id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0907.4180
|
Rafiq Saleh
|
Vitaliy Kurlin, Alexei Lisitsa, Igor Potapov and Rafiq Saleh
|
On Descriptional Complexity of the Planarity Problem for Gauss Words
| null | null | null | null |
cs.FL cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate the descriptional complexity of knot theoretic
problems and show upper bounds for planarity problem of signed and unsigned
knot diagrams represented by Gauss words. Since a topological equivalence of
knots can involve knot diagrams with arbitrarily many crossings then Gauss
words will be considered as strings over an infinite (unbounded) alphabet. For
establishing the upper bounds on recognition of knot properties, we study these
problems in a context of automata models over an infinite alphabet.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 11:25:07 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Kurlin",
"Vitaliy",
""
],
[
"Lisitsa",
"Alexei",
""
],
[
"Potapov",
"Igor",
""
],
[
"Saleh",
"Rafiq",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.4230
|
Klara Stokes
|
Maria Bras-Amor\'os and Klara Stokes
|
The Semigroup of Combinatorial Configurations
|
Title changed, article shortened
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A (v,b,r,k) combinatorial configuration is a (r,k)-biregular bipartite graph
with v vertices on the left and b vertices on the right and with no cycle of
length 4. Combinatorial configurations have become very important for some
cryptographic applications to sensor networks and to peer-to-peer communities.
Configurable tuples are those tuples (v,b,r,k) for which a (v,b,r,k)
combinatorial configuration exists. It is proved in this work that the set of
configurable tuples with fixed r and k has the structure of a numerical
semigroup. The numerical semigroup is completely described for r=2 and r=3.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 07:05:46 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Sep 2009 11:02:50 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Dec 2010 12:16:56 GMT"
}
] | 2010-12-24T00:00:00 |
[
[
"Bras-Amorós",
"Maria",
""
],
[
"Stokes",
"Klara",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.4251
|
Lin Dai
|
Tony T. Lee and Lin Dai
|
Buffered Aloha with K-Exponential Backoff -- Part I: Stability and
Throughput Analysis
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This two-part paper series studies the performance of buffered Aloha networks
with K-Exponential Backoff collision resolution algorithms. Part I focuses on
stability and throughput analysis and Part II presents the delay analysis.
In Part I, the buffered Aloha network is modeled as a multi-queue
single-server system. We adopt a widely used approach in packet switching
systems to decompose the multi-queue system into independent first-in-first-out
(FIFO) queues, which are hinged together by the probability of success of
head-of-line (HOL) packets. A unified method is devised to tackle the stability
and throughput problems of K-Exponential Backoff with any cutoff phase K. We
demonstrate that a network with K-Exponential Backoff can be stabilized if the
retransmission factor q is properly selected. The stable region of q is
characterized and illustrated via examples of Geometric Retransmission (K=1)
and Exponential Backoff (K=infinity). With an increasing number of nodes n, we
show that the stable region of Geometric Retransmission rapidly shrinks, and
vanishes as n goes to infinity. In contrast, the stable region of Exponential
Backoff does not vary with the network population n, implying that a stable
throughput can be achieved in networks with Exponential Backoff even with an
infinite number of nodes. All the analytical results presented in this paper
series are verified by simulations.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 10:20:50 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Lee",
"Tony T.",
""
],
[
"Dai",
"Lin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4254
|
Lin Dai
|
Lin Dai and Tony T. Lee
|
Buffered Aloha with K-Exponential Backoff -- Part II: Delay Analysis
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the delay analysis for buffered Aloha networks with
K-Exponential Backoff. Mean access delay and mean queueing delay are derived
and demonstrated via the examples of Geometric Retransmission (K=1) and
Exponential Backoff (K=infinity). The comparison shows that higher delay is
incurred with Geometric Retransmission when the aggregate input rate is small,
and the delay gap is enlarged as the number of nodes n increases. With a high
traffic input rate, however, the delay performance with Exponential Backoff
severely deteriorates. The mean queueing delay will be unbounded if the
aggregate input rate exceeds 0.3.
We also extend the analysis to the contention-window-based backoff model
which is widely adopted in practical MAC protocols. It will be revealed that
both the retransmission-probability-based and the contention-window-based
models exhibit the same stable region and achieve similar queueing performance
in most cases, which justifies the intuition that was taken but remained
unverified in previous studies: the retransmission-probability-based backoff
model can serve as a good approximation of the contention-window-based one.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 10:26:05 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Dai",
"Lin",
""
],
[
"Lee",
"Tony T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4273
|
Berndt Gammel
|
Berndt M. Gammel and Stefan Mangard
|
On the Duality of Probing and Fault Attacks
| null |
Cryptology ePrint Archive, Report 2009/352
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we investigate the problem of simultaneous privacy and integrity
protection in cryptographic circuits. We consider a white-box scenario with a
powerful, yet limited attacker. A concise metric for the level of probing and
fault security is introduced, which is directly related to the capabilities of
a realistic attacker. In order to investigate the interrelation of probing and
fault security we introduce a common mathematical framework based on the
formalism of information and coding theory. The framework unifies the known
linear masking schemes. We proof a central theorem about the properties of
linear codes which leads to optimal secret sharing schemes. These schemes
provide the lower bound for the number of masks needed to counteract an
attacker with a given strength. The new formalism reveals an intriguing duality
principle between the problems of probing and fault security, and provides a
unified view on privacy and integrity protection using error detecting codes.
Finally, we introduce a new class of linear tamper-resistant codes. These are
eligible to preserve security against an attacker mounting simultaneous probing
and fault attacks.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 12:49:11 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Gammel",
"Berndt M.",
""
],
[
"Mangard",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.4283
|
Stephan Kreutzer
|
Anuj Dawar and Stephan Kreutzer
|
Domination Problems in Nowhere-Dense Classes of Graphs
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the parameterized complexity of generalisations and variations
of the dominating set problem on classes of graphs that are nowhere dense. In
particular, we show that the distance-d dominating-set problem, also known as
the (k,d)-centres problem, is fixed-parameter tractable on any class that is
nowhere dense and closed under induced subgraphs. This generalises known
results about the dominating set problem on H-minor free classes, classes with
locally excluded minors and classes of graphs of bounded expansion. A key
feature of our proof is that it is based simply on the fact that these graph
classes are uniformly quasi-wide, and does not rely on a structural
decomposition. Our result also establishes that the distance-d dominating-set
problem is FPT on classes of bounded expansion, answering a question of Ne{\v
s}et{\v{r}}il and Ossona de Mendez.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 13:26:45 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Dawar",
"Anuj",
""
],
[
"Kreutzer",
"Stephan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.4296
|
Pascal Caron
|
Pascal Caron and Marianne Flouret
|
Algorithms for Glushkov K-graphs
|
31 pages, 20 figures, 1 table
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The automata arising from the well known conversion of regular expression to
non deterministic automata have rather particular transition graphs. We refer
to them as the Glushkov graphs, to honour his nice expression-to-automaton
algorithmic short cut (On a synthesis algorithm for abstract automata, Ukr.
Matem. Zhurnal, 12(2):147-156, 1960, In Russian). The Glushkov graphs have been
characterized (P. Caron and D. Ziadi, Characterization of Glushkov automata.
Theoret. Comput. Sci., 233(1-2):75-90, 2000) in terms of simple graph
theoretical properties and certain reduction rules. We show how to carry, under
certain restrictions, this characterization over to the weighted Glushkov
graphs. With the weights in a semiring K, they are defined as the transition
Glushkov K-graphs of the Weighted Finite Automata (WFA) obtained by the
generalized Glushkov construction (P. Caron and M. Flouret, Glushkov
construction for series: the non commutative case, Internat. J. Comput. Math.,
80(4):457-472, 2003) from the K-expressions. It works provided that the
semiring K is factorial and the K-expressions are in the so called star normal
form (SNF) of Bruggeman-Klein (Regular expressions into finite automata,
Theoret. Comput. Sci., 120(2):197-213, 1993) The restriction to the factorial
semiring ensures to obtain algorithms. The restriction to the SNF would not be
necessary if every K-expressions were equivalent to some with the same litteral
length, as it is the case for the boolean semiring B but remains an open
question for a general K.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 15:22:46 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Nov 2011 14:22:53 GMT"
}
] | 2011-11-22T00:00:00 |
[
[
"Caron",
"Pascal",
""
],
[
"Flouret",
"Marianne",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.4311
|
Leah Epstein
|
Leah Epstein, Elena Kleiman and Julian Mestre
|
Parametric packing of selfish items and the subset sum algorithm
| null | null | null | null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The subset sum algorithm is a natural heuristic for the classical Bin Packing
problem: In each iteration, the algorithm finds among the unpacked items, a
maximum size set of items that fits into a new bin. More than 35 years after
its first mention in the literature, establishing the worst-case performance of
this heuristic remains, surprisingly, an open problem.
Due to their simplicity and intuitive appeal, greedy algorithms are the
heuristics of choice of many practitioners. Therefore, better understanding
simple greedy heuristics is, in general, an interesting topic in its own right.
Very recently, Epstein and Kleiman (Proc. ESA 2008) provided another incentive
to study the subset sum algorithm by showing that the Strong Price of Anarchy
of the game theoretic version of the bin-packing problem is precisely the
approximation ratio of this heuristic.
In this paper we establish the exact approximation ratio of the subset sum
algorithm, thus settling a long standing open problem. We generalize this
result to the parametric variant of the bin packing problem where item sizes
lie on the interval (0,\alpha] for some \alpha \leq 1, yielding tight bounds
for the Strong Price of Anarchy for all \alpha \leq 1. Finally, we study the
pure Price of Anarchy of the parametric Bin Packing game for which we show
nearly tight upper and lower bounds for all \alpha \leq 1.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 15:06:00 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Epstein",
"Leah",
""
],
[
"Kleiman",
"Elena",
""
],
[
"Mestre",
"Julian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.4316
|
Krzysztof R. Apt
|
Krzysztof R. Apt, Frank S. de Boer, Ernst-R\"udiger Olderog
|
Modular Verification of Recursive Programs
|
21 pages. appeared in: Languages: From Formal to Natural, Essays
Dedicated to Nissim Francez on the Occasion of His 65th Birthday. Lecture
Notes in Computer Science 5533 Springer 2009
| null | null | null |
cs.LO cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We argue that verification of recursive programs by means of the assertional
method of C.A.R. Hoare can be conceptually simplified using a modular
reasoning. In this approach some properties of the program are established
first and subsequently used to establish other program properties. We
illustrate this approach by providing a modular correctness proof of the
Quicksort program.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 15:06:46 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Apt",
"Krzysztof R.",
""
],
[
"de Boer",
"Frank S.",
""
],
[
"Olderog",
"Ernst-Rüdiger",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0907.4354
|
Damian Eads
|
Damian Eads (1), Edward Rosten (2), David Helmbold (1) ((1) University
of California Santa Cruz, (2) University of Cambridge)
|
Learning Object Location Predictors with Boosting and Grammar-Guided
Feature Extraction
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present BEAMER: a new spatially exploitative approach to learning object
detectors which shows excellent results when applied to the task of detecting
objects in greyscale aerial imagery in the presence of ambiguous and noisy
data. There are four main contributions used to produce these results. First,
we introduce a grammar-guided feature extraction system, enabling the
exploration of a richer feature space while constraining the features to a
useful subset. This is specified with a rule-based generative grammar crafted
by a human expert. Second, we learn a classifier on this data using a newly
proposed variant of AdaBoost which takes into account the spatially correlated
nature of the data. Third, we perform another round of training to optimize the
method of converting the pixel classifications generated by boosting into a
high quality set of (x, y) locations. Lastly, we carefully define three common
problems in object detection and define two evaluation criteria that are
tightly matched to these problems. Major strengths of this approach are: (1) a
way of randomly searching a broad feature space, (2) its performance when
evaluated on well-matched evaluation criteria, and (3) its use of the location
prediction domain to learn object detectors as well as to generate detections
that perform well on several tasks: object counting, tracking, and target
detection. We demonstrate the efficacy of BEAMER with a comprehensive
experimental evaluation on a challenging data set.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 18:01:08 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Eads",
"Damian",
""
],
[
"Rosten",
"Edward",
""
],
[
"Helmbold",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0907.4356
|
Benjamin Birnbaum
|
Yossi Azar, Benjamin Birnbaum, L. Elisa Celis, Nikhil R. Devanur, and
Yuval Peres
|
Convergence of Local Dynamics to Balanced Outcomes in Exchange Networks
|
Full version of FOCS 2009 paper
| null | null | null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Bargaining games on exchange networks have been studied by both economists
and sociologists. A Balanced Outcome for such a game is an equilibrium concept
that combines notions of stability and fairness. In a recent paper, Kleinberg
and Tardos introduced balanced outcomes to the computer science community and
provided a polynomial-time algorithm to compute the set of such outcomes. Their
work left open a pertinent question: are there natural, local dynamics that
converge quickly to a balanced outcome? In this paper, we provide a partial
answer to this question by showing that simple edge-balancing dynamics converge
to a balanced outcome whenever one exists.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 18:35:20 GMT"
}
] | 2009-07-27T00:00:00 |
[
[
"Azar",
"Yossi",
""
],
[
"Birnbaum",
"Benjamin",
""
],
[
"Celis",
"L. Elisa",
""
],
[
"Devanur",
"Nikhil R.",
""
],
[
"Peres",
"Yuval",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.4364
|
Miao Song
|
Miao Song
|
Dynamic Deformation of Uniform Elastic Two-Layer Objects
|
96 pages, 46 pages; master's thesis; August 2007; also available at
http://clues.concordia.ca/record=b2343207~S0
| null | null | null |
cs.GR
|
http://creativecommons.org/licenses/by/3.0/
|
This thesis presents a two-layer uniform facet elastic object for real-time
simulation based on physics modeling method. It describes the elastic object
procedural modeling algorithm with particle system from the simplest
one-dimensional object, to more complex two-dimensional and three-dimensional
objects.
The double-layered elastic object consists of inner and outer elastic mass
spring surfaces and compressible internal pressure. The density of the inner
layer can be set different from the density of the outer layer; the motion of
the inner layer can be opposite to the motion of the outer layer. These special
features, which cannot be achieved by a single layered object, result in
improved imitation of a soft body, such as tissue's liquidity non-uniform
deformation. The construction of the double-layered elastic object is closer to
the real tissue's physical structure.
The inertial behavior of the elastic object is well illustrated in
environments with gravity and collisions with walls, ceiling, and floor. The
collision detection is defined by elastic collision penalty method and the
motion of the object is guided by the Ordinary Differential Equation
computation.
Users can interact with the modeled objects, deform them, and observe the
response to their action in real time.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 19:13:02 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Jul 2009 22:54:29 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Song",
"Miao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0907.4385
|
Joerg Rothe
|
Yoram Bachrach, Edith Elkind, Reshef Meir, Dmitrii Pasechnik, Michael
Zuckerman, Joerg Rothe and Jeffrey S. Rosenschein
|
The Cost of Stability in Coalitional Games
|
20 pages; will be presented at SAGT'09
|
Proceedings of SAGT 2009, LNCS, 5814, 122-134
|
10.1007/978-3-642-04645-2
| null |
cs.GT cs.AI cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A key question in cooperative game theory is that of coalitional stability,
usually captured by the notion of the \emph{core}--the set of outcomes such
that no subgroup of players has an incentive to deviate. However, some
coalitional games have empty cores, and any outcome in such a game is unstable.
In this paper, we investigate the possibility of stabilizing a coalitional
game by using external payments. We consider a scenario where an external
party, which is interested in having the players work together, offers a
supplemental payment to the grand coalition (or, more generally, a particular
coalition structure). This payment is conditional on players not deviating from
their coalition(s). The sum of this payment plus the actual gains of the
coalition(s) may then be divided among the agents so as to promote stability.
We define the \emph{cost of stability (CoS)} as the minimal external payment
that stabilizes the game.
We provide general bounds on the cost of stability in several classes of
games, and explore its algorithmic properties. To develop a better intuition
for the concepts we introduce, we provide a detailed algorithmic study of the
cost of stability in weighted voting games, a simple but expressive class of
games which can model decision-making in political bodies, and cooperation in
multiagent settings. Finally, we extend our model and results to games with
coalition structures.
|
[
{
"version": "v1",
"created": "Fri, 24 Jul 2009 21:38:45 GMT"
}
] | 2010-10-21T00:00:00 |
[
[
"Bachrach",
"Yoram",
""
],
[
"Elkind",
"Edith",
""
],
[
"Meir",
"Reshef",
""
],
[
"Pasechnik",
"Dmitrii",
""
],
[
"Zuckerman",
"Michael",
""
],
[
"Rothe",
"Joerg",
""
],
[
"Rosenschein",
"Jeffrey S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.4426
|
Christopher Frenz
|
Christopher M. Frenz, Steve Peters, Wilson Julien
|
Evolution of Digital Logic Functionality via a Genetic Algorithm
|
Frenz, C.M., Peters, S., Julien, W. (2009) Evolution of Digital Logic
Functionality via a Genetic Algorithm, Proceedings of the 2009 International
Conference on Genetic and Evolutionary Methods (GEM 2009), 99-101
| null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Digital logic forms the functional basics of most modern electronic equipment
and as such the creation of novel digital logic circuits is an active area of
computer engineering research. This study demonstrates that genetic algorithms
can be used to evolve functionally useful sets of logic gate interconnections
to create useful digital logic circuits. The efficacy of this approach is
illustrated via the evolution of AND, OR, XOR, NOR, and XNOR functionality from
sets of NAND gates, thereby illustrating that evolutionary methods have the
potential be applied to the design of digital electronics.
|
[
{
"version": "v1",
"created": "Sat, 25 Jul 2009 15:21:16 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Frenz",
"Christopher M.",
""
],
[
"Peters",
"Steve",
""
],
[
"Julien",
"Wilson",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0907.4447
|
Martin Levesque
|
Martin Levesque and Halima Elbiaze
|
Graphical Probabilistic Routing Model for OBS Networks with Realistic
Traffic Scenario
|
6 pages
|
IEEE Globecom 2009, Hawaii, United States, November 30 - December
4, 2009
| null | null |
cs.NI cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Burst contention is a well-known challenging problem in Optical Burst
Switching (OBS) networks. Contention resolution approaches are always reactive
and attempt to minimize the BLR based on local information available at the
core node. On the other hand, a proactive approach that avoids burst losses
before they occur is desirable. To reduce the probability of burst contention,
a more robust routing algorithm than the shortest path is needed. This paper
proposes a new routing mechanism for JET-based OBS networks, called Graphical
Probabilistic Routing Model (GPRM) that selects less utilized links, on a
hop-by-hop basis by using a bayesian network. We assume no wavelength
conversion and no buffering to be available at the core nodes of the OBS
network. We simulate the proposed approach under dynamic load to demonstrate
that it reduces the Burst Loss Ratio (BLR) compared to static approaches by
using Network Simulator 2 (ns-2) on NSFnet network topology and with realistic
traffic matrix. Simulation results clearly show that the proposed approach
outperforms static approaches in terms of BLR.
|
[
{
"version": "v1",
"created": "Sat, 25 Jul 2009 21:26:30 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Levesque",
"Martin",
""
],
[
"Elbiaze",
"Halima",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.4468
|
Andrei Sukhov M
|
A.M. Sukhov, N. Kuznetsova
|
What type of distribution for packet delay in a global network should be
used in the control theory?
|
5 pages, 2 figures
| null | null | null |
cs.NI
|
http://creativecommons.org/licenses/by/3.0/
|
In this paper correspondence between experimental data for packet delay and
two theoretical types of distribution is investigated. Calculations have shown
that the exponential distribution describes the data on network delay better,
than truncated normal distribution. Precision experimental data to within
microseconds are gathered by means of the RIPE Test Box. In addition to exact
measurements the data gathered by means of the utility {\em ping} has been
parsed that has not changed the main result. As a result, the equation for an
exponential distribution, in the best way describing process of packet delay in
a TCP/IP based network is written. The search algorithm for key parameters as
for normal, and an exponential distribution is resulted.
|
[
{
"version": "v1",
"created": "Sun, 26 Jul 2009 09:39:39 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Sukhov",
"A. M.",
""
],
[
"Kuznetsova",
"N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4471
|
R Doomun
|
Natasa Zivic
|
Strategies and performances of Soft Input Decryption
|
International Journal of Computer science and Information security,
12 pages, IJCSIS Volume 1
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper analyzes performance aspects of Soft Input Decryption and L
values. Soft Input Decryption is a novel method which uses L values (soft
output) of a SISO channel decoder for the correction of input of Soft Input
Decryption (SID blocks) which have been modified during the transmission over a
noisy channel. The method is based on the combination of cryptography and
channel coding improving characteristics of both of them. The algorithm,
strategies and scenarios of Soft Input Decryption are described.
|
[
{
"version": "v1",
"created": "Sun, 26 Jul 2009 10:41:31 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Sep 2009 07:07:36 GMT"
}
] | 2009-09-17T00:00:00 |
[
[
"Zivic",
"Natasa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.4477
|
Nikos Tzevelekos
|
Nikos Tzevelekos
|
Full abstraction for nominal general references
| null |
Logical Methods in Computer Science, Volume 5, Issue 3 (September
11, 2009) lmcs:918
|
10.2168/LMCS-5(3:8)2009
| null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Game semantics has been used with considerable success in formulating fully
abstract semantics for languages with higher-order procedures and a wide range
of computational effects. Recently, nominal games have been proposed for
modelling functional languages with names. These are ordinary, stateful games
cast in the theory of nominal sets developed by Pitts and Gabbay. Here we take
nominal games one step further, by developing a fully abstract semantics for a
language with nominal general references.
|
[
{
"version": "v1",
"created": "Sun, 26 Jul 2009 13:27:38 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Sep 2009 19:57:27 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Tzevelekos",
"Nikos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.4488
|
Gregory Gutin
|
Gregory Gutin, Eun Jung Kim, Michael Lampis, and Valia Mitsou
|
Vertex Cover Problem Parameterized Above and Below Tight Bounds
| null | null | null | null |
cs.CC cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the well-known Vertex Cover problem parameterized above and below
tight bounds. We show that two of the parameterizations (both were suggested by
Mahajan, Raman and Sikdar, J. Computer and System Sciences, 75(2):137--153,
2009) are fixed-parameter tractable and two other parameterizations are
W[1]-hard (one of them is, in fact, W[2]-hard).
|
[
{
"version": "v1",
"created": "Sun, 26 Jul 2009 15:02:39 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Aug 2009 10:25:36 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Gutin",
"Gregory",
""
],
[
"Kim",
"Eun Jung",
""
],
[
"Lampis",
"Michael",
""
],
[
"Mitsou",
"Valia",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.4509
|
Gilberto de Paiva
|
Gilberto de Paiva
|
Pattern Recognition Theory of Mind
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
I propose that pattern recognition, memorization and processing are key
concepts that can be a principle set for the theoretical modeling of the mind
function. Most of the questions about the mind functioning can be answered by a
descriptive modeling and definitions from these principles. An understandable
consciousness definition can be drawn based on the assumption that a pattern
recognition system can recognize its own patterns of activity. The principles,
descriptive modeling and definitions can be a basis for theoretical and applied
research on cognitive sciences, particularly at artificial intelligence
studies.
|
[
{
"version": "v1",
"created": "Sun, 26 Jul 2009 19:10:43 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"de Paiva",
"Gilberto",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.4521
|
Doron Ezri
|
Igor Gutman, Doron Ezri and Dov Wulich
|
Grassmannian Beamforming for MIMO-OFDM Systems with Frequency and
Spatially Correlated Channels Using Huffman Coding
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiple input multiple output (MIMO) precoding is an efficient scheme that
may significantly enhance the communication link. However, this enhancement
comes with a cost. Many precoding schemes require channel knowledge at the
transmitter that is obtained through feedback from the receiver. Focusing on
the natural common fusion of orthogonal frequency division multiplexing (OFDM)
and MIMO, we exploit the channel correlation in the frequency and spatial
domain to reduce the required feedback rate in a frequency division duplex
(FDD) system. The proposed feedback method is based on Huffman coding and is
employed here for the single stream case. The method leads to a significant
reduction in the required feedback rate, without any loss in performance. The
proposed method may be extended to the multi-stream case.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 06:40:13 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Gutman",
"Igor",
""
],
[
"Ezri",
"Doron",
""
],
[
"Wulich",
"Dov",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.4531
|
Zhaohua Luo
|
Zhaohua Luo
|
Clone Theory and Algebraic Logic
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The concept of a clone is central to many branches of mathematics, such as
universal algebra, algebraic logic, and lambda calculus. Abstractly a clone is
a category with two objects such that one is a countably infinite power of the
other. Left and right algebras over a clone are covariant and contravariant
functors from the category to that of sets respectively. In this paper we show
that first-order logic can be studied effectively using the notions of right
and left algebras over a clone. It is easy to translate the classical treatment
of logic into our setting and prove all the fundamental theorems of first-order
theory algebraically.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 17:36:16 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Luo",
"Zhaohua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.4547
|
EPTCS
|
Janusz Brzozowski
|
Quotient Complexity of Regular Languages
| null |
EPTCS 3, 2009, pp. 17-28
|
10.4204/EPTCS.3.2
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The past research on the state complexity of operations on regular languages
is examined, and a new approach based on an old method (derivatives of regular
expressions) is presented. Since state complexity is a property of a language,
it is appropriate to define it in formal-language terms as the number of
distinct quotients of the language, and to call it "quotient complexity". The
problem of finding the quotient complexity of a language f(K,L) is considered,
where K and L are regular languages and f is a regular operation, for example,
union or concatenation. Since quotients can be represented by derivatives, one
can find a formula for the typical quotient of f(K,L) in terms of the quotients
of K and L. To obtain an upper bound on the number of quotients of f(K,L) all
one has to do is count how many such quotients are possible, and this makes
automaton constructions unnecessary. The advantages of this point of view are
illustrated by many examples. Moreover, new general observations are presented
to help in the estimation of the upper bounds on quotient complexity of regular
operations.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 06:19:09 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Brzozowski",
"Janusz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.4554
|
EPTCS
|
John Jack (Louisiana Tech University), Andrei Paun (Louisiana Tech
University, INCDSB, UPM)
|
The Nondeterministic Waiting Time Algorithm: A Review
| null |
EPTCS 3, 2009, pp. 29-46
|
10.4204/EPTCS.3.3
| null |
cs.FL cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present briefly the Nondeterministic Waiting Time algorithm. Our technique
for the simulation of biochemical reaction networks has the ability to mimic
the Gillespie Algorithm for some networks and solutions to ordinary
differential equations for other networks, depending on the rules of the
system, the kinetic rates and numbers of molecules. We provide a full
description of the algorithm as well as specifics on its implementation. Some
results for two well-known models are reported. We have used the algorithm to
explore Fas-mediated apoptosis models in cancerous and HIV-1 infected T cells.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 07:26:49 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Jack",
"John",
"",
"Louisiana Tech University"
],
[
"Paun",
"Andrei",
"",
"Louisiana Tech\n University, INCDSB, UPM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0907.4561
|
York Sure
|
York Sure
|
Fact Sheet on Semantic Web
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The report gives an overview about activities on the topic Semantic Web. It
has been released as technical report for the project "KTweb -- Connecting
Knowledge Technologies Communities" in 2003.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 08:28:35 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Sure",
"York",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.4573
|
Gregory Gutin
|
Noga Alon, Gregory Gutin, Eun Jung Kim, Stefan Szeider, and Anders Yeo
|
Solving MAX-r-SAT Above a Tight Lower Bound
| null | null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an exact algorithm that decides, for every fixed $r \geq 2$ in
time $O(m) + 2^{O(k^2)}$ whether a given multiset of $m$ clauses of size $r$
admits a truth assignment that satisfies at least $((2^r-1)m+k)/2^r$ clauses.
Thus \textsc{Max-$r$-Sat} is fixed-parameter tractable when parameterized by
the number of satisfied clauses above the tight lower bound $(1-2^{-r})m$. This
solves an open problem of Mahajan et al. (J. Comput. System Sci., 75, 2009).
Our algorithm is based on a polynomial-time data reduction procedure that
reduces a problem instance to an equivalent algebraically represented problem
with $O(k^2)$ variables. This is done by representing the instance as an
appropriate polynomial, and by applying a probabilistic argument combined with
some simple tools from Harmonic analysis to show that if the polynomial cannot
be reduced to one of size $O(k^2)$, then there is a truth assignment satisfying
the required number of clauses.
We introduce a new notion of bikernelization from a parameterized problem to
another one and apply it to prove that the above-mentioned parameterized
\textsc{Max-$r$-Sat} admits a polynomial-size kernel.
Combining another probabilistic argument with tools from graph matching
theory and signed graphs, we show that if an instance of \textsc{Max-2-Sat}
with $m$ clauses has at least $3k$ variables after application of certain
polynomial time reduction rules to it, then there is a truth assignment that
satisfies at least $(3m+k)/4$ clauses.
We also outline how the fixed-parameter tractability and polynomial-size
kernel results on \textsc{Max-$r$-Sat} can be extended to more general families
of Boolean Constraint Satisfaction Problems.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 09:10:25 GMT"
},
{
"version": "v2",
"created": "Tue, 28 Jul 2009 07:45:35 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Nov 2009 14:48:23 GMT"
},
{
"version": "v4",
"created": "Mon, 22 Aug 2011 13:26:56 GMT"
}
] | 2011-08-23T00:00:00 |
[
[
"Alon",
"Noga",
""
],
[
"Gutin",
"Gregory",
""
],
[
"Kim",
"Eun Jung",
""
],
[
"Szeider",
"Stefan",
""
],
[
"Yeo",
"Anders",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.4576
|
Elena Pribavkina
|
E. V. Pribavkina
|
Slowly synchronizing automata with zero and incomplete sets
|
9 pages, 6 figures
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using combinatorial properties of incomplete sets in a free monoid we
construct a series of n-state deterministic automata with zero whose shortest
synchronizing word has length n^2/4+n/2-1.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 09:19:56 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Pribavkina",
"E. V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.4583
|
Fabien Durand
|
Fabien Durand (LAMFA), Michel Rigo
|
Syndeticity and independent substitutions
| null |
Advances in Applied Mathematics, 42 (2009) 1-22
| null | null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We associate in a canonical way a substitution to any abstract numeration
system built on a regular language. In relationship with the growth order of
the letters, we define the notion of two independent substitutions. Our main
result is the following. If a sequence $x$ is generated by two independent
substitutions, at least one being of exponential growth, then the factors of
$x$ appearing infinitely often in $x$ appear with bounded gaps. As an
application, we derive an analogue of Cobham's theorem for two independent
substitutions (or abstract numeration systems) one with polynomial growth, the
other being exponential.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 09:48:15 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Durand",
"Fabien",
"",
"LAMFA"
],
[
"Rigo",
"Michel",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.4622
|
Rajkumar Buyya
|
Christian Vecchiola, Xingchen Chu, and Rajkumar Buyya
|
Aneka: A Software Platform for .NET-based Cloud Computing
|
30 pages, 10 figures
| null | null |
GRIDS-TR-2009-4, Grid Computing and Distributed Systems Laboratory,
The University of Melbourne, Australia, May 25, 2009
|
cs.DC cs.CE cs.NI cs.OS cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Aneka is a platform for deploying Clouds developing applications on top of
it. It provides a runtime environment and a set of APIs that allow developers
to build .NET applications that leverage their computation on either public or
private clouds. One of the key features of Aneka is the ability of supporting
multiple programming models that are ways of expressing the execution logic of
applications by using specific abstractions. This is accomplished by creating a
customizable and extensible service oriented runtime environment represented by
a collection of software containers connected together. By leveraging on these
architecture advanced services including resource reservation, persistence,
storage management, security, and performance monitoring have been implemented.
On top of this infrastructure different programming models can be plugged to
provide support for different scenarios as demonstrated by the engineering,
life science, and industry applications.
|
[
{
"version": "v1",
"created": "Sun, 26 Jul 2009 02:19:42 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Vecchiola",
"Christian",
""
],
[
"Chu",
"Xingchen",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0907.4640
|
Keiko Nakata Dr
|
Keiko Nakata and Masahito Hasegawa
|
Small-step and big-step semantics for call-by-need
|
29 pages
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present natural semantics for acyclic as well as cyclic call-by-need
lambda calculi, which are proved equivalent to the reduction semantics given by
Ariola and Felleisen. The natural semantics are big-step and use global heaps,
where evaluation is suspended and memorized. The reduction semantics are
small-step and evaluation is suspended and memorized locally in let-bindings.
Thus two styles of formalization describe the call-by-need strategy from
different angles.
The natural semantics for the acyclic calculus is revised from the previous
presentation by Maraist et al. and its adequacy is ascribed to its
correspondence with the reduction semantics, which has been proved equivalent
to call-by-name by Ariola and Felleisen. The natural semantics for the cyclic
calculus is inspired by that of Launchbury and Sestoft and we state its
adequacy using a denotational semantics in the style of Launchbury; adequacy of
the reduction semantics for the cyclic calculus is in turn ascribed to its
correspondence with the natural semantics.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 17:19:28 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Nakata",
"Keiko",
""
],
[
"Hasegawa",
"Masahito",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0907.4653
|
Yao Yu
|
Athina P. Petropulu, Yao Yu and H. Vincent Poor
|
Distributed MIMO radar using compressive sampling
| null |
Proc. 42th Asilomar Conf.Signals, Syst. Comput, pp. 203 - 207,
Nov. 2008
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A distributed MIMO radar is considered, in which the transmit and receive
antennas belong to nodes of a small scale wireless network. The transmit
waveforms could be uncorrelated, or correlated in order to achieve a desirable
beampattern. The concept of compressive sampling is employed at the receive
nodes in order to perform direction of arrival (DOA) estimation. According to
the theory of compressive sampling, a signal that is sparse in some domain can
be recovered based on far fewer samples than required by the Nyquist sampling
theorem. The DOAs of targets form a sparse vector in the angle space, and
therefore, compressive sampling can be applied for DOA estimation. The proposed
approach achieves the superior resolution of MIMO radar with far fewer samples
than other approaches. This is particularly useful in a distributed scenario,
in which the results at each receive node need to be transmitted to a fusion
center.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 15:14:10 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Petropulu",
"Athina P.",
""
],
[
"Yu",
"Yao",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.4667
|
Narad Rampersad
|
Narad Rampersad
|
Further applications of a power series method for pattern avoidance
|
7 pages
| null | null | null |
math.CO cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In combinatorics on words, a word w over an alphabet Sigma is said to avoid a
pattern p over an alphabet Delta if there is no factor x of w and no
non-erasing morphism h from Delta^* to Sigma^* such that h(p) = x. Bell and Goh
have recently applied an algebraic technique due to Golod to show that for a
certain wide class of patterns p there are exponentially many words of length n
over a 4-letter alphabet that avoid p. We consider some further consequences of
their work. In particular, we show that any pattern with k variables of length
at least 4^k is avoidable on the binary alphabet. This improves an earlier
bound due to Cassaigne and Roth.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 15:43:38 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Rampersad",
"Narad",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.4697
|
Samir Saoudi
|
Samir Saoudi, Tarik Ait-Idir, and Yukou Mochida
|
Unsupervised and Non Parametric Iterative Soft Bit Error Rate Estimation
for Any Communications System
|
This paper has been withdrawn by the author because it was not
accepted as it is for publication in IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the problem of unsupervised soft bit error rate (BER)
estimation for any communications system, where no prior knowledge either about
transmitted information bits, or the transceiver scheme is available. We show
that the problem of BER estimation is equivalent to estimating the conditional
probability density functions (pdf)s of soft channel/receiver outputs. Assuming
that the receiver has no analytical model of soft observations, we propose a
non parametric Kernel-based pdf estimation technique, and show that the
resulting BER estimator is asymptotically unbiased and point-wise consistent.
We then introduce an iterative Stochastic Expectation Maximization (EM)
algorithm for the estimation of both a priori and a posteriori probabilities of
transmitted information bits, and the classification of soft observations
according to transmitted bit values. These inputs serve in the iterative
Kernel-based estimation procedure of conditional pdfs. We analyze the
performance of the proposed unsupervised and non parametric BER estimator in
the framework of a multiuser code division multiple access (CDMA) system with
single user detection, and show that attractive performance are achieved
compared with conventional Monte Carlo (MC)-aided techniques.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 16:56:12 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Sep 2013 17:43:04 GMT"
},
{
"version": "v3",
"created": "Wed, 25 Sep 2013 11:48:22 GMT"
}
] | 2013-09-26T00:00:00 |
[
[
"Saoudi",
"Samir",
""
],
[
"Ait-Idir",
"Tarik",
""
],
[
"Mochida",
"Yukou",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.4705
|
Yao Yu
|
Yao Yu, Athina P.Petropulu and H. Vincent Poor
|
Compressive Sensing for MIMO Radar
| null |
Proc. IEEE International Conf. Acoust.Speech Signal Process, pp.
3017 - 3020, Apr. 2008
|
10.1109/ICASSP.2009.4960259
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiple-input multiple-output (MIMO) radar systems have been shown to
achieve superior resolution as compared to traditional radar systems with the
same number of transmit and receive antennas. This paper considers a
distributed MIMO radar scenario, in which each transmit element is a node in a
wireless network, and investigates the use of compressive sampling for
direction-of-arrival (DOA) estimation. According to the theory of compressive
sampling, a signal that is sparse in some domain can be recovered based on far
fewer samples than required by the Nyquist sampling theorem. The DOA of targets
form a sparse vector in the angle space, and therefore, compressive sampling
can be applied for DOA estimation. The proposed approach achieves the superior
resolution of MIMO radar with far fewer samples than other approaches. This is
particularly useful in a distributed scenario, in which the results at each
receive node need to be transmitted to a fusion center for further processing.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 17:08:32 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Yu",
"Yao",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.4740
|
Asif-ul Haque
|
Asif-ul Haque and Paul Ginsparg
|
Positional Effects on Citation and Readership in arXiv
|
28 pages, to appear in JASIST
|
JASIST 60, 2203-2218 (Nov 2009)
|
10.1002/asi.21166
| null |
cs.DL astro-ph.IM hep-ph hep-th physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
arXiv.org mediates contact with the literature for entire scholarly
communities, both through provision of archival access and through daily email
and web announcements of new materials, potentially many screenlengths long. We
confirm and extend a surprising correlation between article position in these
initial announcements, ordered by submission time, and later citation impact,
due primarily to intentional "self-promotion" on the part of authors. A pure
"visibility" effect was also present: the subset of articles accidentally in
early positions fared measurably better in the long-term citation record than
those lower down. Astrophysics articles announced in position 1, for example,
overall received a median number of citations 83\% higher, while those there
accidentally had a 44\% visibility boost. For two large subcommunities of
theoretical high energy physics, hep-th and hep-ph articles announced in
position 1 had median numbers of citations 50\% and 100\% larger than for
positions 5--15, and the subsets there accidentally had visibility boosts of
38\% and 71\%.
We also consider the positional effects on early readership. The median
numbers of early full text downloads for astro-ph, hep-th, and hep-ph articles
announced in position 1 were 82\%, 61\%, and 58\% higher than for lower
positions, respectively, and those there accidentally had medians
visibility-boosted by 53\%, 44\%, and 46\%. Finally, we correlate a variety of
readership features with long-term citations, using machine learning methods,
thereby extending previous results on the predictive power of early readership
in a broader context. We conclude with some observations on impact metrics and
dangers of recommender mechanisms.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 19:28:06 GMT"
}
] | 2011-02-01T00:00:00 |
[
[
"Haque",
"Asif-ul",
""
],
[
"Ginsparg",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Physics",
"code": "hep-ph",
"description": "Theoretical particle physics and its interrelation with experiment. Prediction of particle physics observables: models, effective field theories, calculation techniques. Particle physics: analysis of theory through experimental results.",
"span": "(High Energy Physics - Phenomenology)"
},
{
"class": "Physics",
"code": "hep-th",
"description": "Formal aspects of quantum field theory. String theory, supersymmetry and supergravity.",
"span": "(High Energy Physics - Theory)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0907.4743
|
Ersin Uzun
|
Arun Kumar, Nitesh Saxena, Ersin Uzun
|
Alice Meets Bob: A Comparative Usability Study of Wireless Device
Pairing Methods for a "Two-User" Setting
|
16 pages manuscript. Keywords: Wireless Security, Device
Authentication, Pairing, Usability
| null | null | null |
cs.CR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When users want to establish wireless communication between/among their
devices, the channel has to be bootstrapped first. To prevent any malicious
control of or eavesdropping over the communication, the channel is desired to
be authenticated and confidential. The process of setting up a secure
communication channel between two previously unassociated devices is referred
to as "Secure Device Pairing". When there is no prior security context, e.g.,
shared secrets, common key servers or public key certificates, device pairing
requires user involvement into the process. The idea usually involves
leveraging an auxiliary human-perceptible channel to authenticate the data
exchanged over the insecure wireless channel.
We observe that the focus of prior research has mostly been limited to
pairing scenarios where a single user controls both the devices. In this paper,
we consider more general and emerging "two-user" scenarios, where two different
users establish pairing between their respective devices. Although a number of
pairing methods exists in the literature, only a handful of those are
applicable to the two-user setting. We present the first study to identify the
methods practical for two-user pairing scenarios, and comparatively evaluate
the usability of these methods. Our results identify methods best-suited for
users, in terms of efficiency, error-tolerance and of course, usability. Our
work sheds light on the applicability and usability of pairing methods for
emerging two-user scenarios, a topic largely ignored so far.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 19:34:20 GMT"
}
] | 2009-07-28T00:00:00 |
[
[
"Kumar",
"Arun",
""
],
[
"Saxena",
"Nitesh",
""
],
[
"Uzun",
"Ersin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0907.4760
|
Giovanni Pighizzini
|
Christel Baier (Technische Universit\"at Dresden), Nathalie Bertrand
(INRIA Rennes) and Marcus Gr\"o{\ss}er (Technische Universit\"at Dresden)
|
Probabilistic Automata over Infinite Words: Expressiveness, Efficiency,
and Decidability
| null |
EPTCS 3, 2009, pp. 3-16
|
10.4204/EPTCS.3.1
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Probabilistic omega-automata are variants of nondeterministic automata for
infinite words where all choices are resolved by probabilistic distributions.
Acceptance of an infinite input word can be defined in different ways: by
requiring that (i) the probability for the accepting runs is positive (probable
semantics), or (ii) almost all runs are accepting (almost-sure semantics), or
(iii) the probability measure of the accepting runs is greater than a certain
threshold (threshold semantics). The underlying notion of an accepting run can
be defined as for standard omega-automata by means of a Buechi condition or
other acceptance conditions, e.g., Rabin or Streett conditions. In this paper,
we put the main focus on the probable semantics and provide a summary of the
fundamental properties of probabilistic omega-automata concerning
expressiveness, efficiency, and decision problems.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 01:20:51 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Baier",
"Christel",
"",
"Technische Universität Dresden"
],
[
"Bertrand",
"Nathalie",
"",
"INRIA Rennes"
],
[
"Größer",
"Marcus",
"",
"Technische Universität Dresden"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.4764
|
Farbod Shokrieh
|
Farbod Shokrieh
|
The monodromy pairing and discrete logarithm on the Jacobian of finite
graphs
| null |
J. Math. Cryptol. 4 (2010), 43--56
|
10.1515/JMC.2010.002
| null |
math.CO cs.CR math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Every graph has a canonical finite abelian group attached to it. This group
has appeared in the literature under a variety of names including the sandpile
group, critical group, Jacobian group, and Picard group. The construction of
this group closely mirrors the construction of the Jacobian variety of an
algebraic curve. Motivated by this analogy, it was recently suggested by Norman
Biggs that the critical group of a finite graph is a good candidate for doing
discrete logarithm based cryptography. In this paper, we study a bilinear
pairing on this group and show how to compute it. Then we use this pairing to
find the discrete logarithm efficiently, thus showing that the associated
cryptographic schemes are not secure. Our approach resembles the MOV attack on
elliptic curves.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 20:36:21 GMT"
},
{
"version": "v2",
"created": "Thu, 7 Jul 2011 09:12:28 GMT"
}
] | 2011-07-08T00:00:00 |
[
[
"Shokrieh",
"Farbod",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
0907.4775
|
Joshua Grochow
|
Lance Fortnow and Joshua A. Grochow
|
Complexity Classes of Equivalence Problems Revisited
|
21 pages
|
Information and Computation 209(4):748-763, April 2011
|
10.1016/j.ic.2011.01.006
| null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To determine if two lists of numbers are the same set, we sort both lists and
see if we get the same result. The sorted list is a canonical form for the
equivalence relation of set equality. Other canonical forms arise in graph
isomorphism algorithms, and the equality of permutation groups given by
generators. To determine if two graphs are cospectral (have the same
eigenvalues), however, we compute their characteristic polynomials and see if
they are the same; the characteristic polynomial is a complete invariant for
the equivalence relation of cospectrality. This is weaker than a canonical
form, and it is not known whether a polynomial-time canonical form for
cospectrality exists. Note that it is a priori possible for an equivalence
relation to be decidable in polynomial time without either a complete invariant
or canonical form.
Blass and Gurevich (SIAM J. Comput., 1984) ask whether these conditions on
equivalence relations -- having an FP canonical form, having an FP complete
invariant, and simply being in P -- are in fact different. They showed that
this question requires non-relativizing techniques to resolve. Here we extend
their results, and give new connections to probabilistic and quantum
computation.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 21:30:02 GMT"
},
{
"version": "v2",
"created": "Wed, 29 Jun 2011 04:42:54 GMT"
}
] | 2011-06-30T00:00:00 |
[
[
"Fortnow",
"Lance",
""
],
[
"Grochow",
"Joshua A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.4803
|
Aram Galstyan
|
Armen E. Allahverdyan, Greg Ver Steeg, and Aram Galstyan
|
Community Detection with and without Prior Information
|
6 pages, 2 figures
|
Europhysics Letters 90, p.18002, 2010
|
10.1209/0295-5075/90/18002
| null |
physics.soc-ph cond-mat.stat-mech cs.CY physics.data-an q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of graph partitioning, or clustering, in sparse networks
with prior information about the clusters. Specifically, we assume that for a
fraction $\rho$ of the nodes their true cluster assignments are known in
advance. This can be understood as a semi--supervised version of clustering, in
contrast to unsupervised clustering where the only available information is the
graph structure. In the unsupervised case, it is known that there is a
threshold of the inter--cluster connectivity beyond which clusters cannot be
detected. Here we study the impact of the prior information on the detection
threshold, and show that even minute [but generic] values of $\rho>0$ shift the
threshold downwards to its lowest possible value. For weighted graphs we show
that a small semi--supervising can be used for a non-trivial definition of
communities.
|
[
{
"version": "v1",
"created": "Mon, 27 Jul 2009 23:53:28 GMT"
},
{
"version": "v2",
"created": "Tue, 5 Oct 2010 19:00:29 GMT"
}
] | 2010-10-06T00:00:00 |
[
[
"Allahverdyan",
"Armen E.",
""
],
[
"Steeg",
"Greg Ver",
""
],
[
"Galstyan",
"Aram",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0907.4810
|
Robert Grossman
|
Robert Grossman, Yunhong Gu, Michal Sabala, Collin Bennet, Jonathan
Seidman and Joe Mambratti
|
The Open Cloud Testbed: A Wide Area Testbed for Cloud Computing
Utilizing High Performance Network Services
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, a number of cloud platforms and services have been developed for
data intensive computing, including Hadoop, Sector, CloudStore (formerly KFS),
HBase, and Thrift. In order to benchmark the performance of these systems, to
investigate their interoperability, and to experiment with new services based
on flexible compute node and network provisioning capabilities, we have
designed and implemented a large scale testbed called the Open Cloud Testbed
(OCT). Currently the OCT has 120 nodes in four data centers: Baltimore, Chicago
(two locations), and San Diego. In contrast to other cloud testbeds, which are
in small geographic areas and which are based on commodity Internet services,
the OCT is a wide area testbed and the four data centers are connected with a
high performance 10Gb/s network, based on a foundation of dedicated lightpaths.
This testbed can address the requirements of extremely large data streams that
challenge other types of distributed infrastructure. We have also developed
several utilities to support the development of cloud computing systems and
services, including novel node and network provisioning services, a monitoring
system, and a RPC system. In this paper, we describe the OCT architecture and
monitoring system. We also describe some benchmarks that we developed and some
interoperability studies we performed using these benchmarks.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 00:54:23 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Grossman",
"Robert",
""
],
[
"Gu",
"Yunhong",
""
],
[
"Sabala",
"Michal",
""
],
[
"Bennet",
"Collin",
""
],
[
"Seidman",
"Jonathan",
""
],
[
"Mambratti",
"Joe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0907.4815
|
Amit Narayanan
|
Amit Narayanan
|
A Survey on BGP Issues and Solutions
| null | null | null |
Rep0352009
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
BGP is the de facto protocol used for inter-autonomous system routing in the
Internet. Generally speaking, BGP has been proven to be secure, efficient,
scalable, and robust. However, with the rapid evolving of the Internet in the
past few decades, there are increasing concerns about BGS's ability to meet the
needs of the Internet routing. There are two major limitations of BGP which are
its failure to address several key security issues, and some operational
related problems. The design and ubiquity of BGP have complicated past efforts
at securing inter-domain routing. This paper surveys the past work related to
BGP security and operational issues. We explore the limitations and advantages
of proposed solutions in these two limitations.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 01:11:56 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Narayanan",
"Amit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4852
|
Oded Kafri
|
Oded Kafri
|
The Distributions in Nature and Entropy Principle
|
19 pages 5 figures
| null | null | null |
cs.DM physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The derivation of the maximum entropy distribution of particles in boxes
yields two kinds of distributions: a "bell-like" distribution and a long-tail
distribution. The first one is obtained when the ratio between particles and
boxes is low, and the second one - when the ratio is high. The obtained long
tail distribution yields correctly the empirical Zipf law, Pareto's 20:80 rule
and Benford's law. Therefore, it is concluded that the long tail and the
"bell-like" distributions are outcomes of the tendency of statistical systems
to maximize entropy.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 07:34:37 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Kafri",
"Oded",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0907.4870
|
K. P. Naveen
|
K. P. Naveen and A. Kumar
|
Tunable locally-optimal geographical forwarding in wireless sensor
networks with sleep-wake cycling nodes
|
13 Pages, 6 Figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a wireless sensor network whose main function is to detect
certain infrequent alarm events, and to forward alarm packets to a base
station, using geographical forwarding. The nodes know their locations, and
they sleep-wake cycle, waking up periodically but not synchronously. In this
situation, when a node has a packet to forward to the sink, there is a
trade-off between how long this node waits for a suitable neighbor to wake up
and the progress the packet makes towards the sink once it is forwarded to this
neighbr. Hence, in choosing a relay node, we consider the problem of minimizing
average delay subject to a constraint on the average progress. By constraint
relaxation, involving a Lagrange multiplier, we formulate this next hop relay
selection problem as a Markov decision process (MDP). The exact optimal
solution (BF (Best Forward)) can be found, but is computationally intensive.
Next, we consider a mathematically simplified model for which the optimal
policy (SF (Simplified Forward)) turns out to be a simple one-step-look-ahead
rule. Simulations show that SF is very close in performance to BF, even for
reasonably small node density. We then study the end-to-end performance of SF
in comparison with two extremal policies: Max Forward (MF), which makes the
maximum possible progress per hop and thus reduces network energy consumption,
and First Forward (FF), which forwards the packet to the first node to wake up,
and thus tends to make end-to-end forwarding delays small. We find that, with
appropriate choice of one hop average progress constraint, SF can be tuned to
provide a favorable trade-off between end-to-end packet delay and the number of
hops in the forwarding path.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 09:37:48 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Jul 2009 11:31:02 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Dec 2009 08:45:37 GMT"
}
] | 2009-12-21T00:00:00 |
[
[
"Naveen",
"K. P.",
""
],
[
"Kumar",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4876
|
Rajkumar Buyya
|
Mukaddim Pathan and Rajkumar Buyya
|
Architecture and Performance Models for QoS-Driven Effective Peering of
Content Delivery Networks
|
31 pages, 19 figures
|
Multiagent and Grid Systems, Volume 5, Number 2, Pages: 165-195,
ISSN: 1574-1702, IOS Press, Amsterdam, The Netherlands, July 2009
| null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The proprietary nature of existing Content Delivery Networks (CDNs) means
they are closed and do not naturally cooperate. A CDN is expected to provide
high performance Internet content delivery through global coverage, which might
be an obstacle for new CDN providers, as well as affecting commercial viability
of existing ones. Finding ways for distinct CDNs to coordinate and cooperate
with other CDNs is necessary to achieve better overall service, as perceived by
end-users, at lower cost. In this paper, we present an architecture to support
peering arrangements between CDNs, based on a Virtual Organization (VO) model.
Our approach promotes peering among providers, while upholding user perceived
performance. This is achieved through proper policy management of negotiated
Service Level Agreements (SLAs) between peers. We also present a Quality of
Service (QoS)-driven performance modeling approach for peering CDNs in order to
predict the user perceived performance. We show that peering between CDNs
upholds user perceived performance by satisfying the target QoS. The
methodology presented in this paper provides CDNs a way to dynamically
distribute user requests to other peers according to different
request-redirection policies. The model-based approach helps an overloaded CDN
to return to a normal state by offloading excess requests to the peers. It also
assists in making concrete QoS guarantee for a CDN provider. Our approach
endeavors to achieve scalability and resource sharing among CDNs through
effective peering in a user transparent manner, thus evolving past the current
landscape where non-cooperative and distinct CDNs exist.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 10:02:15 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Pathan",
"Mukaddim",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4877
|
Liang Xiao
|
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
|
Fingerprints in the Ether: Using the Physical Layer for Wireless
Authentication
|
5 pages, 10 figures, ICC
|
ICC, pp. 4646-4651, Glasgow, Scotland, Jun. 2007
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The wireless medium contains domain-specific information that can be used to
complement and enhance traditional security mechanisms. In this paper we
propose ways to exploit the fact that, in a typically rich scattering
environment, the radio channel response decorrelates quite rapidly in space.
Specifically, we describe a physical-layer algorithm that combines channel
probing (M complex frequency response samples over a bandwidth W) with
hypothesis testing to determine whether current and prior communication
attempts are made by the same user (same channel response). In this way,
legitimate users can be reliably authenticated and false users can be reliably
detected. To evaluate the feasibility of our algorithm, we simulate spatially
variable channel responses in real environments using the WiSE ray-tracing
tool; and we analyze the ability of a receiver to discriminate between
transmitters (users) based on their channel frequency responses in a given
office environment. For several rooms in the extremities of the building we
considered, we have confirmed the efficacy of our approach under static channel
conditions. For example, measuring five frequency response samples over a
bandwidth of 100 MHz and using a transmit power of 100 mW, valid users can be
verified with 99% confidence while rejecting false users with greater than 95%
confidence.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 12:53:17 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Xiao",
"Liang",
""
],
[
"Greenstein",
"Larry",
""
],
[
"Mandayam",
"Narayan",
""
],
[
"Trappe",
"Wade",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.4878
|
Rajkumar Buyya
|
Rajkumar Buyya, Rajiv Ranjan and Rodrigo N. Calheiros
|
Modeling and Simulation of Scalable Cloud Computing Environments and the
CloudSim Toolkit: Challenges and Opportunities
|
11 pages, 11 figures
|
Proceedings of the 7th High Performance Computing and Simulation
(HPCS 2009) Conference, Leipzig, Germany, June 21 - 24, 2009
| null | null |
cs.DC cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cloud computing aims to power the next generation data centers and enables
application service providers to lease data center capabilities for deploying
applications depending on user QoS (Quality of Service) requirements. Cloud
applications have different composition, configuration, and deployment
requirements. Quantifying the performance of resource allocation policies and
application scheduling algorithms at finer details in Cloud computing
environments for different application and service models under varying load,
energy performance (power consumption, heat dissipation), and system size is a
challenging problem to tackle. To simplify this process, in this paper we
propose CloudSim: an extensible simulation toolkit that enables modelling and
simulation of Cloud computing environments. The CloudSim toolkit supports
modelling and creation of one or more virtual machines (VMs) on a simulated
node of a Data Center, jobs, and their mapping to suitable VMs. It also allows
simulation of multiple Data Centers to enable a study on federation and
associated policies for migration of VMs for reliability and automatic scaling
of applications.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 10:11:58 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Buyya",
"Rajkumar",
""
],
[
"Ranjan",
"Rajiv",
""
],
[
"Calheiros",
"Rodrigo N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.4881
|
Vipin M
|
Vipin M, Mohamed Imran K R
|
Approximate mechanism for measuring stability of Internet link in
aggregated Internet pipe
|
8 pages, 5 figures
| null | null | null |
cs.NI cs.PF
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
In this article we propose a method for measuring internet connection
stability which is fast and has negligible overhead for the process of its
complexity. This method finds a relative value for representing the stability
of internet connections and can also be extended for aggregated internet
connections. The method is documented with help of a real time implementation
and results are shared. This proposed measurement scheme uses HTTP GET method
for each connections. The normalized responses to identified sites like
gateways of ISPs, google.com etc are used for calculating current link
stability. The novelty of the approach is that historic values are used to
calculate overall link stability. In this discussion, we also document a method
to use the calculated values as a dynamic threshold metric. This is used in
routing decisions and for load-balancing each of the connections in an
aggregated bandwidth pipe. This scheme is a very popular practice in aggregated
internet connections.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 10:29:31 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"M",
"Vipin",
""
],
[
"R",
"Mohamed Imran K",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0907.4885
|
Mark Flanagan
|
Mark F. Flanagan, Enrico Paolini, Marco Chiani, and Marc P. C.
Fossorier
|
Growth Rate of the Weight Distribution of Doubly-Generalized LDPC Codes:
General Case and Efficient Evaluation
|
6 pages, 1 figure. Proc. IEEE Globecom 2009, Hawaii, USA, November 30
- December 4, 2009
| null |
10.1109/GLOCOM.2009.5426116
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The growth rate of the weight distribution of irregular doubly-generalized
LDPC (D-GLDPC) codes is developed and in the process, a new efficient numerical
technique for its evaluation is presented. The solution involves simultaneous
solution of a 4 x 4 system of polynomial equations. This represents the first
efficient numerical technique for exact evaluation of the growth rate, even for
LDPC codes. The technique is applied to two example D-GLDPC code ensembles.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 10:57:21 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Flanagan",
"Mark F.",
""
],
[
"Paolini",
"Enrico",
""
],
[
"Chiani",
"Marco",
""
],
[
"Fossorier",
"Marc P. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.4908
|
Liang Xiao
|
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
|
MIMO-Assisted Channel-Based Authentication in Wireless Networks
|
5 pages, 6 figures, CISS
|
Proc. Conference on Information Sciences and Systems (CISS), pp.
642-646, Princeton, NJ, Mar. 2008
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiple-input multiple-output (MIMO) techniques allow for multiplexing
and/or diversity gain, and will be widely deployed in future wireless systems.
In this paper, we propose a MIMO-assisted channel-based authentication scheme,
exploiting current channel estimation mechanisms in MIMO systems to detect
spoofing attacks with very low overhead. In this scheme, the use of multiple
antennas provides extra dimensions of channel estimation data, and thus leads
to a "security gain" over single-input single-output (SISO) systems. We
investigate the security gain of MIMO systems in several system configurations
via simulations for a specific real indoor environment using ray-tracing
software. We also discuss the effect of increasing the number of transmit and
receive antennas on the security gain and contrast that to the
diversity/multiplexing gain.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 13:04:44 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Xiao",
"Liang",
""
],
[
"Greenstein",
"Larry",
""
],
[
"Mandayam",
"Narayan",
""
],
[
"Trappe",
"Wade",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.4919
|
Liang Xiao
|
Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe
|
Using the Physical Layer for Wireless Authentication in Time-Variant
Channels
|
10 pages, 6 figures
|
IEEE Transactions on Wireless Communications, vol. 7, pp.
2571-2579, Jul. 2008
|
10.1109/TWC.2008.070194
| null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The wireless medium contains domain-specific information that can be used to
complement and enhance traditional security mechanisms. In this paper we
propose ways to exploit the spatial variability of the radio channel response
in a rich scattering environment, as is typical of indoor environments.
Specifically, we describe a physical-layer authentication algorithm that
utilizes channel probing and hypothesis testing to determine whether current
and prior communication attempts are made by the same transmit terminal. In
this way, legitimate users can be reliably authenticated and false users can be
reliably detected. We analyze the ability of a receiver to discriminate between
transmitters (users) according to their channel frequency responses. This work
is based on a generalized channel response with both spatial and temporal
variability, and considers correlations among the time, frequency and spatial
domains. Simulation results, using the ray-tracing tool WiSE to generate the
time-averaged response, verify the efficacy of the approach under realistic
channel conditions, as well as its capability to work under unknown channel
variations.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 13:56:58 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Xiao",
"Liang",
""
],
[
"Greenstein",
"Larry",
""
],
[
"Mandayam",
"Narayan",
""
],
[
"Trappe",
"Wade",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.4957
|
Maurice Margenstern
|
Maurice Margenstern
|
Iterative pushdown automata and hyperbolic contour words
|
15 pages, 6 figures
| null | null | null |
cs.CG cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we give an application of iterated pushdown automata to
contour words of balls and two other domains in infinitely many tilings of the
hyperbolic plane. We also give a similar application for the tiling {5,3,4} of
the hyperbolic 3D space and for the tiling {5,3,3,4} of the hyperbolic 4D space
as well.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 17:16:45 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.4960
|
Muthiah Annamalai
|
Muthiah Annamalai
|
Ezhil: A Tamil Programming Language
|
6 pages, Tamil UTF-8 characters
| null | null | null |
cs.PL cs.CL
|
http://creativecommons.org/licenses/by/3.0/
|
Ezhil is a Tamil language based interpreted procedural programming language.
Tamil keywords and grammar are chosen to make the native Tamil speaker write
programs in the Ezhil system. Ezhil allows easy representation of computer
program closer to the Tamil language logical constructs equivalent to the
conditional, branch and loop statements in modern English based programming
languages. Ezhil is a compact programming language aimed towards Tamil speaking
novice computer users. Grammar for Ezhil and a few example programs are
reported here, from the initial proof-of-concept implementation using the
Python programming language1. To the best of our knowledge, Ezhil language is
the first freely available Tamil programming language.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 19:24:51 GMT"
}
] | 2009-07-29T00:00:00 |
[
[
"Annamalai",
"Muthiah",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0907.4984
|
R Doomun
|
Yousra Ben Jemaa, Sana Khanfir
|
Automatic local Gabor Features extraction for face recognition
|
7 pages, International Journal of Computer Science and Information
Security, IJCSIS, Impact Factor 0.423
|
IJCSIS July 2009, Volume 3, ISSN 1947 5500
| null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present in this paper a biometric system of face detection and recognition
in color images. The face detection technique is based on skin color
information and fuzzy classification. A new algorithm is proposed in order to
detect automatically face features (eyes, mouth and nose) and extract their
correspondent geometrical points. These fiducial points are described by sets
of wavelet components which are used for recognition. To achieve the face
recognition, we use neural networks and we study its performances for different
inputs. We compare the two types of features used for recognition: geometric
distances and Gabor coefficients which can be used either independently or
jointly. This comparison shows that Gabor coefficients are more powerful than
geometric distances. We show with experimental results how the importance
recognition ratio makes our system an effective tool for automatic face
detection and recognition.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 20:02:15 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Jemaa",
"Yousra Ben",
""
],
[
"Khanfir",
"Sana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0907.4994
|
R Doomun
|
R.K.Pateriya, J.L.Rana, S.C. Shrivastava, Jaideep Patel
|
A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers
using Batch RSA decryption
|
5 pages, International Journal of Computer Science and Information
Security, IJCSIS, Impact Factor 0.423
|
IJCSIS July 2009, Volume 3, ISSN 1947 5500
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Today, Internet becomes the essential part of our lives. Over 90 percent of
the ecommerce is developed on the Internet. A security algorithm became very
necessary for producer client transactions assurance and the financial
applications safety. The rsa algorithm applicability derives from algorithm
properties like confidentiality, safe authentication, data safety and integrity
on the internet. Thus, this kind of networks can have a more easy utilization
by practical accessing from short, medium, even long distance and from
different public places. Rsa encryption in the client side is relatively cheap,
whereas, the corresponding decryption in the server side is expensive because
its private exponent is much larger. Thus ssl tls servers become swamped to
perform public key decryption operations when the simultaneous requests
increase quickly .The batch rsa method is useful for such highly loaded web
server .In our proposed algorithm by reducing the response time and clients
tolerable waiting time an improvement in performance of ssl tls servers can be
done. The proposed algorithm should provide the reasonable response time and
optimizes server performance significantly. At Encryption side, to withstand
many attacks like brute force attack, subtle attack etc. we also adapted a
parameter generation method, which sieve all the parameters strictly, and
filter out every insecure parameter.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 20:17:04 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Pateriya",
"R. K.",
""
],
[
"Rana",
"J. L.",
""
],
[
"Shrivastava",
"S. C.",
""
],
[
"Patel",
"Jaideep",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.4996
|
Lun Dong
|
Lun Dong, Zhu Han, Athina P. Petropulu and H. Vincent Poor
|
Cooperative Jamming for Wireless Physical Layer Security
|
4 pages, 3 figures, in Proceedings of IEEE Workshop on Statistical
Signal Processing (SSP 2009), Cardiff, Wales, UK, Aug. - Sept. 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cooperative jamming is an approach that has been recently proposed for
improving physical layer based security for wireless networks in the presence
of an eavesdropper. While the source transmits its message to its destination,
a relay node transmits a jamming signal to create interference at the
eavesdropper. In this paper, a scenario in which the relay is equipped with
multiple antennas is considered. A novel system design is proposed for
determining the antenna weights and transmit power of source and relay, so that
the system secrecy rate is maximized subject to a total transmit power
constraint, or, the transmit power is minimized subject to a secrecy rate
constraint. Since the optimal solutions to these problems are difficult to
obtain, suboptimal closed-form solutions are proposed that introduce an
additional constraint, i.e., the complete nulling of jamming signal at the
destination.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 20:46:23 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Dong",
"Lun",
""
],
[
"Han",
"Zhu",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5016
|
Hurlee Gonchigdanzan Dr.
|
Hurlee Gonchigdanzan
|
How much does a Hamiltonian cycle weigh?
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate how much Hamiltonian cycles weigh in K_4 and K_5
compare to the total weight of the graph and establish precise estimates.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 22:47:01 GMT"
},
{
"version": "v2",
"created": "Thu, 30 Jul 2009 00:13:38 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Gonchigdanzan",
"Hurlee",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.5024
|
Aris L. Moustakas
|
P. Kazakopoulos, P. Mertikopoulos, A. L. Moustakas and G. Caire
|
Living at the Edge: A Large Deviations Approach to the Outage MIMO
Capacity
|
Accepted for publication, IEEE Transactions on Information Theory
(2010). Part of this work appears in the Proc. IEEE Information Theory
Workshop, June 2009, Volos, Greece
|
IEEE Transactions on Information Theory, vol. 57, no 4, p. 1984,
April 2011
|
10.1109/TIT.2011.2112050
| null |
cs.IT cond-mat.stat-mech math.IT stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using a large deviations approach we calculate the probability distribution
of the mutual information of MIMO channels in the limit of large antenna
numbers. In contrast to previous methods that only focused at the distribution
close to its mean (thus obtaining an asymptotically Gaussian distribution), we
calculate the full distribution, including its tails which strongly deviate
from the Gaussian behavior near the mean. The resulting distribution
interpolates seamlessly between the Gaussian approximation for rates $R$ close
to the ergodic value of the mutual information and the approach of Zheng and
Tse for large signal to noise ratios $\rho$. This calculation provides us with
a tool to obtain outage probabilities analytically at any point in the $(R,
\rho, N)$ parameter space, as long as the number of antennas $N$ is not too
small. In addition, this method also yields the probability distribution of
eigenvalues constrained in the subspace where the mutual information per
antenna is fixed to $R$ for a given $\rho$. Quite remarkably, this eigenvalue
density is of the form of the Marcenko-Pastur distribution with square-root
singularities, and it depends on the values of $R$ and $\rho$.
|
[
{
"version": "v1",
"created": "Tue, 28 Jul 2009 23:41:51 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Oct 2010 12:34:53 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Kazakopoulos",
"P.",
""
],
[
"Mertikopoulos",
"P.",
""
],
[
"Moustakas",
"A. L.",
""
],
[
"Caire",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0907.5030
|
Terence H. Chan
|
Terence Chan, Alex Grant and Doris Kern
|
Existence of new inequalities for representable polymatroids
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An Ingletonian polymatroid satisfies, in addition to the polymatroid axioms,
the inequalities of Ingleton (Combin. Math. Appln., 1971). These inequalities
are required for a polymatroid to be representable. It is has been an open
question as to whether these inequalities are also sufficient. Representable
polymatroids are of interest in their own right. They also have a strong
connection to network coding. In particular, the problem of finding the linear
network coding capacity region is equivalent to the characterization of all
representable, entropic polymatroids. In this paper, we describe a new approach
to adhere two polymatroids together to produce a new polymatroid. Using this
approach, we can construct a polymatroid that is not inside the minimal closed
and convex cone containing all representable polymatroids. This polymatroid is
proved to satisfy not only the Ingleton inequalities, but also the recently
reported inequalities of Dougherty, Freiling and Zeger. A direct consequence is
that these inequalities are not sufficient to characterize representable
polymatroids.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 05:06:50 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Sep 2009 00:50:49 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Chan",
"Terence",
""
],
[
"Grant",
"Alex",
""
],
[
"Kern",
"Doris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5032
|
Shai Haim
|
Shai Haim and Toby Walsh
|
Restart Strategy Selection using Machine Learning Techniques
|
14 pages, 4 figures
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Restart strategies are an important factor in the performance of
conflict-driven Davis Putnam style SAT solvers. Selecting a good restart
strategy for a problem instance can enhance the performance of a solver.
Inspired by recent success applying machine learning techniques to predict the
runtime of SAT solvers, we present a method which uses machine learning to
boost solver performance through a smart selection of the restart strategy.
Based on easy to compute features, we train both a satisfiability classifier
and runtime models. We use these models to choose between restart strategies.
We present experimental results comparing this technique with the most commonly
used restart strategies. Our results demonstrate that machine learning is
effective in improving solver performance.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 01:21:36 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Haim",
"Shai",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.5033
|
Shai Haim
|
Shai Haim and Toby Walsh
|
Online Search Cost Estimation for SAT Solvers
|
8 pages, 9 figures
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present two different methods for estimating the cost of solving SAT
problems. The methods focus on the online behaviour of the backtracking solver,
as well as the structure of the problem. Modern SAT solvers present several
challenges to estimate search cost including coping with nonchronological
backtracking, learning and restarts. Our first method adapt an existing
algorithm for estimating the size of a search tree to deal with these
challenges. We then suggest a second method that uses a linear model trained on
data gathered online at the start of search. We compare the effectiveness of
these two methods using random and structured problems. We also demonstrate
that predictions made in early restarts can be used to improve later
predictions. We conclude by showing that the cost of solving a set of problems
can be reduced by selecting a solver from a portfolio based on such cost
estimations.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 01:30:53 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Haim",
"Shai",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.5038
|
Yi Li
|
Yi Li
|
An Explicit Construction of Gauss-Jordan Elimination Matrix
| null | null | null | null |
cs.SC cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A constructive approach to get the reduced row echelon form of a given matrix
$A$ is presented. It has been shown that after the $k$th step of the
Gauss-Jordan procedure, each entry $a^k_{ij}(i<>j; j > k)$ in the new matrix
$A^k$ can always be expressed as a ratio of two determinants whose entries are
from the original matrix $A$. The new method also gives a more general
generalization of Cramer's rule than existing methods.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 02:01:45 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Li",
"Yi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0907.5043
|
Zhi-Qiang Jiang
|
Zhi-Qiang Jiang (ECUST), Wei-Xing Zhou (ECUST), Qun-Zhao Tan (SNDA)
|
Online-offline activities and game-playing behaviors of avatars in a
massive multiplayer online role-playing game
|
6 EPL pages including 10 eps figures
|
EPL 88, 48007 (2009)
|
10.1209/0295-5075/88/48007
| null |
physics.pop-ph cs.MA physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Massive multiplayer online role-playing games (MMORPGs) are very popular in
China, which provides a potential platform for scientific research. We study
the online-offline activities of avatars in an MMORPG to understand their
game-playing behavior. The statistical analysis unveils that the active avatars
can be classified into three types. The avatars of the first type are owned by
game cheaters who go online and offline in preset time intervals with the
online duration distributions dominated by pulses. The second type of avatars
is characterized by a Weibull distribution in the online durations, which is
confirmed by statistical tests. The distributions of online durations of the
remaining individual avatars differ from the above two types and cannot be
described by a simple form. These findings have potential applications in the
game industry.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 05:34:18 GMT"
}
] | 2009-12-04T00:00:00 |
[
[
"Jiang",
"Zhi-Qiang",
"",
"ECUST"
],
[
"Zhou",
"Wei-Xing",
"",
"ECUST"
],
[
"Tan",
"Qun-Zhao",
"",
"SNDA"
]
] |
[
{
"class": "Physics",
"code": "physics.pop-ph",
"description": "Description coming soon",
"span": "(Popular Physics)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0907.5055
|
Giovanni Pighizzini
|
Fevzi Belli and Mutlu Beyazit
|
Mutation of Directed Graphs -- Corresponding Regular Expressions and
Complexity of Their Generation
| null |
EPTCS 3, 2009, pp. 69-77
|
10.4204/EPTCS.3.6
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Directed graphs (DG), interpreted as state transition diagrams, are
traditionally used to represent finite-state automata (FSA). In the context of
formal languages, both FSA and regular expressions (RE) are equivalent in that
they accept and generate, respectively, type-3 (regular) languages. Based on
our previous work, this paper analyzes effects of graph manipulations on
corresponding RE. In this present, starting stage we assume that the DG under
consideration contains no cycles. Graph manipulation is performed by deleting
or inserting of nodes or arcs. Combined and/or multiple application of these
basic operators enable a great variety of transformations of DG (and
corresponding RE) that can be seen as mutants of the original DG (and
corresponding RE). DG are popular for modeling complex systems; however they
easily become intractable if the system under consideration is complex and/or
large. In such situations, we propose to switch to corresponding RE in order to
benefit from their compact format for modeling and algebraic operations for
analysis. The results of the study are of great potential interest to mutation
testing.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 06:53:16 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Belli",
"Fevzi",
""
],
[
"Beyazit",
"Mutlu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5058
|
EPTCS
|
Marco Almeida (LIACC-U.Porto), Nelma Moreira (LIACC-U.Porto),
Rog\'erio Reis (LIACC-U.Porto)
|
Testing the Equivalence of Regular Languages
| null |
EPTCS 3, 2009, pp. 47-57
|
10.4204/EPTCS.3.4
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The minimal deterministic finite automaton is generally used to determine
regular languages equality. Antimirov and Mosses proposed a rewrite system for
deciding regular expressions equivalence of which Almeida et al. presented an
improved variant. Hopcroft and Karp proposed an almost linear algorithm for
testing the equivalence of two deterministic finite automata that avoids
minimisation. In this paper we improve the best-case running time, present an
extension of this algorithm to non-deterministic finite automata, and establish
a relationship between this algorithm and the one proposed in Almeida et al. We
also present some experimental comparative results. All these algorithms are
closely related with the recent coalgebraic approach to automata proposed by
Rutten.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 07:44:15 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Almeida",
"Marco",
"",
"LIACC-U.Porto"
],
[
"Moreira",
"Nelma",
"",
"LIACC-U.Porto"
],
[
"Reis",
"Rogério",
"",
"LIACC-U.Porto"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5063
|
EPTCS
|
Hermann Gruber, Markus Holzer, Martin Kutrib
|
On Measuring Non-Recursive Trade-Offs
| null |
EPTCS 3, 2009, pp. 141-150
|
10.4204/EPTCS.3.13
| null |
cs.FL cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the phenomenon of non-recursive trade-offs between
descriptional systems in an abstract fashion. We aim at categorizing
non-recursive trade-offs by bounds on their growth rate, and show how to deduce
such bounds in general. We also identify criteria which, in the spirit of
abstract language theory, allow us to deduce non-recursive tradeoffs from
effective closure properties of language families on the one hand, and
differences in the decidability status of basic decision problems on the other.
We develop a qualitative classification of non-recursive trade-offs in order to
obtain a better understanding of this very fundamental behaviour of
descriptional systems.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:43:02 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Gruber",
"Hermann",
""
],
[
"Holzer",
"Markus",
""
],
[
"Kutrib",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5072
|
EPTCS
|
Galina Jir\'askov\'a (Slovak Academy of Sciences), Alexander Okhotin
(University of Turku)
|
Nondeterministic State Complexity of Positional Addition
| null |
EPTCS 3, 2009, pp. 151-161
|
10.4204/EPTCS.3.14
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider nondeterministic finite automata recognizing base-k positional
notation of numbers. Assume that numbers are read starting from their least
significant digits. It is proved that if two sets of numbers S and T are
represented by nondeterministic automata of m and n states, respectively, then
their sum {s+t | s in S, t in T} is represented by a nondeterministic automaton
with 2mn+2m+2n+1 states. Moreover, this number of states is necessary in the
worst case for all k>=9.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:48:23 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Jirásková",
"Galina",
"",
"Slovak Academy of Sciences"
],
[
"Okhotin",
"Alexander",
"",
"University of Turku"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5074
|
Marcello M. Bersani
|
Marcello M. Bersani, Carlo A. Furia, Matteo Pradella, and Matteo Rossi
|
Integrated Modeling and Verification of Real-Time Systems through
Multiple Paradigms
|
27 pages
|
Proceedings of the 7th IEEE International Conference on Software
Engineering and Formal Methods (SEFM'09). Pgg. 13--22, IEEE Computer Society
Press, November 2009
|
10.1109/SEFM.2009.16
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Complex systems typically have many different parts and facets, with
different characteristics. In a multi-paradigm approach to modeling, formalisms
with different natures are used in combination to describe complementary parts
and aspects of the system. This can have a beneficial impact on the modeling
activity, as different paradigms an be better suited to describe different
aspects of the system. While each paradigm provides a different view on the
many facets of the system, it is of paramount importance that a coherent
comprehensive model emerges from the combination of the various partial
descriptions. In this paper we present a technique to model different aspects
of the same system with different formalisms, while keeping the various models
tightly integrated with one another. In addition, our approach leverages the
flexibility provided by a bounded satisfiability checker to encode the
verification problem of the integrated model in the propositional
satisfiability (SAT) problem; this allows users to carry out formal
verification activities both on the whole model and on parts thereof. The
effectiveness of the approach is illustrated through the example of a
monitoring system.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 09:21:45 GMT"
}
] | 2013-08-14T00:00:00 |
[
[
"Bersani",
"Marcello M.",
""
],
[
"Furia",
"Carlo A.",
""
],
[
"Pradella",
"Matteo",
""
],
[
"Rossi",
"Matteo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.5083
|
EPTCS
|
M. Sakthi Balan (Infosys)
|
Serializing the Parallelism in Parallel Communicating Pushdown Automata
Systems
| null |
EPTCS 3, 2009, pp. 59-68
|
10.4204/EPTCS.3.5
| null |
cs.FL cs.CL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider parallel communicating pushdown automata systems (PCPA) and
define a property called known communication for it. We use this property to
prove that the power of a variant of PCPA, called returning centralized
parallel communicating pushdown automata (RCPCPA), is equivalent to that of
multi-head pushdown automata. The above result presents a new sub-class of
returning parallel communicating pushdown automata systems (RPCPA) called
simple-RPCPA and we show that it can be written as a finite intersection of
multi-head pushdown automata systems.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 09:45:32 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Balan",
"M. Sakthi",
"",
"Infosys"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0907.5096
|
Adrien Richard
|
Adrien Richard
|
Negative circuits and sustained oscillations in asynchronous automata
networks
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The biologist Ren\'e Thomas conjectured, twenty years ago, that the presence
of a negative feedback circuit in the interaction graph of a dynamical system
is a necessary condition for this system to produce sustained oscillations. In
this paper, we state and prove this conjecture for asynchronous automata
networks, a class of discrete dynamical systems extensively used to model the
behaviors of gene networks. As a corollary, we obtain the following fixed point
theorem: given a product $X$ of $n$ finite intervals of integers, and a map $F$
from $X$ to itself, if the interaction graph associated with $F$ has no
negative circuit, then $F$ has at least one fixed point.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 10:40:12 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Richard",
"Adrien",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.5111
|
EPTCS
|
Franziska Biegler, Mark Daley, Ian McQuillan
|
On the Shuffle Automaton Size for Words
| null |
EPTCS 3, 2009, pp. 79-89
|
10.4204/EPTCS.3.7
| null |
cs.FL cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the state size of DFAs accepting the shuffle of two words. We
provide words u and v, such that the minimal DFA for u shuffled with v requires
an exponential number of states. We also show some conditions for the words u
and v which ensure a quadratic upper bound on the state size of u shuffled with
v. Moreover, switching only two letters within one of u or v is enough to
trigger the change from quadratic to exponential.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:11:50 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Biegler",
"Franziska",
""
],
[
"Daley",
"Mark",
""
],
[
"McQuillan",
"Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.5119
|
EPTCS
|
Erzs\'ebet Csuhaj-Varj\'u, Gy\"orgy Vaszil
|
On the Size Complexity of Non-Returning Context-Free PC Grammar Systems
| null |
EPTCS 3, 2009, pp. 91-100
|
10.4204/EPTCS.3.8
| null |
cs.FL cs.DC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Improving the previously known best bound, we show that any recursively
enumerable language can be generated with a non-returning parallel
communicating (PC) grammar system having six context-free components. We also
present a non-returning universal PC grammar system generating unary languages,
that is, a system where not only the number of components, but also the number
of productions and the number of nonterminals are limited by certain constants,
and these size parameters do not depend on the generated language.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:20:17 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Csuhaj-Varjú",
"Erzsébet",
""
],
[
"Vaszil",
"György",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0907.5120
|
EPTCS
|
Rudolf Freund, Andreas Klein, Martin Kutrib
|
On the Number of Membranes in Unary P Systems
| null |
EPTCS 3, 2009, pp. 101-109
|
10.4204/EPTCS.3.9
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider P systems with a linear membrane structure working on objects
over a unary alphabet using sets of rules resembling homomorphisms. Such a
restricted variant of P systems allows for a unique minimal representation of
the generated unary language and in that way for an effective solution of the
equivalence problem. Moreover, we examine the descriptional complexity of unary
P systems with respect to the number of membranes.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:25:02 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Freund",
"Rudolf",
""
],
[
"Klein",
"Andreas",
""
],
[
"Kutrib",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5121
|
EPTCS
|
Pierluigi Frisco (Heriot-Watt University), Oscar H. Ibarra (University
of California)
|
On Languages Accepted by P/T Systems Composed of joins
| null |
EPTCS 3, 2009, pp. 111-120
|
10.4204/EPTCS.3.10
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, some studies linked the computational power of abstract computing
systems based on multiset rewriting to models of Petri nets and the computation
power of these nets to their topology. In turn, the computational power of
these abstract computing devices can be understood by just looking at their
topology, that is, information flow.
Here we continue this line of research introducing J languages and proving
that they can be accepted by place/transition systems whose underlying net is
composed only of joins. Moreover, we investigate how J languages relate to
other families of formal languages. In particular, we show that every J
language can be accepted by a log n space-bounded non-deterministic Turing
machine with a one-way read-only input. We also show that every J language has
a semilinear Parikh map and that J languages and context-free languages (CFLs)
are incomparable.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:29:45 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Frisco",
"Pierluigi",
"",
"Heriot-Watt University"
],
[
"Ibarra",
"Oscar H.",
"",
"University\n of California"
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5124
|
EPTCS
|
Yuan Gao, Sheng Yu
|
State Complexity Approximation
| null |
EPTCS 3, 2009, pp. 121-130
|
10.4204/EPTCS.3.11
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we introduce the new concept of state complexity
approximation, which is a further development of state complexity estimation.
We show that this new concept is useful in both of the following two cases: the
exact state complexities are not known and the state complexities have been
obtained but are in incomprehensible form.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:34:34 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Gao",
"Yuan",
""
],
[
"Yu",
"Sheng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5125
|
Florent Jacquemard
|
Florent Jacquemard (INRIA Saclay - Ile de France), Michael Rusinowitch
(INRIA Lorraine - LORIA / LIFC)
|
Rewrite based Verification of XML Updates
| null | null | null |
RR-7007
|
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider problems of access control for update of XML documents. In the
context of XML programming, types can be viewed as hedge automata, and static
type checking amounts to verify that a program always converts valid source
documents into also valid output documents. Given a set of update operations we
are particularly interested by checking safety properties such as preservation
of document types along any sequence of updates. We are also interested by the
related policy consistency problem, that is detecting whether a sequence of
authorized operations can simulate a forbidden one. We reduce these questions
to type checking problems, solved by computing variants of hedge automata
characterizing the set of ancestors and descendants of the initial document
type for the closure of parameterized rewrite rules.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:34:50 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Jacquemard",
"Florent",
"",
"INRIA Saclay - Ile de France"
],
[
"Rusinowitch",
"Michael",
"",
"INRIA Lorraine - LORIA / LIFC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0907.5126
|
John Panaretos
|
John Panaretos, Chrisovaladis Malesios
|
A population-modulated bibliometric measure with an application in the
field of statistics
| null | null | null | null |
stat.AP cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We use confirmatory factor analysis to derive a unifying measure of
comparison of scientists based on bibliometric measurements, by utilizing the
h-index, some similar h-type indices as well as other common measures of
scientific performance. We use a real data example from nine well-known
departments of statistics to demonstrate our approach and argue that our
combined measure results in a better overall evaluation of a researchers'
scientific work.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:38:55 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Aug 2009 08:08:54 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Panaretos",
"John",
""
],
[
"Malesios",
"Chrisovaladis",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0907.5127
|
EPTCS
|
Viliam Geffert, Lubom\'ira I\v{s}to\v{n}ov\'a
|
Translation from Classical Two-Way Automata to Pebble Two-Way Automata
| null |
EPTCS 3, 2009, pp. 131-140
|
10.4204/EPTCS.3.12
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the relation between the standard two-way automata and more powerful
devices, namely, two-way finite automata with an additional "pebble" movable
along the input tape. Similarly as in the case of the classical two-way
machines, it is not known whether there exists a polynomial trade-off, in the
number of states, between the nondeterministic and deterministic pebble two-way
automata. However, we show that these two machine models are not independent:
if there exists a polynomial trade-off for the classical two-way automata, then
there must also exist a polynomial trade-off for the pebble two-way automata.
Thus, we have an upward collapse (or a downward separation) from the classical
two-way automata to more powerful pebble automata, still staying within the
class of regular languages. The same upward collapse holds for complementation
of nondeterministic two-way machines.
These results are obtained by showing that each pebble machine can be, by
using suitable inputs, simulated by a classical two-way automaton with a linear
number of states (and vice versa), despite the existing exponential blow-up
between the classical and pebble two-way machines.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:39:09 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Geffert",
"Viliam",
""
],
[
"Ištoňová",
"Lubomíra",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5128
|
EPTCS
|
Martin Kutrib, Andreas Malcher
|
Bounded Languages Meet Cellular Automata with Sparse Communication
| null |
EPTCS 3, 2009, pp. 163-172
|
10.4204/EPTCS.3.15
| null |
cs.FL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cellular automata are one-dimensional arrays of interconnected interacting
finite automata. We investigate one of the weakest classes, the real-time
one-way cellular automata, and impose an additional restriction on their
inter-cell communication by bounding the number of allowed uses of the links
between cells. Moreover, we consider the devices as acceptors for bounded
languages in order to explore the borderline at which non-trivial decidability
problems of cellular automata classes become decidable. It is shown that even
devices with drastically reduced communication, that is, each two neighboring
cells may communicate only constantly often, accept bounded languages that are
not semilinear. If the number of communications is at least logarithmic in the
length of the input, several problems are undecidable. The same result is
obtained for classes where the total number of communications during a
computation is linearly bounded.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:52:28 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Kutrib",
"Martin",
""
],
[
"Malcher",
"Andreas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0907.5130
|
EPTCS
|
Remco Loos, Florin Manea, Victor Mitrana
|
Small Universal Accepting Networks of Evolutionary Processors with
Filtered Connections
| null |
EPTCS 3, 2009, pp. 173-182
|
10.4204/EPTCS.3.16
| null |
cs.FL cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present some results regarding the size complexity of
Accepting Networks of Evolutionary Processors with Filtered Connections
(ANEPFCs). We show that there are universal ANEPFCs of size 10, by devising a
method for simulating 2-Tag Systems. This result significantly improves the
known upper bound for the size of universal ANEPFCs which is 18.
We also propose a new, computationally and descriptionally efficient
simulation of nondeterministic Turing machines by ANEPFCs. More precisely, we
describe (informally, due to space limitations) how ANEPFCs with 16 nodes can
simulate in O(f(n)) time any nondeterministic Turing machine of time complexity
f(n). Thus the known upper bound for the number of nodes in a network
simulating an arbitrary Turing machine is decreased from 26 to 16.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 13:57:19 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Loos",
"Remco",
""
],
[
"Manea",
"Florin",
""
],
[
"Mitrana",
"Victor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.5132
|
EPTCS
|
Tom\'a\v{s} Masopust, Alexander Meduna
|
Descriptional Complexity of Three-Nonterminal Scattered Context
Grammars: An Improvement
| null |
EPTCS 3, 2009, pp. 183-192
|
10.4204/EPTCS.3.17
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, it has been shown that every recursively enumerable language can be
generated by a scattered context grammar with no more than three nonterminals.
However, in that construction, the maximal number of nonterminals
simultaneously rewritten during a derivation step depends on many factors, such
as the cardinality of the alphabet of the generated language and the structure
of the generated language itself. This paper improves the result by showing
that the maximal number of nonterminals simultaneously rewritten during any
derivation step can be limited by a small constant regardless of other factors.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 14:00:56 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Masopust",
"Tomáš",
""
],
[
"Meduna",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5136
|
EPTCS
|
Ralf Stiebe, Sherzod Turaev
|
Capacity Bounded Grammars and Petri Nets
| null |
EPTCS 3, 2009, pp. 193-203
|
10.4204/EPTCS.3.18
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A capacity bounded grammar is a grammar whose derivations are restricted by
assigning a bound to the number of every nonterminal symbol in the sentential
forms. In the paper the generative power and closure properties of capacity
bounded grammars and their Petri net controlled counterparts are investigated.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 14:16:33 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Stiebe",
"Ralf",
""
],
[
"Turaev",
"Sherzod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0907.5138
|
Benoit Kloeckner
|
Benoit Kloeckner (IF)
|
Cutwidth and degeneracy of graphs
|
v2: slightly shortened, some typos corrected.
| null | null |
IF_PREPUB
|
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove an inequality involving the degeneracy, the cutwidth and the
sparsity of graphs. It implies a quadratic lower bound on the cutwidth in terms
of the degeneracy for all graphs and an improvement of it for clique-free
graphs.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 14:09:22 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Oct 2010 15:51:59 GMT"
}
] | 2010-11-01T00:00:00 |
[
[
"Kloeckner",
"Benoit",
"",
"IF"
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.5141
|
Haipeng Zheng
|
Haipeng Zheng, Sanjeev R. Kulkarni, H. Vincent Poor
|
Cooperative Training for Attribute-Distributed Data: Trade-off Between
Data Transmission and Performance
| null |
Proceedings of IEEE Fusion 2009
| null | null |
cs.DC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a modeling framework for distributed regression with
agents/experts observing attribute-distributed data (heterogeneous data). Under
this model, a new algorithm, the iterative covariance optimization algorithm
(ICOA), is designed to reshape the covariance matrix of the training residuals
of individual agents so that the linear combination of the individual
estimators minimizes the ensemble training error. Moreover, a scheme (Minimax
Protection) is designed to provide a trade-off between the number of data
instances transmitted among the agents and the performance of the ensemble
estimator without undermining the convergence of the algorithm. This scheme
also provides an upper bound (with high probability) on the test error of the
ensemble estimator. The efficacy of ICOA combined with Minimax Protection and
the comparison between the upper bound and actual performance are both
demonstrated by simulations.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 14:20:08 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Zheng",
"Haipeng",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0907.5155
|
Ching-an Hsiao
|
C. A. Hsiao
|
On Classification from Outlier View
|
Conclusion renewed; IAENG International Journal of Computer Science,
Volume 37, Issue 4, Nov, 2010
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Classification is the basis of cognition. Unlike other solutions, this study
approaches it from the view of outliers. We present an expanding algorithm to
detect outliers in univariate datasets, together with the underlying
foundation. The expanding algorithm runs in a holistic way, making it a rather
robust solution. Synthetic and real data experiments show its power.
Furthermore, an application for multi-class problems leads to the introduction
of the oscillator algorithm. The corresponding result implies the potential
wide use of the expanding algorithm.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 15:47:33 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Jul 2009 14:17:30 GMT"
},
{
"version": "v3",
"created": "Fri, 24 Jun 2011 13:53:49 GMT"
},
{
"version": "v4",
"created": "Mon, 2 Jan 2012 15:19:41 GMT"
}
] | 2012-01-04T00:00:00 |
[
[
"Hsiao",
"C. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0907.5162
|
Anya Tafliovich
|
Anya Tafliovich and Eric C. R. Hehner
|
Programming with Quantum Communication
| null | null | null | null |
cs.PL cs.LO quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work develops a formal framework for specifying, implementing, and
analysing quantum communication protocols. We provide tools for developing
simple proofs and analysing programs which involve communication, both via
quantum channels and exhibiting the LOCC (local operations, classical
communication) paradigm.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 15:38:02 GMT"
}
] | 2009-07-30T00:00:00 |
[
[
"Tafliovich",
"Anya",
""
],
[
"Hehner",
"Eric C. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0907.5165
|
Oliver Johnson
|
Oliver Johnson, Matthew Aldridge, Robert Piechocki
|
Interference alignment-based sum capacity bounds for random dense
Gaussian interference networks
|
23 pages
|
IEEE Transactions on Information Theory, 57:1, 282-290, 2011
|
10.1109/TIT.2010.2090242
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a dense $K$ user Gaussian interference network formed by paired
transmitters and receivers placed independently at random in a fixed spatial
region. Under natural conditions on the node position distributions and signal
attenuation, we prove convergence in probability of the average per-user
capacity $\csum/K$ to $\half \ep \log(1 + 2 \SNR)$. The achievability result
follows directly from results based on an interference alignment scheme
presented in recent work of Nazer et al. Our main contribution comes through an
upper bound, motivated by ideas of `bottleneck capacity' developed in recent
work of Jafar. By controlling the physical location of transmitter--receiver
pairs, we can match a large proportion of these pairs to form so-called
$\epsilon$-bottleneck links, with consequent control of the sum capacity.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 15:47:48 GMT"
}
] | 2011-09-12T00:00:00 |
[
[
"Johnson",
"Oliver",
""
],
[
"Aldridge",
"Matthew",
""
],
[
"Piechocki",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5168
|
Haipeng Zheng
|
Haipeng Zheng, Sanjeev R. Kulkarni and H. Vincent Poor
|
Collaborative Training in Sensor Networks: A graphical model approach
| null |
Proceedings of IEEE International Workshop on Machine Learning for
Signal Processing, 2009
|
10.1109/MLSP.2009.5306188
| null |
cs.DC cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Graphical models have been widely applied in solving distributed inference
problems in sensor networks. In this paper, the problem of coordinating a
network of sensors to train a unique ensemble estimator under communication
constraints is discussed. The information structure of graphical models with
specific potential functions is employed, and this thus converts the
collaborative training task into a problem of local training plus global
inference. Two important classes of algorithms of graphical model inference,
message-passing algorithm and sampling algorithm, are employed to tackle
low-dimensional, parametrized and high-dimensional, non-parametrized problems
respectively. The efficacy of this approach is demonstrated by concrete
examples.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 15:59:16 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Zheng",
"Haipeng",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0907.5219
|
Shahar Dobzinski
|
Shahar Dobzinski
|
A Note on the Power of Truthful Approximation Mechanisms
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the power of polynomial-time truthful mechanisms comparing to
polynomial time (non-truthful) algorithms. We show that there is a setting in
which deterministic polynomial-time truthful mechanisms cannot guarantee a
bounded approximation ratio, but a non-truthful FPTAS exists. We also show that
in the same setting there is a universally truthful mechanism that provides an
approximation ratio of 2. This shows that the cost of truthfulness is
unbounded. The proofs are almost standard in the field and follow from known
results.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 09:18:31 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Aug 2009 15:41:55 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Dobzinski",
"Shahar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0907.5226
|
Subhash Kak
|
Subhash Kak
|
Recursive Random Number Generator Using Prime Reciprocals
|
4 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A recursive random number generator using prime reciprocals is described.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 21:54:34 GMT"
}
] | 2009-07-31T00:00:00 |
[
[
"Kak",
"Subhash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.5233
|
Sean McPherson
|
Sean McPherson, Antonio Ortega
|
Analysis of Internet Measurement Systems for Optimized Anomaly Detection
System Design
|
18 Pages, 10 Figures
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Although there exist very accurate hardware systems for measuring traffic on
the internet, their widespread use for analysis tasks is limited by their high
cost. On the other hand, less expensive, software-based systems exist that are
widely available and can be used to perform a number of simple analysis tasks.
The caveat with using such software systems is that application of standard
analysis methods cannot proceed blindly because inherent distortions exist in
the measurements obtained from software systems. The goal of this paper is to
analyze common Internet measurement systems to discover the effect of these
distortions on common analysis tasks. Then by selecting one specific task,
periodic signal detection, a more in-depth analysis is conducted which derives
a signal representation to capture the salient features of the measurement and
develops a periodic detection mechanism designed for the measurement system
which outperforms an existing detection method not optimized for the
measurement system. Finally, through experiments the importance of
understanding the relationship between the input traffic, measurement system
configuration and detection method performance is emphasized.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 23:20:21 GMT"
}
] | 2009-07-31T00:00:00 |
[
[
"McPherson",
"Sean",
""
],
[
"Ortega",
"Antonio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.5234
|
Kalyana Babu Nakshatrala
|
K. B. Nakshatrala and K. R. Rajagopal
|
A numerical study of fluids with pressure dependent viscosity flowing
through a rigid porous medium
| null | null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we consider modifications to Darcy's equation wherein the drag
coefficient is a function of pressure, which is a realistic model for
technological applications like enhanced oil recovery and geological carbon
sequestration. We first outline the approximations behind Darcy's equation and
the modifications that we propose to Darcy's equation, and derive the governing
equations through a systematic approach using mixture theory. We then propose a
stabilized mixed finite element formulation for the modified Darcy's equation.
To solve the resulting nonlinear equations we present a solution procedure
based on the consistent Newton-Raphson method. We solve representative test
problems to illustrate the performance of the proposed stabilized formulation.
One of the objectives of this paper is also to show that the dependence of
viscosity on the pressure can have a significant effect both on the qualitative
and quantitative nature of the solution.
|
[
{
"version": "v1",
"created": "Wed, 29 Jul 2009 23:22:24 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Apr 2010 22:12:47 GMT"
}
] | 2010-04-12T00:00:00 |
[
[
"Nakshatrala",
"K. B.",
""
],
[
"Rajagopal",
"K. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0907.5257
|
EPTCS
|
J\"urgen Dassow, Giovanni Pighizzini, Bianca Truthe
|
Proceedings Eleventh International Workshop on Descriptional Complexity
of Formal Systems
| null |
EPTCS 3, 2009
|
10.4204/EPTCS.3
| null |
cs.FL cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The 11th workshop, Descriptional Complexity of Formal Systems 2009, is taking
place in Magdeburg, Germany, on July 6-9, 2009. It is jointly organized by the
IFIP Working Group 1.2 on Descriptional Complexity and by the Faculty of
Computer Science at the Otto von Guericke University Magdeburg. This volume
contains the papers of the invited lectures and the accepted contributions.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 05:21:51 GMT"
}
] | 2010-02-23T00:00:00 |
[
[
"Dassow",
"Jürgen",
""
],
[
"Pighizzini",
"Giovanni",
""
],
[
"Truthe",
"Bianca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.5269
|
Dennis Luxen
|
Robert Geisberger, Dennis Luxen, Sabine Neubauer, Peter Sanders, Lars
Volker
|
Fast Detour Computation for Ride Sharing
|
5 pages, 2 figure environment, 4 includegraphics
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Todays ride sharing services still mimic a better billboard. They list the
offers and allow to search for the source and target city, sometimes enriched
with radial search. So finding a connection between big cities is quite easy.
These places are on a list of designated origin and distination points. But
when you want to go from a small town to another small town, even when they are
next to a freeway, you run into problems. You can't find offers that would or
could pass by the town easily with little or no detour. We solve this
interesting problem by presenting a fast algorithm that computes the offers
with the smallest detours w.r.t. a request. Our experiments show that the
problem is efficiently solvable in times suitable for a web service
implementation. For realistic database size we achieve lookup times of about
5ms and a matching rate of 90% instead of just 70% for the simple matching
algorithms used today.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 11:31:05 GMT"
}
] | 2009-07-31T00:00:00 |
[
[
"Geisberger",
"Robert",
""
],
[
"Luxen",
"Dennis",
""
],
[
"Neubauer",
"Sabine",
""
],
[
"Sanders",
"Peter",
""
],
[
"Volker",
"Lars",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.5287
|
Cristina Fern\'andez-C\'ordoba
|
J. Borges, C. Fernandez-Cordoba, J. Rifa
|
Propelinear structure of Z_{2k}-linear codes
| null |
Electronic Notes in Discrete Mathematics, Volume 10, November
2001, Pages 100-102
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let C be an additive subgroup of $\Z_{2k}^n$ for any $k\geq 1$. We define a
Gray map $\Phi:\Z_{2k}^n \longrightarrow \Z_2^{kn}$ such that $\Phi(\codi)$ is
a binary propelinear code and, hence, a Hamming-compatible group code.
Moreover, $\Phi$ is the unique Gray map such that $\Phi(C)$ is
Hamming-compatible group code. Using this Gray map we discuss about the
nonexistence of 1-perfect binary mixed group code.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 09:26:55 GMT"
}
] | 2009-07-31T00:00:00 |
[
[
"Borges",
"J.",
""
],
[
"Fernandez-Cordoba",
"C.",
""
],
[
"Rifa",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5290
|
Alexander Shkotin
|
Alex Shkotin
|
Program structure
|
22 pages, 4 figures
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A program is usually represented as a word chain. It is exactly a word chain
that appears as the lexical analyzer output and is parsed. The work shows that
a program can be syntactically represented as an oriented word tree, that is a
syntactic program tree, program words being located both in tree nodes and on
tree arrows. The basic property of a tree is that arrows starting from each
node are marked by different words (including an empty word). Semantics can
then be directly specified on such tree using either requirements or additional
links, and adding instructions to some tree nodes enables program execution
specification.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 09:33:53 GMT"
},
{
"version": "v2",
"created": "Thu, 22 Mar 2012 18:58:15 GMT"
}
] | 2012-03-23T00:00:00 |
[
[
"Shkotin",
"Alex",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0907.5321
|
Tomoya Sakai
|
Tomoya Sakai
|
Multiple pattern classification by sparse subspace decomposition
|
8 pages, 3 figures, 2nd IEEE International Workshop on Subspace
Methods, Workshop Proceedings of ICCV 2009
| null |
10.1109/ICCVW.2009.5457702
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A robust classification method is developed on the basis of sparse subspace
decomposition. This method tries to decompose a mixture of subspaces of
unlabeled data (queries) into class subspaces as few as possible. Each query is
classified into the class whose subspace significantly contributes to the
decomposed subspace. Multiple queries from different classes can be
simultaneously classified into their respective classes. A practical greedy
algorithm of the sparse subspace decomposition is designed for the
classification. The present method achieves high recognition rate and robust
performance exploiting joint sparsity.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 12:23:25 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 06:01:53 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Sakai",
"Tomoya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0907.5372
|
Barry Wittman
|
Greg N. Frederickson, Barry Wittman
|
Speedup in the Traveling Repairman Problem with Unit Time Windows
|
16 pages, 3 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The input to the unrooted traveling repairman problem is an undirected metric
graph and a subset of nodes, each of which has a time window of unit length.
Given that a repairman can start at any location, the goal is to plan a route
that visits as many nodes as possible during their respective time windows. A
polynomial-time bicriteria approximation algorithm is presented for this
problem, gaining an increased fraction of repairman visits for increased
speedup of repairman motion. For speedup $s$, we find a $6\gamma/(s +
1)$-approximation for $s$ in the range $1 \leq s \leq 2$ and a
$4\gamma/s$-approximation for $s$ in the range $2 \leq s \leq 4$, where $\gamma
= 1$ on tree-shaped networks and $\gamma = 2 + \epsilon$ on general metric
graphs.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 16:30:15 GMT"
}
] | 2009-07-31T00:00:00 |
[
[
"Frederickson",
"Greg N.",
""
],
[
"Wittman",
"Barry",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.5388
|
Aylin Yener
|
Xiang He and Aylin Yener
|
Providing Secrecy With Structured Codes: Tools and Applications to
Two-User Gaussian Channels
|
50 pages. Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent results have shown that structured codes can be used to construct good
channel codes, source codes and physical layer network codes for Gaussian
channels. For Gaussian channels with secrecy constraints, however, efforts to
date rely on random codes. In this work, we advocate that structured codes are
useful for providing secrecy, and show how to compute the secrecy rate when
structured codes are used. In particular, we solve the problem of bounding
equivocation rates with one important class of structured codes, i.e., nested
lattice codes. Having established this result, we next demonstrate the use of
structured codes for secrecy in two-user Gaussian channels. In particular, with
structured codes, we prove that a positive secure degree of freedom is
achievable for a large class of fully connected Gaussian channels as long as
the channel is not degraded. By way of this, for these channels, we establish
that structured codes outperform Gaussian random codes at high SNR. This class
of channels include the two-user multiple access wiretap channel, the two-user
interference channel with confidential messages and the two-user interference
wiretap channel. A notable consequence of this result is that, unlike the case
with Gaussian random codes, using structured codes for both transmission and
cooperative jamming, it is possible to achieve an arbitrary large secrecy rate
given enough power.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 18:28:27 GMT"
}
] | 2009-07-31T00:00:00 |
[
[
"He",
"Xiang",
""
],
[
"Yener",
"Aylin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5397
|
Divyanshu Vats
|
Divyanshu Vats, Jose M. F. Moura
|
Telescoping Recursive Representations and Estimation of Gauss-Markov
Random Fields
|
To appear in the Transactions on Information Theory
|
IEEE Transactions on Information Theory, vol. 57, no. 3, pp
1645-1663, March 2011
|
10.1109/TIT.2011.2104612
| null |
cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present \emph{telescoping} recursive representations for both continuous
and discrete indexed noncausal Gauss-Markov random fields. Our recursions start
at the boundary (a hypersurface in $\R^d$, $d \ge 1$) and telescope inwards.
For example, for images, the telescoping representation reduce recursions from
$d = 2$ to $d = 1$, i.e., to recursions on a single dimension. Under
appropriate conditions, the recursions for the random field are linear
stochastic differential/difference equations driven by white noise, for which
we derive recursive estimation algorithms, that extend standard algorithms,
like the Kalman-Bucy filter and the Rauch-Tung-Striebel smoother, to noncausal
Markov random fields.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 19:10:53 GMT"
},
{
"version": "v2",
"created": "Mon, 22 Feb 2010 02:17:38 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Aug 2010 17:20:17 GMT"
},
{
"version": "v4",
"created": "Mon, 20 Dec 2010 00:33:30 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Vats",
"Divyanshu",
""
],
[
"Moura",
"Jose M. F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.