id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0907.4180
Rafiq Saleh
Vitaliy Kurlin, Alexei Lisitsa, Igor Potapov and Rafiq Saleh
On Descriptional Complexity of the Planarity Problem for Gauss Words
null
null
null
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the descriptional complexity of knot theoretic problems and show upper bounds for planarity problem of signed and unsigned knot diagrams represented by Gauss words. Since a topological equivalence of knots can involve knot diagrams with arbitrarily many crossings then Gauss words will be considered as strings over an infinite (unbounded) alphabet. For establishing the upper bounds on recognition of knot properties, we study these problems in a context of automata models over an infinite alphabet.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 11:25:07 GMT" } ]
2009-07-27T00:00:00
[ [ "Kurlin", "Vitaliy", "" ], [ "Lisitsa", "Alexei", "" ], [ "Potapov", "Igor", "" ], [ "Saleh", "Rafiq", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.4230
Klara Stokes
Maria Bras-Amor\'os and Klara Stokes
The Semigroup of Combinatorial Configurations
Title changed, article shortened
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A (v,b,r,k) combinatorial configuration is a (r,k)-biregular bipartite graph with v vertices on the left and b vertices on the right and with no cycle of length 4. Combinatorial configurations have become very important for some cryptographic applications to sensor networks and to peer-to-peer communities. Configurable tuples are those tuples (v,b,r,k) for which a (v,b,r,k) combinatorial configuration exists. It is proved in this work that the set of configurable tuples with fixed r and k has the structure of a numerical semigroup. The numerical semigroup is completely described for r=2 and r=3.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 07:05:46 GMT" }, { "version": "v2", "created": "Wed, 16 Sep 2009 11:02:50 GMT" }, { "version": "v3", "created": "Thu, 23 Dec 2010 12:16:56 GMT" } ]
2010-12-24T00:00:00
[ [ "Bras-Amorós", "Maria", "" ], [ "Stokes", "Klara", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.4251
Lin Dai
Tony T. Lee and Lin Dai
Buffered Aloha with K-Exponential Backoff -- Part I: Stability and Throughput Analysis
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This two-part paper series studies the performance of buffered Aloha networks with K-Exponential Backoff collision resolution algorithms. Part I focuses on stability and throughput analysis and Part II presents the delay analysis. In Part I, the buffered Aloha network is modeled as a multi-queue single-server system. We adopt a widely used approach in packet switching systems to decompose the multi-queue system into independent first-in-first-out (FIFO) queues, which are hinged together by the probability of success of head-of-line (HOL) packets. A unified method is devised to tackle the stability and throughput problems of K-Exponential Backoff with any cutoff phase K. We demonstrate that a network with K-Exponential Backoff can be stabilized if the retransmission factor q is properly selected. The stable region of q is characterized and illustrated via examples of Geometric Retransmission (K=1) and Exponential Backoff (K=infinity). With an increasing number of nodes n, we show that the stable region of Geometric Retransmission rapidly shrinks, and vanishes as n goes to infinity. In contrast, the stable region of Exponential Backoff does not vary with the network population n, implying that a stable throughput can be achieved in networks with Exponential Backoff even with an infinite number of nodes. All the analytical results presented in this paper series are verified by simulations.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 10:20:50 GMT" } ]
2009-07-27T00:00:00
[ [ "Lee", "Tony T.", "" ], [ "Dai", "Lin", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4254
Lin Dai
Lin Dai and Tony T. Lee
Buffered Aloha with K-Exponential Backoff -- Part II: Delay Analysis
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the delay analysis for buffered Aloha networks with K-Exponential Backoff. Mean access delay and mean queueing delay are derived and demonstrated via the examples of Geometric Retransmission (K=1) and Exponential Backoff (K=infinity). The comparison shows that higher delay is incurred with Geometric Retransmission when the aggregate input rate is small, and the delay gap is enlarged as the number of nodes n increases. With a high traffic input rate, however, the delay performance with Exponential Backoff severely deteriorates. The mean queueing delay will be unbounded if the aggregate input rate exceeds 0.3. We also extend the analysis to the contention-window-based backoff model which is widely adopted in practical MAC protocols. It will be revealed that both the retransmission-probability-based and the contention-window-based models exhibit the same stable region and achieve similar queueing performance in most cases, which justifies the intuition that was taken but remained unverified in previous studies: the retransmission-probability-based backoff model can serve as a good approximation of the contention-window-based one.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 10:26:05 GMT" } ]
2009-07-27T00:00:00
[ [ "Dai", "Lin", "" ], [ "Lee", "Tony T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4273
Berndt Gammel
Berndt M. Gammel and Stefan Mangard
On the Duality of Probing and Fault Attacks
null
Cryptology ePrint Archive, Report 2009/352
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited attacker. A concise metric for the level of probing and fault security is introduced, which is directly related to the capabilities of a realistic attacker. In order to investigate the interrelation of probing and fault security we introduce a common mathematical framework based on the formalism of information and coding theory. The framework unifies the known linear masking schemes. We proof a central theorem about the properties of linear codes which leads to optimal secret sharing schemes. These schemes provide the lower bound for the number of masks needed to counteract an attacker with a given strength. The new formalism reveals an intriguing duality principle between the problems of probing and fault security, and provides a unified view on privacy and integrity protection using error detecting codes. Finally, we introduce a new class of linear tamper-resistant codes. These are eligible to preserve security against an attacker mounting simultaneous probing and fault attacks.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 12:49:11 GMT" } ]
2009-07-27T00:00:00
[ [ "Gammel", "Berndt M.", "" ], [ "Mangard", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.4283
Stephan Kreutzer
Anuj Dawar and Stephan Kreutzer
Domination Problems in Nowhere-Dense Classes of Graphs
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the parameterized complexity of generalisations and variations of the dominating set problem on classes of graphs that are nowhere dense. In particular, we show that the distance-d dominating-set problem, also known as the (k,d)-centres problem, is fixed-parameter tractable on any class that is nowhere dense and closed under induced subgraphs. This generalises known results about the dominating set problem on H-minor free classes, classes with locally excluded minors and classes of graphs of bounded expansion. A key feature of our proof is that it is based simply on the fact that these graph classes are uniformly quasi-wide, and does not rely on a structural decomposition. Our result also establishes that the distance-d dominating-set problem is FPT on classes of bounded expansion, answering a question of Ne{\v s}et{\v{r}}il and Ossona de Mendez.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 13:26:45 GMT" } ]
2009-07-27T00:00:00
[ [ "Dawar", "Anuj", "" ], [ "Kreutzer", "Stephan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.4296
Pascal Caron
Pascal Caron and Marianne Flouret
Algorithms for Glushkov K-graphs
31 pages, 20 figures, 1 table
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The automata arising from the well known conversion of regular expression to non deterministic automata have rather particular transition graphs. We refer to them as the Glushkov graphs, to honour his nice expression-to-automaton algorithmic short cut (On a synthesis algorithm for abstract automata, Ukr. Matem. Zhurnal, 12(2):147-156, 1960, In Russian). The Glushkov graphs have been characterized (P. Caron and D. Ziadi, Characterization of Glushkov automata. Theoret. Comput. Sci., 233(1-2):75-90, 2000) in terms of simple graph theoretical properties and certain reduction rules. We show how to carry, under certain restrictions, this characterization over to the weighted Glushkov graphs. With the weights in a semiring K, they are defined as the transition Glushkov K-graphs of the Weighted Finite Automata (WFA) obtained by the generalized Glushkov construction (P. Caron and M. Flouret, Glushkov construction for series: the non commutative case, Internat. J. Comput. Math., 80(4):457-472, 2003) from the K-expressions. It works provided that the semiring K is factorial and the K-expressions are in the so called star normal form (SNF) of Bruggeman-Klein (Regular expressions into finite automata, Theoret. Comput. Sci., 120(2):197-213, 1993) The restriction to the factorial semiring ensures to obtain algorithms. The restriction to the SNF would not be necessary if every K-expressions were equivalent to some with the same litteral length, as it is the case for the boolean semiring B but remains an open question for a general K.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 15:22:46 GMT" }, { "version": "v2", "created": "Mon, 21 Nov 2011 14:22:53 GMT" } ]
2011-11-22T00:00:00
[ [ "Caron", "Pascal", "" ], [ "Flouret", "Marianne", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.4311
Leah Epstein
Leah Epstein, Elena Kleiman and Julian Mestre
Parametric packing of selfish items and the subset sum algorithm
null
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The subset sum algorithm is a natural heuristic for the classical Bin Packing problem: In each iteration, the algorithm finds among the unpacked items, a maximum size set of items that fits into a new bin. More than 35 years after its first mention in the literature, establishing the worst-case performance of this heuristic remains, surprisingly, an open problem. Due to their simplicity and intuitive appeal, greedy algorithms are the heuristics of choice of many practitioners. Therefore, better understanding simple greedy heuristics is, in general, an interesting topic in its own right. Very recently, Epstein and Kleiman (Proc. ESA 2008) provided another incentive to study the subset sum algorithm by showing that the Strong Price of Anarchy of the game theoretic version of the bin-packing problem is precisely the approximation ratio of this heuristic. In this paper we establish the exact approximation ratio of the subset sum algorithm, thus settling a long standing open problem. We generalize this result to the parametric variant of the bin packing problem where item sizes lie on the interval (0,\alpha] for some \alpha \leq 1, yielding tight bounds for the Strong Price of Anarchy for all \alpha \leq 1. Finally, we study the pure Price of Anarchy of the parametric Bin Packing game for which we show nearly tight upper and lower bounds for all \alpha \leq 1.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 15:06:00 GMT" } ]
2009-07-27T00:00:00
[ [ "Epstein", "Leah", "" ], [ "Kleiman", "Elena", "" ], [ "Mestre", "Julian", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.4316
Krzysztof R. Apt
Krzysztof R. Apt, Frank S. de Boer, Ernst-R\"udiger Olderog
Modular Verification of Recursive Programs
21 pages. appeared in: Languages: From Formal to Natural, Essays Dedicated to Nissim Francez on the Occasion of His 65th Birthday. Lecture Notes in Computer Science 5533 Springer 2009
null
null
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We argue that verification of recursive programs by means of the assertional method of C.A.R. Hoare can be conceptually simplified using a modular reasoning. In this approach some properties of the program are established first and subsequently used to establish other program properties. We illustrate this approach by providing a modular correctness proof of the Quicksort program.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 15:06:46 GMT" } ]
2009-07-27T00:00:00
[ [ "Apt", "Krzysztof R.", "" ], [ "de Boer", "Frank S.", "" ], [ "Olderog", "Ernst-Rüdiger", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0907.4354
Damian Eads
Damian Eads (1), Edward Rosten (2), David Helmbold (1) ((1) University of California Santa Cruz, (2) University of Cambridge)
Learning Object Location Predictors with Boosting and Grammar-Guided Feature Extraction
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present BEAMER: a new spatially exploitative approach to learning object detectors which shows excellent results when applied to the task of detecting objects in greyscale aerial imagery in the presence of ambiguous and noisy data. There are four main contributions used to produce these results. First, we introduce a grammar-guided feature extraction system, enabling the exploration of a richer feature space while constraining the features to a useful subset. This is specified with a rule-based generative grammar crafted by a human expert. Second, we learn a classifier on this data using a newly proposed variant of AdaBoost which takes into account the spatially correlated nature of the data. Third, we perform another round of training to optimize the method of converting the pixel classifications generated by boosting into a high quality set of (x, y) locations. Lastly, we carefully define three common problems in object detection and define two evaluation criteria that are tightly matched to these problems. Major strengths of this approach are: (1) a way of randomly searching a broad feature space, (2) its performance when evaluated on well-matched evaluation criteria, and (3) its use of the location prediction domain to learn object detectors as well as to generate detections that perform well on several tasks: object counting, tracking, and target detection. We demonstrate the efficacy of BEAMER with a comprehensive experimental evaluation on a challenging data set.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 18:01:08 GMT" } ]
2009-07-27T00:00:00
[ [ "Eads", "Damian", "" ], [ "Rosten", "Edward", "" ], [ "Helmbold", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.4356
Benjamin Birnbaum
Yossi Azar, Benjamin Birnbaum, L. Elisa Celis, Nikhil R. Devanur, and Yuval Peres
Convergence of Local Dynamics to Balanced Outcomes in Exchange Networks
Full version of FOCS 2009 paper
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Bargaining games on exchange networks have been studied by both economists and sociologists. A Balanced Outcome for such a game is an equilibrium concept that combines notions of stability and fairness. In a recent paper, Kleinberg and Tardos introduced balanced outcomes to the computer science community and provided a polynomial-time algorithm to compute the set of such outcomes. Their work left open a pertinent question: are there natural, local dynamics that converge quickly to a balanced outcome? In this paper, we provide a partial answer to this question by showing that simple edge-balancing dynamics converge to a balanced outcome whenever one exists.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 18:35:20 GMT" } ]
2009-07-27T00:00:00
[ [ "Azar", "Yossi", "" ], [ "Birnbaum", "Benjamin", "" ], [ "Celis", "L. Elisa", "" ], [ "Devanur", "Nikhil R.", "" ], [ "Peres", "Yuval", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.4364
Miao Song
Miao Song
Dynamic Deformation of Uniform Elastic Two-Layer Objects
96 pages, 46 pages; master's thesis; August 2007; also available at http://clues.concordia.ca/record=b2343207~S0
null
null
null
cs.GR
http://creativecommons.org/licenses/by/3.0/
This thesis presents a two-layer uniform facet elastic object for real-time simulation based on physics modeling method. It describes the elastic object procedural modeling algorithm with particle system from the simplest one-dimensional object, to more complex two-dimensional and three-dimensional objects. The double-layered elastic object consists of inner and outer elastic mass spring surfaces and compressible internal pressure. The density of the inner layer can be set different from the density of the outer layer; the motion of the inner layer can be opposite to the motion of the outer layer. These special features, which cannot be achieved by a single layered object, result in improved imitation of a soft body, such as tissue's liquidity non-uniform deformation. The construction of the double-layered elastic object is closer to the real tissue's physical structure. The inertial behavior of the elastic object is well illustrated in environments with gravity and collisions with walls, ceiling, and floor. The collision detection is defined by elastic collision penalty method and the motion of the object is guided by the Ordinary Differential Equation computation. Users can interact with the modeled objects, deform them, and observe the response to their action in real time.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 19:13:02 GMT" }, { "version": "v2", "created": "Sat, 25 Jul 2009 22:54:29 GMT" } ]
2009-09-30T00:00:00
[ [ "Song", "Miao", "" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0907.4385
Joerg Rothe
Yoram Bachrach, Edith Elkind, Reshef Meir, Dmitrii Pasechnik, Michael Zuckerman, Joerg Rothe and Jeffrey S. Rosenschein
The Cost of Stability in Coalitional Games
20 pages; will be presented at SAGT'09
Proceedings of SAGT 2009, LNCS, 5814, 122-134
10.1007/978-3-642-04645-2
null
cs.GT cs.AI cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A key question in cooperative game theory is that of coalitional stability, usually captured by the notion of the \emph{core}--the set of outcomes such that no subgroup of players has an incentive to deviate. However, some coalitional games have empty cores, and any outcome in such a game is unstable. In this paper, we investigate the possibility of stabilizing a coalitional game by using external payments. We consider a scenario where an external party, which is interested in having the players work together, offers a supplemental payment to the grand coalition (or, more generally, a particular coalition structure). This payment is conditional on players not deviating from their coalition(s). The sum of this payment plus the actual gains of the coalition(s) may then be divided among the agents so as to promote stability. We define the \emph{cost of stability (CoS)} as the minimal external payment that stabilizes the game. We provide general bounds on the cost of stability in several classes of games, and explore its algorithmic properties. To develop a better intuition for the concepts we introduce, we provide a detailed algorithmic study of the cost of stability in weighted voting games, a simple but expressive class of games which can model decision-making in political bodies, and cooperation in multiagent settings. Finally, we extend our model and results to games with coalition structures.
[ { "version": "v1", "created": "Fri, 24 Jul 2009 21:38:45 GMT" } ]
2010-10-21T00:00:00
[ [ "Bachrach", "Yoram", "" ], [ "Elkind", "Edith", "" ], [ "Meir", "Reshef", "" ], [ "Pasechnik", "Dmitrii", "" ], [ "Zuckerman", "Michael", "" ], [ "Rothe", "Joerg", "" ], [ "Rosenschein", "Jeffrey S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.4426
Christopher Frenz
Christopher M. Frenz, Steve Peters, Wilson Julien
Evolution of Digital Logic Functionality via a Genetic Algorithm
Frenz, C.M., Peters, S., Julien, W. (2009) Evolution of Digital Logic Functionality via a Genetic Algorithm, Proceedings of the 2009 International Conference on Genetic and Evolutionary Methods (GEM 2009), 99-101
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Digital logic forms the functional basics of most modern electronic equipment and as such the creation of novel digital logic circuits is an active area of computer engineering research. This study demonstrates that genetic algorithms can be used to evolve functionally useful sets of logic gate interconnections to create useful digital logic circuits. The efficacy of this approach is illustrated via the evolution of AND, OR, XOR, NOR, and XNOR functionality from sets of NAND gates, thereby illustrating that evolutionary methods have the potential be applied to the design of digital electronics.
[ { "version": "v1", "created": "Sat, 25 Jul 2009 15:21:16 GMT" } ]
2009-07-28T00:00:00
[ [ "Frenz", "Christopher M.", "" ], [ "Peters", "Steve", "" ], [ "Julien", "Wilson", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0907.4447
Martin Levesque
Martin Levesque and Halima Elbiaze
Graphical Probabilistic Routing Model for OBS Networks with Realistic Traffic Scenario
6 pages
IEEE Globecom 2009, Hawaii, United States, November 30 - December 4, 2009
null
null
cs.NI cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Burst contention is a well-known challenging problem in Optical Burst Switching (OBS) networks. Contention resolution approaches are always reactive and attempt to minimize the BLR based on local information available at the core node. On the other hand, a proactive approach that avoids burst losses before they occur is desirable. To reduce the probability of burst contention, a more robust routing algorithm than the shortest path is needed. This paper proposes a new routing mechanism for JET-based OBS networks, called Graphical Probabilistic Routing Model (GPRM) that selects less utilized links, on a hop-by-hop basis by using a bayesian network. We assume no wavelength conversion and no buffering to be available at the core nodes of the OBS network. We simulate the proposed approach under dynamic load to demonstrate that it reduces the Burst Loss Ratio (BLR) compared to static approaches by using Network Simulator 2 (ns-2) on NSFnet network topology and with realistic traffic matrix. Simulation results clearly show that the proposed approach outperforms static approaches in terms of BLR.
[ { "version": "v1", "created": "Sat, 25 Jul 2009 21:26:30 GMT" } ]
2009-07-28T00:00:00
[ [ "Levesque", "Martin", "" ], [ "Elbiaze", "Halima", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.4468
Andrei Sukhov M
A.M. Sukhov, N. Kuznetsova
What type of distribution for packet delay in a global network should be used in the control theory?
5 pages, 2 figures
null
null
null
cs.NI
http://creativecommons.org/licenses/by/3.0/
In this paper correspondence between experimental data for packet delay and two theoretical types of distribution is investigated. Calculations have shown that the exponential distribution describes the data on network delay better, than truncated normal distribution. Precision experimental data to within microseconds are gathered by means of the RIPE Test Box. In addition to exact measurements the data gathered by means of the utility {\em ping} has been parsed that has not changed the main result. As a result, the equation for an exponential distribution, in the best way describing process of packet delay in a TCP/IP based network is written. The search algorithm for key parameters as for normal, and an exponential distribution is resulted.
[ { "version": "v1", "created": "Sun, 26 Jul 2009 09:39:39 GMT" } ]
2009-07-28T00:00:00
[ [ "Sukhov", "A. M.", "" ], [ "Kuznetsova", "N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4471
R Doomun
Natasa Zivic
Strategies and performances of Soft Input Decryption
International Journal of Computer science and Information security, 12 pages, IJCSIS Volume 1
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes performance aspects of Soft Input Decryption and L values. Soft Input Decryption is a novel method which uses L values (soft output) of a SISO channel decoder for the correction of input of Soft Input Decryption (SID blocks) which have been modified during the transmission over a noisy channel. The method is based on the combination of cryptography and channel coding improving characteristics of both of them. The algorithm, strategies and scenarios of Soft Input Decryption are described.
[ { "version": "v1", "created": "Sun, 26 Jul 2009 10:41:31 GMT" }, { "version": "v2", "created": "Thu, 17 Sep 2009 07:07:36 GMT" } ]
2009-09-17T00:00:00
[ [ "Zivic", "Natasa", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.4477
Nikos Tzevelekos
Nikos Tzevelekos
Full abstraction for nominal general references
null
Logical Methods in Computer Science, Volume 5, Issue 3 (September 11, 2009) lmcs:918
10.2168/LMCS-5(3:8)2009
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Game semantics has been used with considerable success in formulating fully abstract semantics for languages with higher-order procedures and a wide range of computational effects. Recently, nominal games have been proposed for modelling functional languages with names. These are ordinary, stateful games cast in the theory of nominal sets developed by Pitts and Gabbay. Here we take nominal games one step further, by developing a fully abstract semantics for a language with nominal general references.
[ { "version": "v1", "created": "Sun, 26 Jul 2009 13:27:38 GMT" }, { "version": "v2", "created": "Fri, 11 Sep 2009 19:57:27 GMT" } ]
2015-07-01T00:00:00
[ [ "Tzevelekos", "Nikos", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.4488
Gregory Gutin
Gregory Gutin, Eun Jung Kim, Michael Lampis, and Valia Mitsou
Vertex Cover Problem Parameterized Above and Below Tight Bounds
null
null
null
null
cs.CC cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the well-known Vertex Cover problem parameterized above and below tight bounds. We show that two of the parameterizations (both were suggested by Mahajan, Raman and Sikdar, J. Computer and System Sciences, 75(2):137--153, 2009) are fixed-parameter tractable and two other parameterizations are W[1]-hard (one of them is, in fact, W[2]-hard).
[ { "version": "v1", "created": "Sun, 26 Jul 2009 15:02:39 GMT" }, { "version": "v2", "created": "Fri, 28 Aug 2009 10:25:36 GMT" } ]
2009-08-28T00:00:00
[ [ "Gutin", "Gregory", "" ], [ "Kim", "Eun Jung", "" ], [ "Lampis", "Michael", "" ], [ "Mitsou", "Valia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.4509
Gilberto de Paiva
Gilberto de Paiva
Pattern Recognition Theory of Mind
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I propose that pattern recognition, memorization and processing are key concepts that can be a principle set for the theoretical modeling of the mind function. Most of the questions about the mind functioning can be answered by a descriptive modeling and definitions from these principles. An understandable consciousness definition can be drawn based on the assumption that a pattern recognition system can recognize its own patterns of activity. The principles, descriptive modeling and definitions can be a basis for theoretical and applied research on cognitive sciences, particularly at artificial intelligence studies.
[ { "version": "v1", "created": "Sun, 26 Jul 2009 19:10:43 GMT" } ]
2009-07-28T00:00:00
[ [ "de Paiva", "Gilberto", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.4521
Doron Ezri
Igor Gutman, Doron Ezri and Dov Wulich
Grassmannian Beamforming for MIMO-OFDM Systems with Frequency and Spatially Correlated Channels Using Huffman Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple input multiple output (MIMO) precoding is an efficient scheme that may significantly enhance the communication link. However, this enhancement comes with a cost. Many precoding schemes require channel knowledge at the transmitter that is obtained through feedback from the receiver. Focusing on the natural common fusion of orthogonal frequency division multiplexing (OFDM) and MIMO, we exploit the channel correlation in the frequency and spatial domain to reduce the required feedback rate in a frequency division duplex (FDD) system. The proposed feedback method is based on Huffman coding and is employed here for the single stream case. The method leads to a significant reduction in the required feedback rate, without any loss in performance. The proposed method may be extended to the multi-stream case.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 06:40:13 GMT" } ]
2009-07-28T00:00:00
[ [ "Gutman", "Igor", "" ], [ "Ezri", "Doron", "" ], [ "Wulich", "Dov", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.4531
Zhaohua Luo
Zhaohua Luo
Clone Theory and Algebraic Logic
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The concept of a clone is central to many branches of mathematics, such as universal algebra, algebraic logic, and lambda calculus. Abstractly a clone is a category with two objects such that one is a countably infinite power of the other. Left and right algebras over a clone are covariant and contravariant functors from the category to that of sets respectively. In this paper we show that first-order logic can be studied effectively using the notions of right and left algebras over a clone. It is easy to translate the classical treatment of logic into our setting and prove all the fundamental theorems of first-order theory algebraically.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 17:36:16 GMT" } ]
2009-07-28T00:00:00
[ [ "Luo", "Zhaohua", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.4547
EPTCS
Janusz Brzozowski
Quotient Complexity of Regular Languages
null
EPTCS 3, 2009, pp. 17-28
10.4204/EPTCS.3.2
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The past research on the state complexity of operations on regular languages is examined, and a new approach based on an old method (derivatives of regular expressions) is presented. Since state complexity is a property of a language, it is appropriate to define it in formal-language terms as the number of distinct quotients of the language, and to call it "quotient complexity". The problem of finding the quotient complexity of a language f(K,L) is considered, where K and L are regular languages and f is a regular operation, for example, union or concatenation. Since quotients can be represented by derivatives, one can find a formula for the typical quotient of f(K,L) in terms of the quotients of K and L. To obtain an upper bound on the number of quotients of f(K,L) all one has to do is count how many such quotients are possible, and this makes automaton constructions unnecessary. The advantages of this point of view are illustrated by many examples. Moreover, new general observations are presented to help in the estimation of the upper bounds on quotient complexity of regular operations.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 06:19:09 GMT" } ]
2009-07-28T00:00:00
[ [ "Brzozowski", "Janusz", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.4554
EPTCS
John Jack (Louisiana Tech University), Andrei Paun (Louisiana Tech University, INCDSB, UPM)
The Nondeterministic Waiting Time Algorithm: A Review
null
EPTCS 3, 2009, pp. 29-46
10.4204/EPTCS.3.3
null
cs.FL cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present briefly the Nondeterministic Waiting Time algorithm. Our technique for the simulation of biochemical reaction networks has the ability to mimic the Gillespie Algorithm for some networks and solutions to ordinary differential equations for other networks, depending on the rules of the system, the kinetic rates and numbers of molecules. We provide a full description of the algorithm as well as specifics on its implementation. Some results for two well-known models are reported. We have used the algorithm to explore Fas-mediated apoptosis models in cancerous and HIV-1 infected T cells.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 07:26:49 GMT" } ]
2009-07-28T00:00:00
[ [ "Jack", "John", "", "Louisiana Tech University" ], [ "Paun", "Andrei", "", "Louisiana Tech\n University, INCDSB, UPM" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0907.4561
York Sure
York Sure
Fact Sheet on Semantic Web
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The report gives an overview about activities on the topic Semantic Web. It has been released as technical report for the project "KTweb -- Connecting Knowledge Technologies Communities" in 2003.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 08:28:35 GMT" } ]
2009-07-28T00:00:00
[ [ "Sure", "York", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.4573
Gregory Gutin
Noga Alon, Gregory Gutin, Eun Jung Kim, Stefan Szeider, and Anders Yeo
Solving MAX-r-SAT Above a Tight Lower Bound
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an exact algorithm that decides, for every fixed $r \geq 2$ in time $O(m) + 2^{O(k^2)}$ whether a given multiset of $m$ clauses of size $r$ admits a truth assignment that satisfies at least $((2^r-1)m+k)/2^r$ clauses. Thus \textsc{Max-$r$-Sat} is fixed-parameter tractable when parameterized by the number of satisfied clauses above the tight lower bound $(1-2^{-r})m$. This solves an open problem of Mahajan et al. (J. Comput. System Sci., 75, 2009). Our algorithm is based on a polynomial-time data reduction procedure that reduces a problem instance to an equivalent algebraically represented problem with $O(k^2)$ variables. This is done by representing the instance as an appropriate polynomial, and by applying a probabilistic argument combined with some simple tools from Harmonic analysis to show that if the polynomial cannot be reduced to one of size $O(k^2)$, then there is a truth assignment satisfying the required number of clauses. We introduce a new notion of bikernelization from a parameterized problem to another one and apply it to prove that the above-mentioned parameterized \textsc{Max-$r$-Sat} admits a polynomial-size kernel. Combining another probabilistic argument with tools from graph matching theory and signed graphs, we show that if an instance of \textsc{Max-2-Sat} with $m$ clauses has at least $3k$ variables after application of certain polynomial time reduction rules to it, then there is a truth assignment that satisfies at least $(3m+k)/4$ clauses. We also outline how the fixed-parameter tractability and polynomial-size kernel results on \textsc{Max-$r$-Sat} can be extended to more general families of Boolean Constraint Satisfaction Problems.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 09:10:25 GMT" }, { "version": "v2", "created": "Tue, 28 Jul 2009 07:45:35 GMT" }, { "version": "v3", "created": "Thu, 5 Nov 2009 14:48:23 GMT" }, { "version": "v4", "created": "Mon, 22 Aug 2011 13:26:56 GMT" } ]
2011-08-23T00:00:00
[ [ "Alon", "Noga", "" ], [ "Gutin", "Gregory", "" ], [ "Kim", "Eun Jung", "" ], [ "Szeider", "Stefan", "" ], [ "Yeo", "Anders", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.4576
Elena Pribavkina
E. V. Pribavkina
Slowly synchronizing automata with zero and incomplete sets
9 pages, 6 figures
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using combinatorial properties of incomplete sets in a free monoid we construct a series of n-state deterministic automata with zero whose shortest synchronizing word has length n^2/4+n/2-1.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 09:19:56 GMT" } ]
2009-07-28T00:00:00
[ [ "Pribavkina", "E. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.4583
Fabien Durand
Fabien Durand (LAMFA), Michel Rigo
Syndeticity and independent substitutions
null
Advances in Applied Mathematics, 42 (2009) 1-22
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We associate in a canonical way a substitution to any abstract numeration system built on a regular language. In relationship with the growth order of the letters, we define the notion of two independent substitutions. Our main result is the following. If a sequence $x$ is generated by two independent substitutions, at least one being of exponential growth, then the factors of $x$ appearing infinitely often in $x$ appear with bounded gaps. As an application, we derive an analogue of Cobham's theorem for two independent substitutions (or abstract numeration systems) one with polynomial growth, the other being exponential.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 09:48:15 GMT" } ]
2009-07-28T00:00:00
[ [ "Durand", "Fabien", "", "LAMFA" ], [ "Rigo", "Michel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.4622
Rajkumar Buyya
Christian Vecchiola, Xingchen Chu, and Rajkumar Buyya
Aneka: A Software Platform for .NET-based Cloud Computing
30 pages, 10 figures
null
null
GRIDS-TR-2009-4, Grid Computing and Distributed Systems Laboratory, The University of Melbourne, Australia, May 25, 2009
cs.DC cs.CE cs.NI cs.OS cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Aneka is a platform for deploying Clouds developing applications on top of it. It provides a runtime environment and a set of APIs that allow developers to build .NET applications that leverage their computation on either public or private clouds. One of the key features of Aneka is the ability of supporting multiple programming models that are ways of expressing the execution logic of applications by using specific abstractions. This is accomplished by creating a customizable and extensible service oriented runtime environment represented by a collection of software containers connected together. By leveraging on these architecture advanced services including resource reservation, persistence, storage management, security, and performance monitoring have been implemented. On top of this infrastructure different programming models can be plugged to provide support for different scenarios as demonstrated by the engineering, life science, and industry applications.
[ { "version": "v1", "created": "Sun, 26 Jul 2009 02:19:42 GMT" } ]
2009-07-28T00:00:00
[ [ "Vecchiola", "Christian", "" ], [ "Chu", "Xingchen", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.4640
Keiko Nakata Dr
Keiko Nakata and Masahito Hasegawa
Small-step and big-step semantics for call-by-need
29 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present natural semantics for acyclic as well as cyclic call-by-need lambda calculi, which are proved equivalent to the reduction semantics given by Ariola and Felleisen. The natural semantics are big-step and use global heaps, where evaluation is suspended and memorized. The reduction semantics are small-step and evaluation is suspended and memorized locally in let-bindings. Thus two styles of formalization describe the call-by-need strategy from different angles. The natural semantics for the acyclic calculus is revised from the previous presentation by Maraist et al. and its adequacy is ascribed to its correspondence with the reduction semantics, which has been proved equivalent to call-by-name by Ariola and Felleisen. The natural semantics for the cyclic calculus is inspired by that of Launchbury and Sestoft and we state its adequacy using a denotational semantics in the style of Launchbury; adequacy of the reduction semantics for the cyclic calculus is in turn ascribed to its correspondence with the natural semantics.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 17:19:28 GMT" } ]
2009-07-28T00:00:00
[ [ "Nakata", "Keiko", "" ], [ "Hasegawa", "Masahito", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0907.4653
Yao Yu
Athina P. Petropulu, Yao Yu and H. Vincent Poor
Distributed MIMO radar using compressive sampling
null
Proc. 42th Asilomar Conf.Signals, Syst. Comput, pp. 203 - 207, Nov. 2008
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A distributed MIMO radar is considered, in which the transmit and receive antennas belong to nodes of a small scale wireless network. The transmit waveforms could be uncorrelated, or correlated in order to achieve a desirable beampattern. The concept of compressive sampling is employed at the receive nodes in order to perform direction of arrival (DOA) estimation. According to the theory of compressive sampling, a signal that is sparse in some domain can be recovered based on far fewer samples than required by the Nyquist sampling theorem. The DOAs of targets form a sparse vector in the angle space, and therefore, compressive sampling can be applied for DOA estimation. The proposed approach achieves the superior resolution of MIMO radar with far fewer samples than other approaches. This is particularly useful in a distributed scenario, in which the results at each receive node need to be transmitted to a fusion center.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 15:14:10 GMT" } ]
2009-07-28T00:00:00
[ [ "Petropulu", "Athina P.", "" ], [ "Yu", "Yao", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.4667
Narad Rampersad
Narad Rampersad
Further applications of a power series method for pattern avoidance
7 pages
null
null
null
math.CO cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In combinatorics on words, a word w over an alphabet Sigma is said to avoid a pattern p over an alphabet Delta if there is no factor x of w and no non-erasing morphism h from Delta^* to Sigma^* such that h(p) = x. Bell and Goh have recently applied an algebraic technique due to Golod to show that for a certain wide class of patterns p there are exponentially many words of length n over a 4-letter alphabet that avoid p. We consider some further consequences of their work. In particular, we show that any pattern with k variables of length at least 4^k is avoidable on the binary alphabet. This improves an earlier bound due to Cassaigne and Roth.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 15:43:38 GMT" } ]
2009-07-28T00:00:00
[ [ "Rampersad", "Narad", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.4697
Samir Saoudi
Samir Saoudi, Tarik Ait-Idir, and Yukou Mochida
Unsupervised and Non Parametric Iterative Soft Bit Error Rate Estimation for Any Communications System
This paper has been withdrawn by the author because it was not accepted as it is for publication in IEEE Transactions on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of unsupervised soft bit error rate (BER) estimation for any communications system, where no prior knowledge either about transmitted information bits, or the transceiver scheme is available. We show that the problem of BER estimation is equivalent to estimating the conditional probability density functions (pdf)s of soft channel/receiver outputs. Assuming that the receiver has no analytical model of soft observations, we propose a non parametric Kernel-based pdf estimation technique, and show that the resulting BER estimator is asymptotically unbiased and point-wise consistent. We then introduce an iterative Stochastic Expectation Maximization (EM) algorithm for the estimation of both a priori and a posteriori probabilities of transmitted information bits, and the classification of soft observations according to transmitted bit values. These inputs serve in the iterative Kernel-based estimation procedure of conditional pdfs. We analyze the performance of the proposed unsupervised and non parametric BER estimator in the framework of a multiuser code division multiple access (CDMA) system with single user detection, and show that attractive performance are achieved compared with conventional Monte Carlo (MC)-aided techniques.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 16:56:12 GMT" }, { "version": "v2", "created": "Mon, 23 Sep 2013 17:43:04 GMT" }, { "version": "v3", "created": "Wed, 25 Sep 2013 11:48:22 GMT" } ]
2013-09-26T00:00:00
[ [ "Saoudi", "Samir", "" ], [ "Ait-Idir", "Tarik", "" ], [ "Mochida", "Yukou", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.4705
Yao Yu
Yao Yu, Athina P.Petropulu and H. Vincent Poor
Compressive Sensing for MIMO Radar
null
Proc. IEEE International Conf. Acoust.Speech Signal Process, pp. 3017 - 3020, Apr. 2008
10.1109/ICASSP.2009.4960259
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-input multiple-output (MIMO) radar systems have been shown to achieve superior resolution as compared to traditional radar systems with the same number of transmit and receive antennas. This paper considers a distributed MIMO radar scenario, in which each transmit element is a node in a wireless network, and investigates the use of compressive sampling for direction-of-arrival (DOA) estimation. According to the theory of compressive sampling, a signal that is sparse in some domain can be recovered based on far fewer samples than required by the Nyquist sampling theorem. The DOA of targets form a sparse vector in the angle space, and therefore, compressive sampling can be applied for DOA estimation. The proposed approach achieves the superior resolution of MIMO radar with far fewer samples than other approaches. This is particularly useful in a distributed scenario, in which the results at each receive node need to be transmitted to a fusion center for further processing.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 17:08:32 GMT" } ]
2016-11-15T00:00:00
[ [ "Yu", "Yao", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.4740
Asif-ul Haque
Asif-ul Haque and Paul Ginsparg
Positional Effects on Citation and Readership in arXiv
28 pages, to appear in JASIST
JASIST 60, 2203-2218 (Nov 2009)
10.1002/asi.21166
null
cs.DL astro-ph.IM hep-ph hep-th physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
arXiv.org mediates contact with the literature for entire scholarly communities, both through provision of archival access and through daily email and web announcements of new materials, potentially many screenlengths long. We confirm and extend a surprising correlation between article position in these initial announcements, ordered by submission time, and later citation impact, due primarily to intentional "self-promotion" on the part of authors. A pure "visibility" effect was also present: the subset of articles accidentally in early positions fared measurably better in the long-term citation record than those lower down. Astrophysics articles announced in position 1, for example, overall received a median number of citations 83\% higher, while those there accidentally had a 44\% visibility boost. For two large subcommunities of theoretical high energy physics, hep-th and hep-ph articles announced in position 1 had median numbers of citations 50\% and 100\% larger than for positions 5--15, and the subsets there accidentally had visibility boosts of 38\% and 71\%. We also consider the positional effects on early readership. The median numbers of early full text downloads for astro-ph, hep-th, and hep-ph articles announced in position 1 were 82\%, 61\%, and 58\% higher than for lower positions, respectively, and those there accidentally had medians visibility-boosted by 53\%, 44\%, and 46\%. Finally, we correlate a variety of readership features with long-term citations, using machine learning methods, thereby extending previous results on the predictive power of early readership in a broader context. We conclude with some observations on impact metrics and dangers of recommender mechanisms.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 19:28:06 GMT" } ]
2011-02-01T00:00:00
[ [ "Haque", "Asif-ul", "" ], [ "Ginsparg", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Physics", "code": "hep-ph", "description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.", "span": "(High Energy Physics - Phenomenology)" }, { "class": "Physics", "code": "hep-th", "description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.", "span": "(High Energy Physics - Theory)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0907.4743
Ersin Uzun
Arun Kumar, Nitesh Saxena, Ersin Uzun
Alice Meets Bob: A Comparative Usability Study of Wireless Device Pairing Methods for a "Two-User" Setting
16 pages manuscript. Keywords: Wireless Security, Device Authentication, Pairing, Usability
null
null
null
cs.CR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When users want to establish wireless communication between/among their devices, the channel has to be bootstrapped first. To prevent any malicious control of or eavesdropping over the communication, the channel is desired to be authenticated and confidential. The process of setting up a secure communication channel between two previously unassociated devices is referred to as "Secure Device Pairing". When there is no prior security context, e.g., shared secrets, common key servers or public key certificates, device pairing requires user involvement into the process. The idea usually involves leveraging an auxiliary human-perceptible channel to authenticate the data exchanged over the insecure wireless channel. We observe that the focus of prior research has mostly been limited to pairing scenarios where a single user controls both the devices. In this paper, we consider more general and emerging "two-user" scenarios, where two different users establish pairing between their respective devices. Although a number of pairing methods exists in the literature, only a handful of those are applicable to the two-user setting. We present the first study to identify the methods practical for two-user pairing scenarios, and comparatively evaluate the usability of these methods. Our results identify methods best-suited for users, in terms of efficiency, error-tolerance and of course, usability. Our work sheds light on the applicability and usability of pairing methods for emerging two-user scenarios, a topic largely ignored so far.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 19:34:20 GMT" } ]
2009-07-28T00:00:00
[ [ "Kumar", "Arun", "" ], [ "Saxena", "Nitesh", "" ], [ "Uzun", "Ersin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0907.4760
Giovanni Pighizzini
Christel Baier (Technische Universit\"at Dresden), Nathalie Bertrand (INRIA Rennes) and Marcus Gr\"o{\ss}er (Technische Universit\"at Dresden)
Probabilistic Automata over Infinite Words: Expressiveness, Efficiency, and Decidability
null
EPTCS 3, 2009, pp. 3-16
10.4204/EPTCS.3.1
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Probabilistic omega-automata are variants of nondeterministic automata for infinite words where all choices are resolved by probabilistic distributions. Acceptance of an infinite input word can be defined in different ways: by requiring that (i) the probability for the accepting runs is positive (probable semantics), or (ii) almost all runs are accepting (almost-sure semantics), or (iii) the probability measure of the accepting runs is greater than a certain threshold (threshold semantics). The underlying notion of an accepting run can be defined as for standard omega-automata by means of a Buechi condition or other acceptance conditions, e.g., Rabin or Streett conditions. In this paper, we put the main focus on the probable semantics and provide a summary of the fundamental properties of probabilistic omega-automata concerning expressiveness, efficiency, and decision problems.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 01:20:51 GMT" } ]
2009-07-29T00:00:00
[ [ "Baier", "Christel", "", "Technische Universität Dresden" ], [ "Bertrand", "Nathalie", "", "INRIA Rennes" ], [ "Größer", "Marcus", "", "Technische Universität Dresden" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.4764
Farbod Shokrieh
Farbod Shokrieh
The monodromy pairing and discrete logarithm on the Jacobian of finite graphs
null
J. Math. Cryptol. 4 (2010), 43--56
10.1515/JMC.2010.002
null
math.CO cs.CR math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Every graph has a canonical finite abelian group attached to it. This group has appeared in the literature under a variety of names including the sandpile group, critical group, Jacobian group, and Picard group. The construction of this group closely mirrors the construction of the Jacobian variety of an algebraic curve. Motivated by this analogy, it was recently suggested by Norman Biggs that the critical group of a finite graph is a good candidate for doing discrete logarithm based cryptography. In this paper, we study a bilinear pairing on this group and show how to compute it. Then we use this pairing to find the discrete logarithm efficiently, thus showing that the associated cryptographic schemes are not secure. Our approach resembles the MOV attack on elliptic curves.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 20:36:21 GMT" }, { "version": "v2", "created": "Thu, 7 Jul 2011 09:12:28 GMT" } ]
2011-07-08T00:00:00
[ [ "Shokrieh", "Farbod", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0907.4775
Joshua Grochow
Lance Fortnow and Joshua A. Grochow
Complexity Classes of Equivalence Problems Revisited
21 pages
Information and Computation 209(4):748-763, April 2011
10.1016/j.ic.2011.01.006
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To determine if two lists of numbers are the same set, we sort both lists and see if we get the same result. The sorted list is a canonical form for the equivalence relation of set equality. Other canonical forms arise in graph isomorphism algorithms, and the equality of permutation groups given by generators. To determine if two graphs are cospectral (have the same eigenvalues), however, we compute their characteristic polynomials and see if they are the same; the characteristic polynomial is a complete invariant for the equivalence relation of cospectrality. This is weaker than a canonical form, and it is not known whether a polynomial-time canonical form for cospectrality exists. Note that it is a priori possible for an equivalence relation to be decidable in polynomial time without either a complete invariant or canonical form. Blass and Gurevich (SIAM J. Comput., 1984) ask whether these conditions on equivalence relations -- having an FP canonical form, having an FP complete invariant, and simply being in P -- are in fact different. They showed that this question requires non-relativizing techniques to resolve. Here we extend their results, and give new connections to probabilistic and quantum computation.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 21:30:02 GMT" }, { "version": "v2", "created": "Wed, 29 Jun 2011 04:42:54 GMT" } ]
2011-06-30T00:00:00
[ [ "Fortnow", "Lance", "" ], [ "Grochow", "Joshua A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.4803
Aram Galstyan
Armen E. Allahverdyan, Greg Ver Steeg, and Aram Galstyan
Community Detection with and without Prior Information
6 pages, 2 figures
Europhysics Letters 90, p.18002, 2010
10.1209/0295-5075/90/18002
null
physics.soc-ph cond-mat.stat-mech cs.CY physics.data-an q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of graph partitioning, or clustering, in sparse networks with prior information about the clusters. Specifically, we assume that for a fraction $\rho$ of the nodes their true cluster assignments are known in advance. This can be understood as a semi--supervised version of clustering, in contrast to unsupervised clustering where the only available information is the graph structure. In the unsupervised case, it is known that there is a threshold of the inter--cluster connectivity beyond which clusters cannot be detected. Here we study the impact of the prior information on the detection threshold, and show that even minute [but generic] values of $\rho>0$ shift the threshold downwards to its lowest possible value. For weighted graphs we show that a small semi--supervising can be used for a non-trivial definition of communities.
[ { "version": "v1", "created": "Mon, 27 Jul 2009 23:53:28 GMT" }, { "version": "v2", "created": "Tue, 5 Oct 2010 19:00:29 GMT" } ]
2010-10-06T00:00:00
[ [ "Allahverdyan", "Armen E.", "" ], [ "Steeg", "Greg Ver", "" ], [ "Galstyan", "Aram", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0907.4810
Robert Grossman
Robert Grossman, Yunhong Gu, Michal Sabala, Collin Bennet, Jonathan Seidman and Joe Mambratti
The Open Cloud Testbed: A Wide Area Testbed for Cloud Computing Utilizing High Performance Network Services
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, a number of cloud platforms and services have been developed for data intensive computing, including Hadoop, Sector, CloudStore (formerly KFS), HBase, and Thrift. In order to benchmark the performance of these systems, to investigate their interoperability, and to experiment with new services based on flexible compute node and network provisioning capabilities, we have designed and implemented a large scale testbed called the Open Cloud Testbed (OCT). Currently the OCT has 120 nodes in four data centers: Baltimore, Chicago (two locations), and San Diego. In contrast to other cloud testbeds, which are in small geographic areas and which are based on commodity Internet services, the OCT is a wide area testbed and the four data centers are connected with a high performance 10Gb/s network, based on a foundation of dedicated lightpaths. This testbed can address the requirements of extremely large data streams that challenge other types of distributed infrastructure. We have also developed several utilities to support the development of cloud computing systems and services, including novel node and network provisioning services, a monitoring system, and a RPC system. In this paper, we describe the OCT architecture and monitoring system. We also describe some benchmarks that we developed and some interoperability studies we performed using these benchmarks.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 00:54:23 GMT" } ]
2009-07-29T00:00:00
[ [ "Grossman", "Robert", "" ], [ "Gu", "Yunhong", "" ], [ "Sabala", "Michal", "" ], [ "Bennet", "Collin", "" ], [ "Seidman", "Jonathan", "" ], [ "Mambratti", "Joe", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.4815
Amit Narayanan
Amit Narayanan
A Survey on BGP Issues and Solutions
null
null
null
Rep0352009
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
BGP is the de facto protocol used for inter-autonomous system routing in the Internet. Generally speaking, BGP has been proven to be secure, efficient, scalable, and robust. However, with the rapid evolving of the Internet in the past few decades, there are increasing concerns about BGS's ability to meet the needs of the Internet routing. There are two major limitations of BGP which are its failure to address several key security issues, and some operational related problems. The design and ubiquity of BGP have complicated past efforts at securing inter-domain routing. This paper surveys the past work related to BGP security and operational issues. We explore the limitations and advantages of proposed solutions in these two limitations.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 01:11:56 GMT" } ]
2009-07-29T00:00:00
[ [ "Narayanan", "Amit", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4852
Oded Kafri
Oded Kafri
The Distributions in Nature and Entropy Principle
19 pages 5 figures
null
null
null
cs.DM physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The derivation of the maximum entropy distribution of particles in boxes yields two kinds of distributions: a "bell-like" distribution and a long-tail distribution. The first one is obtained when the ratio between particles and boxes is low, and the second one - when the ratio is high. The obtained long tail distribution yields correctly the empirical Zipf law, Pareto's 20:80 rule and Benford's law. Therefore, it is concluded that the long tail and the "bell-like" distributions are outcomes of the tendency of statistical systems to maximize entropy.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 07:34:37 GMT" } ]
2009-07-29T00:00:00
[ [ "Kafri", "Oded", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0907.4870
K. P. Naveen
K. P. Naveen and A. Kumar
Tunable locally-optimal geographical forwarding in wireless sensor networks with sleep-wake cycling nodes
13 Pages, 6 Figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a wireless sensor network whose main function is to detect certain infrequent alarm events, and to forward alarm packets to a base station, using geographical forwarding. The nodes know their locations, and they sleep-wake cycle, waking up periodically but not synchronously. In this situation, when a node has a packet to forward to the sink, there is a trade-off between how long this node waits for a suitable neighbor to wake up and the progress the packet makes towards the sink once it is forwarded to this neighbr. Hence, in choosing a relay node, we consider the problem of minimizing average delay subject to a constraint on the average progress. By constraint relaxation, involving a Lagrange multiplier, we formulate this next hop relay selection problem as a Markov decision process (MDP). The exact optimal solution (BF (Best Forward)) can be found, but is computationally intensive. Next, we consider a mathematically simplified model for which the optimal policy (SF (Simplified Forward)) turns out to be a simple one-step-look-ahead rule. Simulations show that SF is very close in performance to BF, even for reasonably small node density. We then study the end-to-end performance of SF in comparison with two extremal policies: Max Forward (MF), which makes the maximum possible progress per hop and thus reduces network energy consumption, and First Forward (FF), which forwards the packet to the first node to wake up, and thus tends to make end-to-end forwarding delays small. We find that, with appropriate choice of one hop average progress constraint, SF can be tuned to provide a favorable trade-off between end-to-end packet delay and the number of hops in the forwarding path.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 09:37:48 GMT" }, { "version": "v2", "created": "Fri, 31 Jul 2009 11:31:02 GMT" }, { "version": "v3", "created": "Mon, 21 Dec 2009 08:45:37 GMT" } ]
2009-12-21T00:00:00
[ [ "Naveen", "K. P.", "" ], [ "Kumar", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4876
Rajkumar Buyya
Mukaddim Pathan and Rajkumar Buyya
Architecture and Performance Models for QoS-Driven Effective Peering of Content Delivery Networks
31 pages, 19 figures
Multiagent and Grid Systems, Volume 5, Number 2, Pages: 165-195, ISSN: 1574-1702, IOS Press, Amsterdam, The Netherlands, July 2009
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The proprietary nature of existing Content Delivery Networks (CDNs) means they are closed and do not naturally cooperate. A CDN is expected to provide high performance Internet content delivery through global coverage, which might be an obstacle for new CDN providers, as well as affecting commercial viability of existing ones. Finding ways for distinct CDNs to coordinate and cooperate with other CDNs is necessary to achieve better overall service, as perceived by end-users, at lower cost. In this paper, we present an architecture to support peering arrangements between CDNs, based on a Virtual Organization (VO) model. Our approach promotes peering among providers, while upholding user perceived performance. This is achieved through proper policy management of negotiated Service Level Agreements (SLAs) between peers. We also present a Quality of Service (QoS)-driven performance modeling approach for peering CDNs in order to predict the user perceived performance. We show that peering between CDNs upholds user perceived performance by satisfying the target QoS. The methodology presented in this paper provides CDNs a way to dynamically distribute user requests to other peers according to different request-redirection policies. The model-based approach helps an overloaded CDN to return to a normal state by offloading excess requests to the peers. It also assists in making concrete QoS guarantee for a CDN provider. Our approach endeavors to achieve scalability and resource sharing among CDNs through effective peering in a user transparent manner, thus evolving past the current landscape where non-cooperative and distinct CDNs exist.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 10:02:15 GMT" } ]
2009-07-29T00:00:00
[ [ "Pathan", "Mukaddim", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4877
Liang Xiao
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication
5 pages, 10 figures, ICC
ICC, pp. 4646-4651, Glasgow, Scotland, Jun. 2007
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the fact that, in a typically rich scattering environment, the radio channel response decorrelates quite rapidly in space. Specifically, we describe a physical-layer algorithm that combines channel probing (M complex frequency response samples over a bandwidth W) with hypothesis testing to determine whether current and prior communication attempts are made by the same user (same channel response). In this way, legitimate users can be reliably authenticated and false users can be reliably detected. To evaluate the feasibility of our algorithm, we simulate spatially variable channel responses in real environments using the WiSE ray-tracing tool; and we analyze the ability of a receiver to discriminate between transmitters (users) based on their channel frequency responses in a given office environment. For several rooms in the extremities of the building we considered, we have confirmed the efficacy of our approach under static channel conditions. For example, measuring five frequency response samples over a bandwidth of 100 MHz and using a transmit power of 100 mW, valid users can be verified with 99% confidence while rejecting false users with greater than 95% confidence.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 12:53:17 GMT" } ]
2009-07-29T00:00:00
[ [ "Xiao", "Liang", "" ], [ "Greenstein", "Larry", "" ], [ "Mandayam", "Narayan", "" ], [ "Trappe", "Wade", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.4878
Rajkumar Buyya
Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros
Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities
11 pages, 11 figures
Proceedings of the 7th High Performance Computing and Simulation (HPCS 2009) Conference, Leipzig, Germany, June 21 - 24, 2009
null
null
cs.DC cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cloud computing aims to power the next generation data centers and enables application service providers to lease data center capabilities for deploying applications depending on user QoS (Quality of Service) requirements. Cloud applications have different composition, configuration, and deployment requirements. Quantifying the performance of resource allocation policies and application scheduling algorithms at finer details in Cloud computing environments for different application and service models under varying load, energy performance (power consumption, heat dissipation), and system size is a challenging problem to tackle. To simplify this process, in this paper we propose CloudSim: an extensible simulation toolkit that enables modelling and simulation of Cloud computing environments. The CloudSim toolkit supports modelling and creation of one or more virtual machines (VMs) on a simulated node of a Data Center, jobs, and their mapping to suitable VMs. It also allows simulation of multiple Data Centers to enable a study on federation and associated policies for migration of VMs for reliability and automatic scaling of applications.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 10:11:58 GMT" } ]
2009-07-29T00:00:00
[ [ "Buyya", "Rajkumar", "" ], [ "Ranjan", "Rajiv", "" ], [ "Calheiros", "Rodrigo N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.4881
Vipin M
Vipin M, Mohamed Imran K R
Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe
8 pages, 5 figures
null
null
null
cs.NI cs.PF
http://creativecommons.org/licenses/by-nc-sa/3.0/
In this article we propose a method for measuring internet connection stability which is fast and has negligible overhead for the process of its complexity. This method finds a relative value for representing the stability of internet connections and can also be extended for aggregated internet connections. The method is documented with help of a real time implementation and results are shared. This proposed measurement scheme uses HTTP GET method for each connections. The normalized responses to identified sites like gateways of ISPs, google.com etc are used for calculating current link stability. The novelty of the approach is that historic values are used to calculate overall link stability. In this discussion, we also document a method to use the calculated values as a dynamic threshold metric. This is used in routing decisions and for load-balancing each of the connections in an aggregated bandwidth pipe. This scheme is a very popular practice in aggregated internet connections.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 10:29:31 GMT" } ]
2009-07-29T00:00:00
[ [ "M", "Vipin", "" ], [ "R", "Mohamed Imran K", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0907.4885
Mark Flanagan
Mark F. Flanagan, Enrico Paolini, Marco Chiani, and Marc P. C. Fossorier
Growth Rate of the Weight Distribution of Doubly-Generalized LDPC Codes: General Case and Efficient Evaluation
6 pages, 1 figure. Proc. IEEE Globecom 2009, Hawaii, USA, November 30 - December 4, 2009
null
10.1109/GLOCOM.2009.5426116
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The growth rate of the weight distribution of irregular doubly-generalized LDPC (D-GLDPC) codes is developed and in the process, a new efficient numerical technique for its evaluation is presented. The solution involves simultaneous solution of a 4 x 4 system of polynomial equations. This represents the first efficient numerical technique for exact evaluation of the growth rate, even for LDPC codes. The technique is applied to two example D-GLDPC code ensembles.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 10:57:21 GMT" } ]
2016-11-18T00:00:00
[ [ "Flanagan", "Mark F.", "" ], [ "Paolini", "Enrico", "" ], [ "Chiani", "Marco", "" ], [ "Fossorier", "Marc P. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.4908
Liang Xiao
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
MIMO-Assisted Channel-Based Authentication in Wireless Networks
5 pages, 6 figures, CISS
Proc. Conference on Information Sciences and Systems (CISS), pp. 642-646, Princeton, NJ, Mar. 2008
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose a MIMO-assisted channel-based authentication scheme, exploiting current channel estimation mechanisms in MIMO systems to detect spoofing attacks with very low overhead. In this scheme, the use of multiple antennas provides extra dimensions of channel estimation data, and thus leads to a "security gain" over single-input single-output (SISO) systems. We investigate the security gain of MIMO systems in several system configurations via simulations for a specific real indoor environment using ray-tracing software. We also discuss the effect of increasing the number of transmit and receive antennas on the security gain and contrast that to the diversity/multiplexing gain.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 13:04:44 GMT" } ]
2009-07-29T00:00:00
[ [ "Xiao", "Liang", "" ], [ "Greenstein", "Larry", "" ], [ "Mandayam", "Narayan", "" ], [ "Trappe", "Wade", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.4919
Liang Xiao
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
Using the Physical Layer for Wireless Authentication in Time-Variant Channels
10 pages, 6 figures
IEEE Transactions on Wireless Communications, vol. 7, pp. 2571-2579, Jul. 2008
10.1109/TWC.2008.070194
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to exploit the spatial variability of the radio channel response in a rich scattering environment, as is typical of indoor environments. Specifically, we describe a physical-layer authentication algorithm that utilizes channel probing and hypothesis testing to determine whether current and prior communication attempts are made by the same transmit terminal. In this way, legitimate users can be reliably authenticated and false users can be reliably detected. We analyze the ability of a receiver to discriminate between transmitters (users) according to their channel frequency responses. This work is based on a generalized channel response with both spatial and temporal variability, and considers correlations among the time, frequency and spatial domains. Simulation results, using the ray-tracing tool WiSE to generate the time-averaged response, verify the efficacy of the approach under realistic channel conditions, as well as its capability to work under unknown channel variations.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 13:56:58 GMT" } ]
2016-11-18T00:00:00
[ [ "Xiao", "Liang", "" ], [ "Greenstein", "Larry", "" ], [ "Mandayam", "Narayan", "" ], [ "Trappe", "Wade", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.4957
Maurice Margenstern
Maurice Margenstern
Iterative pushdown automata and hyperbolic contour words
15 pages, 6 figures
null
null
null
cs.CG cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give an application of iterated pushdown automata to contour words of balls and two other domains in infinitely many tilings of the hyperbolic plane. We also give a similar application for the tiling {5,3,4} of the hyperbolic 3D space and for the tiling {5,3,3,4} of the hyperbolic 4D space as well.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 17:16:45 GMT" } ]
2009-07-29T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.4960
Muthiah Annamalai
Muthiah Annamalai
Ezhil: A Tamil Programming Language
6 pages, Tamil UTF-8 characters
null
null
null
cs.PL cs.CL
http://creativecommons.org/licenses/by/3.0/
Ezhil is a Tamil language based interpreted procedural programming language. Tamil keywords and grammar are chosen to make the native Tamil speaker write programs in the Ezhil system. Ezhil allows easy representation of computer program closer to the Tamil language logical constructs equivalent to the conditional, branch and loop statements in modern English based programming languages. Ezhil is a compact programming language aimed towards Tamil speaking novice computer users. Grammar for Ezhil and a few example programs are reported here, from the initial proof-of-concept implementation using the Python programming language1. To the best of our knowledge, Ezhil language is the first freely available Tamil programming language.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 19:24:51 GMT" } ]
2009-07-29T00:00:00
[ [ "Annamalai", "Muthiah", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0907.4984
R Doomun
Yousra Ben Jemaa, Sana Khanfir
Automatic local Gabor Features extraction for face recognition
7 pages, International Journal of Computer Science and Information Security, IJCSIS, Impact Factor 0.423
IJCSIS July 2009, Volume 3, ISSN 1947 5500
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present in this paper a biometric system of face detection and recognition in color images. The face detection technique is based on skin color information and fuzzy classification. A new algorithm is proposed in order to detect automatically face features (eyes, mouth and nose) and extract their correspondent geometrical points. These fiducial points are described by sets of wavelet components which are used for recognition. To achieve the face recognition, we use neural networks and we study its performances for different inputs. We compare the two types of features used for recognition: geometric distances and Gabor coefficients which can be used either independently or jointly. This comparison shows that Gabor coefficients are more powerful than geometric distances. We show with experimental results how the importance recognition ratio makes our system an effective tool for automatic face detection and recognition.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 20:02:15 GMT" } ]
2009-07-30T00:00:00
[ [ "Jemaa", "Yousra Ben", "" ], [ "Khanfir", "Sana", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.4994
R Doomun
R.K.Pateriya, J.L.Rana, S.C. Shrivastava, Jaideep Patel
A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption
5 pages, International Journal of Computer Science and Information Security, IJCSIS, Impact Factor 0.423
IJCSIS July 2009, Volume 3, ISSN 1947 5500
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement in performance of ssl tls servers can be done. The proposed algorithm should provide the reasonable response time and optimizes server performance significantly. At Encryption side, to withstand many attacks like brute force attack, subtle attack etc. we also adapted a parameter generation method, which sieve all the parameters strictly, and filter out every insecure parameter.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 20:17:04 GMT" } ]
2009-07-30T00:00:00
[ [ "Pateriya", "R. K.", "" ], [ "Rana", "J. L.", "" ], [ "Shrivastava", "S. C.", "" ], [ "Patel", "Jaideep", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.4996
Lun Dong
Lun Dong, Zhu Han, Athina P. Petropulu and H. Vincent Poor
Cooperative Jamming for Wireless Physical Layer Security
4 pages, 3 figures, in Proceedings of IEEE Workshop on Statistical Signal Processing (SSP 2009), Cardiff, Wales, UK, Aug. - Sept. 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperative jamming is an approach that has been recently proposed for improving physical layer based security for wireless networks in the presence of an eavesdropper. While the source transmits its message to its destination, a relay node transmits a jamming signal to create interference at the eavesdropper. In this paper, a scenario in which the relay is equipped with multiple antennas is considered. A novel system design is proposed for determining the antenna weights and transmit power of source and relay, so that the system secrecy rate is maximized subject to a total transmit power constraint, or, the transmit power is minimized subject to a secrecy rate constraint. Since the optimal solutions to these problems are difficult to obtain, suboptimal closed-form solutions are proposed that introduce an additional constraint, i.e., the complete nulling of jamming signal at the destination.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 20:46:23 GMT" } ]
2009-07-30T00:00:00
[ [ "Dong", "Lun", "" ], [ "Han", "Zhu", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5016
Hurlee Gonchigdanzan Dr.
Hurlee Gonchigdanzan
How much does a Hamiltonian cycle weigh?
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate how much Hamiltonian cycles weigh in K_4 and K_5 compare to the total weight of the graph and establish precise estimates.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 22:47:01 GMT" }, { "version": "v2", "created": "Thu, 30 Jul 2009 00:13:38 GMT" } ]
2009-07-30T00:00:00
[ [ "Gonchigdanzan", "Hurlee", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.5024
Aris L. Moustakas
P. Kazakopoulos, P. Mertikopoulos, A. L. Moustakas and G. Caire
Living at the Edge: A Large Deviations Approach to the Outage MIMO Capacity
Accepted for publication, IEEE Transactions on Information Theory (2010). Part of this work appears in the Proc. IEEE Information Theory Workshop, June 2009, Volos, Greece
IEEE Transactions on Information Theory, vol. 57, no 4, p. 1984, April 2011
10.1109/TIT.2011.2112050
null
cs.IT cond-mat.stat-mech math.IT stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using a large deviations approach we calculate the probability distribution of the mutual information of MIMO channels in the limit of large antenna numbers. In contrast to previous methods that only focused at the distribution close to its mean (thus obtaining an asymptotically Gaussian distribution), we calculate the full distribution, including its tails which strongly deviate from the Gaussian behavior near the mean. The resulting distribution interpolates seamlessly between the Gaussian approximation for rates $R$ close to the ergodic value of the mutual information and the approach of Zheng and Tse for large signal to noise ratios $\rho$. This calculation provides us with a tool to obtain outage probabilities analytically at any point in the $(R, \rho, N)$ parameter space, as long as the number of antennas $N$ is not too small. In addition, this method also yields the probability distribution of eigenvalues constrained in the subspace where the mutual information per antenna is fixed to $R$ for a given $\rho$. Quite remarkably, this eigenvalue density is of the form of the Marcenko-Pastur distribution with square-root singularities, and it depends on the values of $R$ and $\rho$.
[ { "version": "v1", "created": "Tue, 28 Jul 2009 23:41:51 GMT" }, { "version": "v2", "created": "Thu, 14 Oct 2010 12:34:53 GMT" } ]
2016-11-18T00:00:00
[ [ "Kazakopoulos", "P.", "" ], [ "Mertikopoulos", "P.", "" ], [ "Moustakas", "A. L.", "" ], [ "Caire", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0907.5030
Terence H. Chan
Terence Chan, Alex Grant and Doris Kern
Existence of new inequalities for representable polymatroids
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An Ingletonian polymatroid satisfies, in addition to the polymatroid axioms, the inequalities of Ingleton (Combin. Math. Appln., 1971). These inequalities are required for a polymatroid to be representable. It is has been an open question as to whether these inequalities are also sufficient. Representable polymatroids are of interest in their own right. They also have a strong connection to network coding. In particular, the problem of finding the linear network coding capacity region is equivalent to the characterization of all representable, entropic polymatroids. In this paper, we describe a new approach to adhere two polymatroids together to produce a new polymatroid. Using this approach, we can construct a polymatroid that is not inside the minimal closed and convex cone containing all representable polymatroids. This polymatroid is proved to satisfy not only the Ingleton inequalities, but also the recently reported inequalities of Dougherty, Freiling and Zeger. A direct consequence is that these inequalities are not sufficient to characterize representable polymatroids.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 05:06:50 GMT" }, { "version": "v2", "created": "Sat, 19 Sep 2009 00:50:49 GMT" } ]
2009-09-21T00:00:00
[ [ "Chan", "Terence", "" ], [ "Grant", "Alex", "" ], [ "Kern", "Doris", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5032
Shai Haim
Shai Haim and Toby Walsh
Restart Strategy Selection using Machine Learning Techniques
14 pages, 4 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Restart strategies are an important factor in the performance of conflict-driven Davis Putnam style SAT solvers. Selecting a good restart strategy for a problem instance can enhance the performance of a solver. Inspired by recent success applying machine learning techniques to predict the runtime of SAT solvers, we present a method which uses machine learning to boost solver performance through a smart selection of the restart strategy. Based on easy to compute features, we train both a satisfiability classifier and runtime models. We use these models to choose between restart strategies. We present experimental results comparing this technique with the most commonly used restart strategies. Our results demonstrate that machine learning is effective in improving solver performance.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 01:21:36 GMT" } ]
2009-07-30T00:00:00
[ [ "Haim", "Shai", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.5033
Shai Haim
Shai Haim and Toby Walsh
Online Search Cost Estimation for SAT Solvers
8 pages, 9 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present two different methods for estimating the cost of solving SAT problems. The methods focus on the online behaviour of the backtracking solver, as well as the structure of the problem. Modern SAT solvers present several challenges to estimate search cost including coping with nonchronological backtracking, learning and restarts. Our first method adapt an existing algorithm for estimating the size of a search tree to deal with these challenges. We then suggest a second method that uses a linear model trained on data gathered online at the start of search. We compare the effectiveness of these two methods using random and structured problems. We also demonstrate that predictions made in early restarts can be used to improve later predictions. We conclude by showing that the cost of solving a set of problems can be reduced by selecting a solver from a portfolio based on such cost estimations.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 01:30:53 GMT" } ]
2009-07-30T00:00:00
[ [ "Haim", "Shai", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.5038
Yi Li
Yi Li
An Explicit Construction of Gauss-Jordan Elimination Matrix
null
null
null
null
cs.SC cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A constructive approach to get the reduced row echelon form of a given matrix $A$ is presented. It has been shown that after the $k$th step of the Gauss-Jordan procedure, each entry $a^k_{ij}(i<>j; j > k)$ in the new matrix $A^k$ can always be expressed as a ratio of two determinants whose entries are from the original matrix $A$. The new method also gives a more general generalization of Cramer's rule than existing methods.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 02:01:45 GMT" } ]
2009-07-30T00:00:00
[ [ "Li", "Yi", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0907.5043
Zhi-Qiang Jiang
Zhi-Qiang Jiang (ECUST), Wei-Xing Zhou (ECUST), Qun-Zhao Tan (SNDA)
Online-offline activities and game-playing behaviors of avatars in a massive multiplayer online role-playing game
6 EPL pages including 10 eps figures
EPL 88, 48007 (2009)
10.1209/0295-5075/88/48007
null
physics.pop-ph cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Massive multiplayer online role-playing games (MMORPGs) are very popular in China, which provides a potential platform for scientific research. We study the online-offline activities of avatars in an MMORPG to understand their game-playing behavior. The statistical analysis unveils that the active avatars can be classified into three types. The avatars of the first type are owned by game cheaters who go online and offline in preset time intervals with the online duration distributions dominated by pulses. The second type of avatars is characterized by a Weibull distribution in the online durations, which is confirmed by statistical tests. The distributions of online durations of the remaining individual avatars differ from the above two types and cannot be described by a simple form. These findings have potential applications in the game industry.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 05:34:18 GMT" } ]
2009-12-04T00:00:00
[ [ "Jiang", "Zhi-Qiang", "", "ECUST" ], [ "Zhou", "Wei-Xing", "", "ECUST" ], [ "Tan", "Qun-Zhao", "", "SNDA" ] ]
[ { "class": "Physics", "code": "physics.pop-ph", "description": "Description coming soon", "span": "(Popular Physics)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0907.5055
Giovanni Pighizzini
Fevzi Belli and Mutlu Beyazit
Mutation of Directed Graphs -- Corresponding Regular Expressions and Complexity of Their Generation
null
EPTCS 3, 2009, pp. 69-77
10.4204/EPTCS.3.6
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Directed graphs (DG), interpreted as state transition diagrams, are traditionally used to represent finite-state automata (FSA). In the context of formal languages, both FSA and regular expressions (RE) are equivalent in that they accept and generate, respectively, type-3 (regular) languages. Based on our previous work, this paper analyzes effects of graph manipulations on corresponding RE. In this present, starting stage we assume that the DG under consideration contains no cycles. Graph manipulation is performed by deleting or inserting of nodes or arcs. Combined and/or multiple application of these basic operators enable a great variety of transformations of DG (and corresponding RE) that can be seen as mutants of the original DG (and corresponding RE). DG are popular for modeling complex systems; however they easily become intractable if the system under consideration is complex and/or large. In such situations, we propose to switch to corresponding RE in order to benefit from their compact format for modeling and algebraic operations for analysis. The results of the study are of great potential interest to mutation testing.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 06:53:16 GMT" } ]
2009-07-30T00:00:00
[ [ "Belli", "Fevzi", "" ], [ "Beyazit", "Mutlu", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5058
EPTCS
Marco Almeida (LIACC-U.Porto), Nelma Moreira (LIACC-U.Porto), Rog\'erio Reis (LIACC-U.Porto)
Testing the Equivalence of Regular Languages
null
EPTCS 3, 2009, pp. 47-57
10.4204/EPTCS.3.4
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimal deterministic finite automaton is generally used to determine regular languages equality. Antimirov and Mosses proposed a rewrite system for deciding regular expressions equivalence of which Almeida et al. presented an improved variant. Hopcroft and Karp proposed an almost linear algorithm for testing the equivalence of two deterministic finite automata that avoids minimisation. In this paper we improve the best-case running time, present an extension of this algorithm to non-deterministic finite automata, and establish a relationship between this algorithm and the one proposed in Almeida et al. We also present some experimental comparative results. All these algorithms are closely related with the recent coalgebraic approach to automata proposed by Rutten.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 07:44:15 GMT" } ]
2009-07-30T00:00:00
[ [ "Almeida", "Marco", "", "LIACC-U.Porto" ], [ "Moreira", "Nelma", "", "LIACC-U.Porto" ], [ "Reis", "Rogério", "", "LIACC-U.Porto" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5063
EPTCS
Hermann Gruber, Markus Holzer, Martin Kutrib
On Measuring Non-Recursive Trade-Offs
null
EPTCS 3, 2009, pp. 141-150
10.4204/EPTCS.3.13
null
cs.FL cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the phenomenon of non-recursive trade-offs between descriptional systems in an abstract fashion. We aim at categorizing non-recursive trade-offs by bounds on their growth rate, and show how to deduce such bounds in general. We also identify criteria which, in the spirit of abstract language theory, allow us to deduce non-recursive tradeoffs from effective closure properties of language families on the one hand, and differences in the decidability status of basic decision problems on the other. We develop a qualitative classification of non-recursive trade-offs in order to obtain a better understanding of this very fundamental behaviour of descriptional systems.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:43:02 GMT" } ]
2009-07-30T00:00:00
[ [ "Gruber", "Hermann", "" ], [ "Holzer", "Markus", "" ], [ "Kutrib", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5072
EPTCS
Galina Jir\'askov\'a (Slovak Academy of Sciences), Alexander Okhotin (University of Turku)
Nondeterministic State Complexity of Positional Addition
null
EPTCS 3, 2009, pp. 151-161
10.4204/EPTCS.3.14
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider nondeterministic finite automata recognizing base-k positional notation of numbers. Assume that numbers are read starting from their least significant digits. It is proved that if two sets of numbers S and T are represented by nondeterministic automata of m and n states, respectively, then their sum {s+t | s in S, t in T} is represented by a nondeterministic automaton with 2mn+2m+2n+1 states. Moreover, this number of states is necessary in the worst case for all k>=9.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:48:23 GMT" } ]
2009-07-30T00:00:00
[ [ "Jirásková", "Galina", "", "Slovak Academy of Sciences" ], [ "Okhotin", "Alexander", "", "University of Turku" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5074
Marcello M. Bersani
Marcello M. Bersani, Carlo A. Furia, Matteo Pradella, and Matteo Rossi
Integrated Modeling and Verification of Real-Time Systems through Multiple Paradigms
27 pages
Proceedings of the 7th IEEE International Conference on Software Engineering and Formal Methods (SEFM'09). Pgg. 13--22, IEEE Computer Society Press, November 2009
10.1109/SEFM.2009.16
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex systems typically have many different parts and facets, with different characteristics. In a multi-paradigm approach to modeling, formalisms with different natures are used in combination to describe complementary parts and aspects of the system. This can have a beneficial impact on the modeling activity, as different paradigms an be better suited to describe different aspects of the system. While each paradigm provides a different view on the many facets of the system, it is of paramount importance that a coherent comprehensive model emerges from the combination of the various partial descriptions. In this paper we present a technique to model different aspects of the same system with different formalisms, while keeping the various models tightly integrated with one another. In addition, our approach leverages the flexibility provided by a bounded satisfiability checker to encode the verification problem of the integrated model in the propositional satisfiability (SAT) problem; this allows users to carry out formal verification activities both on the whole model and on parts thereof. The effectiveness of the approach is illustrated through the example of a monitoring system.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 09:21:45 GMT" } ]
2013-08-14T00:00:00
[ [ "Bersani", "Marcello M.", "" ], [ "Furia", "Carlo A.", "" ], [ "Pradella", "Matteo", "" ], [ "Rossi", "Matteo", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.5083
EPTCS
M. Sakthi Balan (Infosys)
Serializing the Parallelism in Parallel Communicating Pushdown Automata Systems
null
EPTCS 3, 2009, pp. 59-68
10.4204/EPTCS.3.5
null
cs.FL cs.CL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider parallel communicating pushdown automata systems (PCPA) and define a property called known communication for it. We use this property to prove that the power of a variant of PCPA, called returning centralized parallel communicating pushdown automata (RCPCPA), is equivalent to that of multi-head pushdown automata. The above result presents a new sub-class of returning parallel communicating pushdown automata systems (RPCPA) called simple-RPCPA and we show that it can be written as a finite intersection of multi-head pushdown automata systems.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 09:45:32 GMT" } ]
2009-07-30T00:00:00
[ [ "Balan", "M. Sakthi", "", "Infosys" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.5096
Adrien Richard
Adrien Richard
Negative circuits and sustained oscillations in asynchronous automata networks
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The biologist Ren\'e Thomas conjectured, twenty years ago, that the presence of a negative feedback circuit in the interaction graph of a dynamical system is a necessary condition for this system to produce sustained oscillations. In this paper, we state and prove this conjecture for asynchronous automata networks, a class of discrete dynamical systems extensively used to model the behaviors of gene networks. As a corollary, we obtain the following fixed point theorem: given a product $X$ of $n$ finite intervals of integers, and a map $F$ from $X$ to itself, if the interaction graph associated with $F$ has no negative circuit, then $F$ has at least one fixed point.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 10:40:12 GMT" } ]
2009-07-30T00:00:00
[ [ "Richard", "Adrien", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.5111
EPTCS
Franziska Biegler, Mark Daley, Ian McQuillan
On the Shuffle Automaton Size for Words
null
EPTCS 3, 2009, pp. 79-89
10.4204/EPTCS.3.7
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the state size of DFAs accepting the shuffle of two words. We provide words u and v, such that the minimal DFA for u shuffled with v requires an exponential number of states. We also show some conditions for the words u and v which ensure a quadratic upper bound on the state size of u shuffled with v. Moreover, switching only two letters within one of u or v is enough to trigger the change from quadratic to exponential.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:11:50 GMT" } ]
2009-07-30T00:00:00
[ [ "Biegler", "Franziska", "" ], [ "Daley", "Mark", "" ], [ "McQuillan", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.5119
EPTCS
Erzs\'ebet Csuhaj-Varj\'u, Gy\"orgy Vaszil
On the Size Complexity of Non-Returning Context-Free PC Grammar Systems
null
EPTCS 3, 2009, pp. 91-100
10.4204/EPTCS.3.8
null
cs.FL cs.DC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Improving the previously known best bound, we show that any recursively enumerable language can be generated with a non-returning parallel communicating (PC) grammar system having six context-free components. We also present a non-returning universal PC grammar system generating unary languages, that is, a system where not only the number of components, but also the number of productions and the number of nonterminals are limited by certain constants, and these size parameters do not depend on the generated language.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:20:17 GMT" } ]
2009-07-30T00:00:00
[ [ "Csuhaj-Varjú", "Erzsébet", "" ], [ "Vaszil", "György", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.5120
EPTCS
Rudolf Freund, Andreas Klein, Martin Kutrib
On the Number of Membranes in Unary P Systems
null
EPTCS 3, 2009, pp. 101-109
10.4204/EPTCS.3.9
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider P systems with a linear membrane structure working on objects over a unary alphabet using sets of rules resembling homomorphisms. Such a restricted variant of P systems allows for a unique minimal representation of the generated unary language and in that way for an effective solution of the equivalence problem. Moreover, we examine the descriptional complexity of unary P systems with respect to the number of membranes.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:25:02 GMT" } ]
2009-07-30T00:00:00
[ [ "Freund", "Rudolf", "" ], [ "Klein", "Andreas", "" ], [ "Kutrib", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5121
EPTCS
Pierluigi Frisco (Heriot-Watt University), Oscar H. Ibarra (University of California)
On Languages Accepted by P/T Systems Composed of joins
null
EPTCS 3, 2009, pp. 111-120
10.4204/EPTCS.3.10
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, some studies linked the computational power of abstract computing systems based on multiset rewriting to models of Petri nets and the computation power of these nets to their topology. In turn, the computational power of these abstract computing devices can be understood by just looking at their topology, that is, information flow. Here we continue this line of research introducing J languages and proving that they can be accepted by place/transition systems whose underlying net is composed only of joins. Moreover, we investigate how J languages relate to other families of formal languages. In particular, we show that every J language can be accepted by a log n space-bounded non-deterministic Turing machine with a one-way read-only input. We also show that every J language has a semilinear Parikh map and that J languages and context-free languages (CFLs) are incomparable.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:29:45 GMT" } ]
2009-07-30T00:00:00
[ [ "Frisco", "Pierluigi", "", "Heriot-Watt University" ], [ "Ibarra", "Oscar H.", "", "University\n of California" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5124
EPTCS
Yuan Gao, Sheng Yu
State Complexity Approximation
null
EPTCS 3, 2009, pp. 121-130
10.4204/EPTCS.3.11
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we introduce the new concept of state complexity approximation, which is a further development of state complexity estimation. We show that this new concept is useful in both of the following two cases: the exact state complexities are not known and the state complexities have been obtained but are in incomprehensible form.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:34:34 GMT" } ]
2009-07-30T00:00:00
[ [ "Gao", "Yuan", "" ], [ "Yu", "Sheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5125
Florent Jacquemard
Florent Jacquemard (INRIA Saclay - Ile de France), Michael Rusinowitch (INRIA Lorraine - LORIA / LIFC)
Rewrite based Verification of XML Updates
null
null
null
RR-7007
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider problems of access control for update of XML documents. In the context of XML programming, types can be viewed as hedge automata, and static type checking amounts to verify that a program always converts valid source documents into also valid output documents. Given a set of update operations we are particularly interested by checking safety properties such as preservation of document types along any sequence of updates. We are also interested by the related policy consistency problem, that is detecting whether a sequence of authorized operations can simulate a forbidden one. We reduce these questions to type checking problems, solved by computing variants of hedge automata characterizing the set of ancestors and descendants of the initial document type for the closure of parameterized rewrite rules.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:34:50 GMT" } ]
2009-07-30T00:00:00
[ [ "Jacquemard", "Florent", "", "INRIA Saclay - Ile de France" ], [ "Rusinowitch", "Michael", "", "INRIA Lorraine - LORIA / LIFC" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0907.5126
John Panaretos
John Panaretos, Chrisovaladis Malesios
A population-modulated bibliometric measure with an application in the field of statistics
null
null
null
null
stat.AP cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use confirmatory factor analysis to derive a unifying measure of comparison of scientists based on bibliometric measurements, by utilizing the h-index, some similar h-type indices as well as other common measures of scientific performance. We use a real data example from nine well-known departments of statistics to demonstrate our approach and argue that our combined measure results in a better overall evaluation of a researchers' scientific work.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:38:55 GMT" }, { "version": "v2", "created": "Wed, 5 Aug 2009 08:08:54 GMT" } ]
2009-08-05T00:00:00
[ [ "Panaretos", "John", "" ], [ "Malesios", "Chrisovaladis", "" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0907.5127
EPTCS
Viliam Geffert, Lubom\'ira I\v{s}to\v{n}ov\'a
Translation from Classical Two-Way Automata to Pebble Two-Way Automata
null
EPTCS 3, 2009, pp. 131-140
10.4204/EPTCS.3.12
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the relation between the standard two-way automata and more powerful devices, namely, two-way finite automata with an additional "pebble" movable along the input tape. Similarly as in the case of the classical two-way machines, it is not known whether there exists a polynomial trade-off, in the number of states, between the nondeterministic and deterministic pebble two-way automata. However, we show that these two machine models are not independent: if there exists a polynomial trade-off for the classical two-way automata, then there must also exist a polynomial trade-off for the pebble two-way automata. Thus, we have an upward collapse (or a downward separation) from the classical two-way automata to more powerful pebble automata, still staying within the class of regular languages. The same upward collapse holds for complementation of nondeterministic two-way machines. These results are obtained by showing that each pebble machine can be, by using suitable inputs, simulated by a classical two-way automaton with a linear number of states (and vice versa), despite the existing exponential blow-up between the classical and pebble two-way machines.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:39:09 GMT" } ]
2009-07-30T00:00:00
[ [ "Geffert", "Viliam", "" ], [ "Ištoňová", "Lubomíra", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5128
EPTCS
Martin Kutrib, Andreas Malcher
Bounded Languages Meet Cellular Automata with Sparse Communication
null
EPTCS 3, 2009, pp. 163-172
10.4204/EPTCS.3.15
null
cs.FL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cellular automata are one-dimensional arrays of interconnected interacting finite automata. We investigate one of the weakest classes, the real-time one-way cellular automata, and impose an additional restriction on their inter-cell communication by bounding the number of allowed uses of the links between cells. Moreover, we consider the devices as acceptors for bounded languages in order to explore the borderline at which non-trivial decidability problems of cellular automata classes become decidable. It is shown that even devices with drastically reduced communication, that is, each two neighboring cells may communicate only constantly often, accept bounded languages that are not semilinear. If the number of communications is at least logarithmic in the length of the input, several problems are undecidable. The same result is obtained for classes where the total number of communications during a computation is linearly bounded.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:52:28 GMT" } ]
2009-07-30T00:00:00
[ [ "Kutrib", "Martin", "" ], [ "Malcher", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0907.5130
EPTCS
Remco Loos, Florin Manea, Victor Mitrana
Small Universal Accepting Networks of Evolutionary Processors with Filtered Connections
null
EPTCS 3, 2009, pp. 173-182
10.4204/EPTCS.3.16
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present some results regarding the size complexity of Accepting Networks of Evolutionary Processors with Filtered Connections (ANEPFCs). We show that there are universal ANEPFCs of size 10, by devising a method for simulating 2-Tag Systems. This result significantly improves the known upper bound for the size of universal ANEPFCs which is 18. We also propose a new, computationally and descriptionally efficient simulation of nondeterministic Turing machines by ANEPFCs. More precisely, we describe (informally, due to space limitations) how ANEPFCs with 16 nodes can simulate in O(f(n)) time any nondeterministic Turing machine of time complexity f(n). Thus the known upper bound for the number of nodes in a network simulating an arbitrary Turing machine is decreased from 26 to 16.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 13:57:19 GMT" } ]
2009-07-30T00:00:00
[ [ "Loos", "Remco", "" ], [ "Manea", "Florin", "" ], [ "Mitrana", "Victor", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.5132
EPTCS
Tom\'a\v{s} Masopust, Alexander Meduna
Descriptional Complexity of Three-Nonterminal Scattered Context Grammars: An Improvement
null
EPTCS 3, 2009, pp. 183-192
10.4204/EPTCS.3.17
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, it has been shown that every recursively enumerable language can be generated by a scattered context grammar with no more than three nonterminals. However, in that construction, the maximal number of nonterminals simultaneously rewritten during a derivation step depends on many factors, such as the cardinality of the alphabet of the generated language and the structure of the generated language itself. This paper improves the result by showing that the maximal number of nonterminals simultaneously rewritten during any derivation step can be limited by a small constant regardless of other factors.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 14:00:56 GMT" } ]
2009-07-30T00:00:00
[ [ "Masopust", "Tomáš", "" ], [ "Meduna", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5136
EPTCS
Ralf Stiebe, Sherzod Turaev
Capacity Bounded Grammars and Petri Nets
null
EPTCS 3, 2009, pp. 193-203
10.4204/EPTCS.3.18
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A capacity bounded grammar is a grammar whose derivations are restricted by assigning a bound to the number of every nonterminal symbol in the sentential forms. In the paper the generative power and closure properties of capacity bounded grammars and their Petri net controlled counterparts are investigated.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 14:16:33 GMT" } ]
2009-07-30T00:00:00
[ [ "Stiebe", "Ralf", "" ], [ "Turaev", "Sherzod", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0907.5138
Benoit Kloeckner
Benoit Kloeckner (IF)
Cutwidth and degeneracy of graphs
v2: slightly shortened, some typos corrected.
null
null
IF_PREPUB
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove an inequality involving the degeneracy, the cutwidth and the sparsity of graphs. It implies a quadratic lower bound on the cutwidth in terms of the degeneracy for all graphs and an improvement of it for clique-free graphs.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 14:09:22 GMT" }, { "version": "v2", "created": "Fri, 29 Oct 2010 15:51:59 GMT" } ]
2010-11-01T00:00:00
[ [ "Kloeckner", "Benoit", "", "IF" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.5141
Haipeng Zheng
Haipeng Zheng, Sanjeev R. Kulkarni, H. Vincent Poor
Cooperative Training for Attribute-Distributed Data: Trade-off Between Data Transmission and Performance
null
Proceedings of IEEE Fusion 2009
null
null
cs.DC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a modeling framework for distributed regression with agents/experts observing attribute-distributed data (heterogeneous data). Under this model, a new algorithm, the iterative covariance optimization algorithm (ICOA), is designed to reshape the covariance matrix of the training residuals of individual agents so that the linear combination of the individual estimators minimizes the ensemble training error. Moreover, a scheme (Minimax Protection) is designed to provide a trade-off between the number of data instances transmitted among the agents and the performance of the ensemble estimator without undermining the convergence of the algorithm. This scheme also provides an upper bound (with high probability) on the test error of the ensemble estimator. The efficacy of ICOA combined with Minimax Protection and the comparison between the upper bound and actual performance are both demonstrated by simulations.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 14:20:08 GMT" } ]
2009-07-30T00:00:00
[ [ "Zheng", "Haipeng", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.5155
Ching-an Hsiao
C. A. Hsiao
On Classification from Outlier View
Conclusion renewed; IAENG International Journal of Computer Science, Volume 37, Issue 4, Nov, 2010
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Classification is the basis of cognition. Unlike other solutions, this study approaches it from the view of outliers. We present an expanding algorithm to detect outliers in univariate datasets, together with the underlying foundation. The expanding algorithm runs in a holistic way, making it a rather robust solution. Synthetic and real data experiments show its power. Furthermore, an application for multi-class problems leads to the introduction of the oscillator algorithm. The corresponding result implies the potential wide use of the expanding algorithm.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 15:47:33 GMT" }, { "version": "v2", "created": "Fri, 31 Jul 2009 14:17:30 GMT" }, { "version": "v3", "created": "Fri, 24 Jun 2011 13:53:49 GMT" }, { "version": "v4", "created": "Mon, 2 Jan 2012 15:19:41 GMT" } ]
2012-01-04T00:00:00
[ [ "Hsiao", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0907.5162
Anya Tafliovich
Anya Tafliovich and Eric C. R. Hehner
Programming with Quantum Communication
null
null
null
null
cs.PL cs.LO quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work develops a formal framework for specifying, implementing, and analysing quantum communication protocols. We provide tools for developing simple proofs and analysing programs which involve communication, both via quantum channels and exhibiting the LOCC (local operations, classical communication) paradigm.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 15:38:02 GMT" } ]
2009-07-30T00:00:00
[ [ "Tafliovich", "Anya", "" ], [ "Hehner", "Eric C. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0907.5165
Oliver Johnson
Oliver Johnson, Matthew Aldridge, Robert Piechocki
Interference alignment-based sum capacity bounds for random dense Gaussian interference networks
23 pages
IEEE Transactions on Information Theory, 57:1, 282-290, 2011
10.1109/TIT.2010.2090242
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a dense $K$ user Gaussian interference network formed by paired transmitters and receivers placed independently at random in a fixed spatial region. Under natural conditions on the node position distributions and signal attenuation, we prove convergence in probability of the average per-user capacity $\csum/K$ to $\half \ep \log(1 + 2 \SNR)$. The achievability result follows directly from results based on an interference alignment scheme presented in recent work of Nazer et al. Our main contribution comes through an upper bound, motivated by ideas of `bottleneck capacity' developed in recent work of Jafar. By controlling the physical location of transmitter--receiver pairs, we can match a large proportion of these pairs to form so-called $\epsilon$-bottleneck links, with consequent control of the sum capacity.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 15:47:48 GMT" } ]
2011-09-12T00:00:00
[ [ "Johnson", "Oliver", "" ], [ "Aldridge", "Matthew", "" ], [ "Piechocki", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5168
Haipeng Zheng
Haipeng Zheng, Sanjeev R. Kulkarni and H. Vincent Poor
Collaborative Training in Sensor Networks: A graphical model approach
null
Proceedings of IEEE International Workshop on Machine Learning for Signal Processing, 2009
10.1109/MLSP.2009.5306188
null
cs.DC cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Graphical models have been widely applied in solving distributed inference problems in sensor networks. In this paper, the problem of coordinating a network of sensors to train a unique ensemble estimator under communication constraints is discussed. The information structure of graphical models with specific potential functions is employed, and this thus converts the collaborative training task into a problem of local training plus global inference. Two important classes of algorithms of graphical model inference, message-passing algorithm and sampling algorithm, are employed to tackle low-dimensional, parametrized and high-dimensional, non-parametrized problems respectively. The efficacy of this approach is demonstrated by concrete examples.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 15:59:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Zheng", "Haipeng", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0907.5219
Shahar Dobzinski
Shahar Dobzinski
A Note on the Power of Truthful Approximation Mechanisms
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the power of polynomial-time truthful mechanisms comparing to polynomial time (non-truthful) algorithms. We show that there is a setting in which deterministic polynomial-time truthful mechanisms cannot guarantee a bounded approximation ratio, but a non-truthful FPTAS exists. We also show that in the same setting there is a universally truthful mechanism that provides an approximation ratio of 2. This shows that the cost of truthfulness is unbounded. The proofs are almost standard in the field and follow from known results.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 09:18:31 GMT" }, { "version": "v2", "created": "Mon, 24 Aug 2009 15:41:55 GMT" } ]
2009-08-24T00:00:00
[ [ "Dobzinski", "Shahar", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.5226
Subhash Kak
Subhash Kak
Recursive Random Number Generator Using Prime Reciprocals
4 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A recursive random number generator using prime reciprocals is described.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 21:54:34 GMT" } ]
2009-07-31T00:00:00
[ [ "Kak", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.5233
Sean McPherson
Sean McPherson, Antonio Ortega
Analysis of Internet Measurement Systems for Optimized Anomaly Detection System Design
18 Pages, 10 Figures
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Although there exist very accurate hardware systems for measuring traffic on the internet, their widespread use for analysis tasks is limited by their high cost. On the other hand, less expensive, software-based systems exist that are widely available and can be used to perform a number of simple analysis tasks. The caveat with using such software systems is that application of standard analysis methods cannot proceed blindly because inherent distortions exist in the measurements obtained from software systems. The goal of this paper is to analyze common Internet measurement systems to discover the effect of these distortions on common analysis tasks. Then by selecting one specific task, periodic signal detection, a more in-depth analysis is conducted which derives a signal representation to capture the salient features of the measurement and develops a periodic detection mechanism designed for the measurement system which outperforms an existing detection method not optimized for the measurement system. Finally, through experiments the importance of understanding the relationship between the input traffic, measurement system configuration and detection method performance is emphasized.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 23:20:21 GMT" } ]
2009-07-31T00:00:00
[ [ "McPherson", "Sean", "" ], [ "Ortega", "Antonio", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.5234
Kalyana Babu Nakshatrala
K. B. Nakshatrala and K. R. Rajagopal
A numerical study of fluids with pressure dependent viscosity flowing through a rigid porous medium
null
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider modifications to Darcy's equation wherein the drag coefficient is a function of pressure, which is a realistic model for technological applications like enhanced oil recovery and geological carbon sequestration. We first outline the approximations behind Darcy's equation and the modifications that we propose to Darcy's equation, and derive the governing equations through a systematic approach using mixture theory. We then propose a stabilized mixed finite element formulation for the modified Darcy's equation. To solve the resulting nonlinear equations we present a solution procedure based on the consistent Newton-Raphson method. We solve representative test problems to illustrate the performance of the proposed stabilized formulation. One of the objectives of this paper is also to show that the dependence of viscosity on the pressure can have a significant effect both on the qualitative and quantitative nature of the solution.
[ { "version": "v1", "created": "Wed, 29 Jul 2009 23:22:24 GMT" }, { "version": "v2", "created": "Thu, 8 Apr 2010 22:12:47 GMT" } ]
2010-04-12T00:00:00
[ [ "Nakshatrala", "K. B.", "" ], [ "Rajagopal", "K. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0907.5257
EPTCS
J\"urgen Dassow, Giovanni Pighizzini, Bianca Truthe
Proceedings Eleventh International Workshop on Descriptional Complexity of Formal Systems
null
EPTCS 3, 2009
10.4204/EPTCS.3
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The 11th workshop, Descriptional Complexity of Formal Systems 2009, is taking place in Magdeburg, Germany, on July 6-9, 2009. It is jointly organized by the IFIP Working Group 1.2 on Descriptional Complexity and by the Faculty of Computer Science at the Otto von Guericke University Magdeburg. This volume contains the papers of the invited lectures and the accepted contributions.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 05:21:51 GMT" } ]
2010-02-23T00:00:00
[ [ "Dassow", "Jürgen", "" ], [ "Pighizzini", "Giovanni", "" ], [ "Truthe", "Bianca", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.5269
Dennis Luxen
Robert Geisberger, Dennis Luxen, Sabine Neubauer, Peter Sanders, Lars Volker
Fast Detour Computation for Ride Sharing
5 pages, 2 figure environment, 4 includegraphics
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Todays ride sharing services still mimic a better billboard. They list the offers and allow to search for the source and target city, sometimes enriched with radial search. So finding a connection between big cities is quite easy. These places are on a list of designated origin and distination points. But when you want to go from a small town to another small town, even when they are next to a freeway, you run into problems. You can't find offers that would or could pass by the town easily with little or no detour. We solve this interesting problem by presenting a fast algorithm that computes the offers with the smallest detours w.r.t. a request. Our experiments show that the problem is efficiently solvable in times suitable for a web service implementation. For realistic database size we achieve lookup times of about 5ms and a matching rate of 90% instead of just 70% for the simple matching algorithms used today.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 11:31:05 GMT" } ]
2009-07-31T00:00:00
[ [ "Geisberger", "Robert", "" ], [ "Luxen", "Dennis", "" ], [ "Neubauer", "Sabine", "" ], [ "Sanders", "Peter", "" ], [ "Volker", "Lars", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.5287
Cristina Fern\'andez-C\'ordoba
J. Borges, C. Fernandez-Cordoba, J. Rifa
Propelinear structure of Z_{2k}-linear codes
null
Electronic Notes in Discrete Mathematics, Volume 10, November 2001, Pages 100-102
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let C be an additive subgroup of $\Z_{2k}^n$ for any $k\geq 1$. We define a Gray map $\Phi:\Z_{2k}^n \longrightarrow \Z_2^{kn}$ such that $\Phi(\codi)$ is a binary propelinear code and, hence, a Hamming-compatible group code. Moreover, $\Phi$ is the unique Gray map such that $\Phi(C)$ is Hamming-compatible group code. Using this Gray map we discuss about the nonexistence of 1-perfect binary mixed group code.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 09:26:55 GMT" } ]
2009-07-31T00:00:00
[ [ "Borges", "J.", "" ], [ "Fernandez-Cordoba", "C.", "" ], [ "Rifa", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5290
Alexander Shkotin
Alex Shkotin
Program structure
22 pages, 4 figures
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A program is usually represented as a word chain. It is exactly a word chain that appears as the lexical analyzer output and is parsed. The work shows that a program can be syntactically represented as an oriented word tree, that is a syntactic program tree, program words being located both in tree nodes and on tree arrows. The basic property of a tree is that arrows starting from each node are marked by different words (including an empty word). Semantics can then be directly specified on such tree using either requirements or additional links, and adding instructions to some tree nodes enables program execution specification.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 09:33:53 GMT" }, { "version": "v2", "created": "Thu, 22 Mar 2012 18:58:15 GMT" } ]
2012-03-23T00:00:00
[ [ "Shkotin", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0907.5321
Tomoya Sakai
Tomoya Sakai
Multiple pattern classification by sparse subspace decomposition
8 pages, 3 figures, 2nd IEEE International Workshop on Subspace Methods, Workshop Proceedings of ICCV 2009
null
10.1109/ICCVW.2009.5457702
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A robust classification method is developed on the basis of sparse subspace decomposition. This method tries to decompose a mixture of subspaces of unlabeled data (queries) into class subspaces as few as possible. Each query is classified into the class whose subspace significantly contributes to the decomposed subspace. Multiple queries from different classes can be simultaneously classified into their respective classes. A practical greedy algorithm of the sparse subspace decomposition is designed for the classification. The present method achieves high recognition rate and robust performance exploiting joint sparsity.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 12:23:25 GMT" }, { "version": "v2", "created": "Tue, 4 Aug 2009 06:01:53 GMT" } ]
2016-11-17T00:00:00
[ [ "Sakai", "Tomoya", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0907.5372
Barry Wittman
Greg N. Frederickson, Barry Wittman
Speedup in the Traveling Repairman Problem with Unit Time Windows
16 pages, 3 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The input to the unrooted traveling repairman problem is an undirected metric graph and a subset of nodes, each of which has a time window of unit length. Given that a repairman can start at any location, the goal is to plan a route that visits as many nodes as possible during their respective time windows. A polynomial-time bicriteria approximation algorithm is presented for this problem, gaining an increased fraction of repairman visits for increased speedup of repairman motion. For speedup $s$, we find a $6\gamma/(s + 1)$-approximation for $s$ in the range $1 \leq s \leq 2$ and a $4\gamma/s$-approximation for $s$ in the range $2 \leq s \leq 4$, where $\gamma = 1$ on tree-shaped networks and $\gamma = 2 + \epsilon$ on general metric graphs.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 16:30:15 GMT" } ]
2009-07-31T00:00:00
[ [ "Frederickson", "Greg N.", "" ], [ "Wittman", "Barry", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.5388
Aylin Yener
Xiang He and Aylin Yener
Providing Secrecy With Structured Codes: Tools and Applications to Two-User Gaussian Channels
50 pages. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent results have shown that structured codes can be used to construct good channel codes, source codes and physical layer network codes for Gaussian channels. For Gaussian channels with secrecy constraints, however, efforts to date rely on random codes. In this work, we advocate that structured codes are useful for providing secrecy, and show how to compute the secrecy rate when structured codes are used. In particular, we solve the problem of bounding equivocation rates with one important class of structured codes, i.e., nested lattice codes. Having established this result, we next demonstrate the use of structured codes for secrecy in two-user Gaussian channels. In particular, with structured codes, we prove that a positive secure degree of freedom is achievable for a large class of fully connected Gaussian channels as long as the channel is not degraded. By way of this, for these channels, we establish that structured codes outperform Gaussian random codes at high SNR. This class of channels include the two-user multiple access wiretap channel, the two-user interference channel with confidential messages and the two-user interference wiretap channel. A notable consequence of this result is that, unlike the case with Gaussian random codes, using structured codes for both transmission and cooperative jamming, it is possible to achieve an arbitrary large secrecy rate given enough power.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 18:28:27 GMT" } ]
2009-07-31T00:00:00
[ [ "He", "Xiang", "" ], [ "Yener", "Aylin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5397
Divyanshu Vats
Divyanshu Vats, Jose M. F. Moura
Telescoping Recursive Representations and Estimation of Gauss-Markov Random Fields
To appear in the Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 57, no. 3, pp 1645-1663, March 2011
10.1109/TIT.2011.2104612
null
cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present \emph{telescoping} recursive representations for both continuous and discrete indexed noncausal Gauss-Markov random fields. Our recursions start at the boundary (a hypersurface in $\R^d$, $d \ge 1$) and telescope inwards. For example, for images, the telescoping representation reduce recursions from $d = 2$ to $d = 1$, i.e., to recursions on a single dimension. Under appropriate conditions, the recursions for the random field are linear stochastic differential/difference equations driven by white noise, for which we derive recursive estimation algorithms, that extend standard algorithms, like the Kalman-Bucy filter and the Rauch-Tung-Striebel smoother, to noncausal Markov random fields.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 19:10:53 GMT" }, { "version": "v2", "created": "Mon, 22 Feb 2010 02:17:38 GMT" }, { "version": "v3", "created": "Thu, 12 Aug 2010 17:20:17 GMT" }, { "version": "v4", "created": "Mon, 20 Dec 2010 00:33:30 GMT" } ]
2015-03-13T00:00:00
[ [ "Vats", "Divyanshu", "" ], [ "Moura", "Jose M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]