 2011 19:57:13 GMT"
},
{
"version": "v18",
"created": "Mon, 24 Oct 2011 22:32:28 GMT"
},
{
"version": "v19",
"created": "Tue, 29 Dec 2015 01:38:57 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jul 2009 19:59:35 GMT"
},
{
"version": "v3",
"created": "Tue, 21 Jul 2009 08:30:01 GMT"
},
{
"version": "v4",
"created": "Tue, 21 Jul 2009 22:06:01 GMT"
},
{
"version": "v5",
"created": "Sat, 25 Jul 2009 03:05:36 GMT"
},
{
"version": "v6",
"created": "Tue, 28 Jul 2009 22:32:54 GMT"
},
{
"version": "v7",
"created": "Thu, 13 Jan 2011 19:40:58 GMT"
},
{
"version": "v8",
"created": "Mon, 17 Jan 2011 21:00:00 GMT"
},
{
"version": "v9",
"created": "Wed, 26 Jan 2011 20:34:21 GMT"
}
] | 2015-12-31T00:00:00 |
[
[
"Mokhov",
"Serguei A.",
""
],
[
"Rostami",
"Shahriar",
""
],
[
"Ali",
"Hammad",
""
],
[
"Chen",
"Min",
""
],
[
"Yan",
"Yuhong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0907.2984
|
Zheng Wang
|
Zheng Wang, Jie Luo
|
Fountain Communication using Concatenated Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper extends linear-complexity concatenated coding schemes to fountain
communication over the discrete-time memoryless channel. Achievable fountain
error exponents for one-level and multi-level concatenated fountain codes are
derived. It is also shown that concatenated coding schemes possess interesting
properties in several multi-user fountain communication scenarios.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 06:08:18 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 03:22:04 GMT"
},
{
"version": "v3",
"created": "Mon, 9 May 2011 06:06:25 GMT"
},
{
"version": "v4",
"created": "Thu, 9 Jun 2011 22:54:06 GMT"
}
] | 2011-06-13T00:00:00 |
[
[
"Wang",
"Zheng",
""
],
[
"Luo",
"Jie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.2990
|
Martin Josef Geiger
|
Martin Josef Geiger
|
The Single Machine Total Weighted Tardiness Problem - Is it (for
Metaheuristics) a Solved Problem ?
| null |
Proceedings of the 8th Metaheuristics International Conference MIC
2009, July 13-16, Hamburg, Germany, pp. 141.1-141.10
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article presents a study of rather simple local search heuristics for the
single machine total weighted tardiness problem (SMTWTP), namely hillclimbing
and Variable Neighborhood Search. In particular, we revisit these approaches
for the SMTWTP as there appears to be a lack of appropriate/challenging
benchmark instances in this case. The obtained results are impressive indeed.
Only few instances remain unsolved, and even those are approximated within 1%
of the optimal/best known solutions. Our experiments support the claim that
metaheuristics for the SMTWTP are very likely to lead to good results, and
that, before refining search strategies, more work must be done with regard to
the proposition of benchmark data. Some recommendations for the construction of
such data sets are derived from our investigations.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 06:45:46 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.2993
|
Martin Josef Geiger
|
Martin Josef Geiger
|
Improvements for multi-objective flow shop scheduling by Pareto Iterated
Local Search
| null |
Proceedings of the 8th Metaheuristics International Conference MIC
2009, July 13-16, 2009, Hamburg, Germany, pp 195.1-195.10
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The article describes the proposition and application of a local search
metaheuristic for multi-objective optimization problems. It is based on two
main principles of heuristic search, intensification through variable
neighborhoods, and diversification through perturbations and successive
iterations in favorable regions of the search space. The concept is
successfully tested on permutation flow shop scheduling problems under multiple
objectives and compared to other local search approaches. While the obtained
results are encouraging in terms of their quality, another positive attribute
of the approach is its simplicity as it does require the setting of only very
few parameters.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 06:53:02 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Geiger",
"Martin Josef",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.3005
|
Flavio D'Alessandro
|
Flavio D'Alessandro, Benedetto Intrigila, Stefano Varricchio
|
On some counting problems for semi-linear sets
|
34 pages
| null | null | null |
cs.DM cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $X$ be a subset of $\N^t$ or $\Z^t$. We can associate with $X$ a function
${\cal G}_X:\N^t\longrightarrow\N$ which returns, for every $(n_1, ..., n_t)\in
\N^t$, the number ${\cal G}_X(n_1, ..., n_t)$ of all vectors $x\in X$ such
that, for every $i=1,..., t, |x_{i}| \leq n_{i}$. This function is called the
{\em growth function} of $X$. The main result of this paper is that the growth
function of a semi-linear set of $\N^t$ or $\Z^t$ is a box spline. By using
this result and some theorems on semi-linear sets, we give a new proof of
combinatorial flavour of a well-known theorem by Dahmen and Micchelli on the
counting function of a system of Diophantine linear equations.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 07:47:22 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"D'Alessandro",
"Flavio",
""
],
[
"Intrigila",
"Benedetto",
""
],
[
"Varricchio",
"Stefano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.3016
|
Arash Rafiey
|
Arash Rafiey and Pavol Hell
|
Duality for Min-Max Orderings and Dichotomy for Min Cost Homomorphisms
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Min-Max orderings correspond to conservative lattice polymorphisms. Digraphs
with Min-Max orderings have polynomial time solvable minimum cost homomorphism
problems. They can also be viewed as digraph analogues of proper interval
graphs and bigraphs.
We give a forbidden structure characterization of digraphs with a Min-Max
ordering which implies a polynomial time recognition algorithm. We also
similarly characterize digraphs with an extended Min-Max ordering, and we apply
this characterization to prove a conjectured form of dichotomy for minimum cost
homomorphism problems.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 08:14:15 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Rafiey",
"Arash",
""
],
[
"Hell",
"Pavol",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.3019
|
Dana Fisman
|
Dana Fisman, Orna Kupferman and Yoad Lustig
|
Rational Synthesis
|
14 pages
| null | null | null |
cs.LO cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Synthesis is the automated construction of a system from its specification.
The system has to satisfy its specification in all possible environments.
Modern systems often interact with other systems, or agents. Many times these
agents have objectives of their own, other than to fail the system. Thus, it
makes sense to model system environments not as hostile, but as composed of
rational agents; i.e., agents that act to achieve their own objectives. We
introduce the problem of synthesis in the context of rational agents (rational
synthesis, for short). The input consists of a temporal-logic formula
specifying the system and temporal-logic formulas specifying the objectives of
the agents. The output is an implementation T of the system and a profile of
strategies, suggesting a behavior for each of the agents. The output should
satisfy two conditions. First, the composition of T with the strategy profile
should satisfy the specification. Second, the strategy profile should be an
equilibria in the sense that, in view of their objectives, agents have no
incentive to deviate from the strategies assigned to them. We solve the
rational-synthesis problem for various definitions of equilibria studied in
game theory. We also consider the multi-valued case in which the objectives of
the system and the agents are still temporal logic formulas, but involve
payoffs from a finite lattice.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 08:51:23 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Fisman",
"Dana",
""
],
[
"Kupferman",
"Orna",
""
],
[
"Lustig",
"Yoad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0907.3045
|
Abdelkader Lahmadi
|
Abdelkader Lahmadi (INRIA Lorraine - LORIA), Olivier Festor (INRIA
Lorraine - LORIA)
|
SecSip: A Stateful Firewall for SIP-based Networks
| null |
11th IFIP/IEEE International Symposium on Integrated Network
Management (2009)
| null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
SIP-based networks are becoming the de-facto standard for voice, video and
instant messaging services. Being exposed to many threats while playing an
major role in the operation of essential services, the need for dedicated
security management approaches is rapidly increasing. In this paper we present
an original security management approach based on a specific vulnerability
aware SIP stateful firewall. Through known attack descriptions, we illustrate
the power of the configuration language of the firewall which uses the
capability to specify stateful objects that track data from multiple SIP
elements within their lifetime. We demonstrate through measurements on a real
implementation of the firewall its efficiency and performance.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 11:28:11 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Lahmadi",
"Abdelkader",
"",
"INRIA Lorraine - LORIA"
],
[
"Festor",
"Olivier",
"",
"INRIA\n Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.3047
|
Abdelkader Lahmadi
|
Abdelkader Lahmadi (INRIA Lorraine - LORIA), Laurent Andrey (INRIA
Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA)
|
Performance of Network and Service Monitoring Frameworks
| null |
11th IFIP/IEEE International Symposium on Integrated Network
Management (2009)
| null | null |
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The efficiency and the performance of anagement systems is becoming a hot
research topic within the networks and services management community. This
concern is due to the new challenges of large scale managed systems, where the
management plane is integrated within the functional plane and where management
activities have to carry accurate and up-to-date information. We defined a set
of primary and secondary metrics to measure the performance of a management
approach. Secondary metrics are derived from the primary ones and quantifies
mainly the efficiency, the scalability and the impact of management activities.
To validate our proposals, we have designed and developed a benchmarking
platform dedicated to the measurement of the performance of a JMX manager-agent
based management system. The second part of our work deals with the collection
of measurement data sets from our JMX benchmarking platform. We mainly studied
the effect of both load and the number of agents on the scalability, the impact
of management activities on the user perceived performance of a managed server
and the delays of JMX operations when carrying variables values. Our findings
show that most of these delays follow a Weibull statistical distribution. We
used this statistical model to study the behavior of a monitoring algorithm
proposed in the literature, under heavy tail delays distribution. In this case,
the view of the managed system on the manager side becomes noisy and out of
date.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 11:35:46 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Lahmadi",
"Abdelkader",
"",
"INRIA Lorraine - LORIA"
],
[
"Andrey",
"Laurent",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Festor",
"Olivier",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0907.3068
|
Giorgos Christodoulou
|
George Christodoulou and Annamaria Kovacs
|
A deterministic truthful PTAS for scheduling related machines
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scheduling on related machines ($Q||C_{\max}$) is one of the most important
problems in the field of Algorithmic Mechanism Design. Each machine is
controlled by a selfish agent and her valuation can be expressed via a single
parameter, her {\em speed}. In contrast to other similar problems, Archer and
Tardos \cite{AT01} showed that an algorithm that minimizes the makespan can be
truthfully implemented, although in exponential time. On the other hand, if we
leave out the game-theoretic issues, the complexity of the problem has been
completely settled -- the problem is strongly NP-hard, while there exists a
PTAS \cite{HS88,ES04}.
This problem is the most well studied in single-parameter algorithmic
mechanism design. It gives an excellent ground to explore the boundary between
truthfulness and efficient computation. Since the work of Archer and Tardos,
quite a lot of deterministic and randomized mechanisms have been suggested.
Recently, a breakthrough result \cite{DDDR08} showed that a randomized truthful
PTAS exists. On the other hand, for the deterministic case, the best known
approximation factor is 2.8 \cite{Kov05,Kov07}.
It has been a major open question whether there exists a deterministic
truthful PTAS, or whether truthfulness has an essential, negative impact on the
computational complexity of the problem. In this paper we give a definitive
answer to this important question by providing a truthful {\em deterministic}
PTAS.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 13:13:07 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Christodoulou",
"George",
""
],
[
"Kovacs",
"Annamaria",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0907.3076
|
Stephan Kreutzer
|
Stephan Kreutzer and Siamak Tazari
|
On Brambles, Grid-Like Minors, and Parameterized Intractability of
Monadic Second-Order Logic
| null | null | null | null |
cs.DM cs.DS cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Brambles were introduced as the dual notion to treewidth, one of the most
central concepts of the graph minor theory of Robertson and Seymour. Recently,
Grohe and Marx showed that there are graphs G, in which every bramble of order
larger than the square root of the treewidth is of exponential size in |G|. On
the positive side, they show the existence of polynomial-sized brambles of the
order of the square root of the treewidth, up to log factors. We provide the
first polynomial time algorithm to construct a bramble in general graphs and
achieve this bound, up to log-factors. We use this algorithm to construct
grid-like minors, a replacement structure for grid-minors recently introduced
by Reed and Wood, in polynomial time. Using the grid-like minors, we introduce
the notion of a perfect bramble and an algorithm to find one in polynomial
time. Perfect brambles are brambles with a particularly simple structure and
they also provide us with a subgraph that has bounded degree and still large
treewidth; we use them to obtain a meta-theorem on deciding certain
parameterized subgraph-closed problems on general graphs in time singly
exponential in the parameter.
The second part of our work deals with providing a lower bound to Courcelle's
famous theorem, stating that every graph property that can be expressed by a
sentence in monadic second-order logic (MSO), can be decided by a linear time
algorithm on classes of graphs of bounded treewidth. Using our results from the
first part of our work we establish a strong lower bound for tractability of
MSO on classes of colored graphs.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 13:45:20 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Kreutzer",
"Stephan",
""
],
[
"Tazari",
"Siamak",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.3085
|
Matteo Pradella
|
Matteo Pradella, Angelo Morzenti, Pierluigi San Pietro
|
A Metric Encoding for Bounded Model Checking (extended version)
| null | null |
10.1007/978-3-642-05089-3_47
| null |
cs.LO cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Bounded Model Checking both the system model and the checked property are
translated into a Boolean formula to be analyzed by a SAT-solver. We introduce
a new encoding technique which is particularly optimized for managing
quantitative future and past metric temporal operators, typically found in
properties of hard real time systems. The encoding is simple and intuitive in
principle, but it is made more complex by the presence, typical of the Bounded
Model Checking technique, of backward and forward loops used to represent an
ultimately periodic infinite domain by a finite structure. We report and
comment on the new encoding technique and on an extensive set of experiments
carried out to assess its feasibility and effectiveness.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 14:51:10 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Jul 2009 09:51:03 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Pradella",
"Matteo",
""
],
[
"Morzenti",
"Angelo",
""
],
[
"Pietro",
"Pierluigi San",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0907.3095
|
Kamal Ahmat
|
Kamal Ahmat
|
Ethernet Topology Discovery: A Survey
| null | null | null |
TR-20091966
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ethernet networks have undergone impressive growth since the past few
decades. This growth can be appreciated in terms of the equipment, such as
switches and links, that have been added, as well as in the number of users
that it supports. In parallel to this expansion, over the past decade the
networking research community has shown a growing interest in discovering and
analyzing the Ethernet topology. Research in this area has concentrated on the
theoretical analysis of Ethernet topology as well as developing tools and
methods for mapping the network layout. These efforts have brought us to a
crucial juncture for Ethernet topology measurement infrastructures: while,
previously, these were both small (in terms of number of measurement points),
we are starting to see the deployment of large-scale distributed systems
composed of hundreds or thousands of monitors. As we look forward to this next
generation of systems, we take stock of what has been achieved so far. In this
survey, we discuss past and current mechanisms for discovering the Ethernet
topology from theoretical and practical prospective. In addition to discovery
techniques, we provide insights into some of the well known open issues related
to Ethernet topology discovery.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 15:31:38 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Ahmat",
"Kamal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.3099
|
Kamal Ahmat
|
Kamal Ahmat
|
Graph Theory and Optimization Problems for Very Large Networks
| null | null | null |
TR-20091970
|
cs.NI cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graph theory provides a primary tool for analyzing and designing computer
communication networks. In the past few decades, Graph theory has been used to
study various types of networks, including the Internet, wide Area Networks,
Local Area Networks, and networking protocols such as border Gateway Protocol,
Open shortest Path Protocol, and Networking Networks. In this paper, we present
some key graph theory concepts used to represent different types of networks.
Then we describe how networks are modeled to investigate problems related to
network protocols. Finally, we present some of the tools used to generate graph
for representing practical networks.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 16:33:30 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Ahmat",
"Kamal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.3117
|
Olivier Bournez
|
Olivier Bournez and Manuel Campagnolo
|
A Survey on Continuous Time Computations
| null |
New Computational Paradigms. Changing Conceptions of What is
Computable. (Cooper, S.B. and L{\"o}we, B. and Sorbi, A., Eds.). New York,
Springer-Verlag, pages 383-423. 2008
| null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We provide an overview of theories of continuous time computation. These
theories allow us to understand both the hardness of questions related to
continuous time dynamical systems and the computational power of continuous
time analog models. We survey the existing models, summarizing results, and
point to relevant references in the literature.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 17:17:20 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Bournez",
"Olivier",
""
],
[
"Campagnolo",
"Manuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.3118
|
Olivier Bournez
|
Olivier Bournez, Philippe Chassaing, Johanne Cohen, Lucas Gerin and
Xavier Koegler
|
On the Convergence of Population Protocols When Population Goes to
Infinity
|
Submitted to Applied Mathematics and Computation. 2009
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Population protocols have been introduced as a model of sensor networks
consisting of very limited mobile agents with no control over their own
movement. A population protocol corresponds to a collection of anonymous
agents, modeled by finite automata, that interact with one another to carry out
computations, by updating their states, using some rules. Their computational
power has been investigated under several hypotheses but always when restricted
to finite size populations. In particular, predicates stably computable in the
original model have been characterized as those definable in Presburger
arithmetic. We study mathematically the convergence of population protocols
when the size of the population goes to infinity. We do so by giving general
results, that we illustrate through the example of a particular population
protocol for which we even obtain an asymptotic development. This example shows
in particular that these protocols seem to have a rather different
computational power when a huge population hypothesis is considered.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 17:22:12 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Bournez",
"Olivier",
""
],
[
"Chassaing",
"Philippe",
""
],
[
"Cohen",
"Johanne",
""
],
[
"Gerin",
"Lucas",
""
],
[
"Koegler",
"Xavier",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0907.3123
|
Olivier Bournez
|
Emmanuel Beffara, Olivier Bournez, Hassen Kacem, Claude Kirchner
|
Verification of Timed Automata Using Rewrite Rules and Strategies
|
In the Proceedings BISFAI 2001, Seventh Biennial Bar-Ilan
International Symposium on the Foundations of Artificial Intelligence.
Ramat-Gan, 2001
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
ELAN is a powerful language and environment for specifying and prototyping
deduction systems in a language based on rewrite rules controlled by
strategies. Timed automata is a class of continuous real-time models of
reactive systems for which efficient model-checking algorithms have been
devised. In this paper, we show that these algorithms can very easily be
prototyped in the ELAN system. This paper argues through this example that
rewriting based systems relying on rules and strategies are a good framework to
prototype, study and test rather efficiently symbolic model-checking
algorithms, i.e. algorithms which involve combination of graph exploration
rules, deduction rules, constraint solving techniques and decision procedures.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 17:40:04 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Beffara",
"Emmanuel",
""
],
[
"Bournez",
"Olivier",
""
],
[
"Kacem",
"Hassen",
""
],
[
"Kirchner",
"Claude",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.3126
|
Olivier Bournez
|
Olivier Bournez, Jeremie Chalopin, Johanne Cohen, Xavier Koegler
|
Population Protocols that Correspond to Symmetric Games
| null | null | null | null |
cs.GT cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Population protocols have been introduced by Angluin et {al.} as a model of
networks consisting of very limited mobile agents that interact in pairs but
with no control over their own movement. A collection of anonymous agents,
modeled by finite automata, interact pairwise according to some rules that
update their states. The model has been considered as a computational model in
several papers. Input values are initially distributed among the agents, and
the agents must eventually converge to the the correct output. Predicates on
the initial configurations that can be computed by such protocols have been
characterized under various hypotheses. In an orthogonal way, several
distributed systems have been termed in literature as being realizations of
games in the sense of game theory. In this paper, we investigate under which
conditions population protocols, or more generally pairwise interaction rules,
can be considered as the result of a symmetric game. We prove that not all
rules can be considered as symmetric games.% We prove that some basic protocols
can be realized using symmetric games. As a side effect of our study, we also
prove that any population protocol can be simulated by a symmetric one (but not
necessarily a game).
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 18:06:13 GMT"
}
] | 2009-07-20T00:00:00 |
[
[
"Bournez",
"Olivier",
""
],
[
"Chalopin",
"Jeremie",
""
],
[
"Cohen",
"Johanne",
""
],
[
"Koegler",
"Xavier",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0907.3135
|
Philip Bille
|
Philip Bille
|
Fast Searching in Packed Strings
|
To appear in Journal of Discrete Algorithms. Special Issue on CPM
2009
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given strings $P$ and $Q$ the (exact) string matching problem is to find all
positions of substrings in $Q$ matching $P$. The classical Knuth-Morris-Pratt
algorithm [SIAM J. Comput., 1977] solves the string matching problem in linear
time which is optimal if we can only read one character at the time. However,
most strings are stored in a computer in a packed representation with several
characters in a single word, giving us the opportunity to read multiple
characters simultaneously. In this paper we study the worst-case complexity of
string matching on strings given in packed representation. Let $m \leq n$ be
the lengths $P$ and $Q$, respectively, and let $\sigma$ denote the size of the
alphabet. On a standard unit-cost word-RAM with logarithmic word size we
present an algorithm using time $$ O\left(\frac{n}{\log_\sigma n} + m +
\occ\right). $$ Here $\occ$ is the number of occurrences of $P$ in $Q$. For $m
= o(n)$ this improves the $O(n)$ bound of the Knuth-Morris-Pratt algorithm.
Furthermore, if $m = O(n/\log_\sigma n)$ our algorithm is optimal since any
algorithm must spend at least $\Omega(\frac{(n+m)\log
\sigma}{\log n} + \occ) = \Omega(\frac{n}{\log_\sigma n} + \occ)$ time to
read the input and report all occurrences. The result is obtained by a novel
automaton construction based on the Knuth-Morris-Pratt algorithm combined with
a new compact representation of subautomata allowing an optimal
tabulation-based simulation.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 19:29:13 GMT"
},
{
"version": "v2",
"created": "Tue, 7 Sep 2010 19:43:47 GMT"
}
] | 2010-09-08T00:00:00 |
[
[
"Bille",
"Philip",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.3154
|
Stevan Harnad
|
Stevan Harnad
|
COMMENTARY ON: Citing and Reading Behavours in High-Energy Physics
(arXiv:0906.5418)
|
2 pages
| null | null | null |
cs.DL
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Evidence confirming that OA increases impact will not be sufficient to induce
enough researchers to provide OA; only mandates from their institutions and
funders can ensure that. HEP researchers continue to submit their papers to
peer-reviewed journals, as they always did, depositing both their unrefereed
preprints and their refereed postprints. None of that has changed. In fields
like HEP and astrophysics, the journal affordability/accessibility problem is
not as great as in many other fields, where it the HEP Early Access impact
advantage translates into the OA impact advantage itself. Almost no one has
ever argued that Gold OA provides a greater OA advantage than Green OA. The OA
advantage is the OA advantage, whether Green or Gold.
|
[
{
"version": "v1",
"created": "Fri, 17 Jul 2009 20:29:11 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Harnad",
"Stevan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0907.3177
|
Chengqing Li
|
Chengqing Li, David Arroyo, and Kwok-Tung Lo
|
Breaking a Chaotic Cryptographic Scheme Based on Composition Maps
|
9 pages, 7 figures
| null |
10.1142/S0218127410027192
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, a chaotic cryptographic scheme based on composition maps was
proposed. This paper studies the security of the scheme and reports the
following findings: 1) the scheme can be broken by a differential attack with
$6+\lceil\log_L(MN)\rceil$ chosen-plaintext, where $MN$ is the size of
plaintext and $L$ is the number of different elements in plain-text; 2) the
scheme is not sensitive to the changes of plaintext; 3) the two composition
maps do not work well as a secure and efficient random number source.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 03:47:49 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Li",
"Chengqing",
""
],
[
"Arroyo",
"David",
""
],
[
"Lo",
"Kwok-Tung",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.3183
|
Shivnath Babu
|
Nedyalko Borisov, Shivnath Babu, Sandeep Uttamchandani, Ramani
Routray, Aameek Singh
|
Why Did My Query Slow Down?
|
A conference version of this work was published as: Why Did My Query
Slow Down, By Nedyalko Borisov, Sandeep Uttamchandani, Ramani Routray, and
Aameek Singh, In the Proc. of the 4th Biennial Conference on Innovative Data
Systems Research, Asilomar, CA, USA, Jan 4-7, 2009
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many enterprise environments have databases running on network-attached
server-storage infrastructure (referred to as Storage Area Networks or SANs).
Both the database and the SAN are complex systems that need their own separate
administrative teams. This paper puts forth the vision of an innovative
management framework to simplify administrative tasks that require an in-depth
understanding of both the database and the SAN. As a concrete instance, we
consider the task of diagnosing the slowdown in performance of a database query
that is executed multiple times (e.g., in a periodic report-generation
setting). This task is very challenging because the space of possible causes
includes problems specific to the database, problems specific to the SAN, and
problems that arise due to interactions between the two systems. In addition,
the monitoring data available from these systems can be noisy.
We describe the design of DIADS which is an integrated diagnosis tool for
database and SAN administrators. DIADS generates and uses a powerful
abstraction called Annotated Plan Graphs (APGs) that ties together the
execution path of queries in the database and the SAN. Using an innovative
workflow that combines domain-specific knowledge with machine-learning
techniques, DIADS was applied successfully to diagnose query slowdowns caused
by complex combinations of events across a PostgreSQL database and a production
SAN.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 06:37:37 GMT"
},
{
"version": "v2",
"created": "Sat, 22 Oct 2011 05:23:52 GMT"
}
] | 2011-10-25T00:00:00 |
[
[
"Borisov",
"Nedyalko",
""
],
[
"Babu",
"Shivnath",
""
],
[
"Uttamchandani",
"Sandeep",
""
],
[
"Routray",
"Ramani",
""
],
[
"Singh",
"Aameek",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0907.3200
|
Yong-Hyuk Kim
|
Yourim Yoon, Yong-Hyuk Kim, Alberto Moraglio, Byung-Ro Moon
|
A Mathematical Unification of Geometric Crossovers Defined on Phenotype
Space
|
20 pages, 2 figures
| null | null | null |
cs.NE cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Geometric crossover is a representation-independent definition of crossover
based on the distance of the search space interpreted as a metric space. It
generalizes the traditional crossover for binary strings and other important
recombination operators for the most frequently used representations. Using a
distance tailored to the problem at hand, the abstract definition of crossover
can be used to design new problem specific crossovers that embed problem
knowledge in the search. This paper is motivated by the fact that
genotype-phenotype mapping can be theoretically interpreted using the concept
of quotient space in mathematics. In this paper, we study a metric
transformation, the quotient metric space, that gives rise to the notion of
quotient geometric crossover. This turns out to be a very versatile notion. We
give many example applications of the quotient geometric crossover.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 10:15:49 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Yoon",
"Yourim",
""
],
[
"Kim",
"Yong-Hyuk",
""
],
[
"Moraglio",
"Alberto",
""
],
[
"Moon",
"Byung-Ro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.3202
|
Yong-Hyuk Kim
|
Yourim Yoon, Yong-Hyuk Kim, Alberto Moraglio, and Byung-Ro Moon
|
Mathematical Interpretation between Genotype and Phenotype Spaces and
Induced Geometric Crossovers
|
21 pages, 3 figures
| null | null | null |
cs.NE cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present that genotype-phenotype mapping can be
theoretically interpreted using the concept of quotient space in mathematics.
Quotient space can be considered as mathematically-defined phenotype space in
the evolutionary computation theory. The quotient geometric crossover has the
effect of reducing the search space actually searched by geometric crossover,
and it introduces problem knowledge in the search by using a distance better
tailored to the specific solution interpretation. Quotient geometric crossovers
are directly applied to the genotype space but they have the effect of the
crossovers performed on phenotype space. We give many example applications of
the quotient geometric crossover.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 10:31:07 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Yoon",
"Yourim",
""
],
[
"Kim",
"Yong-Hyuk",
""
],
[
"Moraglio",
"Alberto",
""
],
[
"Moon",
"Byung-Ro",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.3208
|
Serge Gaspers
|
Fedor V. Fomin, Serge Gaspers, Saket Saurabh, and St\'ephan Thomass\'e
|
A Linear Vertex Kernel for Maximum Internal Spanning Tree
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a polynomial time algorithm that for any graph G and integer k >=
0, either finds a spanning tree with at least k internal vertices, or outputs a
new graph G' on at most 3k vertices and an integer k' such that G has a
spanning tree with at least k internal vertices if and only if G' has a
spanning tree with at least k' internal vertices. In other words, we show that
the Maximum Internal Spanning Tree problem parameterized by the number of
internal vertices k, has a 3k-vertex kernel. Our result is based on an
innovative application of a classical min-max result about hypertrees in
hypergraphs which states that "a hypergraph H contains a hypertree if and only
if H is partition connected."
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 18:50:55 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Mar 2012 18:23:27 GMT"
}
] | 2012-03-06T00:00:00 |
[
[
"Fomin",
"Fedor V.",
""
],
[
"Gaspers",
"Serge",
""
],
[
"Saurabh",
"Saket",
""
],
[
"Thomassé",
"Stéphan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.3209
|
Ula\c{s} Ba\u{g}ci
|
Ulas Bagci and Li Bai
|
Registration of Standardized Histological Images in Feature Space
|
SPIE Medical Imaging 2008 - submission
|
SPIE Medical Imaging 2008: Image Processing. Edited by Reinhardt,
Joseph M.; Pluim, Josien P. W. Proceedings of the SPIE, Volume 6914, pp.
69142V-69142V-9 (2008)
|
10.1117/12.770219
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose three novel and important methods for the
registration of histological images for 3D reconstruction. First, possible
intensity variations and nonstandardness in images are corrected by an
intensity standardization process which maps the image scale into a standard
scale where the similar intensities correspond to similar tissues meaning.
Second, 2D histological images are mapped into a feature space where continuous
variables are used as high confidence image features for accurate registration.
Third, we propose an automatic best reference slice selection algorithm that
improves reconstruction quality based on both image entropy and mean square
error of the registration process. We demonstrate that the choice of reference
slice has a significant impact on registration error, standardization, feature
space and entropy information. After 2D histological slices are registered
through an affine transformation with respect to an automatically chosen
reference, the 3D volume is reconstructed by co-registering 2D slices
elastically.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 11:28:41 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Bagci",
"Ulas",
""
],
[
"Bai",
"Li",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0907.3215
|
Ula\c{s} Ba\u{g}ci
|
Ulas Bagci and Li Bai
|
Fully Automatic 3D Reconstruction of Histological Images
|
IEEE ISBI-08 Submission
|
5th IEEE International Symposium on Biomedical Imaging: From Nano
to Macro ISBI-08, pp. 591-594. 2008
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose a computational framework for 3D volume
reconstruction from 2D histological slices using registration algorithms in
feature space. To improve the quality of reconstructed 3D volume, first,
intensity variations in images are corrected by an intensity standardization
process which maps image intensity scale to a standard scale where similar
intensities correspond to similar tissues. Second, a subvolume approach is
proposed for 3D reconstruction by dividing standardized slices into groups.
Third, in order to improve the quality of the reconstruction process, an
automatic best reference slice selection algorithm is developed based on an
iterative assessment of image entropy and mean square error of the registration
process. Finally, we demonstrate that the choice of the reference slice has a
significant impact on registration quality and subsequent 3D reconstruction.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 12:32:27 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Bagci",
"Ulas",
""
],
[
"Bai",
"Li",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0907.3218
|
Ula\c{s} Ba\u{g}ci
|
Ulas Bagci and Li Bai
|
Parallel AdaBoost Algorithm for Gabor Wavelet Selection in Face
Recognition
|
IEEE ICIP 2008 Submission
|
IEEE International Conference on Image Processing (ICIP-08), San
Diego, CA, U.S.A, 12-15 October, 2008
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, the problem of automatic Gabor wavelet selection for face
recognition is tackled by introducing an automatic algorithm based on Parallel
AdaBoosting method. Incorporating mutual information into the algorithm leads
to the selection procedure not only based on classification accuracy but also
on efficiency. Effective image features are selected by using properly chosen
Gabor wavelets optimised with Parallel AdaBoost method and mutual information
to get high recognition rates with low computational cost. Experiments are
conducted using the well-known FERET face database. In proposed framework,
memory and computation costs are reduced significantly and high classification
accuracy is obtained.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 13:03:19 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Bagci",
"Ulas",
""
],
[
"Bai",
"Li",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0907.3220
|
Ula\c{s} Ba\u{g}ci
|
Ulas Bagci and Engin Erzin
|
Inter Genre Similarity Modelling For Automatic Music Genre
Classification
|
Dafx 2006 submission
|
9th International Conference on Digital Audio Effects (DAFx-06),
Montreal, Canada, September 18-20, 2006
| null | null |
cs.SD cs.AI stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Music genre classification is an essential tool for music information
retrieval systems and it has been finding critical applications in various
media platforms. Two important problems of the automatic music genre
classification are feature extraction and classifier design. This paper
investigates inter-genre similarity modelling (IGS) to improve the performance
of automatic music genre classification. Inter-genre similarity information is
extracted over the mis-classified feature population. Once the inter-genre
similarity is modelled, elimination of the inter-genre similarity reduces the
inter-genre confusion and improves the identification rates. Inter-genre
similarity modelling is further improved with iterative IGS modelling(IIGS) and
score modelling for IGS elimination(SMIGS). Experimental results with promising
classification improvements are provided.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 13:25:59 GMT"
}
] | 2018-10-18T00:00:00 |
[
[
"Bagci",
"Ulas",
""
],
[
"Erzin",
"Engin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0907.3226
|
Walid Belkhir
|
Walid Belkhir
|
From Causal Semantics To Duration Timed Models
|
14 pages
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The interleaving semantics is not compatible with both action refinement and
durational actions. Since many true concurrency semantics are congruent w.r.t.
action refinement, notably the causality and the maximality ones, this has
challenged us to study the dense time behavior - where the actions are of
arbitrary fixed duration - within the causality semantics of Da Costa.
We extend the causal transition systems with the clocks and the timed
constraints, and thus we obtain an over class of timed automata where the
actions need not to be atomic. We define a real time extension of the formal
description technique CSP, called duration-CSP, by attributing the duration to
actions. We give the operational timed causal semantics of duration-CSP as well
as its denotational semantics over the class of timed causal transition
systems. Afterwards, we prove that the two semantics are equivalent. Finally we
extend the duration-CSP language with a refinement operator $\rho$ - that
allows to replace an action with a process - and prove that it preserves the
timed causal bisimulation.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 15:27:45 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Apr 2010 08:56:45 GMT"
}
] | 2010-04-14T00:00:00 |
[
[
"Belkhir",
"Walid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.3230
|
Arno Pauly
|
Arno Pauly
|
Infinite Oracle Queries in Type-2 Machines (Extended Abstract)
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define Oracle-Type-2-Machine capable of writing infinite oracle queries.
In contrast to finite oracle queries, this extends the realm of
oracle-computable functions into the discontinuous realm. Our definition is
conservative; access to a computable oracle does not increase the computational
power.
Other models of real hypercomputation such as Ziegler's (finitely) revising
computation or Type-2-Nondeterminism are shown to be special cases of
Oracle-Type-2-Machines. Our approach offers an intuitive definition of the
weakest machine model capable to simulate both Type-2-Machines and BSS
machines.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 15:06:12 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Pauly",
"Arno",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.3246
|
Martyn Amos
|
Alan Gibbons and Martyn Amos
|
Wave propagation in filamental cellular automata
|
To appear in the International Journal of Natural Computing Research.
Changes to previous version: (1) Made title more specific, (2) added several
explanatory figures, (3) improved background material, (4) several
clarifications as requested by referees
| null | null | null |
cs.FL nlin.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by questions in biology and distributed computing, we investigate
the behaviour of particular cellular automata, modelled as one-dimensional
arrays of identical finite automata. We investigate what sort of
self-stabilising cooperative behaviour these can induce in terms of waves of
cellular state changes along a filament of cells. We discover what the minimum
requirements are, in terms of numbers of states and the range of communication
between automata, to observe this for individual filaments. We also discover
that populations of growing filaments may have useful features that the
individual filament does not have, and we give the results of numerical
simulations.
|
[
{
"version": "v1",
"created": "Sat, 18 Jul 2009 22:18:24 GMT"
},
{
"version": "v2",
"created": "Sat, 14 Nov 2009 00:27:17 GMT"
}
] | 2009-11-14T00:00:00 |
[
[
"Gibbons",
"Alan",
""
],
[
"Amos",
"Martyn",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Physics",
"code": "nlin.CG",
"description": "Computational methods, time series analysis, signal processing, wavelets, lattice gases",
"span": "(Cellular Automata and Lattice Gases)"
}
] |
0907.3291
|
Satish Babu Korada
|
S. Hamed Hassani, Satish Babu Korada, Ruediger Urbanke
|
The Compound Capacity of Polar Codes
|
5 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the compound capacity of polar codes under successive
cancellation decoding for a collection of binary-input memoryless
output-symmetric channels. By deriving a sequence of upper and lower bounds, we
show that in general the compound capacity under successive decoding is
strictly smaller than the unrestricted compound capacity.
|
[
{
"version": "v1",
"created": "Sun, 19 Jul 2009 14:27:01 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Hassani",
"S. Hamed",
""
],
[
"Korada",
"Satish Babu",
""
],
[
"Urbanke",
"Ruediger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3315
|
Zi-Ke Zhang Mr.
|
Zi-Ke Zhang, Tao Zhou
|
Effective Personalized Recommendation in Collaborative Tagging Systems
| null | null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, collaborative tagging systems have attracted more and more
attention and have been widely applied in web systems. Tags provide highly
abstracted information about personal preferences and item content, and are
therefore potential to help in improving better personalized recommendations.
In this paper, we propose a tag-based recommendation algorithm considering the
personal vocabulary and evaluate it in a real-world dataset: Del.icio.us.
Experimental results demonstrate that the usage of tag information can
significantly improve the accuracy of personalized recommendations.
|
[
{
"version": "v1",
"created": "Sun, 19 Jul 2009 18:56:37 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Zhang",
"Zi-Ke",
""
],
[
"Zhou",
"Tao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0907.3330
|
Carl Hewitt
|
Carl Hewitt
|
Inconsistency Robustness in Foundations: Mathematics self proves its own
Consistency and Other Matters
|
Notation was made consistent with other articles. arXiv admin note:
substantial text overlap with arXiv:0812.4852
| null | null | null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inconsistency Robustness is performance of information systems with
pervasively inconsistent information. Inconsistency Robustness of the community
of professional mathematicians is their performance repeatedly repairing
contradictions over the centuries. In the Inconsistency Robustness paradigm,
deriving contradictions have been a progressive development and not "game
stoppers." Contradictions can be helpful instead of being something to be
"swept under the rug" by denying their existence, which has been repeatedly
attempted by Establishment Philosophers (beginning with some Pythagoreans).
Such denial has delayed mathematical development. This article reports how
considerations of Inconsistency Robustness have recently influenced the
foundations of mathematics for Computer Science continuing a tradition
developing the sociological basis for foundations.
The current common understanding is that G\"odel proved "Mathematics cannot
prove its own consistency, if it is consistent." However, the consistency of
mathematics is proved by a simple argument in this article. Consequently, the
current common understanding that G\"odel proved "Mathematics cannot prove its
own consistency, if it is consistent" is inaccurate.
Wittgenstein long ago showed that contradiction in mathematics results from
the kind of "self-referential" sentence that G\"odel used in his argument that
mathematics cannot prove its own consistency. However, using a typed grammar
for mathematical sentences, it can be proved that the kind "self-referential"
sentence that G\"odel used in his argument cannot be constructed because
required the fixed point that G\"odel used to the construct the
"self-referential" sentence does not exist. In this way, consistency of
mathematics is preserved without giving up power.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 01:44:33 GMT"
},
{
"version": "v10",
"created": "Fri, 20 Nov 2009 21:32:18 GMT"
},
{
"version": "v11",
"created": "Mon, 14 Dec 2009 20:41:52 GMT"
},
{
"version": "v12",
"created": "Tue, 15 Dec 2009 06:42:36 GMT"
},
{
"version": "v13",
"created": "Tue, 29 Dec 2009 22:47:55 GMT"
},
{
"version": "v14",
"created": "Thu, 31 Dec 2009 18:11:14 GMT"
},
{
"version": "v15",
"created": "Tue, 12 Jan 2010 13:35:17 GMT"
},
{
"version": "v16",
"created": "Mon, 8 Mar 2010 15:43:27 GMT"
},
{
"version": "v17",
"created": "Thu, 11 Mar 2010 18:45:30 GMT"
},
{
"version": "v18",
"created": "Mon, 22 Mar 2010 15:06:23 GMT"
},
{
"version": "v19",
"created": "Tue, 23 Mar 2010 06:44:32 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Jul 2009 14:30:08 GMT"
},
{
"version": "v20",
"created": "Wed, 24 Mar 2010 15:33:13 GMT"
},
{
"version": "v21",
"created": "Thu, 8 Apr 2010 10:27:18 GMT"
},
{
"version": "v22",
"created": "Wed, 21 Apr 2010 17:38:39 GMT"
},
{
"version": "v23",
"created": "Thu, 22 Apr 2010 11:40:50 GMT"
},
{
"version": "v24",
"created": "Tue, 27 Apr 2010 02:15:43 GMT"
},
{
"version": "v25",
"created": "Tue, 4 May 2010 16:34:52 GMT"
},
{
"version": "v26",
"created": "Thu, 6 May 2010 20:46:16 GMT"
},
{
"version": "v27",
"created": "Wed, 12 May 2010 16:20:38 GMT"
},
{
"version": "v28",
"created": "Wed, 19 May 2010 18:15:24 GMT"
},
{
"version": "v29",
"created": "Sat, 22 May 2010 14:41:14 GMT"
},
{
"version": "v3",
"created": "Mon, 17 Aug 2009 14:29:50 GMT"
},
{
"version": "v30",
"created": "Mon, 7 Jun 2010 23:11:19 GMT"
},
{
"version": "v31",
"created": "Mon, 21 Jun 2010 16:43:08 GMT"
},
{
"version": "v32",
"created": "Wed, 30 Jun 2010 06:16:43 GMT"
},
{
"version": "v33",
"created": "Mon, 12 Jul 2010 15:51:20 GMT"
},
{
"version": "v34",
"created": "Thu, 15 Jul 2010 17:36:15 GMT"
},
{
"version": "v35",
"created": "Mon, 19 Jul 2010 07:48:43 GMT"
},
{
"version": "v36",
"created": "Mon, 26 Jul 2010 16:48:39 GMT"
},
{
"version": "v37",
"created": "Mon, 9 Aug 2010 08:44:32 GMT"
},
{
"version": "v38",
"created": "Wed, 18 Aug 2010 17:28:42 GMT"
},
{
"version": "v39",
"created": "Mon, 23 Aug 2010 14:48:39 GMT"
},
{
"version": "v4",
"created": "Mon, 24 Aug 2009 14:30:19 GMT"
},
{
"version": "v40",
"created": "Mon, 6 Sep 2010 13:37:37 GMT"
},
{
"version": "v41",
"created": "Fri, 5 Nov 2010 19:37:11 GMT"
},
{
"version": "v42",
"created": "Sat, 8 Jan 2011 03:38:48 GMT"
},
{
"version": "v43",
"created": "Thu, 11 Oct 2012 16:31:11 GMT"
},
{
"version": "v44",
"created": "Mon, 29 Dec 2014 19:46:13 GMT"
},
{
"version": "v45",
"created": "Mon, 9 Feb 2015 05:18:48 GMT"
},
{
"version": "v46",
"created": "Tue, 17 Feb 2015 18:32:13 GMT"
},
{
"version": "v5",
"created": "Sun, 6 Sep 2009 00:43:37 GMT"
},
{
"version": "v6",
"created": "Sun, 4 Oct 2009 16:59:37 GMT"
},
{
"version": "v7",
"created": "Sun, 11 Oct 2009 16:52:58 GMT"
},
{
"version": "v8",
"created": "Tue, 20 Oct 2009 17:59:23 GMT"
},
{
"version": "v9",
"created": "Wed, 4 Nov 2009 16:44:00 GMT"
}
] | 2015-02-18T00:00:00 |
[
[
"Hewitt",
"Carl",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0907.3340
|
Rachael Tappenden Miss
|
R. Broughton, I. Coope, P. Renaud, R. Tappenden
|
A Barzilai-Borwein $l_1$-Regularized Least Squares Algorithm for
Compressed Sensing
| null | null | null | null |
cs.NA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Problems in signal processing and medical imaging often lead to calculating
sparse solutions to under-determined linear systems. Methodologies for solving
this problem are presented as background to the method used in this work where
the problem is reformulated as an unconstrained convex optimization problem.
The least squares approach is modified by an $l_1$-regularization term. A
sparse solution is sought using a Barzilai-Borwein type projection algorithm
with an adaptive step length. New insight into the choice of step length is
provided through a study of the special structure of the underlying problem.
Numerical experiments are conducted and results given, comparing this algorithm
with a number of other current algorithms.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 05:45:11 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Broughton",
"R.",
""
],
[
"Coope",
"I.",
""
],
[
"Renaud",
"P.",
""
],
[
"Tappenden",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3341
|
Onur Ozan Koyluoglu
|
Karim Khalil, O. Ozan Koyluoglu, Hesham El Gamal, and Moustafa Youssef
|
Opportunistic Secrecy with a Strict Delay Constraint
|
Submitted to IEEE Transactions on Information Theory
| null |
10.1109/TCOMM.2013.101113.130356
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the delay limited secrecy capacity of the flat fading channel
under two different assumptions on the available transmitter channel state
information (CSI). The first scenario assumes perfect prior knowledge of both
the main and eavesdropper channel gains. Here, upper and lower bounds on the
delay limited secrecy capacity are derived, and shown to be tight in the high
signal-to-noise ratio (SNR) regime. In the second scenario, only the main
channel CSI is assumed to be available at the transmitter where, remarkably, we
establish the achievability of a non-zero delay-limited secure rate, for a wide
class of channel distributions, with a high probability. In the two cases, our
achievability arguments are based on a novel two-stage key-sharing approach
that overcomes the secrecy outage phenomenon observed in earlier works.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 05:07:30 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Khalil",
"Karim",
""
],
[
"Koyluoglu",
"O. Ozan",
""
],
[
"Gamal",
"Hesham El",
""
],
[
"Youssef",
"Moustafa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3342
|
Gerard Bloch
|
Mustapha Ouladsine (LSIS), G\'erard Bloch (CRAN), Xavier Dovifaaz
(CRAN)
|
Neural Modeling and Control of Diesel Engine with Pollution Constraints
|
15 pages
|
Journal of Intelligent and Robotic Systems 41, 2-3 (2005) 157-171
|
10.1007/s10846-005-3806-y
| null |
cs.LG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper describes a neural approach for modelling and control of a
turbocharged Diesel engine. A neural model, whose structure is mainly based on
some physical equations describing the engine behaviour, is built for the
rotation speed and the exhaust gas opacity. The model is composed of three
interconnected neural submodels, each of them constituting a nonlinear
multi-input single-output error model. The structural identification and the
parameter estimation from data gathered on a real engine are described. The
neural direct model is then used to determine a neural controller of the
engine, in a specialized training scheme minimising a multivariable criterion.
Simulations show the effect of the pollution constraint weighting on a
trajectory tracking of the engine speed. Neural networks, which are flexible
and parsimonious nonlinear black-box models, with universal approximation
capabilities, can accurately describe or control complex nonlinear systems,
with little a priori theoretical knowledge. The presented work extends optimal
neuro-control to the multivariable case and shows the flexibility of neural
optimisers. Considering the preliminary results, it appears that neural
networks can be used as embedded models for engine control, to satisfy the more
and more restricting pollutant emission legislation. Particularly, they are
able to model nonlinear dynamics and outperform during transients the control
schemes based on static mappings.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 05:58:24 GMT"
}
] | 2019-08-24T00:00:00 |
[
[
"Ouladsine",
"Mustapha",
"",
"LSIS"
],
[
"Bloch",
"Gérard",
"",
"CRAN"
],
[
"Dovifaaz",
"Xavier",
"",
"CRAN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0907.3348
|
Alexander Kholosha
|
Tor Helleseth and Alexander Kholosha
|
New Binomial Bent Function over the Finite Fields of Odd Characteristic
|
13 pages
| null | null | null |
cs.DM cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The $p$-ary function $f(x)$ mapping $\mathrm{GF}(p^{4k})$ to $\mathrm{GF}(p)$
given by $f(x)={\rm Tr}_{4k}\big(x^{p^{3k}+p^{2k}-p^k+1}+x^2\big)$ is proven to
be a weakly regular bent function and the exact values of its Walsh transform
coefficients are found. The proof is based on a few new results in the area of
exponential sums and polynomials over finite fields that may also be
interesting as independent problems.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 07:12:29 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Helleseth",
"Tor",
""
],
[
"Kholosha",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.3387
|
Moshe Schwartz
|
Itzhak Tamo and Moshe Schwartz
|
Correcting Limited-Magnitude Errors in the Rank-Modulation Scheme
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study error-correcting codes for permutations under the infinity norm,
motivated by a novel storage scheme for flash memories call rank modulation. In
this scheme, a set of $n$ flash cells are combined to create a single virtual
multi-level cell. Information is stored in the permutation induced by the cell
charge levels. Spike errors, which are characterized by a limited-magnitude
change in cell charge levels, correspond to a low-distance change under the
infinity norm.
We define codes protecting against spike errors, called limited-magnitude
rank-modulation codes (LMRM codes), and present several constructions for these
codes, some resulting in optimal codes. These codes admit simple recursive, and
sometimes direct, encoding and decoding procedures.
We also provide lower and upper bounds on the maximal size of LMRM codes both
in the general case, and in the case where the codes form a subgroup of the
symmetric group. In the asymptotic analysis, the codes we construct out-perform
the Gilbert-Varshamov-like bound estimate.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 12:59:30 GMT"
},
{
"version": "v2",
"created": "Sun, 2 Aug 2009 06:17:11 GMT"
}
] | 2009-08-02T00:00:00 |
[
[
"Tamo",
"Itzhak",
""
],
[
"Schwartz",
"Moshe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3397
|
Somphong Jitman
|
Somphong Jitman, Patanee Udomkavanich
|
The Gray Image of Codes over Finite Chain Rings
|
Submit to Discrete Mathematics
| null | null | null |
math.RA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The results of J. F. Qiann et al. [4] on $(1-\gamma)$-cyclic codes over
finite chain rings of nilpotency index 2 are extended to $(1-\gamma^e)$-cyclic
codes over finite chain rings of arbitrary nilpotency index $e+1$. The Gray map
is introduced for this type of rings. We prove that the Gray image of a linear
$(1 - \gamma^{e})$-cyclic code over a finite chain ring is a distance-invariant
quasi-cyclic code over its residue field. When the length of codes and the
characteristic of a ring are relatively prime, the Gray images of a linear
cyclic code and a linear $(1+\gamma^e)$-cyclic code are permutatively to
quasi-cyclic codes over its residue field.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 13:37:11 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Jul 2009 03:14:55 GMT"
},
{
"version": "v3",
"created": "Wed, 29 Jul 2009 03:53:01 GMT"
},
{
"version": "v4",
"created": "Fri, 2 Oct 2009 17:24:20 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Jitman",
"Somphong",
""
],
[
"Udomkavanich",
"Patanee",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3402
|
Matteo Dell'Amico
|
Matteo Dell'Amico, Pietro Michiardi, Yves Roudier
|
Measuring Password Strength: An Empirical Analysis
|
15 pages, 9 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an in-depth analysis on the strength of the almost 10,000
passwords from users of an instant messaging server in Italy. We estimate the
strength of those passwords, and compare the effectiveness of state-of-the-art
attack methods such as dictionaries and Markov chain-based techniques.
We show that the strength of passwords chosen by users varies enormously, and
that the cost of attacks based on password strength grows very quickly when the
attacker wants to obtain a higher success percentage. In accordance with
existing studies we observe that, in the absence of measures for enforcing
password strength, weak passwords are common. On the other hand we discover
that there will always be a subset of users with extremely strong passwords
that are very unlikely to be broken.
The results of our study will help in evaluating the security of
password-based authentication means, and they provide important insights for
inspiring new and better proactive password checkers and password recovery
tools.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 13:53:56 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Dell'Amico",
"Matteo",
""
],
[
"Michiardi",
"Pietro",
""
],
[
"Roudier",
"Yves",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.3414
|
Ashutosh Trivedi
|
Marcin Jurdzi\'nski and Ashutosh Trivedi
|
Reachability-time games on timed automata
| null |
In ICALP, Volume 4596 of LNCS, pages 838--849, Springer 2007
|
10.1007/978-3-540-73420-8_72
| null |
cs.CC cs.DS cs.GT cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a reachability-time game, players Min and Max choose moves so that the
time to reach a final state in a timed automaton is minimised or maximised,
respectively. Asarin and Maler showed decidability of reachability-time games
on strongly non-Zeno timed automata using a value iteration algorithm. This
paper complements their work by providing a strategy improvement algorithm for
the problem. It also generalizes their decidability result because the proposed
strategy improvement algorithm solves reachability-time games on all timed
automata. The exact computational complexity of solving reachability-time games
is also established: the problem is EXPTIME-complete for timed automata with at
least two clocks.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 14:57:38 GMT"
}
] | 2020-01-16T00:00:00 |
[
[
"Jurdziński",
"Marcin",
""
],
[
"Trivedi",
"Ashutosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.3445
|
Martin Klein
|
Martin Klein, Michael L. Nelson
|
Investigating the Change of Web Pages' Titles Over Time
|
6 pages, 8 figures, 1 table, 1 appendix
| null | null | null |
cs.IR cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inaccessible web pages are part of the browsing experience. The content of
these pages however is often not completely lost but rather missing. Lexical
signatures (LS) generated from the web pages' textual content have been shown
to be suitable as search engine queries when trying to discover a (missing) web
page. Since LSs are expensive to generate, we investigate the potential of web
pages' titles as they are available at a lower cost. We present the results
from studying the change of titles over time. We take titles from copies
provided by the Internet Archive of randomly sampled web pages and show the
frequency of change as well as the degree of change in terms of the Levenshtein
score. We found very low frequencies of change and high Levenshtein scores
indicating that titles, on average, change little from their original, first
observed values (rooted comparison) and even less from the values of their
previous observation (sliding).
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 16:56:51 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Klein",
"Martin",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0907.3456
|
Scott Turner
|
Scott Turner, Manuel A. Perez-Quinones
|
Exploring Peer Review in the Computer Science Classroom
|
69 pages
| null | null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In computer science, students could benefit from more opportunities to learn
important, high-level concepts and to improve their learning skills. Peer
review is one method to encourage this by providing students with the
opportunity to evaluate other people's work and to receive feedback on their
own projects. This allows for rich learning experience but it is not
immediately obvious how to create a programming project review that will
improve the students' conceptual understanding, require higher level thinking,
and be engaging. The current literature does not typically address differences
between review implementations or provide reasons for design decisions. This
work explored how two different types of reviews affected the students'
learning of concepts, high-level thinking, and engagement. There were
indications that the type of review affected how well students addressed the
concept they were reviewing and the comments' length. This shows that the
review's type may affect student engagement and conceptual learning. There were
also differences in how they reviewed the concepts of Abstraction,
Decomposition, and Encapsulation, suggesting that the concepts are being
learned in different ways. Both of these results have an impact on the use of
peer review computer science but need further investigation.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 18:10:41 GMT"
}
] | 2009-07-21T00:00:00 |
[
[
"Turner",
"Scott",
""
],
[
"Perez-Quinones",
"Manuel A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0907.3493
|
Salim El Rouayheb
|
Salim El Rouayheb, Emina Soljanin and Alex Sprintson
|
Secure Network Coding for Wiretap Networks of Type II
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of securing a multicast network against a wiretapper
that can intercept the packets on a limited number of arbitrary network edges
of its choice. We assume that the network employs the network coding technique
to simultaneously deliver the packets available at the source to all the
receivers.
We show that this problem can be looked at as a network generalization of the
wiretap channel of type II introduced in a seminal paper by Ozarow and Wyner.
In particular, we show that the transmitted information can be secured by using
the Ozarow-Wyner approach of coset coding at the source on top of the existing
network code. This way, we quickly and transparently recover some of the
results available in the literature on secure network coding for wiretap
networks. Moreover, we derive new bounds on the required alphabet size that are
independent of the network size and devise an algorithm for the construction of
secure network codes. We also look at the dual problem and analyze the amount
of information that can be gained by the wiretapper as a function of the number
of wiretapped edges.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 20:52:16 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Rouayheb",
"Salim El",
""
],
[
"Soljanin",
"Emina",
""
],
[
"Sprintson",
"Alex",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3497
|
Chinh Hoang
|
Daniel Bruce, Chinh T. Hoang, Joe Sawada
|
A certifying algorithm for 3-colorability of P5-free graphs
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We provide a certifying algorithm for the problem of deciding whether a P5-
free graph is 3-colorable by showing there are exactly six finite graphs that
are P5-free and not 3-colorable and minimal with respect to this property.
|
[
{
"version": "v1",
"created": "Mon, 20 Jul 2009 21:33:25 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Bruce",
"Daniel",
""
],
[
"Hoang",
"Chinh T.",
""
],
[
"Sawada",
"Joe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.3520
|
George Djorgovski
|
S. G. Djorgovski, P. Hut, S. McMillan, E. Vesperini, R. Knop, W. Farr,
M. J. Graham
|
Exploring the Use of Virtual Worlds as a Scientific Research Platform:
The Meta-Institute for Computational Astrophysics (MICA)
|
15 pages, to appear in the refereed proceedings of "Facets of Virtual
Environments" (FaVE 2009), eds. F. Lehmann-Grube, J. Sablating, et al., ICST
Lecture Notes Ser., Berlin: Springer Verlag (2009); version with full
resolution color figures is available at
http://www.mica-vw.org/wiki/index.php/Publications
| null |
10.1007/978-3-642-11743-5_3
| null |
astro-ph.IM cs.CY physics.ed-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe the Meta-Institute for Computational Astrophysics (MICA), the
first professional scientific organization based exclusively in virtual worlds
(VWs). The goals of MICA are to explore the utility of the emerging VR and VWs
technologies for scientific and scholarly work in general, and to facilitate
and accelerate their adoption by the scientific research community. MICA itself
is an experiment in academic and scientific practices enabled by the immersive
VR technologies. We describe the current and planned activities and research
directions of MICA, and offer some thoughts as to what the future developments
in this arena may be.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 00:43:24 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Djorgovski",
"S. G.",
""
],
[
"Hut",
"P.",
""
],
[
"McMillan",
"S.",
""
],
[
"Vesperini",
"E.",
""
],
[
"Knop",
"R.",
""
],
[
"Farr",
"W.",
""
],
[
"Graham",
"M. J.",
""
]
] |
[
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.ed-ph",
"description": "Report of results of a research study, laboratory experience, assessment or classroom practice that represents a way to improve teaching and learning in physics. Also, report on misconceptions of students, textbook errors, and other similar information relative to promoting physics understanding.",
"span": "(Physics Education)"
}
] |
0907.3563
|
Jaroslaw Byrka
|
Jaroslaw Byrka, Andreas Karrenbauer, Laura Sanita
|
The interval constrained 3-coloring problem
|
minor revision
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we settle the open complexity status of interval constrained
coloring with a fixed number of colors. We prove that the problem is already
NP-complete if the number of different colors is 3. Previously, it has only
been known that it is NP-complete, if the number of colors is part of the input
and that the problem is solvable in polynomial time, if the number of colors is
at most 2. We also show that it is hard to satisfy almost all of the
constraints for a feasible instance.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 07:39:50 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Dec 2009 14:30:22 GMT"
}
] | 2009-12-17T00:00:00 |
[
[
"Byrka",
"Jaroslaw",
""
],
[
"Karrenbauer",
"Andreas",
""
],
[
"Sanita",
"Laura",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.3574
|
Andrea Montanari
|
David L. Donoho and Arian Maleki and Andrea Montanari
|
Message Passing Algorithms for Compressed Sensing
|
6 pages paper + 9 pages supplementary information, 13 eps figure.
Submitted to Proc. Natl. Acad. Sci. USA
| null |
10.1073/pnas.0909892106
| null |
cs.IT cond-mat.dis-nn math.IT stat.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Compressed sensing aims to undersample certain high-dimensional signals, yet
accurately reconstruct them by exploiting signal characteristics. Accurate
reconstruction is possible when the object to be recovered is sufficiently
sparse in a known basis. Currently, the best known sparsity-undersampling
tradeoff is achieved when reconstructing by convex optimization -- which is
expensive in important large-scale applications. Fast iterative thresholding
algorithms have been intensively studied as alternatives to convex optimization
for large-scale problems. Unfortunately known fast algorithms offer
substantially worse sparsity-undersampling tradeoffs than convex optimization.
We introduce a simple costless modification to iterative thresholding making
the sparsity-undersampling tradeoff of the new algorithms equivalent to that of
the corresponding convex optimization procedures. The new
iterative-thresholding algorithms are inspired by belief propagation in
graphical models. Our empirical measurements of the sparsity-undersampling
tradeoff for the new algorithms agree with theoretical calculations. We show
that a state evolution formalism correctly derives the true
sparsity-undersampling tradeoff. There is a surprising agreement between
earlier calculations based on random convex polytopes and this new, apparently
very different theoretical formalism.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 14:47:47 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Donoho",
"David L.",
""
],
[
"Maleki",
"Arian",
""
],
[
"Montanari",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
}
] |
0907.3576
|
Volker Pohl
|
Yonina C. Eldar, Volker Pohl
|
Recovering Signals from Lowpass Data
|
submitted to IEEE Trans. Signal Process. Jul. 2009
|
IEEE Signal Process., vol. 58, no. 5, pp. 2636-2646 , May 2010
|
10.1109/TSP.2010.2041278
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of recovering a signal from its low frequency components occurs
often in practical applications due to the lowpass behavior of many physical
systems. Here we study in detail conditions under which a signal can be
determined from its low-frequency content. We focus on signals in
shift-invariant spaces generated by multiple generators. For these signals, we
derive necessary conditions on the cutoff frequency of the lowpass filter as
well as necessary and sufficient conditions on the generators such that signal
recovery is possible. When the lowpass content is not sufficient to determine
the signal, we propose appropriate pre-processing that can improve the
reconstruction ability. In particular, we show that modulating the signal with
one or more mixing functions prior to lowpass filtering, can ensure the
recovery of the signal in many cases, and reduces the necessary bandwidth of
the filter.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 08:27:24 GMT"
}
] | 2013-02-20T00:00:00 |
[
[
"Eldar",
"Yonina C.",
""
],
[
"Pohl",
"Volker",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3583
|
Yoo Chung
|
Yoo Chung and Dongman Lee
|
Web of Lossy Adapters for Interface Interoperability: An Algorithm and
NP-completeness of Minimization
|
7 pages
|
Proc. of ICSESS 2010
|
10.1109/ICSESS.2010.5552291
| null |
cs.SE cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By using different interface adapters for different methods, it is possible
to construct a maximally covering web of interface adapters which incurs
minimum loss during interface adaptation. We introduce a polynomial-time
algorithm that can achieve this. However, we also show that minimizing the
number of adapters included in a maximally covering web of interface adapters
is an NP-complete problem.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 08:58:06 GMT"
}
] | 2010-12-01T00:00:00 |
[
[
"Chung",
"Yoo",
""
],
[
"Lee",
"Dongman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.3599
|
Jean-Francois Monin
|
Jean-Fran\c{c}ois Monin (VERIMAG - Imag), Cristian Ene (VERIMAG -
Imag), Micha\"el P\'erin (VERIMAG - Imag)
|
Gentzen-Prawitz Natural Deduction as a Teaching Tool
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We report a four-years experiment in teaching reasoning to undergraduate
students, ranging from weak to gifted, using Gentzen-Prawitz's style natural
deduction. We argue that this pedagogical approach is a good alternative to the
use of Boolean algebra for teaching reasoning, especially for computer
scientists and formal methods practionners.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 09:58:12 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Monin",
"Jean-François",
"",
"VERIMAG - Imag"
],
[
"Ene",
"Cristian",
"",
"VERIMAG -\n Imag"
],
[
"Périn",
"Michaël",
"",
"VERIMAG - Imag"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.3604
|
Mark Grundland
|
Mark Grundland, Jiri Patera, Zuzana Masakova and Neil A. Dodgson
|
Image Sampling with Quasicrystals
|
For a full resolution version of this paper, along with supplementary
materials, please visit at
http://www.Eyemaginary.com/Portfolio/Publications.html
|
SIGMA 5 (2009), 075, 23 pages
|
10.3842/SIGMA.2009.075
| null |
cs.CV cs.GR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
We investigate the use of quasicrystals in image sampling. Quasicrystals
produce space-filling, non-periodic point sets that are uniformly discrete and
relatively dense, thereby ensuring the sample sites are evenly spread out
throughout the sampled image. Their self-similar structure can be attractive
for creating sampling patterns endowed with a decorative symmetry. We present a
brief general overview of the algebraic theory of cut-and-project quasicrystals
based on the geometry of the golden ratio. To assess the practical utility of
quasicrystal sampling, we evaluate the visual effects of a variety of
non-adaptive image sampling strategies on photorealistic image reconstruction
and non-photorealistic image rendering used in multiresolution image
representations. For computer visualization of point sets used in image
sampling, we introduce a mosaic rendering technique.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 10:08:48 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Grundland",
"Mark",
""
],
[
"Patera",
"Jiri",
""
],
[
"Masakova",
"Zuzana",
""
],
[
"Dodgson",
"Neil A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0907.3616
|
Venkatesh Ramaiyan
|
Venkatesh Ramaiyan, Anurag Kumar, and Eitan Altman,
|
Optimal Routing and Power Control for a Single Cell, Dense, Ad Hoc
Wireless Network
|
Technical report of WiOpt 2007 paper
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a dense, ad hoc wireless network, confined to a small region. The
wireless network is operated as a single cell, i.e., only one successful
transmission is supported at a time. Data packets are sent between
sourcedestination pairs by multihop relaying. We assume that nodes
self-organise into a multihop network such that all hops are of length d
meters, where d is a design parameter. There is a contention based multiaccess
scheme, and it is assumed that every node always has data to send, either
originated from it or a transit packet (saturation assumption). In this
scenario, we seek to maximize a measure of the transport capacity of the
network (measured in bit-meters per second) over power controls (in a fading
environment) and over the hop distance d, subject to an average power
constraint. We first argue that for a dense collection of nodes confined to a
small region, single cell operation is efficient for single user decoding
transceivers. Then, operating the dense ad hoc wireless network (described
above) as a single cell, we study the hop length and power control that
maximizes the transport capacity for a given network power constraint.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 11:13:54 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Ramaiyan",
"Venkatesh",
""
],
[
"Kumar",
"Anurag",
""
],
[
"Altman",
"Eitan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3631
|
Uriel Feige
|
Reid Andersen and Uriel Feige
|
Interchanging distance and capacity in probabilistic mappings
|
16 pages, no figures
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Harald Racke [STOC 2008] described a new method to obtain hierarchical
decompositions of networks in a way that minimizes the congestion. Racke's
approach is based on an equivalence that he discovered between minimizing
congestion and minimizing stretch (in a certain setting). Here we present
Racke's equivalence in an abstract setting that is more general than the one
described in Racke's work, and clarifies the power of Racke's result. In
addition, we present a related (but different) equivalence that was developed
by Yuval Emek [ESA 2009] and is only known to apply to planar graphs.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 12:33:36 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Andersen",
"Reid",
""
],
[
"Feige",
"Uriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.3654
|
J\'er\^ome Gauthier
|
Jerome Gauthier, Laurent Duval and Jean-Christophe Pesquet
|
Optimization of Synthesis Oversampled Complex Filter Banks
| null |
IEEE Transactions on Signal Processing, October 2009, Volume 57,
Issue 10, p. 3827-3843
|
10.1109/TSP.2009.2023947
| null |
cs.IT cs.SY eess.SY math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An important issue with oversampled FIR analysis filter banks (FBs) is to
determine inverse synthesis FBs, when they exist. Given any complex oversampled
FIR analysis FB, we first provide an algorithm to determine whether there
exists an inverse FIR synthesis system. We also provide a method to ensure the
Hermitian symmetry property on the synthesis side, which is serviceable to
processing real-valued signals. As an invertible analysis scheme corresponds to
a redundant decomposition, there is no unique inverse FB. Given a particular
solution, we parameterize the whole family of inverses through a null space
projection. The resulting reduced parameter set simplifies design procedures,
since the perfect reconstruction constrained optimization problem is recast as
an unconstrained optimization problem. The design of optimized synthesis FBs
based on time or frequency localization criteria is then investigated, using a
simple yet efficient gradient algorithm.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 13:41:45 GMT"
}
] | 2023-01-19T00:00:00 |
[
[
"Gauthier",
"Jerome",
""
],
[
"Duval",
"Laurent",
""
],
[
"Pesquet",
"Jean-Christophe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Electrical Engineering and Systems Science",
"code": "eess.SY",
"description": "This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0907.3666
|
Mihailo Stojnic
|
Mihailo Stojnic
|
Various thresholds for $\ell_1$-optimization in compressed sensing
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, \cite{CRT,DonohoPol} theoretically analyzed the success of a
polynomial $\ell_1$-optimization algorithm in solving an under-determined
system of linear equations. In a large dimensional and statistical context
\cite{CRT,DonohoPol} proved that if the number of equations (measurements in
the compressed sensing terminology) in the system is proportional to the length
of the unknown vector then there is a sparsity (number of non-zero elements of
the unknown vector) also proportional to the length of the unknown vector such
that $\ell_1$-optimization succeeds in solving the system. In this paper, we
provide an alternative performance analysis of $\ell_1$-optimization and obtain
the proportionality constants that in certain cases match or improve on the
best currently known ones from \cite{DonohoPol,DT}.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 14:40:27 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Stojnic",
"Mihailo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3679
|
Mihailo Stojnic
|
Mihailo Stojnic
|
Block-length dependent thresholds in block-sparse compressed sensing
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most basic problems in compressed sensing is solving an
under-determined system of linear equations. Although this problem seems rather
hard certain $\ell_1$-optimization algorithm appears to be very successful in
solving it. The recent work of \cite{CRT,DonohoPol} rigorously proved (in a
large dimensional and statistical context) that if the number of equations
(measurements in the compressed sensing terminology) in the system is
proportional to the length of the unknown vector then there is a sparsity
(number of non-zero elements of the unknown vector) also proportional to the
length of the unknown vector such that $\ell_1$-optimization algorithm succeeds
in solving the system. In more recent papers
\cite{StojnicICASSP09block,StojnicJSTSP09} we considered the setup of the
so-called \textbf{block}-sparse unknown vectors. In a large dimensional and
statistical context, we determined sharp lower bounds on the values of
allowable sparsity for any given number (proportional to the length of the
unknown vector) of equations such that an $\ell_2/\ell_1$-optimization
algorithm succeeds in solving the system. The results established in
\cite{StojnicICASSP09block,StojnicJSTSP09} assumed a fairly large block-length
of the block-sparse vectors. In this paper we consider the block-length to be a
parameter of the system. Consequently, we then establish sharp lower bounds on
the values of the allowable block-sparsity as functions of the block-length.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 15:13:07 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Stojnic",
"Mihailo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3710
|
Andrei Sukhov M
|
A.V. Sukhov, T.G. Sultanov, M.V. Strizhov, A.P. Platonov
|
Throughput metrics and packet delay in TCP/IP networks
|
6 pages, 3 figures
|
RIPE 59, Lissabon, 2009
| null | null |
cs.NI cs.PF
|
http://creativecommons.org/licenses/by/3.0/
|
In the paper the method for estimation of throughput metrics like available
bandwidth and end-t-end capacity is supposed. This method is based on
measurement of network delay $D_i$ for packets of different sizes $W_i$. The
simple expression for available bandwidth $B_{av} =(W_2-W_1)/(D_2-D_1)$ is
substantiated. The number of experiments on matching of the results received
new and traditional methods is spent. The received results testify to
possibility of application of new model.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 17:35:44 GMT"
}
] | 2009-07-22T00:00:00 |
[
[
"Sukhov",
"A. V.",
""
],
[
"Sultanov",
"T. G.",
""
],
[
"Strizhov",
"M. V.",
""
],
[
"Platonov",
"A. P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0907.3754
|
Moritz Hardt
|
Moritz Hardt, Kunal Talwar
|
On the Geometry of Differential Privacy
|
27 pages
| null | null | null |
cs.CC cs.CR cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the noise complexity of differentially private mechanisms in the
setting where the user asks $d$ linear queries $f\colon\Rn\to\Re$
non-adaptively. Here, the database is represented by a vector in $\Rn$ and
proximity between databases is measured in the $\ell_1$-metric.
We show that the noise complexity is determined by two geometric parameters
associated with the set of queries.
We use this connection to give tight upper and lower bounds on the noise
complexity for any $d \leq n$. We show that for $d$ random linear queries of
sensitivity~1, it is necessary and sufficient to add $\ell_2$-error
$\Theta(\min\{d\sqrt{d}/\epsilon,d\sqrt{\log (n/d)}/\epsilon\})$ to achieve
$\epsilon$-differential privacy. Assuming the truth of a deep conjecture from
convex geometry, known as the Hyperplane conjecture, we can extend our results
to arbitrary linear queries giving nearly matching upper and lower bounds.
Our bound translates to error
$O(\min\{d/\epsilon,\sqrt{d\log(n/d)}/\epsilon\})$ per answer. The best
previous upper bound (Laplacian mechanism) gives a bound of
$O(\min\{d/\eps,\sqrt{n}/\epsilon\})$ per answer, while the best known lower
bound was $\Omega(\sqrt{d}/\epsilon)$. In contrast, our lower bound is strong
enough to separate the concept of differential privacy from the notion of
approximate differential privacy where an upper bound of $O(\sqrt{d}/\epsilon)$
can be achieved.
|
[
{
"version": "v1",
"created": "Tue, 21 Jul 2009 22:26:02 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Sep 2009 00:40:40 GMT"
},
{
"version": "v3",
"created": "Mon, 9 Nov 2009 20:53:59 GMT"
}
] | 2009-11-09T00:00:00 |
[
[
"Hardt",
"Moritz",
""
],
[
"Talwar",
"Kunal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.3777
|
Katia Jaffres-Runser
|
Katia Jaffres-Runser (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes,
EA 3720, WNET, CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes), Jean-Marie
Gorce (CITI Insa Lyon / INRIA Grenoble Rh\^one-Alpes), Cristina Comaniciu
(WNET)
|
A multiobjective Tabu framework for the optimization and evaluation of
wireless systems
| null |
Local Search Techniques: Focus on Tabu Search I-Tech Education and
Publishing (Ed.) (2008)
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This chapter will focus on the multiobjective formulation of an optimization
problem and highlight the assets of a multiobjective Tabu implementation for
such problems. An illustration of a specific Multiobjective Tabu heuristic
(referred to as MO Tabu in the following) will be given for 2 particular
problems arising in wireless systems. The first problem addresses the planning
of access points for a WLAN network with some Quality of Service requirements
and the second one provides an evaluation mean to assess the performance
evaluation of a wireless sensor network. The chapter will begin with an
overview of multiobjective (MO) optimization featuring the definitions and
concepts of the domain (e.g. Dominance, Pareto front,...) and the main MO
search heuristics available so far. We will then emphasize on the definition of
a problem as a multiobjective optimization problem and illustrate it by the two
examples from the field of wireless networking. The next part will focus on MO
Tabu, a Tabu-inspired multiobjective heuristic and describe its assets compared
to other MO heuristics. The last part of the chapter will show the results
obtained with this MO Tabu strategy on the 2 wireless networks related
problems. Conclusion on the use of Tabu as a multiobjective heuristic will be
drawn based on the results presented so far.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 06:02:53 GMT"
}
] | 2009-07-23T00:00:00 |
[
[
"Jaffres-Runser",
"Katia",
"",
"CITI Insa Lyon / INRIA Grenoble Rhône-Alpes,\n EA 3720, WNET, CITI Insa Lyon / INRIA Grenoble Rhône-Alpes"
],
[
"Gorce",
"Jean-Marie",
"",
"CITI Insa Lyon / INRIA Grenoble Rhône-Alpes"
],
[
"Comaniciu",
"Cristina",
"",
"WNET"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.3780
|
Srikanth Srinivasan
|
V. Arvind, Pushkar S. Joglekar, Srikanth Srinivasan
|
On Lower Bounds for Constant Width Arithmetic Circuits
|
16 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The motivation for this paper is to study the complexity of constant-width
arithmetic circuits. Our main results are the following.
1. For every k > 1, we provide an explicit polynomial that can be computed by
a linear-sized monotone circuit of width 2k but has no subexponential-sized
monotone circuit of width k. It follows, from the definition of the polynomial,
that the constant-width and the constant-depth hierarchies of monotone
arithmetic circuits are infinite, both in the commutative and the
noncommutative settings.
2. We prove hardness-randomness tradeoffs for identity testing constant-width
commutative circuits analogous to [KI03,DSY08].
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 06:21:30 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Aug 2009 07:10:01 GMT"
}
] | 2009-08-14T00:00:00 |
[
[
"Arvind",
"V.",
""
],
[
"Joglekar",
"Pushkar S.",
""
],
[
"Srinivasan",
"Srikanth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.3781
|
Stephanie Leon
|
St\'ephanie L\'eon (LIRMM)
|
Un syst\`eme modulaire d'acquisition automatique de traductions \`a
partir du Web
| null |
TALN'09 (Traitement Automatique des Langues Naturelles), France
(2009)
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a method of automatic translation (French/English) of Complex
Lexical Units (CLU) for aiming at extracting a bilingual lexicon. Our modular
system is based on linguistic properties (compositionality, polysemy, etc.).
Different aspects of the multilingual Web are used to validate candidate
translations and collect new terms. We first build a French corpus of Web pages
to collect CLU. Three adapted processing stages are applied for each linguistic
property : compositional and non polysemous translations, compositional
polysemous translations and non compositional translations. Our evaluation on a
sample of CLU shows that our technique based on the Web can reach a very high
precision.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 06:25:59 GMT"
}
] | 2009-07-23T00:00:00 |
[
[
"Léon",
"Stéphanie",
"",
"LIRMM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0907.3793
|
Ayman Khalil
|
Ayman Khalil (IETR), Matthieu Crussi\`ere (IETR), Jean-Fran\c{c}ois
H\'elard (IETR)
|
Cross-layer Resource Allocation Scheme for Multi-band High Rate UWB
Systems
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we investigate the use of a cross-layer allocation mechanism
for the high-rate ultra-wideband (UWB) systems. The aim of this paper is
twofold. First, through the cross-layer approach that provides a new service
differentiation approach to the fully distributed UWB systems, we support
traffic with quality of service (QoS) guarantee in a multi-user context.
Second, we exploit the effective SINR method that represents the
characteristics of multiple sub-carrier SINRs in the multi-band WiMedia
solution proposed for UWB systems, in order to provide the channel state
information needed for the multi-user sub-band allocation. This new approach
improves the system performance and optimizes the spectrum utilization with a
low cost data exchange between the different users while guaranteeing the
required QoS. In addition, this new approach solves the problem of the
cohabitation of more than three users in the same WiMedia channel.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 08:10:39 GMT"
}
] | 2009-07-23T00:00:00 |
[
[
"Khalil",
"Ayman",
"",
"IETR"
],
[
"Crussière",
"Matthieu",
"",
"IETR"
],
[
"Hélard",
"Jean-François",
"",
"IETR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.3801
|
Eric Sopena
|
Eric Sopena (LaBRI), Jiaojiao Wu (LaBRI)
|
The Incidence Chromatic Number of Toroidal Grids
|
16 pages
|
Discussiones Mathematicae Graph Theory 33 (2013) 315-327
| null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An incidence in a graph $G$ is a pair $(v,e)$ with $v \in V(G)$ and $e \in
E(G)$, such that $v$ and $e$ are incident. Two incidences $(v,e)$ and $(w,f)$
are adjacent if $v=w$, or $e=f$, or the edge $vw$ equals $e$ or $f$. The
incidence chromatic number of $G$ is the smallest $k$ for which there exists a
mapping from the set of incidences of $G$ to a set of $k$ colors that assigns
distinct colors to adjacent incidences. In this paper, we prove that the
incidence chromatic number of the toroidal grid $T_{m,n}=C_m\Box C_n$ equals 5
when $m,n \equiv 0 \pmod 5$ and 6 otherwise.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 09:08:11 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Sep 2010 07:12:42 GMT"
},
{
"version": "v3",
"created": "Sun, 6 May 2012 05:50:59 GMT"
}
] | 2013-04-12T00:00:00 |
[
[
"Sopena",
"Eric",
"",
"LaBRI"
],
[
"Wu",
"Jiaojiao",
"",
"LaBRI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.3804
|
Colin Stirling
|
Colin Stirling
|
Decidability of higher-order matching
|
appears in LMCS (Logical Methods in Computer Science)
|
Logical Methods in Computer Science, Volume 5, Issue 3 (July 30,
2009) lmcs:757
|
10.2168/LMCS-5(3:2)2009
| null |
cs.LO cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that the higher-order matching problem is decidable using a
game-theoretic argument.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 09:17:30 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2009 12:42:31 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Jul 2009 11:37:46 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Stirling",
"Colin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0907.3819
|
Thomas Guyet
|
Thomas Guyet (Agrocampus Ouest, INRIA - IRISA), Ren\'e Quiniou (INRIA
- IRISA), Wei Wang (NTNU), Marie-Odile Cordier (INRIA - IRISA)
|
Self-adaptive web intrusion detection system
| null | null | null |
RR-6989
|
cs.NI cs.AI cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The evolution of the web server contents and the emergence of new kinds of
intrusions make necessary the adaptation of the intrusion detection systems
(IDS). Nowadays, the adaptation of the IDS requires manual -- tedious and
unreactive -- actions from system administrators. In this paper, we present a
self-adaptive intrusion detection system which relies on a set of local
model-based diagnosers. The redundancy of diagnoses is exploited, online, by a
meta-diagnoser to check the consistency of computed partial diagnoses, and to
trigger the adaptation of defective diagnoser models (or signatures) in case of
inconsistency. This system is applied to the intrusion detection from a stream
of HTTP requests. Our results show that our system 1) detects intrusion
occurrences sensitively and precisely, 2) accurately self-adapts diagnoser
model, thus improving its detection accuracy.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 11:45:02 GMT"
}
] | 2009-07-23T00:00:00 |
[
[
"Guyet",
"Thomas",
"",
"Agrocampus Ouest, INRIA - IRISA"
],
[
"Quiniou",
"René",
"",
"INRIA\n - IRISA"
],
[
"Wang",
"Wei",
"",
"NTNU"
],
[
"Cordier",
"Marie-Odile",
"",
"INRIA - IRISA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0907.3823
|
Ravindranath Chowdary C Dr.
|
C Ravindranath Chowdary, P Sreenivasa Kumar
|
USUM: Update Summary Generation System
| null |
Advances in Computational Linguistics, Research in Computing
Science Vol. 41, 2009, pp. 229-240
| null | null |
cs.IR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Huge amount of information is present in the World Wide Web and a large
amount is being added to it frequently. A query-specific summary of multiple
documents is very helpful to the user in this context. Currently, few systems
have been proposed for query-specific, extractive multi-document summarization.
If a summary is available for a set of documents on a given query and if a new
document is added to the corpus, generating an updated summary from the scratch
is time consuming and many a times it is not practical/possible. In this paper
we propose a solution to this problem. This is especially useful in a scenario
where the source documents are not accessible. We cleverly embed the sentences
of the current summary into the new document and then perform query-specific
summary generation on that document. Our experimental results show that the
performance of the proposed approach is good in terms of both quality and
efficiency.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 12:00:06 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2009 12:08:31 GMT"
}
] | 2015-01-20T00:00:00 |
[
[
"Chowdary",
"C Ravindranath",
""
],
[
"Kumar",
"P Sreenivasa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0907.3826
|
Takao Namiki
|
Takao Namiki, Hiraku Kuroda and Shunsuke Naruse
|
Experimental DML over digital repositories in Japan
| null |
Proceedings of Towards a Digital Mathematics Library 2009, Grand
Bend, Ontario, Canada (2009)
| null | null |
cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper the authors show an overview of Virtual Digital Mathematics
Library in Japan (DML-JP), contents of which consist of metadata harvested from
institutional repositories in Japan and digital repositories in the world.
DML-JP is, in a sense, a subject specific repository which collaborate with
various digital repositories. Beyond portal website, DML-JP provides
subject-specific metadata through OAI-ORE. By the schema it is enabled that
digital repositories can load the rich metadata which were added by
mathematicians.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 12:40:35 GMT"
}
] | 2009-07-23T00:00:00 |
[
[
"Namiki",
"Takao",
""
],
[
"Kuroda",
"Hiraku",
""
],
[
"Naruse",
"Shunsuke",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0907.3867
|
Uwe Aickelin
|
Julie Greensmith and Uwe Aickelin
|
Artificial Dendritic Cells: Multi-faceted Perspectives
|
24 pages, 6 figures,
|
Human-Centric Information Processing Through Granular Modelling,
182, 375-395, 2009
| null | null |
cs.AI cs.CR cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dendritic cells are the crime scene investigators of the human immune system.
Their function is to correlate potentially anomalous invading entities with
observed damage to the body. The detection of such invaders by dendritic cells
results in the activation of the adaptive immune system, eventually leading to
the removal of the invader from the host body. This mechanism has provided
inspiration for the development of a novel bio-inspired algorithm, the
Dendritic Cell Algorithm. This algorithm processes information at multiple
levels of resolution, resulting in the creation of information granules of
variable structure. In this chapter we examine the multi-faceted nature of
immunology and how research in this field has shaped the function of the
resulting Dendritic Cell Algorithm. A brief overview of the algorithm is given
in combination with the details of the processes used for its development. The
chapter is concluded with a discussion of the parallels between our
understanding of the human immune system and how such knowledge influences the
design of artificial immune systems.
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 15:46:18 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Jul 2009 15:21:39 GMT"
}
] | 2010-07-05T00:00:00 |
[
[
"Greensmith",
"Julie",
""
],
[
"Aickelin",
"Uwe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0907.3874
|
Nikolaos Laoutaris
|
Ruben Cuevas, Nikolaos Laoutaris, Xiaoyuan Yang, Georgos Siganos,
Pablo Rodriguez
|
Deep Diving into BitTorrent Locality
|
Please cite the conference version of this paper appearing in the
Proceedings of IEEE INFOCOM'11
| null | null | null |
cs.NI cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A substantial amount of work has recently gone into localizing BitTorrent
traffic within an ISP in order to avoid excessive and often times unnecessary
transit costs. Several architectures and systems have been proposed and the
initial results from specific ISPs and a few torrents have been encouraging. In
this work we attempt to deepen and scale our understanding of locality and its
potential. Looking at specific ISPs, we consider tens of thousands of
concurrent torrents, and thus capture ISP-wide implications that cannot be
appreciated by looking at only a handful of torrents. Secondly, we go beyond
individual case studies and present results for the top 100 ISPs in terms of
number of users represented in our dataset of up to 40K torrents involving more
than 3.9M concurrent peers and more than 20M in the course of a day spread in
11K ASes. We develop scalable methodologies that permit us to process this huge
dataset and answer questions such as: "\emph{what is the minimum and the
maximum transit traffic reduction across hundreds of ISPs?}", "\emph{what are
the win-win boundaries for ISPs and their users?}", "\emph{what is the maximum
amount of transit traffic that can be localized without requiring fine-grained
control of inter-AS overlay connections?}", "\emph{what is the impact to
transit traffic from upgrades of residential broadband speeds?}".
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 16:18:44 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Jul 2009 08:35:39 GMT"
},
{
"version": "v3",
"created": "Tue, 10 Nov 2009 19:40:27 GMT"
},
{
"version": "v4",
"created": "Tue, 1 Feb 2011 19:01:18 GMT"
}
] | 2011-02-02T00:00:00 |
[
[
"Cuevas",
"Ruben",
""
],
[
"Laoutaris",
"Nikolaos",
""
],
[
"Yang",
"Xiaoyuan",
""
],
[
"Siganos",
"Georgos",
""
],
[
"Rodriguez",
"Pablo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0907.3920
|
Sergey Bravyi
|
Sergey Bravyi, Aram W. Harrow, and Avinatan Hassidim
|
Quantum algorithms for testing properties of distributions
|
20 pages
|
IEEE. Trans. Inf. Th., vol. 57, no. 6, pp. 3971--3981, June 2011
|
10.1109/TIT.2011.2134250
| null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suppose one has access to oracles generating samples from two unknown
probability distributions P and Q on some N-element set. How many samples does
one need to test whether the two distributions are close or far from each other
in the L_1-norm ? This and related questions have been extensively studied
during the last years in the field of property testing. In the present paper we
study quantum algorithms for testing properties of distributions. It is shown
that the L_1-distance between P and Q can be estimated with a constant
precision using approximately N^{1/2} queries in the quantum settings, whereas
classical computers need \Omega(N) queries. We also describe quantum algorithms
for testing Uniformity and Orthogonality with query complexity O(N^{1/3}). The
classical query complexity of these problems is known to be \Omega(N^{1/2}).
|
[
{
"version": "v1",
"created": "Wed, 22 Jul 2009 20:05:29 GMT"
}
] | 2011-12-01T00:00:00 |
[
[
"Bravyi",
"Sergey",
""
],
[
"Harrow",
"Aram W.",
""
],
[
"Hassidim",
"Avinatan",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.3942
|
Megan Owen
|
Megan Owen and J. Scott Provan
|
A Fast Algorithm for Computing Geodesic Distances in Tree Space
|
20 pages, 5 figures. Added new section on including common edges and
leaf edge-lengths in the algorithm, clarified starting point for algorithm,
added references, other minor improvements. To appear in IEEE/ACM
Transactions on Computational Biology and Bioinformatics
| null | null | null |
q-bio.PE cs.CG cs.DM math.MG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Comparing and computing distances between phylogenetic trees are important
biological problems, especially for models where edge lengths play an important
role. The geodesic distance measure between two phylogenetic trees with edge
lengths is the length of the shortest path between them in the continuous tree
space introduced by Billera, Holmes, and Vogtmann. This tree space provides a
powerful tool for studying and comparing phylogenetic trees, both in exhibiting
a natural distance measure and in providing a Euclidean-like structure for
solving optimization problems on trees. An important open problem is to find a
polynomial time algorithm for finding geodesics in tree space. This paper gives
such an algorithm, which starts with a simple initial path and moves through a
series of successively shorter paths until the geodesic is attained.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 15:39:16 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Nov 2009 01:14:54 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Owen",
"Megan",
""
],
[
"Provan",
"J. Scott",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
0907.3965
|
Andr\'e Luiz Barbosa
|
Andr\'e Luiz Barbosa
|
P != NP Proof
|
25 pages and 3 new great ideas!
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper demonstrates that P \not= NP. The way was to generalize the
traditional definitions of the classes P and NP, to construct an artificial
problem (a generalization to SAT: The XG-SAT, much more difficult than the
former) and then to demonstrate that it is in NP but not in P (where the
classes P and NP are generalized and called too simply P and NP in this paper,
and then it is explained why the traditional classes P and NP should be fixed
and replaced by these generalized ones into Theory of Computer Science). The
demonstration consists of: 1. Definition of Restricted Type X Program; 2.
Definition of the General Extended Problem of Satisfiability of a Boolean
Formula - XG-SAT; 3. Generalization to classes P and NP; 4. Demonstration that
the XG-SAT is in NP; 5. Demonstration that the XG-SAT is not in P; 6.
Demonstration that the Baker-Gill-Solovay Theorem does not refute the proof; 7.
Demonstration that the Razborov-Rudich Theorem does not refute the proof; 8.
Demonstration that the Aaronson-Wigderson Theorem does not refute the proof.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 00:30:29 GMT"
},
{
"version": "v10",
"created": "Mon, 4 Jan 2010 00:35:26 GMT"
},
{
"version": "v11",
"created": "Fri, 22 Jan 2010 02:01:46 GMT"
},
{
"version": "v12",
"created": "Wed, 24 Feb 2010 04:47:54 GMT"
},
{
"version": "v13",
"created": "Mon, 12 Apr 2010 17:06:12 GMT"
},
{
"version": "v14",
"created": "Tue, 13 Apr 2010 17:21:48 GMT"
},
{
"version": "v15",
"created": "Wed, 14 Apr 2010 02:06:53 GMT"
},
{
"version": "v16",
"created": "Thu, 29 Apr 2010 06:13:04 GMT"
},
{
"version": "v17",
"created": "Fri, 30 Apr 2010 16:21:33 GMT"
},
{
"version": "v18",
"created": "Mon, 7 Jun 2010 14:45:07 GMT"
},
{
"version": "v19",
"created": "Sun, 20 Jun 2010 21:45:38 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 23:07:16 GMT"
},
{
"version": "v20",
"created": "Fri, 2 Jul 2010 16:20:50 GMT"
},
{
"version": "v21",
"created": "Wed, 7 Jul 2010 04:45:16 GMT"
},
{
"version": "v22",
"created": "Sat, 17 Jul 2010 21:53:57 GMT"
},
{
"version": "v23",
"created": "Wed, 21 Jul 2010 15:41:24 GMT"
},
{
"version": "v24",
"created": "Thu, 29 Jul 2010 06:09:12 GMT"
},
{
"version": "v25",
"created": "Tue, 3 Aug 2010 22:28:20 GMT"
},
{
"version": "v26",
"created": "Sun, 8 Aug 2010 04:23:20 GMT"
},
{
"version": "v27",
"created": "Fri, 13 Aug 2010 17:12:50 GMT"
},
{
"version": "v28",
"created": "Mon, 11 Oct 2010 16:45:13 GMT"
},
{
"version": "v29",
"created": "Mon, 1 Nov 2010 16:47:12 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Oct 2009 16:43:46 GMT"
},
{
"version": "v30",
"created": "Sat, 11 Dec 2010 06:48:08 GMT"
},
{
"version": "v31",
"created": "Thu, 30 Dec 2010 18:02:57 GMT"
},
{
"version": "v32",
"created": "Mon, 24 Jan 2011 00:03:06 GMT"
},
{
"version": "v33",
"created": "Tue, 25 Jan 2011 20:35:07 GMT"
},
{
"version": "v34",
"created": "Mon, 14 Feb 2011 19:27:02 GMT"
},
{
"version": "v35",
"created": "Thu, 31 Mar 2011 15:33:46 GMT"
},
{
"version": "v36",
"created": "Fri, 15 Apr 2011 06:20:46 GMT"
},
{
"version": "v37",
"created": "Tue, 3 May 2011 05:55:35 GMT"
},
{
"version": "v38",
"created": "Sat, 21 May 2011 05:47:38 GMT"
},
{
"version": "v39",
"created": "Sun, 12 Jun 2011 17:29:30 GMT"
},
{
"version": "v4",
"created": "Tue, 20 Oct 2009 05:36:45 GMT"
},
{
"version": "v40",
"created": "Sun, 19 Jun 2011 20:48:53 GMT"
},
{
"version": "v41",
"created": "Wed, 22 Jun 2011 18:51:43 GMT"
},
{
"version": "v42",
"created": "Tue, 5 Jul 2011 13:04:12 GMT"
},
{
"version": "v43",
"created": "Sun, 10 Jul 2011 16:32:48 GMT"
},
{
"version": "v44",
"created": "Sun, 24 Jul 2011 17:01:12 GMT"
},
{
"version": "v45",
"created": "Wed, 27 Jul 2011 03:54:24 GMT"
},
{
"version": "v46",
"created": "Mon, 1 Aug 2011 16:16:56 GMT"
},
{
"version": "v47",
"created": "Wed, 3 Aug 2011 23:13:30 GMT"
},
{
"version": "v48",
"created": "Mon, 15 Aug 2011 23:25:09 GMT"
},
{
"version": "v49",
"created": "Mon, 26 Sep 2011 03:31:48 GMT"
},
{
"version": "v5",
"created": "Wed, 4 Nov 2009 23:16:40 GMT"
},
{
"version": "v50",
"created": "Fri, 30 Sep 2011 19:54:37 GMT"
},
{
"version": "v51",
"created": "Fri, 21 Oct 2011 19:10:29 GMT"
},
{
"version": "v52",
"created": "Tue, 25 Oct 2011 02:31:57 GMT"
},
{
"version": "v53",
"created": "Tue, 1 Nov 2011 02:13:21 GMT"
},
{
"version": "v54",
"created": "Thu, 3 Nov 2011 19:18:57 GMT"
},
{
"version": "v55",
"created": "Sun, 5 Feb 2012 04:19:05 GMT"
},
{
"version": "v56",
"created": "Fri, 9 Mar 2012 02:32:22 GMT"
},
{
"version": "v57",
"created": "Wed, 21 Mar 2012 18:07:38 GMT"
},
{
"version": "v58",
"created": "Mon, 26 Mar 2012 22:46:59 GMT"
},
{
"version": "v59",
"created": "Fri, 30 Mar 2012 06:06:13 GMT"
},
{
"version": "v6",
"created": "Fri, 6 Nov 2009 13:42:43 GMT"
},
{
"version": "v60",
"created": "Thu, 5 Apr 2012 00:42:53 GMT"
},
{
"version": "v61",
"created": "Sun, 29 Apr 2012 23:14:47 GMT"
},
{
"version": "v62",
"created": "Fri, 4 May 2012 23:27:23 GMT"
},
{
"version": "v63",
"created": "Thu, 28 Jun 2012 22:14:08 GMT"
},
{
"version": "v64",
"created": "Thu, 12 Jul 2012 21:43:11 GMT"
},
{
"version": "v65",
"created": "Sun, 5 Aug 2012 17:46:26 GMT"
},
{
"version": "v66",
"created": "Mon, 27 Aug 2012 06:35:09 GMT"
},
{
"version": "v67",
"created": "Tue, 20 Nov 2012 14:06:51 GMT"
},
{
"version": "v68",
"created": "Sun, 25 Nov 2012 06:54:21 GMT"
},
{
"version": "v69",
"created": "Thu, 27 Dec 2012 05:17:06 GMT"
},
{
"version": "v7",
"created": "Sat, 7 Nov 2009 04:03:12 GMT"
},
{
"version": "v70",
"created": "Thu, 5 Dec 2013 19:02:03 GMT"
},
{
"version": "v71",
"created": "Wed, 8 Jan 2014 23:09:50 GMT"
},
{
"version": "v72",
"created": "Tue, 14 Jan 2014 13:42:50 GMT"
},
{
"version": "v73",
"created": "Tue, 21 Jan 2014 21:13:15 GMT"
},
{
"version": "v74",
"created": "Tue, 10 Feb 2015 00:31:07 GMT"
},
{
"version": "v75",
"created": "Mon, 3 Aug 2015 06:29:04 GMT"
},
{
"version": "v76",
"created": "Fri, 4 Dec 2015 15:10:07 GMT"
},
{
"version": "v77",
"created": "Sun, 6 Nov 2016 15:44:34 GMT"
},
{
"version": "v78",
"created": "Sat, 10 Nov 2018 19:15:44 GMT"
},
{
"version": "v79",
"created": "Mon, 17 Dec 2018 15:08:10 GMT"
},
{
"version": "v8",
"created": "Mon, 30 Nov 2009 10:13:43 GMT"
},
{
"version": "v80",
"created": "Fri, 28 Jun 2019 16:30:04 GMT"
},
{
"version": "v9",
"created": "Thu, 3 Dec 2009 16:03:44 GMT"
}
] | 2019-07-01T00:00:00 |
[
[
"Barbosa",
"André Luiz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.3970
|
Dae San Kim
|
Dae San Kim
|
Infinite Families of Recursive Formulas Generating Power Moments of
Kloosterman Sums: Symplectic Case
|
21 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct two infinite families of binary linear codes
associated with double cosets with respect to certain maximal parabolic
subgroup of the symplectic group Sp(2n,q) Here q is a power of two. Then we
obtain an infinite family of recursive formulas for the power moments of
Kloosterman sums and those of 2-dimensional Kloosterman sums in terms of the
frequencies of weights in the codes. This is done via Pless power moment
identity and by utilizing the explicit expressions of exponential sums over
those double cosets related to the evaluations of "Gauss sums" for the
symplectic groups Sp(2n,q).
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 02:22:16 GMT"
}
] | 2009-07-24T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3972
|
Dae San Kim
|
Dae San Kim
|
Infinite Families of Recursive Formulas Generating Power Moments of
Kloosterman Sums: O\^{+}(2n, 2\^{r}) Case
|
21pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct four infinite families of binary linear codes
associated with double cosets with respect to certain maximal parabolic
subgroup of the orthogonal group O^+(2n,2^r). Here q is a power of two. Then we
obtain two infinite families of recursive formulas for the power moments of
Kloosterman sums and those of 2-dimensional Kloosterman sums in terms of the
frequencies of weights in the codes. This is done via Pless power moment
identity and by utilizing the explicit expressions of exponential sums over
those double cosets related to the evaluations of "Gauss sums" for the
orthogonal groups O^+(2n,2^r).
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 02:36:30 GMT"
}
] | 2009-07-24T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3974
|
Dae San Kim
|
Dae San Kim
|
Simple Recursive Formulas Generating Power Moments of Kloosterman Sums
|
8 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct four binary linear codes closely connected with
certain exponential sums over the finite field F_q and F_q-{0,1}. Here q is a
power of two. Then we obtain four recursive formulas for the power moments of
Kloosterman sums in terms of the frequencies of weights in the codes. This is
done via Pless power moment identity and by utilizing the explicit expressions
of the exponential sums obtained earlier.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 02:45:16 GMT"
}
] | 2009-07-24T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.3977
|
Lei Ying
|
Shihuan Liu, Lei Ying and R. Srikant
|
Throughput-Optimal Opportunistic Scheduling in the Presence of
Flow-Level Dynamics
|
15 pages
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider multiuser scheduling in wireless networks with channel variations
and flow-level dynamics. Recently, it has been shown that the MaxWeight
algorithm, which is throughput-optimal in networks with a fixed number users,
fails to achieve the maximum throughput in the presence of flow-level dynamics.
In this paper, we propose a new algorithm, called workload-based scheduling
with learning, which is provably throughput-optimal, requires no prior
knowledge of channels and user demands, and performs significantly better than
previously suggested algorithms.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 03:50:01 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Jul 2009 04:47:26 GMT"
},
{
"version": "v3",
"created": "Sun, 15 Aug 2010 02:07:30 GMT"
}
] | 2010-08-17T00:00:00 |
[
[
"Liu",
"Shihuan",
""
],
[
"Ying",
"Lei",
""
],
[
"Srikant",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.3983
|
Wenguang Wang
|
Wenguang Wang, Wenguang Yu, Qun Li, Weiping Wang, Xichun Liu (College
of Information System and Management, National University of Defense
Technology, Changsha, China)
|
Service-oriented high level architecture
|
12 pages, 3 figures, 2 tables, Proceedings of 2008 European
Simulation Interoperability Workshop, 08E-SIW-022
| null | null |
08E-SIW-022
|
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Service-oriented High Level Architecture (SOHLA) refers to the high level
architecture (HLA) enabled by Service-Oriented Architecture (SOA) and Web
Services etc. techniques which supports distributed interoperating services.
The detailed comparisons between HLA and SOA are made to illustrate the
importance of their combination. Then several key enhancements and changes of
HLA Evolved Web Service API are introduced in comparison with native APIs, such
as Federation Development and Execution Process, communication mechanisms, data
encoding, session handling, testing environment and performance analysis. Some
approaches are summarized including Web-Enabling HLA at the communication
layer, HLA interface specification layer, federate interface layer and
application layer. Finally the problems of current research are discussed, and
the future directions are pointed out.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 04:39:37 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Aug 2009 11:23:28 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Wang",
"Wenguang",
"",
"College\n of Information System and Management, National University of Defense\n Technology, Changsha, China"
],
[
"Yu",
"Wenguang",
"",
"College\n of Information System and Management, National University of Defense\n Technology, Changsha, China"
],
[
"Li",
"Qun",
"",
"College\n of Information System and Management, National University of Defense\n Technology, Changsha, China"
],
[
"Wang",
"Weiping",
"",
"College\n of Information System and Management, National University of Defense\n Technology, Changsha, China"
],
[
"Liu",
"Xichun",
"",
"College\n of Information System and Management, National University of Defense\n Technology, Changsha, China"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0907.3986
|
Aleksandrs Slivkins
|
Aleksandrs Slivkins
|
Contextual Bandits with Similarity Information
|
This is the full version of a conference paper in COLT 2011, to
appear in JMLR in 2014. A preliminary version of this manuscript (with all
the results) has been posted to arXiv in February 2011. An earlier version on
arXiv, which does not include the results in Section 6, dates back to July
2009. The present revision addresses various presentation issues pointed out
by journal referees
| null | null | null |
cs.DS cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a multi-armed bandit (MAB) problem, an online algorithm makes a sequence
of choices. In each round it chooses from a time-invariant set of alternatives
and receives the payoff associated with this alternative. While the case of
small strategy sets is by now well-understood, a lot of recent work has focused
on MAB problems with exponentially or infinitely large strategy sets, where one
needs to assume extra structure in order to make the problem tractable. In
particular, recent literature considered information on similarity between
arms.
We consider similarity information in the setting of "contextual bandits", a
natural extension of the basic MAB problem where before each round an algorithm
is given the "context" -- a hint about the payoffs in this round. Contextual
bandits are directly motivated by placing advertisements on webpages, one of
the crucial problems in sponsored search. A particularly simple way to
represent similarity information in the contextual bandit setting is via a
"similarity distance" between the context-arm pairs which gives an upper bound
on the difference between the respective expected payoffs.
Prior work on contextual bandits with similarity uses "uniform" partitions of
the similarity space, which is potentially wasteful. We design more efficient
algorithms that are based on adaptive partitions adjusted to "popular" context
and "high-payoff" arms.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 06:41:33 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Feb 2011 00:49:41 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jun 2011 17:32:29 GMT"
},
{
"version": "v4",
"created": "Mon, 13 Jan 2014 17:30:07 GMT"
},
{
"version": "v5",
"created": "Tue, 20 May 2014 03:52:46 GMT"
}
] | 2014-05-21T00:00:00 |
[
[
"Slivkins",
"Aleksandrs",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0907.4006
|
Pushkar Joglekar
|
V. Arvind, Pushkar S. Joglekar, Srikanth Srinivasan
|
Arithmetic Circuits and the Hadamard Product of Polynomials
|
20 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by the Hadamard product of matrices we define the Hadamard product
of multivariate polynomials and study its arithmetic circuit and branching
program complexity. We also give applications and connections to polynomial
identity testing. Our main results are the following. 1. We show that
noncommutative polynomial identity testing for algebraic branching programs
over rationals is complete for the logspace counting class $\ceql$, and over
fields of characteristic $p$ the problem is in $\ModpL/\Poly$. 2.We show an
exponential lower bound for expressing the Raz-Yehudayoff polynomial as the
Hadamard product of two monotone multilinear polynomials. In contrast the
Permanent can be expressed as the Hadamard product of two monotone multilinear
formulas of quadratic size.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 08:52:50 GMT"
}
] | 2009-07-24T00:00:00 |
[
[
"Arvind",
"V.",
""
],
[
"Joglekar",
"Pushkar S.",
""
],
[
"Srinivasan",
"Srikanth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.4031
|
Omar Mehanna
|
Omar Mehanna, Ahmed Sultan and Hesham El Gamal
|
Cognitive MAC Protocols for General Primary Network Models
|
12 pages, 8 figures, submitted to IEEE Transactions on Mobile
Computing
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the design of cognitive Medium Access Control (MAC) protocols
enabling a secondary (unlicensed) transmitter-receiver pair to communicate over
the idle periods of a set of primary (licensed) channels. More specifically, we
propose cognitive MAC protocols optimized for both slotted and un-slotted
primary networks. For the slotted structure, the objective is to maximize the
secondary throughput while maintaining synchronization between the secondary
pair and not causing interference to the primary network. Our investigations
differentiate between two sensing scenarios. In the first, the secondary
transmitter is capable of sensing all the primary channels, whereas it senses
only a subset of the primary channels in the second scenario. In both cases, we
propose blind MAC protocols that efficiently learn the statistics of the
primary traffic on-line and asymptotically achieve the throughput obtained when
prior knowledge of primary traffic statistics is available. For the un-slotted
structure, the objective is to maximize the secondary throughput while
satisfying an interference constraint on the primary network. Sensing-dependent
periods are optimized for each primary channel yielding a MAC protocol which
outperforms previously proposed techniques that rely on a single sensing period
optimization.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 11:31:16 GMT"
}
] | 2009-07-25T00:00:00 |
[
[
"Mehanna",
"Omar",
""
],
[
"Sultan",
"Ahmed",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.4036
|
Derek Groen
|
D. Groen, S. Harfst, S. Portegies Zwart
|
The Living Application: a Self-Organising System for Complex Grid Tasks
|
26 pages, 3 figures, accepted by IJHPCA
|
International Journal of High Performance Computing Applications
May 2010 vol. 24 no. 2 185-193
|
10.1177/1094342009347891
| null |
cs.DC astro-ph.GA cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the living application, a method to autonomously manage
applications on the grid. During its execution on the grid, the living
application makes choices on the resources to use in order to complete its
tasks. These choices can be based on the internal state, or on autonomously
acquired knowledge from external sensors. By giving limited user capabilities
to a living application, the living application is able to port itself from one
resource topology to another. The application performs these actions at
run-time without depending on users or external workflow tools. We demonstrate
this new concept in a special case of a living application: the living
simulation. Today, many simulations require a wide range of numerical solvers
and run most efficiently if specialized nodes are matched to the solvers. The
idea of the living simulation is that it decides itself which grid machines to
use based on the numerical solver currently in use. In this paper we apply the
living simulation to modelling the collision between two galaxies in a test
setup with two specialized computers. This simulation switces at run-time
between a GPU-enabled computer in the Netherlands and a GRAPE-enabled machine
that resides in the United States, using an oct-tree N-body code whenever it
runs in the Netherlands and a direct N-body solver in the United States.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 12:00:21 GMT"
}
] | 2011-09-27T00:00:00 |
[
[
"Groen",
"D.",
""
],
[
"Harfst",
"S.",
""
],
[
"Zwart",
"S. Portegies",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "astro-ph.GA",
"description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents",
"span": "(Astrophysics of Galaxies)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4068
|
Masud Hasan
|
Syed Ishtiaque Ahmed, Masud Hasan, and Md. Ariful Islam
|
Cutting a Convex Polyhedron Out of a Sphere
|
10 pages
| null | null | null |
cs.CG cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a convex polyhedron $P$ of $n$ vertices inside a sphere $Q$, we give an
$O(n^3)$-time algorithm that cuts $P$ out of $Q$ by using guillotine cuts and
has cutting cost $O((\log n)^2)$ times the optimal.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 14:11:59 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Mar 2010 17:26:51 GMT"
}
] | 2010-03-10T00:00:00 |
[
[
"Ahmed",
"Syed Ishtiaque",
""
],
[
"Hasan",
"Masud",
""
],
[
"Islam",
"Md. Ariful",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.4085
|
Amitabh Saxena
|
Amitabh Saxena
|
A Secure Wireless Routing Protocol Using Enhanced Chain Signatures
|
Extended version
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a routing protocol for wireless networks. Wireless routing
protocols allow hosts within a network to have some knowledge of the topology
in order to know when to forward a packet (via broadcast) and when to drop it.
Since a routing protocol forms the backbone of a network, it is a lucrative
target for many attacks, all of which attempt to disrupt network traffic by
corrupting routing tables of neighboring routers using false updates. Secure
routing protocols designed for wired networks (such as S-BGP) are not scalable
in an ad-hoc wireless environment because of two main drawbacks: (1) the need
to maintain knowledge about all immediate neighbors (which requires a discovery
protocol), and (2) the need to transmit the same update several times, one for
each neighbor. Although information about neighbors is readily available in a
fairly static and wired network, such information is often not updated or
available in an ad-hoc wireless network with mobile devices. Our protocol is a
variant of S-BGP called SS-BGP and allows a single broadcast for routing
updates without having the need to be aware of every neighboring router. The
protocol is based on a novel authentication primitive called Enhanced Chain
Signatures (ECS).
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 14:47:31 GMT"
}
] | 2009-07-24T00:00:00 |
[
[
"Saxena",
"Amitabh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4100
|
Kurt Ammon
|
Kurt Ammon
|
Beyond Turing Machines
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses "computational" systems capable of "computing" functions
not computable by predefined Turing machines if the systems are not isolated
from their environment. Roughly speaking, these systems can change their finite
descriptions by interacting with their environment.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 15:45:10 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Ammon",
"Kurt",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.4128
|
Stefan Woltran
|
Miroslaw Truszczy\'nski, Stefan Woltran
|
Relativized hyperequivalence of logic programs for modular programming
| null | null | null | null |
cs.AI cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A recent framework of relativized hyperequivalence of programs offers a
unifying generalization of strong and uniform equivalence. It seems to be
especially well suited for applications in program optimization and modular
programming due to its flexibility that allows us to restrict, independently of
each other, the head and body alphabets in context programs. We study
relativized hyperequivalence for the three semantics of logic programs given by
stable, supported and supported minimal models. For each semantics, we identify
four types of contexts, depending on whether the head and body alphabets are
given directly or as the complement of a given set. Hyperequivalence relative
to contexts where the head and body alphabets are specified directly has been
studied before. In this paper, we establish the complexity of deciding
relativized hyperequivalence with respect to the three other types of context
programs.
To appear in Theory and Practice of Logic Programming (TPLP).
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 17:31:45 GMT"
}
] | 2009-07-24T00:00:00 |
[
[
"Truszczyński",
"Miroslaw",
""
],
[
"Woltran",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.4130
|
Xi Chen
|
Xi Chen, Shang-Hua Teng
|
Spending is not Easier than Trading: On the Computational Equivalence of
Fisher and Arrow-Debreu Equilibria
| null | null | null | null |
cs.GT cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is a common belief that computing a market equilibrium in Fisher's
spending model is easier than computing a market equilibrium in Arrow-Debreu's
exchange model. This belief is built on the fact that we have more algorithmic
success in Fisher equilibria than Arrow-Debreu equilibria. For example, a
Fisher equilibrium in a Leontief market can be found in polynomial time, while
it is PPAD-hard to compute an approximate Arrow-Debreu equilibrium in a
Leontief market.
In this paper, we show that even when all the utilities are additively
separable, piecewise-linear, and concave functions, finding an approximate
equilibrium in Fisher's model is complete in PPAD. Our result solves a
long-term open question on the complexity of market equilibria. To the best of
our knowledge, this is the first PPAD-completeness result for Fisher's model.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 17:49:12 GMT"
}
] | 2009-07-24T00:00:00 |
[
[
"Chen",
"Xi",
""
],
[
"Teng",
"Shang-Hua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.4166
|
Kamesh Munagala
|
Sayan Bhattacharya, Gagan Goel, Sreenivas Gollapudi and Kamesh
Munagala
|
Budget Constrained Auctions with Heterogeneous Items
|
Final version accepted to STOC '10. Incorporates significant reviewer
comments
| null | null | null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present the first approximation algorithms for the problem
of designing revenue optimal Bayesian incentive compatible auctions when there
are multiple (heterogeneous) items and when bidders can have arbitrary demand
and budget constraints. Our mechanisms are surprisingly simple: We show that a
sequential all-pay mechanism is a 4 approximation to the revenue of the optimal
ex-interim truthful mechanism with discrete correlated type space for each
bidder. We also show that a sequential posted price mechanism is a O(1)
approximation to the revenue of the optimal ex-post truthful mechanism when the
type space of each bidder is a product distribution that satisfies the standard
hazard rate condition. We further show a logarithmic approximation when the
hazard rate condition is removed, and complete the picture by showing that
achieving a sub-logarithmic approximation, even for regular distributions and
one bidder, requires pricing bundles of items. Our results are based on
formulating novel LP relaxations for these problems, and developing generic
rounding schemes from first principles. We believe this approach will be useful
in other Bayesian mechanism design contexts.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 12:39:22 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Aug 2009 12:21:58 GMT"
},
{
"version": "v3",
"created": "Sat, 22 Aug 2009 12:29:45 GMT"
},
{
"version": "v4",
"created": "Sat, 3 Oct 2009 19:07:11 GMT"
},
{
"version": "v5",
"created": "Tue, 6 Oct 2009 12:19:00 GMT"
},
{
"version": "v6",
"created": "Mon, 29 Mar 2010 11:45:54 GMT"
}
] | 2010-03-30T00:00:00 |
[
[
"Bhattacharya",
"Sayan",
""
],
[
"Goel",
"Gagan",
""
],
[
"Gollapudi",
"Sreenivas",
""
],
[
"Munagala",
"Kamesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.4169
|
Victor Yodaiken
|
Victor Yodaiken
|
Primitive Recursive Presentations of Automata and their Products
|
11 pages
| null | null | null |
cs.FL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Methods for specifying Moore type state machines (transducers) abstractly via
primitive recursive functions and for defining parallel composition via
simultaneous primitive recursion are discussed. The method is mostly of
interest as a concise and convenient way of working with the complex state
systems found in computer programming and engineering, but a short section
indicates connections to algebraic automata theory and the theorem of Krohn and
Rhodes.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 20:56:05 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Jan 2010 12:58:03 GMT"
}
] | 2010-01-10T00:00:00 |
[
[
"Yodaiken",
"Victor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.4176
|
Renuka Kandregula
|
Renuka Kandregula
|
The Basic Discrete Hilbert Transform with an Information Hiding
Application
|
13 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents several experimental findings related to the basic
discrete Hilbert transform. The errors in the use of a finite set of the
transform values have been tabulated for the more commonly used functions. The
error can be quite small and, for example, it is of the order of 10^{-17} for
the chirp signal. The use of the discrete Hilbert transform in hiding
information is presented.
|
[
{
"version": "v1",
"created": "Thu, 23 Jul 2009 21:47:12 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Kandregula",
"Renuka",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.