id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0907.5402
Juan Jose Jaramillo
Juan Jose Jaramillo and R. Srikant
Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with Elastic and Inelastic Traffic
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the problem of congestion control and scheduling in ad hoc wireless networks that have to support a mixture of best-effort and real-time traffic. Optimization and stochastic network theory have been successful in designing architectures for fair resource allocation to meet long-term throughput demands. However, to the best of our knowledge, strict packet delay deadlines were not considered in this framework previously. In this paper, we propose a model for incorporating the quality of service (QoS) requirements of packets with deadlines in the optimization framework. The solution to the problem results in a joint congestion control and scheduling algorithm which fairly allocates resources to meet the fairness objectives of both elastic and inelastic flows, and per-packet delay requirements of inelastic flows.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 19:40:20 GMT" }, { "version": "v2", "created": "Fri, 31 Jul 2009 19:53:20 GMT" }, { "version": "v3", "created": "Fri, 31 Jul 2009 20:34:30 GMT" }, { "version": "v4", "created": "Tue, 25 Aug 2009 20:35:30 GMT" }, { "version": "v5", "created": "Fri, 23 Oct 2009 19:36:07 GMT" }, { "version": "v6", "created": "Mon, 26 Oct 2009 18:44:06 GMT" }, { "version": "v7", "created": "Thu, 10 Dec 2009 22:53:00 GMT" }, { "version": "v8", "created": "Sun, 13 Dec 2009 00:41:41 GMT" } ]
2009-12-13T00:00:00
[ [ "Jaramillo", "Juan Jose", "" ], [ "Srikant", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.5427
Gregory Gutin
Gregory Gutin, Eun Jung Kim, Matthias Mnich, Anders Yeo
Betweenness Parameterized Above Tight Lower Bound
null
null
null
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study ordinal embedding relaxations in the realm of parameterized complexity. We prove the existence of a quadratic kernel for the {\sc Betweenness} problem parameterized above its tight lower bound, which is stated as follows. For a set $V$ of variables and set $\mathcal C$ of constraints "$v_i$ \mbox{is between} $v_j$ \mbox{and} $v_k$", decide whether there is a bijection from $V$ to the set $\{1,\ldots,|V|\}$ satisfying at least $|\mathcal C|/3 + \kappa$ of the constraints in $\mathcal C$. Our result solves an open problem attributed to Benny Chor in Niedermeier's monograph "Invitation to Fixed-Parameter Algorithms." The betweenness problem is of interest in molecular biology. An approach developed in this paper can be used to determine parameterized complexity of a number of other optimization problems on permutations parameterized above or below tight bounds.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 21:26:12 GMT" }, { "version": "v2", "created": "Mon, 2 Nov 2009 19:28:20 GMT" }, { "version": "v3", "created": "Sat, 22 Jun 2013 10:56:57 GMT" } ]
2013-06-25T00:00:00
[ [ "Gutin", "Gregory", "" ], [ "Kim", "Eun Jung", "" ], [ "Mnich", "Matthias", "" ], [ "Yeo", "Anders", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.5429
R Doomun
Muhammad Sohail, Abdur Rashid Khan
Knowledge Elecitation for Factors Affecting Taskforce Productivity using a Questionnaire
7 pages, International Journal of Computer Science and Information Security, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, July 2009, Volume 3. No.1
null
null
cs.CY cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present the process of Knowledge Elicitation through a structured questionnaire technique. This is an effort to depict a problem domain as Investigation of factors affecting taskforce productivity. The problem has to be solved using the expert system technology. This problem is the very first step how to acquire knowledge from the domain experts. Knowledge Elicitation is one of the difficult tasks in knowledge base formation which is a key component of expert system. The questionnaire was distributed among 105 different domain experts of Public and Private Organizations (i.e. Education Institutions, Industries and Research etc) in Pakistan. A total 61 responses from these experts were received. All the experts were well qualified, highly experienced and has been remained the members for selection committees a number of times for different posts. Facts acquired were analyzed from which knowledge was extracted and elicited. A standard shape was given to the questionnaire for further research as a knowledge learning tool. This tool may be used as a standard document for selection and promotion of employees.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 21:06:19 GMT" } ]
2009-08-03T00:00:00
[ [ "Sohail", "Muhammad", "" ], [ "Khan", "Abdur Rashid", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0907.5430
Lucile Sassatelli
Eitan Altman, Francesco De Pellegrini, Lucile Sassatelli
Dynamic control of Coding in Delay Tolerant Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Delay tolerant Networks (DTNs) leverage the mobility of relay nodes to compensate for lack of permanent connectivity and thus enable communication between nodes that are out of range of each other. To decrease message delivery delay, the information to be transmitted is replicated in the network. We study replication mechanisms that include Reed-Solomon type codes as well as network coding in order to improve the probability of successful delivery within a given time limit. We propose an analytical approach that allows us to compute the probability of successful delivery. We study the effect of coding on the performance of the network while optimizing parameters that govern routing.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 21:12:04 GMT" }, { "version": "v2", "created": "Tue, 4 Aug 2009 19:08:32 GMT" }, { "version": "v3", "created": "Wed, 5 Aug 2009 19:46:09 GMT" }, { "version": "v4", "created": "Fri, 7 Aug 2009 18:15:11 GMT" } ]
2009-08-07T00:00:00
[ [ "Altman", "Eitan", "" ], [ "De Pellegrini", "Francesco", "" ], [ "Sassatelli", "Lucile", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.5433
R Doomun
Ratnesh Kumar Jain, Dr. R. S. Kasana, Dr. Suresh Jain
Efficient Web Log Mining using Doubly Linked Tree
5 pages, International Journal of Computer Science and Information Security, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, July 2009, Volume 3. No.1, USA
null
null
cs.IR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
World Wide Web is a huge data repository and is growing with the explosive rate of about 1 million pages a day. As the information available on World Wide Web is growing the usage of the web sites is also growing. Web log records each access of the web page and number of entries in the web logs is increasing rapidly. These web logs, when mined properly can provide useful information for decision-making. The designer of the web site, analyst and management executives are interested in extracting this hidden information from web logs for decision making. Web access pattern, which is the frequently used sequence of accesses, is one of the important information that can be mined from the web logs. This information can be used to gather business intelligence to improve sales and advertisement, personalization for a user, to analyze system performance and to improve the web site organization. There exist many techniques to mine access patterns from the web logs. This paper describes the powerful algorithm that mines the web logs efficiently. Proposed algorithm firstly converts the web access data available in a special doubly linked tree. Each access is called an event. This tree keeps the critical mining related information in very compressed form based on the frequent event count. Proposed recursive algorithm uses this tree to efficiently find all access patterns that satisfy user specified criteria. To prove that our algorithm is efficient from the other GSP (Generalized Sequential Pattern) algorithms we have done experimental studies on sample data.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 21:37:46 GMT" } ]
2009-08-03T00:00:00
[ [ "Jain", "Ratnesh Kumar", "" ], [ "Kasana", "Dr. R. S.", "" ], [ "Jain", "Dr. Suresh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5438
Pranav Agrawal
Pranav Agrawal, Joy Kuri
Key Distribution Scheme without Deployment Knowledge
8 pages, 5 figures, Accepted in ICUMT 2009
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many basic key distribution schemes specifically tuned to wireless sensor networks have been proposed in the literature. Recently, several researchers have proposed schemes in which they have used group-based deployment models and assumed predeployment knowledge of the expected locations of nodes. They have shown that these schemes achieve better performance than the basic schemes, in terms of connectivity, resilience against node capture and storage requirements. But in many situations expected locations of nodes are not available. In this paper we propose a solution which uses the basic scheme, but does not use group-based deployment model and predeployment knowledge of the locations of nodes, and yet performs better than schemes which make the aforementioned assumptions. In our scheme, groups are formed after deployment of sensor nodes, on the basis of their physical locations, and the nodes sample keys from disjoint key pools. Compromise of a node affects secure links with other nodes that are part of its group only. Because of this reason, our scheme performs better than the basic schemes and the schemes using predeployment knowledge, in terms of connectivity, storage requirement, and security. Moreover, the post-deployment key generation process completes sooner than in schemes like LEAP+.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 22:58:53 GMT" }, { "version": "v2", "created": "Sat, 29 Aug 2009 10:50:52 GMT" } ]
2009-08-29T00:00:00
[ [ "Agrawal", "Pranav", "" ], [ "Kuri", "Joy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0907.5441
R Doomun
B.Narasimhan, S.Santhosh baboo
A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile Ad-hoc Networks
7 pages, International Journal of Computer Science and Information Security, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, July 2009, Volume 3. No.1, USA
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Heterogeneous mobile ad hoc networks (MANETs) congestion occurs with limited resources. Due to the shared wireless channel and dynamic topology, packet transmissions suffer from interference and fading. In heterogeneous ad hoc networks, throughput via a given route is depending on the minimum data rate of all its links. In a route of links with various data rates, if a high data rate node forwards more traffic to a low data rate node, there is a chance of congestion, which leads to long queuing delays in such routes. Since hop count is used as a routing metric in traditional routing, it do not adapt well to mobile nodes. A congestion-aware routing metric for MANETs should incorporate transmission capability, reliability, and congestion around a link. In this paper, we propose to develop a hop-by-hop congestion aware routing protocol which employs a combined weight value as a routing metric, based on the data rate, queuing delay, link quality and MAC overhead. Among the discovered routes, the route with minimum cost index is selected, which is based on the node weight of all the in-network nodes. Simulation results prove that our proposed routing protocol attains high throughput and packet delivery ratio, by reducing the packet drop and delay.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 22:31:08 GMT" } ]
2009-08-03T00:00:00
[ [ "Narasimhan", "B.", "" ], [ "baboo", "S. Santhosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.5442
Jian Li
Jian Li, Amol Deshpande, Samir Khuller
On Computing Compression Trees for Data Collection in Sensor Networks
null
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the problem of efficiently gathering correlated data from a wired or a wireless sensor network, with the aim of designing algorithms with provable optimality guarantees, and understanding how close we can get to the known theoretical lower bounds. Our proposed approach is based on finding an optimal or a near-optimal {\em compression tree} for a given sensor network: a compression tree is a directed tree over the sensor network nodes such that the value of a node is compressed using the value of its parent. We consider this problem under different communication models, including the {\em broadcast communication} model that enables many new opportunities for energy-efficient data collection. We draw connections between the data collection problem and a previously studied graph concept, called {\em weakly connected dominating sets}, and we use this to develop novel approximation algorithms for the problem. We present comparative results on several synthetic and real-world datasets showing that our algorithms construct near-optimal compression trees that yield a significant reduction in the data collection cost.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 22:40:53 GMT" } ]
2009-08-03T00:00:00
[ [ "Li", "Jian", "" ], [ "Deshpande", "Amol", "" ], [ "Khuller", "Samir", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0907.5443
R Doomun
H S Guruprasad, H D Maheshappa
Dynamic Bandwidth Management in Distributed VoD based on the User Class Using Agents
7 pages, International Journal of Computer Science and Information Security, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, July 2009, Volume 3. No.1, USA
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes a dynamic bandwidth management algorithm in which more bandwidth is allocated for higher class users and also higher priority is given to the videos with higher popularity within a class using agent technology. The popularity and weight profile of the videos which is used for efficiently allocating bandwidth is periodically updated by a mobile agent. The proposed approach allocates more bandwidth for higher class users and gives higher priority for higher weight videos [popular videos] so that they can be served with high QoS, reduces the load on the central multimedia server and maximizes the channel utilization between the neighboring proxy servers and the central multimedia server and lower video rejection ratio. The simulation results prove the reduction of load on central multimedia server by load sharing among the neighboring proxy servers, maximum bandwidth utilization, and more bandwidth allocation for higher class users.
[ { "version": "v1", "created": "Thu, 30 Jul 2009 22:53:48 GMT" } ]
2009-08-03T00:00:00
[ [ "Guruprasad", "H S", "" ], [ "Maheshappa", "H D", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0907.5469
Pierre Lescanne
Pierre Lescanne (LIP)
Feasibility/Desirability Games for Normal Form Games, Choice Models and Evolutionary Games
17 pages
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An abstraction of normal form games is proposed, called Feasibility/Desirability Games (or FD Games in short). FD Games can be seen from three points of view: as a new presentation of games in which Nash equilibria can be found, as choice models in microeconomics or as a model of evolution in games.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 04:44:57 GMT" } ]
2009-08-03T00:00:00
[ [ "Lescanne", "Pierre", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0907.5474
Kevin Wortman
David Eppstein and Kevin A. Wortman
Optimal Angular Resolution for Face-Symmetric Drawings
10 pages, 6 figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let G be a graph that may be drawn in the plane in such a way that all internal faces are centrally symmetric convex polygons. We show how to find a drawing of this type that maximizes the angular resolution of the drawing, the minimum angle between any two incident edges, in polynomial time, by reducing the problem to one of finding parametric shortest paths in an auxiliary graph. The running time is at most O(t^3), where t is a parameter of the input graph that is at most O(n) but is more typically proportional to n^.5.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 06:27:19 GMT" } ]
2009-08-03T00:00:00
[ [ "Eppstein", "David", "" ], [ "Wortman", "Kevin A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0907.5477
Lee-Ad Gottlieb
Lee-Ad Gottlieb, and Robert Krauthgamer
A Nonlinear Approach to Dimension Reduction
null
null
10.1007/s00454-015-9707-9
null
cs.CG cs.DS math.FA math.MG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The $l_2$ flattening lemma of Johnson and Lindenstrauss [JL84] is a powerful tool for dimension reduction. It has been conjectured that the target dimension bounds can be refined and bounded in terms of the intrinsic dimensionality of the data set (for example, the doubling dimension). One such problem was proposed by Lang and Plaut [LP01] (see also [GKL03,MatousekProblems07,ABN08,CGT10]), and is still open. We prove another result in this line of work: The snowflake metric $d^{1/2}$ of a doubling set $S \subset l_2$ embeds with constant distortion into $l_2^D$, for dimension $D$ that depends solely on the doubling constant of the metric. In fact, the distortion can be made arbitrarily close to 1, and the target dimension is polylogarithmic in the doubling constant. Our techniques are robust and extend to the more difficult spaces $l_1$ and $l_\infty$, although the dimension bounds here are quantitatively inferior than those for $l_2$.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 07:10:04 GMT" }, { "version": "v2", "created": "Sun, 11 Apr 2010 01:29:04 GMT" }, { "version": "v3", "created": "Sun, 3 Apr 2011 10:51:24 GMT" }, { "version": "v4", "created": "Thu, 14 May 2015 11:25:45 GMT" } ]
2015-06-09T00:00:00
[ [ "Gottlieb", "Lee-Ad", "" ], [ "Krauthgamer", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Mathematics", "code": "math.MG", "description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces", "span": "(Metric Geometry)" } ]
0907.5481
Yong Gao
Yong Gao
Treewidth of Erd\"{o}s-R\'{e}nyi Random Graphs, Random Intersection Graphs, and Scale-Free Random Graphs
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that the treewidth of an Erd\"{o}s-R\'{e}nyi random graph $\rg{n, m}$ is, with high probability, greater than $\beta n$ for some constant $\beta > 0$ if the edge/vertex ratio $\frac{m}{n}$ is greater than 1.073. Our lower bound $\frac{m}{n} > 1.073$ improves the only previously-known lower bound. We also study the treewidth of random graphs under two other random models for large-scale complex networks. In particular, our result on the treewidth of \rigs strengths a previous observation on the average-case behavior of the \textit{gate matrix layout} problem. For scale-free random graphs based on the Barab\'{a}si-Albert preferential-attachment model, our result shows that if more than 12 vertices are attached to a new vertex, then the treewidth of the obtained network is linear in the size of the network with high probability.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 08:17:58 GMT" } ]
2009-08-03T00:00:00
[ [ "Gao", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0907.5488
Lucile Sassatelli
Lucile Sassatelli, Muriel Medard
Network Coding for Delay Tolerant Networks with Byzantine Adversaries
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article has been withdrawn by the authors
[ { "version": "v1", "created": "Fri, 31 Jul 2009 17:24:50 GMT" }, { "version": "v2", "created": "Sat, 1 Aug 2009 00:35:06 GMT" }, { "version": "v3", "created": "Fri, 19 Feb 2010 16:43:14 GMT" }, { "version": "v4", "created": "Tue, 23 Feb 2010 13:03:25 GMT" } ]
2010-02-23T00:00:00
[ [ "Sassatelli", "Lucile", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.5489
Shan Zhou
Shan Zhou, Lei Ying
On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks
12 pages,8 figures, conference
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the delay constrained multicast capacity of large scale mobile ad hoc networks (MANETs). We consider a MANET consists of $n_s$ multicast sessions. Each multicast session has one source and $p$ destinations. The wireless mobiles move according to a two-dimensional i.i.d. mobility model. Each source sends identical information to the $p$ destinations in its multicast session, and the information is required to be delivered to all the $p$ destinations within $D$ time-slots. Given the delay constraint $D,$ we first prove that the capacity per multicast session is $O(\min\{1, (\log p)(\log (n_sp)) \sqrt{\frac{D}{n_s}}\}).$ Given non-negative functions $f(n)$ and $g(n)$: $f(n)=O(g(n))$ means there exist positive constants $c$ and $m$ such that $f(n) \leq cg(n)$ for all $ n\geq m;$ $f(n)=\Omega(g(n))$ means there exist positive constants $c$ and $m$ such that $f(n)\geq cg(n)$ for all $n\geq m;$ $f(n)=\Theta(g(n))$ means that both $f(n)=\Omega(g(n))$ and $f(n)=O(g(n))$ hold; $f(n)=o(g(n))$ means that $\lim_{n\to \infty} f(n)/g(n)=0;$ and $f(n)=\omega(g(n))$ means that $\lim_{n\to \infty} g(n)/f(n)=0.$ We then propose a joint coding/scheduling algorithm achieving a throughput of $\Theta(\min\{1,\sqrt{\frac{D}{n_s}}\}).$ Our simulations show that the joint coding/scheduling algorithm achieves a throughput of the same order ($\Theta(\min\{1, \sqrt{\frac{D}{n_s}}\})$) under random walk model and random waypoint model.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 09:07:50 GMT" }, { "version": "v2", "created": "Sat, 15 Aug 2009 05:59:05 GMT" } ]
2009-08-17T00:00:00
[ [ "Zhou", "Shan", "" ], [ "Ying", "Lei", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0907.5500
Laurent Bougrain
Nanying Liang (INRIA Lorraine - LORIA), Laurent Bougrain (INRIA Lorraine - LORIA)
Decoding Finger Flexion using amplitude modulation from band-specific ECoG
null
European Symposium on Artificial Neural Networks (ESANN) (2009) 467-472
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
EEG-BCIs have been well studied in the past decades and implemented into several famous applications, like P300 speller and wheelchair controller. However, these interfaces are indirect due to low spatial resolution of EEG. Recently, direct ECoG-BCIs attract intensive attention because ECoG provides a higher spatial resolution and signal quality. This makes possible localization of the source of neural signals with respect to certain brain functions. In this article, we present a realization of ECoG-BCIs for finger flexion prediction provided by BCI competition IV. Methods for finger flexion prediction including feature extraction and selection are provided in this article. Results show that the predicted finger movement is highly correlated with the true movement when we use band-specific amplitude modulation.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 10:06:29 GMT" } ]
2009-08-03T00:00:00
[ [ "Liang", "Nanying", "", "INRIA Lorraine - LORIA" ], [ "Bougrain", "Laurent", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0907.5527
Georg Moser
Georg Moser
Proof Theory at Work: Complexity Analysis of Term Rewrite Systems
Cumulative Habilitation Thesis, submitted to the University of Innsbruck
null
null
null
cs.LO cs.CC cs.SC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This thesis is concerned with investigations into the "complexity of term rewriting systems". Moreover the majority of the presented work deals with the "automation" of such a complexity analysis. The aim of this introduction is to present the main ideas in an easily accessible fashion to make the result presented accessible to the general public. Necessarily some technical points are stated in an over-simplified way.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 13:19:25 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2009 08:40:50 GMT" } ]
2009-12-30T00:00:00
[ [ "Moser", "Georg", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0907.5538
Francesco Carraro
Francesco Carraro, Sergio Fonte, Diego Turrini, Maria Cristina De Sanctis, Livia Giacomini
A preliminary XML-based search system for planetary data
10 pages, 5 figures, submitted to Computers and Geosciences
null
null
null
cs.IR astro-ph.EP cs.DB physics.geo-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Planetary sciences can benefit from several different sources of information, i.e. ground-based or near Earth-based observations, space missions and laboratory experiments. The data collected from these sources, however, are spread over a number of smaller, separate communities and stored through different facilities: this makes it difficult to integrate them. The IDIS initiative, born in the context of the Europlanet project, performed a pilot study of the viability and the issues to be overcome in order to create an integrated search system for planetary data. As part of the results of such pilot study, the IDIS Small Bodies and Dust node developed a search system based on a preliminary XML data model. Here we introduce the goals of the IDIS initiative and describe the structure and the working of this search system. The source code of the search system is released under GPL license to allow people interested in participating to the IDIS initiative both as developers and as data providers to familiarise with the search environment and to allow the creation of volunteer nodes to be integrated into the existing network.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 14:17:34 GMT" } ]
2009-08-03T00:00:00
[ [ "Carraro", "Francesco", "" ], [ "Fonte", "Sergio", "" ], [ "Turrini", "Diego", "" ], [ "De Sanctis", "Maria Cristina", "" ], [ "Giacomini", "Livia", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "astro-ph.EP", "description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system", "span": "(Earth and Planetary Astrophysics)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Physics", "code": "physics.geo-ph", "description": "Atmospheric physics. Biogeosciences. Computational geophysics. Geographic location. Geoinformatics. Geophysical techniques. Hydrospheric geophysics. Magnetospheric physics. Mathematical geophysics. Planetology. Solar system. Solid earth geophysics. Space plasma physics. Mineral physics. High pressure physics.", "span": "(Geophysics)" } ]
0907.5575
Pascal Koiran
Pascal Koiran (LIP)
A hitting set construction, with application to arithmetic circuit lower bounds
14 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A polynomial identity testing algorithm must determine whether a given input polynomial is identically equal to 0. We give a deterministic black-box identity testing algorithm for univariate polynomials of the form $\sum_{j=0}^t c_j X^{\alpha_j} (a + b X)^{\beta_j}$. From our algorithm we derive an exponential lower bound for representations of polynomials such as $\prod_{i=1}^{2^n} (X^i-1)$ under this form. It has been conjectured that these polynomials are hard to compute by general arithmetic circuits. Our result shows that the "hardness from derandomization" approach to lower bounds is feasible for a restricted class of arithmetic circuits. The proof is based on techniques from algebraic number theory, and more precisely on properties of the height function of algebraic numbers.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 16:51:06 GMT" }, { "version": "v2", "created": "Tue, 8 Dec 2009 07:33:54 GMT" } ]
2009-12-08T00:00:00
[ [ "Koiran", "Pascal", "", "LIP" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0907.5598
Peter de Blanc
Peter de Blanc
Convergence of Expected Utility for Universal AI
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a sequence of repeated interactions between an agent and an environment. Uncertainty about the environment is captured by a probability distribution over a space of hypotheses, which includes all computable functions. Given a utility function, we can evaluate the expected utility of any computational policy for interaction with the environment. After making some plausible assumptions (and maybe one not-so-plausible assumption), we show that if the utility function is unbounded, then the expected utility of any policy is undefined.
[ { "version": "v1", "created": "Fri, 31 Jul 2009 19:16:09 GMT" }, { "version": "v2", "created": "Wed, 2 Dec 2009 21:16:44 GMT" } ]
2009-12-02T00:00:00
[ [ "de Blanc", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.0014
Mohamed Abdel Latif Mr
Mohamed Abdel Latif, Ahmed Sultan, and Hesham El Gamal
Keys through ARQ
21 Files 11 Figures Submitted to the IEEE Transactions on Information Theory on July 31st, 2009
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a novel framework for sharing secret keys using the well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing protocol does not assume any prior knowledge about the channel state information (CSI), but, harnesses the available opportunistic secrecy gains using only the one bit feedback, in the form of ACK/NACK. The distribution of key bits among multiple ARQ epochs, in our approach, allows for mitigating the secrecy outage phenomenon observed in earlier works. We characterize the information theoretic limits of the proposed scheme, under different assumptions on the channel spatial and temporal correlation function, and develop low complexity explicit implementations. Our analysis reveals a novel role of "dumb antennas" in overcoming the negative impact of spatial correlation, between the legitimate and eavesdropper channels, on the achievable secrecy rates. We further develop an adaptive rate allocation policy which achieves higher secrecy rates by exploiting the channel temporal correlation. Finally, our theoretical claims are validated by numerical results that establish the achievability of non-zero secrecy rates even when the eavesdropper channel is less noisy, on the average, than the legitimate channel.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 00:40:37 GMT" } ]
2009-08-04T00:00:00
[ [ "Latif", "Mohamed Abdel", "" ], [ "Sultan", "Ahmed", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0043
Ashwinkumar B.V.
Ashwinkumar B. V. and Robert Kleinberg
Randomized Online Algorithms for the Buyback Problem
null
WINE 2009, LNCS 5929, pp. 529-536, 2009
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the matroid buyback problem, an algorithm observes a sequence of bids and must decide whether to accept each bid at the moment it arrives, subject to a matroid constraint on the set of accepted bids. Decisions to reject bids are irrevocable, whereas decisions to accept bids may be canceled at a cost which is a fixed fraction of the bid value. We present a new randomized algorithm for this problem, and we prove matching upper and lower bounds to establish that the competitive ratio of this algorithm, against an oblivious adversary, is the best possible. We also observe that when the adversary is adaptive, no randomized algorithm can improve the competitive ratio of the optimal deterministic algorithm. Thus, our work completely resolves the question of what competitive ratios can be achieved by randomized algorithms for the matroid buyback problem.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 04:21:22 GMT" } ]
2009-11-30T00:00:00
[ [ "V.", "Ashwinkumar B.", "" ], [ "Kleinberg", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0908.0045
Tadashi Wadyama
Tadashi Wadayama
On Random Construction of a Bipolar Sensing Matrix with Compact Representation
6 pages, to be presented at 2009 IEEE Information Theory Workshop, Taormina
null
10.1109/ITW.2009.5351188
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A random construction of bipolar sensing matrices based on binary linear codes is introduced and its RIP (Restricted Isometry Property) is analyzed based on an argument on the ensemble average of the weight distribution of binary linear codes.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 05:09:33 GMT" } ]
2016-11-15T00:00:00
[ [ "Wadayama", "Tadashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0050
Julien Mairal
Julien Mairal (INRIA Rocquencourt), Francis Bach (INRIA Rocquencourt), Jean Ponce (INRIA Rocquencourt, LIENS), Guillermo Sapiro
Online Learning for Matrix Factorization and Sparse Coding
revised version
Journal of Machine Learning Research 11 (2010) 19--60
null
null
stat.ML cs.LG math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sparse coding--that is, modelling data vectors as sparse linear combinations of basis elements--is widely used in machine learning, neuroscience, signal processing, and statistics. This paper focuses on the large-scale matrix factorization problem that consists of learning the basis set, adapting it to specific data. Variations of this problem include dictionary learning in signal processing, non-negative matrix factorization and sparse principal component analysis. In this paper, we propose to address these tasks with a new online optimization algorithm, based on stochastic approximations, which scales up gracefully to large datasets with millions of training samples, and extends naturally to various matrix factorization formulations, making it suitable for a wide range of learning problems. A proof of convergence is presented, along with experiments with natural images and genomic data demonstrating that it leads to state-of-the-art performance in terms of speed and optimization for both small and large datasets.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 06:09:18 GMT" }, { "version": "v2", "created": "Thu, 11 Feb 2010 07:33:02 GMT" } ]
2010-02-11T00:00:00
[ [ "Mairal", "Julien", "", "INRIA Rocquencourt" ], [ "Bach", "Francis", "", "INRIA Rocquencourt" ], [ "Ponce", "Jean", "", "INRIA Rocquencourt, LIENS" ], [ "Sapiro", "Guillermo", "" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0908.0051
Harshan Jagadeesh
J. Harshan, B. Sundar Rajan and Are Hj{\o}rungnes
High-Rate, Distributed Training-Embedded Complex Orthogonal Designs for Relay Networks
6 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed Space-Time Block Codes (DSTBCs) from Complex Orthogonal Designs (CODs) (both square and non-square CODs other than the Alamouti design) are known to lose their single-symbol ML decodable (SSD) property when used in two-hop wireless relay networks using amplify and forward protocol. For such a network, in this paper, a new class of high rate, training-embedded (TE) SSD DSTBCs are constructed from TE-CODs. The proposed codes include the training symbols in the structure of the code which is shown to be the key point to obtain high rate as well as the SSD property. TE-CODs are shown to offer full-diversity for arbitrary complex constellations. Non-square TE-CODs are shown to provide higher rates (in symbols per channel use) compared to the known SSD DSTBCs for relay networks with number of relays less than $10.$
[ { "version": "v1", "created": "Sat, 1 Aug 2009 06:24:08 GMT" } ]
2009-08-04T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ], [ "Hjørungnes", "Are", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0060
Mugurel Ionut Andreica
Mugurel Ionut Andreica
Algorithmic Decision Optimization Techniques for Multiple Types of Agents with Contrasting Interests
null
Metalurgia International, vol. 14, special issue no. 11, pp. 162-170, 2009. (ISSN: 1582-2214)
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper I present several algorithmic techniques for improving the decision process of multiple types of agents behaving in environments where their interests are in conflict. The interactions between the agents are modelled by using several types of two-player games, where the agents have identical roles and compete for the same resources, or where they have different roles, like in query-response games. The described situations have applications in modelling behavior in many types of environments, like distributed systems, learning environments, resource negotiation environments, and many others. The mentioned models are applicable in a wide range of domains, like computer science or the industrial (e.g. metallurgical), economic or financial sector.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 10:06:49 GMT" } ]
2009-08-04T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.0076
R Doomun
J.C. Miraclin Joyce Pamila, K. Thanushkodi
Log Management support for recovery in mobile computing Environment
6 Pages, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rapid and innovative improvement in wireless communication technologies has led to an increase in the demand for mobile internet transactions. However, internet access from mobile devices is very expensive due to limited bandwidth available on wireless links and high mobility rate of mobile hosts. When a user executes a transaction with a web portal from a mobile device, the disconnection necessitates failure of the transaction or redoing all the steps after reconnection, to get back into consistent application state. Thus considering challenges in wireless mobile networks, a new log management scheme is proposed for recovery of mobile transactions. In this proposed approach, the model parameters that affect application state recovery are analyzed. The proposed scheme is compared with the existing Lazy and Pessimistic scheme and a trade off analysis between the cost invested to manage log and the return of investment in terms of improved failure recoverability is made. From the analysis, the best checkpoint interval period that yields the best return of investment is identified.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 13:32:37 GMT" } ]
2010-02-23T00:00:00
[ [ "Pamila", "J. C. Miraclin Joyce", "" ], [ "Thanushkodi", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0078
Abhik Das
Abhik Das, Shweta Agarwal and Sriram Vishwanath
On Algebraic Traceback in Dynamic Networks
9 pages, 4 figures
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces the concept of incremental traceback for determining changes in the trace of a network as it evolves with time. A distributed algorithm, based on the methodology of algebraic traceback developed by Dean et al, is proposed which can completely determine a path of d nodes/routers using O(d) marked packets, and subsequently determine the changes in its topology using O(log d) marked packets with high probability. The algorithm is established to be order-wise optimal i.e., no other distributed algorithm can determine changes in the path topology using lesser order of bits (i.e., marked packets). The algorithm is shown to have a computational complexity of O(d log d), which is significantly less than that of any existing non-incremental algorithm of algebraic traceback. Extensions of this algorithm to settings with node identity spoofing and network coding are also presented.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 13:45:17 GMT" }, { "version": "v2", "created": "Tue, 11 Aug 2009 07:07:26 GMT" }, { "version": "v3", "created": "Wed, 20 Jan 2010 01:55:43 GMT" } ]
2010-01-20T00:00:00
[ [ "Das", "Abhik", "" ], [ "Agarwal", "Shweta", "" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0080
R Doomun
Manas Paul, Tanmay Bhattacharya, Suvajit Pal, Ranit Saha
A Novel Generic Session Based Bit Level Encryption Technique to Enhance Information Security
7 Pages, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- In this paper a session based symmetric key encryption system has been proposed and is termed as Permutated Cipher Technique (PCT). This technique is more fast, suitable and secure for larger files. In this technique the input file is broken down into blocks of various sizes (of 2 power n order) and encrypted by shifting the position of each bit by a certain value for a certain number of times. A key is generated randomly wherein the length of each block is determined. Each block length generates a unique value of number of bits to be skipped. This value determines the new position of the bits within the block that are to be shifted. After the shifting and inverting each block is XORed with SHA 512 digest of the key. The resultant blocks from the cipher text. The key is generated according to the binary value of the input file size. Decryption is done following the same process as the technique is symmetric.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 13:53:00 GMT" } ]
2009-08-04T00:00:00
[ [ "Paul", "Manas", "" ], [ "Bhattacharya", "Tanmay", "" ], [ "Pal", "Suvajit", "" ], [ "Saha", "Ranit", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0089
\^Hamed \"Owladeghaffari O.Ghaffari
H. O. Ghaffari, M. Ejtemaei, M. Irannajad
Knowledge Discovery of Hydrocyclone s Circuit Based on SONFIS and SORST
Proceedings of the 11th International Mineral Processing Symposium 21-23 October 2008, Belek-Antalya, Turkey
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study describes application of some approximate reasoning methods to analysis of hydrocyclone performance. In this manner, using a combining of Self Organizing Map (SOM), Neuro-Fuzzy Inference System (NFIS)-SONFIS- and Rough Set Theory (RST)-SORST-crisp and fuzzy granules are obtained. Balancing of crisp granules and non-crisp granules can be implemented in close-open iteration. Using different criteria and based on granulation level balance point (interval) or a pseudo-balance point is estimated. Validation of the proposed methods, on the data set of the hydrocyclone is rendered.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 17:28:13 GMT" } ]
2009-08-04T00:00:00
[ [ "Ghaffari", "H. O.", "" ], [ "Ejtemaei", "M.", "" ], [ "Irannajad", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.0099
R Doomun
Azeez Nureni Ayofe, Osunade Oluwaseyifunmitan
Approach To Solving Cybercrime And Cybersecurity
11 Pages, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA
null
null
cs.CY cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cybercrime is becoming ever more serious. Findings from 2002 Computer Crime and Security Survey show an upward trend that demonstrates a need for a timely review of existing approaches to fighting this new phenomenon in the information age. In this paper, we provide an overview of Cybercrime and present an international perspective on fighting Cybercrime. This work seeks to define the concept of cyber-crime, identify reasons for cyber-crime, how it can be eradicated, look at those involved and the reasons for their involvement, we would look at how best to detect a criminal mail and in conclusion, proffer recommendations that would help in checking the increasing rate of cyber-crimes and criminals.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 20:33:56 GMT" } ]
2009-08-04T00:00:00
[ [ "Ayofe", "Azeez Nureni", "" ], [ "Oluwaseyifunmitan", "Osunade", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0100
Florentin Smarandache
Florentin Smarandache, Mark Alford
A Class of DSm Conditional Rules
9 pages. SUbmitted to COGIS 2009 International Conference in PAris
Proceedings of COGIS 2009 International Conference, Paris, France, 16-18 November 2009. Also, presented at this conference
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce two new DSm fusion conditioning rules with example, and as a generalization of them a class of DSm fusion conditioning rules, and then extend them to a class of DSm conditioning rules.
[ { "version": "v1", "created": "Sat, 1 Aug 2009 22:40:37 GMT" } ]
2009-11-23T00:00:00
[ [ "Smarandache", "Florentin", "" ], [ "Alford", "Mark", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.0122
R Doomun
Kalpana Sharma, M.K. Ghose, Kuldeep
Complete Security Framework for Wireless Sensor Networks
7 pages, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3 No. 1, USA
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to integrate them all is a new research challenge. In this paper we took up the challenge and have proposed an integrated comprehensive security framework that will provide security services for all services of sensor network. We have added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions. This framework has many components like Intrusion Detection System, Trust Framework, Key Management scheme and Link layer communication protocol. We have also tested it on three different application scenarios in Castalia and Omnet++ simulator.
[ { "version": "v1", "created": "Sun, 2 Aug 2009 10:58:51 GMT" } ]
2009-08-04T00:00:00
[ [ "Sharma", "Kalpana", "" ], [ "Ghose", "M. K.", "" ], [ "Kuldeep", "", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0124
R Doomun
Atta E. E. Elalfi, and M. E. ElAlami
Intelligent Advisory System for Supporting University Managers in Law
6 pages, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3 No. 1, USA
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The rights and duties of both staff members and students are regulated by a large and different numbers of legal regulations and rules. This large number of rules and regulations makes the decision-making process time consuming and error boring. Smart advisory systems could provide rapid and accurate advices to managers and give the arguments for these advices. This paper presents an intelligent advisory system in law to assist the legal educational processes in universities and institutes. The aims of the system are: to provide smart legal advisors in the universities and institutes, to integrate rules and regulations of universities and institutes in the e-government, to ease the burden on the legal advisor and the provision of consulting services to users, to achieve accurate and timely presentation of the legal opinion to a given problem and to assure flexibility for accepting changes in the rules and legal regulations. The system is based on experienced jurists and the rules and regulations of the law organizing Saudi Arabia universities and institutes.
[ { "version": "v1", "created": "Sun, 2 Aug 2009 11:23:34 GMT" } ]
2009-08-04T00:00:00
[ [ "Elalfi", "Atta E. E.", "" ], [ "ElAlami", "M. E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0908.0126
R Doomun
Alexei Barbosa de Aguiar, Alvaro de M. S. Neto, Placido Rogerio Pinheiro, Andre L. V. Coelho
Applicability of a Novel Integer Programming Model for Wireless Sensor Networks
7 pages, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3 No. 1, USA
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an applicability analysis over a novel integer programming model devoted to optimize power consumption efficiency in heterogeneous wireless sensor networks. This model is based upon a schedule of sensor allocation plans in multiple time intervals subject to coverage and connectivity constraints. By turning off a specific set of redundant sensors in each time interval, it is possible to reduce the total energy consumption in the network and, at the same time, avoid partitioning the whole network by losing some strategic sensors too prematurely. Since the network is heterogeneous, sensors can sense different phenomena from different demand points, with different sample rates. As the problem instances grows the time spent to the execution turns impracticable.
[ { "version": "v1", "created": "Sun, 2 Aug 2009 11:57:15 GMT" } ]
2009-08-04T00:00:00
[ [ "de Aguiar", "Alexei Barbosa", "" ], [ "Neto", "Alvaro de M. S.", "" ], [ "Pinheiro", "Placido Rogerio", "" ], [ "Coelho", "Andre L. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0908.0160
Danny Dolev
Ariel Daliot and Danny Dolev
Self-stabilizing Byzantine Agreement
A revision of PODC06 submission that includes full proofs and corrections of mistakes
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Byzantine agreement algorithms typically assume implicit initial state consistency and synchronization among the correct nodes and then operate in coordinated rounds of information exchange to reach agreement based on the input values. The implicit initial assumptions enable correct nodes to infer about the progression of the algorithm at other nodes from their local state. This paper considers a more severe fault model than permanent Byzantine failures, one in which the system can in addition be subject to severe transient failures that can temporarily throw the system out of its assumption boundaries. When the system eventually returns to behave according to the presumed assumptions it may be in an arbitrary state in which any synchronization among the nodes might be lost, and each node may be at an arbitrary state. We present a self-stabilizing Byzantine agreement algorithm that reaches agreement among the correct nodes in an optimal ration of faulty to correct, by using only the assumption of eventually bounded message transmission delay. In the process of solving the problem, two additional important and challenging building blocks were developed: a unique self-stabilizing protocol for assigning consistent relative times to protocol initialization and a Reliable Broadcast primitive that progresses at the speed of actual message delivery time.
[ { "version": "v1", "created": "Sun, 2 Aug 2009 21:09:20 GMT" } ]
2009-08-04T00:00:00
[ [ "Daliot", "Ariel", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0908.0163
Liang-Liang Xie
Liang-Liang Xie
An Improvement of Cover/El Gamal's Compress-and-Forward Relay Scheme
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The compress-and-forward relay scheme developed by (Cover and El Gamal, 1979) is improved with a modification on the decoding process. The improvement follows as a result of realizing that it is not necessary for the destination to decode the compressed observation of the relay; and even if the compressed observation is to be decoded, it can be more easily done by joint decoding with the original message, rather than in a successive way. An extension to multiple relays is also discussed.
[ { "version": "v1", "created": "Sun, 2 Aug 2009 21:31:40 GMT" }, { "version": "v2", "created": "Sat, 15 Aug 2009 12:56:19 GMT" } ]
2009-08-15T00:00:00
[ [ "Xie", "Liang-Liang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0175
Alex Stewart
Alex A. Stewart and Marta F. Antoszkiewicz
BGP Route Analysis and Management Systems
IEEE Proceedings of 5th International Conference on Information Technology
null
null
ITNG'08
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Border Gateway Protocol (BGP) is an important component in today's IP network infrastructure. As the main routing protocol of the Internet, clear understanding of its dynamics is crucial for configuring, diagnosing and debugging Internet routing problems. Despite the increase in the services that BGP provide such as MPLS VPNs, there is no much progress achieved in automating the BGP management tasks. In this paper we discuss some of the problems encountered by network engineers when managing BGP networks. We also describe some of the open source tools and methods that attempt to resolve these issues. Then we present some of the features that, if implemented, will ease BGP management related tasks.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 01:53:06 GMT" } ]
2009-08-04T00:00:00
[ [ "Stewart", "Alex A.", "" ], [ "Antoszkiewicz", "Marta F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0191
Wenguang Wang
Wenguang WANG (1), Andreas TOLK (2), Weiping WANG (1) ((1) College of Information System and Management, National University of Defense Technology, Changsha, China, (2) Engineering Management & Systems Engineering, Old Dominion University, Norfolk, VA, United States)
The Levels of Conceptual Interoperability Model: Applying Systems Engineering Principles to M&S
9 pages, 2 figures, 4 tables, Proceedings of Spring Simulation Multiconference (SpringSim'09). San Diego, CA, USA
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes the use of the Levels of Conceptual Interoperability Model (LCIM) as a framework for conceptual modeling and its descriptive and prescriptive uses. LCIM is applied to show its potential and shortcomings in the current simulation interoperability approaches, in particular the High Level Architecture (HLA) and Base Object Models (BOM). It emphasizes the need to apply rigorous engineering methods and principles and replace ad-hoc approaches.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 06:14:40 GMT" } ]
2009-08-04T00:00:00
[ [ "WANG", "Wenguang", "" ], [ "TOLK", "Andreas", "" ], [ "WANG", "Weiping", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.0216
R Doomun
A.W. Naji, Shihab A. Hameed,, B.B.Zaidan, Wajdi F. Al-Khateeb, Othman O. Khalifa, A.A.Zaidan and Teddy S. Gunawan
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the stego file, extract the information, and decryption of the information).
[ { "version": "v1", "created": "Mon, 3 Aug 2009 10:00:25 GMT" } ]
2009-08-04T00:00:00
[ [ "Naji", "A. W.", "" ], [ "Hameed", "Shihab A.", "" ], [ "Zaidan", "B. B.", "" ], [ "Al-Khateeb", "Wajdi F.", "" ], [ "Khalifa", "Othman O.", "" ], [ "Zaidan", "A. A.", "" ], [ "Gunawan", "Teddy S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0221
R Doomun
Shilpa Kale, S. S. Shriramwar
FPGA-based Controller for a Mobile Robot
5 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA
null
null
cs.RO cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
With application in the robotics and automation, more and more it becomes necessary the development of applications based on methodologies that facilitate future modifications, updates and enhancements in the original projected system. This project presents a conception of mobile robots using rapid prototyping, distributing the several control actions in growing levels of complexity and computing proposal oriented to embed systems implementation. This kind of controller can be tested on different platform representing the mobile robots using reprogrammable logic components (FPGA). This mobile robot will detect obstacle and also be able to control the speed. Different modules will be Actuators, Sensors, wireless transmission. All this modules will be interfaced using FPGA controller. I would like to construct a mechanically simple robot model, which can measure the distance from obstacle with the aid of sensor and accordingly should able to control the speed of motor. I would like to construct a mechanically simple robot model, which can measure the distance from obstacle with the aid of sensor and accordingly should able to control the speed of motor.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 10:30:55 GMT" } ]
2009-08-04T00:00:00
[ [ "Kale", "Shilpa", "" ], [ "Shriramwar", "S. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0908.0222
R Doomun
E.A.Mary Anita, and V.Vasudevan
Performance Evaluation of Mesh based Multicast Reactive Routing Protocol under Black Hole Attack
6 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA
null
null
cs.CR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mobile ad-hoc network is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. The wireless and dynamic nature of ad-hoc networks makes them vulnerable to attacks especially in routing protocols. Providing security in mobile ad-hoc networks has been a major issue over the recent years. One of the prominent mesh base reactive multicast routing protocols used in ad-hoc networks is On Demand Multicast Routing protocol (ODMRP). The security of ODMRP is compromised by a primary routing attack called black hole attack. In this attack a malicious node advertises itself as having the shortest path to the node whose packets it wants to intercept. This paper discusses the impact of black hole attack on ODMRP under various scenarios. The performance is evaluated using metrics such as packet delivery ratio and end to end delay for various numbers of senders and receivers via simulation. Simulations are carried out using network simulator ns-2. The results enable us to propose solutions to counter the effect of black hole attack.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 10:47:42 GMT" } ]
2009-08-04T00:00:00
[ [ "Anita", "E. A. Mary", "" ], [ "Vasudevan", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0908.0239
Manfred Kufleitner
Manfred Kufleitner
On Bijective Variants of the Burrows-Wheeler Transform
15 pages, presented at the Prague Stringology Conference 2009 (PSC 2009)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The sort transform (ST) is a modification of the Burrows-Wheeler transform (BWT). Both transformations map an arbitrary word of length n to a pair consisting of a word of length n and an index between 1 and n. The BWT sorts all rotation conjugates of the input word, whereas the ST of order k only uses the first k letters for sorting all such conjugates. If two conjugates start with the same prefix of length k, then the indices of the rotations are used for tie-breaking. Both transforms output the sequence of the last letters of the sorted list and the index of the input within the sorted list. In this paper, we discuss a bijective variant of the BWT (due to Scott), proving its correctness and relations to other results due to Gessel and Reutenauer (1993) and Crochemore, Desarmenien, and Perrin (2005). Further, we present a novel bijective variant of the ST.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 13:10:48 GMT" } ]
2009-08-04T00:00:00
[ [ "Kufleitner", "Manfred", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.0302
Eren Sasoglu
Eren Sasoglu, Emre Telatar, Erdal Arikan
Polarization for arbitrary discrete memoryless channels
12 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel polarization, originally proposed for binary-input channels, is generalized to arbitrary discrete memoryless channels. Specifically, it is shown that when the input alphabet size is a prime number, a similar construction to that for the binary case leads to polarization. This method can be extended to channels of composite input alphabet sizes by decomposing such channels into a set of channels with prime input alphabet sizes. It is also shown that all discrete memoryless channels can be polarized by randomized constructions. The introduction of randomness does not change the order of complexity of polar code construction, encoding, and decoding. A previous result on the error probability behavior of polar codes is also extended to the case of arbitrary discrete memoryless channels. The generalization of polarization to channels with arbitrary finite input alphabet sizes leads to polar-coding methods for approaching the true (as opposed to symmetric) channel capacity of arbitrary channels with discrete or continuous input alphabets.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 17:24:39 GMT" } ]
2009-08-04T00:00:00
[ [ "Sasoglu", "Eren", "" ], [ "Telatar", "Emre", "" ], [ "Arikan", "Erdal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0319
Sarah Filippi
Sarah Filippi (LTCI), Olivier Capp\'e (LTCI), Aur\'elien Garivier (LTCI)
Regret Bounds for Opportunistic Channel Access
null
null
null
null
stat.ML cs.AI cs.LG cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the task of opportunistic channel access in a primary system composed of independent Gilbert-Elliot channels where the secondary (or opportunistic) user does not dispose of a priori information regarding the statistical characteristics of the system. It is shown that this problem may be cast into the framework of model-based learning in a specific class of Partially Observed Markov Decision Processes (POMDPs) for which we introduce an algorithm aimed at striking an optimal tradeoff between the exploration (or estimation) and exploitation requirements. We provide finite horizon regret bounds for this algorithm as well as a numerical evaluation of its performance in the single channel model as well as in the case of stochastically identical channels.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 19:25:58 GMT" } ]
2009-08-04T00:00:00
[ [ "Filippi", "Sarah", "", "LTCI" ], [ "Cappé", "Olivier", "", "LTCI" ], [ "Garivier", "Aurélien", "", "LTCI" ] ]
[ { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0320
Jerome Jaffre
Adimurthi Adimurthi, G.D. Veerappa Gowda, J\'er\^ome Jaffr\'e (INRIA Rocquencourt, INRIA Rocquencourt)
Applications of the DFLU flux to systems of conservation laws
null
Journal of Computational and Applied Mathematics 247 (2013) 102-103
10.1016/j.cam.2012.12.025
RR-7009
cs.NA math.AP math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The DFLU numerical flux was introduced in order to solve hyperbolic scalar conservation laws with a flux function discontinuous in space. We show how this flux can be used to solve systems of conservation laws. The obtained numerical flux is very close to a Godunov flux. As an example we consider a system modeling polymer flooding in oil reservoir engineering.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 19:27:57 GMT" } ]
2014-01-16T00:00:00
[ [ "Adimurthi", "Adimurthi", "", "INRIA\n Rocquencourt, INRIA Rocquencourt" ], [ "Gowda", "G. D. Veerappa", "", "INRIA\n Rocquencourt, INRIA Rocquencourt" ], [ "Jaffré", "Jérôme", "", "INRIA\n Rocquencourt, INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.AP", "description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics", "span": "(Analysis of PDEs)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0908.0350
Siddharth Barman
Siddharth Barman, Shuchi Chawla
Region growing for multi-route cuts
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a number of multi-route cut problems: given a graph G=(V,E) and connectivity thresholds k_(u,v) on pairs of nodes, the goal is to find a minimum cost set of edges or vertices the removal of which reduces the connectivity between every pair (u,v) to strictly below its given threshold. These problems arise in the context of reliability in communication networks; They are natural generalizations of traditional minimum cut problems where the thresholds are either 1 (we want to completely separate the pair) or infinity (we don't care about the connectivity for the pair). We provide the first non-trivial approximations to a number of variants of the problem including for both node-disjoint and edge-disjoint connectivity thresholds. A main contribution of our work is an extension of the region growing technique for approximating minimum multicuts to the multi-route setting. When the connectivity thresholds are either 2 or infinity (the "2-route cut" case), we obtain polylogarithmic approximations while satisfying the thresholds exactly. For arbitrary connectivity thresholds this approach leads to bicriteria approximations where we approximately satisfy the thresholds and approximately minimize the cost. We present a number of different algorithms achieving different cost-connectivity tradeoffs.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 21:21:06 GMT" } ]
2009-08-05T00:00:00
[ [ "Barman", "Siddharth", "" ], [ "Chawla", "Shuchi", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.0358
Yang Weng
Yang Weng and Daniela Tuninetti
Outage analysis of Block-Fading Gaussian Interference Channels
39 pages, 9 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the asymptotic behavior of two-source block-fading single-antenna Gaussian interference channels in the high-SNR regime by means of the diversity-multiplexing tradeoff. We consider a general setting where the users and the average channel gains are not restricted to be symmetric. Our results are not just extensions of previous results for symmetric networks, as our setting covers scenarios that are not possible under the symmetric assumption, such as the case of "mixed" interference, i.e., when difference sources have different distances from their intended receivers. We derive upper and lower bounds on the diversity. We show that for a fairly large set of channel parameters the two bounds coincides.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 22:47:34 GMT" } ]
2009-08-05T00:00:00
[ [ "Weng", "Yang", "" ], [ "Tuninetti", "Daniela", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0362
I-Hong Hou
I-Hong Hou and P.R. Kumar
Utility Maximization for Delay Constrained QoS in Wireless
submitted to INFOCOM 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies the problem of utility maximization for clients with delay based QoS requirements in wireless networks. We adopt a model used in a previous work that characterizes the QoS requirements of clients by their delay constraints, channel reliabilities, and delivery ratio requirements. In this work, we assume that the utility of a client is a function of the delivery ratio it obtains. We treat the delivery ratio for a client as a tunable parameter by the access point (AP), instead of a given value as in the previous work. We then study how the AP should assign delivery ratios to clients so that the total utility of all clients is maximized. We apply the techniques introduced in two previous papers to decompose the utility maximization problem into two simpler problems, a CLIENT problem and an ACCESS-POINT problem. We show that this decomposition actually describes a bidding game, where clients bid for the service time from the AP. We prove that although all clients behave selfishly in this game, the resulting equilibrium point of the game maximizes the total utility. In addition, we also establish an efficient scheduling policy for the AP to reach the optimal point of the ACCESS-POINT problem. We prove that the policy not only approaches the optimal point but also achieves some forms of fairness among clients. Finally, simulation results show that our proposed policy does achieve higher utility than all other compared policies.
[ { "version": "v1", "created": "Mon, 3 Aug 2009 23:10:55 GMT" } ]
2009-08-05T00:00:00
[ [ "Hou", "I-Hong", "" ], [ "Kumar", "P. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0373
Marko A. Rodriguez
Marko A. Rodriguez
A Reflection on the Structure and Process of the Web of Data
null
Bulletin of the American Society for Information Science and Technology, American Society for Information Science and Technology, volume 35, number 6, ISSN: 1550-8366, LA-UR-09-03724, pages 38-43, September 2009
null
LA-UR-09-03724
cs.AI cs.DL cs.GL
http://creativecommons.org/licenses/publicdomain/
The Web community has introduced a set of standards and technologies for representing, querying, and manipulating a globally distributed data structure known as the Web of Data. The proponents of the Web of Data envision much of the world's data being interrelated and openly accessible to the general public. This vision is analogous in many ways to the Web of Documents of common knowledge, but instead of making documents and media openly accessible, the focus is on making data openly accessible. In providing data for public use, there has been a stimulated interest in a movement dubbed Open Data. Open Data is analogous in many ways to the Open Source movement. However, instead of focusing on software, Open Data is focused on the legal and licensing issues around publicly exposed data. Together, various technological and legal tools are laying the groundwork for the future of global-scale data management on the Web. As of today, in its early form, the Web of Data hosts a variety of data sets that include encyclopedic facts, drug and protein data, metadata on music, books and scholarly articles, social network representations, geospatial information, and many other types of information. The size and diversity of the Web of Data is a demonstration of the flexibility of the underlying standards and the overall feasibility of the project as a whole. The purpose of this article is to provide a review of the technological underpinnings of the Web of Data as well as some of the hurdles that need to be overcome if the Web of Data is to emerge as the defacto medium for data representation, distribution, and ultimately, processing.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 01:59:07 GMT" } ]
2009-08-05T00:00:00
[ [ "Rodriguez", "Marko A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0908.0375
Karthekeyan Chandrasekaran
Karthekeyan Chandrasekaran, Navin Goyal, Bernhard Haeupler
Deterministic Algorithms for the Lovasz Local Lemma
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Lovasz Local Lemma (LLL) is a powerful result in probability theory that states that the probability that none of a set of bad events happens is nonzero if the probability of each event is small compared to the number of events that depend on it. It is often used in combination with the probabilistic method for non-constructive existence proofs. A prominent application is to k-CNF formulas, where LLL implies that, if every clause in the formula shares variables with at most d <= 2^k/e other clauses then such a formula has a satisfying assignment. Recently, a randomized algorithm to efficiently construct a satisfying assignment was given by Moser. Subsequently Moser and Tardos gave a randomized algorithm to construct the structures guaranteed by the LLL in a very general algorithmic framework. We address the main problem left open by Moser and Tardos of derandomizing these algorithms efficiently. Specifically, for a k-CNF formula with m clauses and d <= 2^{k/(1+\eps)}/e for any \eps\in (0,1), we give an algorithm that finds a satisfying assignment in time \tilde{O}(m^{2(1+1/\eps)}). This improves upon the deterministic algorithms of Moser and of Moser-Tardos with running time m^{\Omega(k^2)} which is superpolynomial for k=\omega(1) and upon other previous algorithms which work only for d\leq 2^{k/16}/4. Our algorithm works efficiently for a general version of LLL under the algorithmic framework of Moser and Tardos, and is also parallelizable, i.e., has polylogarithmic running time using polynomially many processors.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 02:13:54 GMT" }, { "version": "v2", "created": "Mon, 5 Aug 2019 23:11:39 GMT" } ]
2019-08-07T00:00:00
[ [ "Chandrasekaran", "Karthekeyan", "" ], [ "Goyal", "Navin", "" ], [ "Haeupler", "Bernhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.0390
Zohir Bouzid
Zohir Bouzid (LIP6), Maria Potop-Butucaru (LIP6, INRIA Rocquencourt), S\'ebastien Tixeuil (LIP6)
Byzantine Convergence in Robots Networks: The Price of Asynchrony
null
null
null
null
cs.DC cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the convergence problem in fully asynchronous, uni-dimensional robot networks that are prone to Byzantine (i.e. malicious) failures. In these settings, oblivious anonymous robots with arbitrary initial positions are required to eventually converge to an a apriori unknown position despite a subset of them exhibiting Byzantine behavior. Our contribution is twofold. We propose a deterministic algorithm that solves the problem in the most generic settings: fully asynchronous robots that operate in the non-atomic CORDA model. Our algorithm provides convergence in 5f+1-sized networks where f is the upper bound on the number of Byzantine robots. Additionally, we prove that 5f+1 is a lower bound whenever robot scheduling is fully asynchronous. This constrasts with previous results in partially synchronous robots networks, where 3f+1 robots are necessary and sufficient.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 06:15:33 GMT" } ]
2009-08-05T00:00:00
[ [ "Bouzid", "Zohir", "", "LIP6" ], [ "Potop-Butucaru", "Maria", "", "LIP6, INRIA Rocquencourt" ], [ "Tixeuil", "Sébastien", "", "LIP6" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0908.0398
Emmanuelle Anceaume
Emmanuelle Anceaume (INRIA - Irisa), R. Ludinard (INRIA - Irisa), B. Sericola (INRIA - Irisa), F. Tronel, F. Brasiliero
Analytical Study of Adversarial Strategies in Cluster-based Overlays
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Scheideler has shown that peer-to-peer overlays networks can only survive Byzantine attacks if malicious nodes are not able to predict what is going to be the topology of the network for a given sequence of join and leave operations. In this paper we investigate adversarial strategies by following specific games. Our analysis demonstrates first that an adversary can very quickly subvert DHT-based overlays by simply never triggering leave operations. We then show that when all nodes (honest and malicious ones) are imposed on a limited lifetime, the system eventually reaches a stationary regime where the ratio of polluted clusters is bounded, independently from the initial amount of corruption in the system.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 07:17:57 GMT" } ]
2009-08-05T00:00:00
[ [ "Anceaume", "Emmanuelle", "", "INRIA - Irisa" ], [ "Ludinard", "R.", "", "INRIA - Irisa" ], [ "Sericola", "B.", "", "INRIA - Irisa" ], [ "Tronel", "F.", "" ], [ "Brasiliero", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0908.0411
Gerhard Mayer
Gerhard Mayer
Data management in systems biology I - Overview and bibliography
20 pages
null
null
null
cs.DB cs.DS q-bio.OT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Large systems biology projects can encompass several workgroups often located in different countries. An overview about existing data standards in systems biology and the management, storage, exchange and integration of the generated data in large distributed research projects is given, the pros and cons of the different approaches are illustrated from a practical point of view, the existing software - open source as well as commercial - and the relevant literature is extensively overview, so that the reader should be enabled to decide which data management approach is the best suited for his special needs. An emphasis is laid on the use of workflow systems and of TAB-based formats. The data in this format can be viewed and edited easily using spreadsheet programs which are familiar to the working experimental biologists. The use of workflows for the standardized access to data in either own or publicly available databanks and the standardization of operation procedures is presented. The use of ontologies and semantic web technologies for data management will be discussed in a further paper.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 08:53:33 GMT" }, { "version": "v2", "created": "Wed, 2 Sep 2009 08:35:53 GMT" }, { "version": "v3", "created": "Tue, 15 Dec 2009 09:09:32 GMT" } ]
2009-12-15T00:00:00
[ [ "Mayer", "Gerhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Quantitative Biology", "code": "q-bio.OT", "description": "Work in quantitative biology that does not fit into the other q-bio classifications", "span": "(Other Quantitative Biology)" } ]
0908.0464
S{\l}awomir Staworko
Slawomir Staworko, Jan Chomicki and Jerzy Marcinkowski
Prioritized Repairing and Consistent Query Answering in Relational Databases
Accepted to the special SUM'08 issue of AMAI
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A consistent query answer in an inconsistent database is an answer obtained in every (minimal) repair. The repairs are obtained by resolving all conflicts in all possible ways. Often, however, the user is able to provide a preference on how conflicts should be resolved. We investigate here the framework of preferred consistent query answers, in which user preferences are used to narrow down the set of repairs to a set of preferred repairs. We axiomatize desirable properties of preferred repairs. We present three different families of preferred repairs and study their mutual relationships. Finally, we investigate the complexity of preferred repairing and computing preferred consistent query answers.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 15:10:25 GMT" }, { "version": "v2", "created": "Thu, 11 Mar 2010 13:27:17 GMT" }, { "version": "v3", "created": "Fri, 7 Oct 2011 16:45:52 GMT" } ]
2011-10-10T00:00:00
[ [ "Staworko", "Slawomir", "" ], [ "Chomicki", "Jan", "" ], [ "Marcinkowski", "Jerzy", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0908.0482
Shenghui Su
Shenghui Su, Shuwang Lu
REESSE1+ . Reward . Proof by Experiment . A New Approach to Proof of P != NP
5 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The authors discuss what is provable security in cryptography. Think that provable security is asymptotic, relative, and dynamic, and only a supplement to but not a replacement of exact security analysis. Because the conjecture P != NP has not been proven yet, and it is possible in terms of the two incompleteness theorems of Kurt Godel that there is some cryptosystem of which the security cannot or only ideally be proven in the random oracle model, the security of a cryptosystem is between provability and unprovability, and any academic conclusion must be checked and verified with practices or experiments as much as possible. Extra, a new approach to proof of P != NP is pointed out. Lastly, a reward is offered for the subexponential time solutions to the three REESSE1+ problems: MPP, ASPP, and TLP with n >= 80 and lg M >= 80, which may be regarded as a type of security proof by experiment.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 16:09:39 GMT" }, { "version": "v2", "created": "Sun, 10 Oct 2010 06:41:11 GMT" }, { "version": "v3", "created": "Thu, 15 Dec 2011 10:37:32 GMT" }, { "version": "v4", "created": "Thu, 7 Feb 2013 06:19:55 GMT" }, { "version": "v5", "created": "Tue, 26 Aug 2014 03:13:05 GMT" } ]
2014-08-27T00:00:00
[ [ "Su", "Shenghui", "" ], [ "Lu", "Shuwang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0488
Andre Schulz
Ares Rib\'o Mor, G\"unter Rote, Andr\'e Schulz
Small grid embeddings of 3-polytopes
null
Discrete and Computational Geometry 45 (2011), 65-87
10.1007/s00454-010-9301-0
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an algorithm that embeds a given 3-connected planar graph as a convex 3-polytope with integer coordinates. The size of the coordinates is bounded by $O(2^{7.55n})=O(188^{n})$. If the graph contains a triangle we can bound the integer coordinates by $O(2^{4.82n})$. If the graph contains a quadrilateral we can bound the integer coordinates by $O(2^{5.46n})$. The crucial part of the algorithm is to find a convex plane embedding whose edges can be weighted such that the sum of the weighted edges, seen as vectors, cancel at every point. It is well known that this can be guaranteed for the interior vertices by applying a technique of Tutte. We show how to extend Tutte's ideas to construct a plane embedding where the weighted vector sums cancel also on the vertices of the boundary face.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 16:35:20 GMT" }, { "version": "v2", "created": "Fri, 23 Jul 2010 15:13:41 GMT" } ]
2017-11-20T00:00:00
[ [ "Mor", "Ares Ribó", "" ], [ "Rote", "Günter", "" ], [ "Schulz", "André", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.0494
Stephan Merz
Francisco L\'opez Fraguas, Stephan Merz (INRIA Lorraine - LORIA), Juan Rodr\'iguez Hortal\'a
A Formalization of the Semantics of Functional-Logic Programming in Isabelle
null
22nd International Conference Theorem Proving for Higher-Order Logics (TPHOLs 2009): emerging trends session (2009)
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Modern functional-logic programming languages like Toy or Curry feature non-strict non-deterministic functions that behave under call-time choice semantics. A standard formulation for this semantics is the CRWL logic, that specifies a proof calculus for computing the set of possible results for each expression. In this paper we present a formalization of that calculus in the Isabelle/HOL proof assistant. We have proved some basic properties of CRWL: closedness under c-substitutions, polarity and compositionality. We also discuss some insights that have been gained, such as the fact that left linearity of program rules is not needed for any of these results to hold.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 17:01:24 GMT" } ]
2009-08-05T00:00:00
[ [ "Fraguas", "Francisco López", "", "INRIA Lorraine - LORIA" ], [ "Merz", "Stephan", "", "INRIA Lorraine - LORIA" ], [ "Hortalá", "Juan Rodríguez", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0908.0497
MinJi Kim
MinJi Kim, Daniel Lucani, Xiaomeng Shi, Fang Zhao, Muriel Medard
Network Coding for Multi-Resolution Multicast
9 pages, 16 figures, submitted to IEEE INFOCOM 2010
null
10.1109/INFCOM.2010.5462001
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-resolution codes enable multicast at different rates to different receivers, a setup that is often desirable for graphics or video streaming. We propose a simple, distributed, two-stage message passing algorithm to generate network codes for single-source multicast of multi-resolution codes. The goal of this "pushback algorithm" is to maximize the total rate achieved by all receivers, while guaranteeing decodability of the base layer at each receiver. By conducting pushback and code generation stages, this algorithm takes advantage of inter-layer as well as intra-layer coding. Numerical simulations show that in terms of total rate achieved, the pushback algorithm outperforms routing and intra-layer coding schemes, even with codeword sizes as small as 10 bits. In addition, the performance gap widens as the number of receivers and the number of nodes in the network increases. We also observe that naiive inter-layer coding schemes may perform worse than intra-layer schemes under certain network conditions.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 17:27:19 GMT" } ]
2016-11-18T00:00:00
[ [ "Kim", "MinJi", "" ], [ "Lucani", "Daniel", "" ], [ "Shi", "Xiaomeng", "" ], [ "Zhao", "Fang", "" ], [ "Medard", "Muriel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0512
Greg Kuperberg
Greg Kuperberg (UC Davis)
How hard is it to approximate the Jones polynomial?
19 pages. Don't miss this major revision! Includes more complete explanations of all results, and refinements of both Aaronson's theorem and the Solovay-Kitaev theorem. To appear in ToC
Theory Comput. 11 (2015), 183-219
null
null
quant-ph cs.CC math.QA
http://creativecommons.org/licenses/by-nc-sa/3.0/
Freedman, Kitaev, and Wang [arXiv:quant-ph/0001071], and later Aharonov, Jones, and Landau [arXiv:quant-ph/0511096], established a quantum algorithm to "additively" approximate the Jones polynomial V(L,t) at any principal root of unity t. The strength of this additive approximation depends exponentially on the bridge number of the link presentation. Freedman, Larsen, and Wang [arXiv:math/0103200] established that the approximation is universal for quantum computation at a non-lattice, principal root of unity; and Aharonov and Arad [arXiv:quant-ph/0605181] established a uniform version of this result. In this article, we show that any value-dependent approximation of the Jones polynomial at these non-lattice roots of unity is #P-hard. If given the power to decide whether |V(L,t)| > a or |V(L,t)| < b for fixed constants a > b > 0, there is a polynomial-time algorithm to exactly count the solutions to arbitrary combinatorial equations. In our argument, the result follows fairly directly from the universality result and Aaronson's theorem that PostBQP = PP [arXiv:quant-ph/0412187].
[ { "version": "v1", "created": "Tue, 4 Aug 2009 18:55:02 GMT" }, { "version": "v2", "created": "Mon, 27 Oct 2014 05:04:49 GMT" } ]
2019-09-16T00:00:00
[ [ "Kuperberg", "Greg", "", "UC Davis" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" } ]
0908.0515
Hongyang Chen
Hongyang Chen, Qingjiang Shi, Pei Huang, H.Vincent Poor, and Kaoru Sezaki
Mobile Anchor Assisted Node Localization for Wireless Sensor Networks
5 pages, 6 figures, IEEE PIMRC 2009
null
10.1109/PIMRC.2009.5449959
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a cooperative localization algorithm is proposed that considers the existence of obstacles in mobilityassisted wireless sensor networks (WSNs). In this scheme, a mobile anchor (MA) node cooperates with static sensor nodes and moves actively to refine location performance. The localization accuracy of the proposed algorithm can be improved further by changing the transmission range of mobile anchor node. The algorithm takes advantage of cooperation betweenMAs and static sensors while, at the same time, taking into account the relay node availability to make the best use of beacon signals. For achieving high localization accuracy and coverage, a novel convex position estimation algorithm is proposed, which can effectively solve the localization problem when infeasible points occur because of the effects of radio irregularity and obstacles. This method is the only range-free based convex method to solve the localization problem when the feasible set of localization inequalities is empty. Simulation results demonstrate the effectiveness of this algorithm.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 19:13:42 GMT" } ]
2016-11-17T00:00:00
[ [ "Chen", "Hongyang", "" ], [ "Shi", "Qingjiang", "" ], [ "Huang", "Pei", "" ], [ "Poor", "H. Vincent", "" ], [ "Sezaki", "Kaoru", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0516
Juan J. Merelo Pr.
Juan J. Merelo Guervos
Still doing evolutionary algorithms with Perl
Corrected version of the paper published in YAPC::EU::2009, Corporate Perl, pp 83-97
null
null
null
cs.NE
http://creativecommons.org/licenses/by-nc-sa/3.0/
Algorithm::Evolutionary (A::E from now on) was introduced in 2002, after a talk in YAPC::EU in Munich. 7 years later, A::E is in its 0.67 version (past its "number of the beast" 0.666), and has been used extensively, to the point of being the foundation of much of the (computer) science being done by our research group (and, admittedly, not many others). All is not done, however; now A::E is being integrated with POE so that evolutionary algorithms (EAs) can be combined with all kinds of servers and used in client, servers, and anything in between. In this companion to the talk I will explain what evolutionary algorithms are, what they are being used for, how to do them with Perl (using these or other fine modules found in CPAN) and what evolutionary algorithms can do for Perl at large.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 19:16:14 GMT" } ]
2009-08-11T00:00:00
[ [ "Guervos", "Juan J. Merelo", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0908.0548
R Doomun
Hanumanthappa J., Manjaiah D. H
IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration Tunneling Considerations Transitional Model:A Case Study for University of Mysore Network
12 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The actual transition from IPv4 to IPv6 requires network administrators to become aware of the next generation protocol and the associated risk problems.Due to the scale and complexity of current internet architecture how to protect from the existing investment and reduce the negative influence to users and service providers during the transition from IPv4 to IPv6 is a very important future topic for the advanced version of an internet architecture.This paper summarizes and compares the IPv6 transition mechanism methods like Dual Stack,Tunneling issues like IPv6 Automatic tunneling and manually configured tunneling considerations, the IPv6 transition scenarios,IPv6 transition security problems,highlights IPv6 and IPv4 threat review with automatic tunneling and configuration tunneling considerations.In this paper we have proposed a transitional threat model for automatic tunneling and a configuration tunneling that could be followed by the University of Mysore(UoM),to estimate automatic tunneling and a manually configured tunneling threat review issues.Furthermore,there are different tunneling mechanisms such as IPv6 over IPv4 GRE Tunnel,Tunnel broker,Automatic IPv4 Compatible Tunnel and Automatic 6 to 4 Tunnel and also outlines many of the common known threats against IPv6 and then it compares and contrast how these threats are similar ones,might affect an IPv6 network.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 21:12:21 GMT" } ]
2009-08-06T00:00:00
[ [ "J.", "Hanumanthappa", "" ], [ "H", "Manjaiah D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0551
R Doomun
Dr. Shishir Kumar, U.S. Rawat, Sameer Kumar Jasra, Akshay Kumar Jain
Efficient methodology for implementation of Encrypted File System in User Space
8 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS July 2009, Vol. 3, No. 1, USA
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Encrypted File System (EFS) pushes encryption services into the file system itself. EFS supports secure storage at the system level through a standard UNIX file system interface to encrypted files. User can associate a cryptographic key with the directories they wish to protect. Files in these directories (as well as their pathname components) are transparently encrypted and decrypted with the specified key without further user intervention; clear text is never stored on a disk or sent to a remote file server. EFS can use any available file system for its underlying storage without modifications, including remote file servers such as NFS. System management functions, such as file backup, work in a normal manner and without knowledge of the key. Performance is an important factor to users since encryption can be time consuming. This paper describes the design and implementation of EFS in user space using faster cryptographic algorithms on UNIX Operating system. Implementing EFS in user space makes it portable and flexible; Kernel size will also not increase resulting in more reliable & efficient Operating System. Encryption techniques for file system level encryption are described, and general issues of cryptographic system interfaces to support routine secure computing are discussed.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 21:30:18 GMT" } ]
2009-08-06T00:00:00
[ [ "Kumar", "Dr. Shishir", "" ], [ "Rawat", "U. S.", "" ], [ "Jasra", "Sameer Kumar", "" ], [ "Jain", "Akshay Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0554
Aran Nayebi
Aran Nayebi
On integers as the sum of a prime and a $k$-th power
This paper has been withdrawn by the author due to several errors in the manuscript, a prominent problem being that it has been known at least since Tarski that in real numbers there exists a deterministic Turing machine which determines if a variety is empty or nonempty
null
null
null
math.NT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\mathcal{R}_k(n)$ be the number of representations of an integer $n$ as the sum of a prime and a $k$-th power. Define E_k(X) := |\{n \le X, n \in I_k, n\text{not a sum of a prime and a $k$-th power}\}|. Hardy and Littlewood conjectured that for $k = 2$ and $k=3$, E_k(X) \ll_{k} 1. In this note we present an alternative approach grounded in the theory of Diophantine equations towards a proof of the conjecture for all $k \ge 2$.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 18:33:44 GMT" }, { "version": "v10", "created": "Wed, 7 Oct 2009 00:58:30 GMT" }, { "version": "v11", "created": "Mon, 12 Oct 2009 16:29:17 GMT" }, { "version": "v12", "created": "Wed, 14 Oct 2009 02:36:10 GMT" }, { "version": "v13", "created": "Thu, 15 Oct 2009 06:13:11 GMT" }, { "version": "v14", "created": "Wed, 21 Oct 2009 22:50:16 GMT" }, { "version": "v15", "created": "Mon, 26 Oct 2009 03:40:59 GMT" }, { "version": "v16", "created": "Sun, 6 Dec 2009 04:05:36 GMT" }, { "version": "v17", "created": "Mon, 14 Dec 2009 04:17:58 GMT" }, { "version": "v18", "created": "Mon, 4 Jan 2010 05:07:56 GMT" }, { "version": "v19", "created": "Mon, 5 Apr 2010 17:29:32 GMT" }, { "version": "v2", "created": "Fri, 7 Aug 2009 17:07:56 GMT" }, { "version": "v20", "created": "Sun, 5 Sep 2010 01:03:35 GMT" }, { "version": "v21", "created": "Mon, 7 Mar 2011 19:01:06 GMT" }, { "version": "v22", "created": "Wed, 9 Mar 2011 17:52:11 GMT" }, { "version": "v23", "created": "Sun, 10 Apr 2011 05:35:39 GMT" }, { "version": "v24", "created": "Sun, 24 Apr 2011 17:02:04 GMT" }, { "version": "v25", "created": "Mon, 13 Jun 2011 23:33:32 GMT" }, { "version": "v3", "created": "Mon, 10 Aug 2009 16:33:24 GMT" }, { "version": "v4", "created": "Tue, 11 Aug 2009 00:55:02 GMT" }, { "version": "v5", "created": "Wed, 12 Aug 2009 15:11:41 GMT" }, { "version": "v6", "created": "Fri, 14 Aug 2009 14:51:45 GMT" }, { "version": "v7", "created": "Sun, 23 Aug 2009 17:11:32 GMT" }, { "version": "v8", "created": "Mon, 5 Oct 2009 07:45:51 GMT" }, { "version": "v9", "created": "Tue, 6 Oct 2009 05:25:27 GMT" } ]
2011-06-15T00:00:00
[ [ "Nayebi", "Aran", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.0567
Oktie Hassanzadeh
Oktie Hassanzadeh, Anastasios Kementsietsidis, Lipyeow Lim, Renee J. Miller, Min Wang
LinkedCT: A Linked Data Space for Clinical Trials
5 pages, 1 figure, 4 tables
null
null
null
cs.DB cs.CE cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Linked Clinical Trials (LinkedCT) project aims at publishing the first open semantic web data source for clinical trials data. The database exposed by LinkedCT is generated by (1) transforming existing data sources of clinical trials into RDF, and (2) discovering semantic links between the records in the trials data and several other data sources. In this paper, we discuss several challenges involved in these two steps and present the methodology used in LinkedCT to overcome these challenges. Our approach for semantic link discovery involves using state-of-the-art approximate string matching techniques combined with ontology-based semantic matching of the records, all performed in a declarative and easy-to-use framework. We present an evaluation of the performance of our proposed techniques in several link discovery scenarios in LinkedCT.
[ { "version": "v1", "created": "Tue, 4 Aug 2009 23:30:46 GMT" } ]
2009-08-06T00:00:00
[ [ "Hassanzadeh", "Oktie", "" ], [ "Kementsietsidis", "Anastasios", "" ], [ "Lim", "Lipyeow", "" ], [ "Miller", "Renee J.", "" ], [ "Wang", "Min", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.0570
Piyush Rai
Piyush Rai and Hal Daum\'e III
The Infinite Hierarchical Factor Regression Model
null
NIPS 2008
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a nonparametric Bayesian factor regression model that accounts for uncertainty in the number of factors, and the relationship between factors. To accomplish this, we propose a sparse variant of the Indian Buffet Process and couple this with a hierarchical model over factors, based on Kingman's coalescent. We apply this model to two problems (factor analysis and factor regression) in gene-expression data analysis.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 01:10:09 GMT" } ]
2009-08-06T00:00:00
[ [ "Rai", "Piyush", "" ], [ "Daumé", "Hal", "III" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0908.0572
Piyush Rai
Piyush Rai, Hal Daum\'e III, Suresh Venkatasubramanian
Streamed Learning: One-Pass SVMs
null
IJCAI 2009
null
null
cs.LG stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a streaming model for large-scale classification (in the context of $\ell_2$-SVM) by leveraging connections between learning and computational geometry. The streaming model imposes the constraint that only a single pass over the data is allowed. The $\ell_2$-SVM is known to have an equivalent formulation in terms of the minimum enclosing ball (MEB) problem, and an efficient algorithm based on the idea of \emph{core sets} exists (Core Vector Machine, CVM). CVM learns a $(1+\varepsilon)$-approximate MEB for a set of points and yields an approximate solution to corresponding SVM instance. However CVM works in batch mode requiring multiple passes over the data. This paper presents a single-pass SVM which is based on the minimum enclosing ball of streaming data. We show that the MEB updates for the streaming case can be easily adapted to learn the SVM weight vector in a way similar to using online stochastic gradient updates. Our algorithm performs polylogarithmic computation at each example, and requires very small and constant storage. Experimental results show that, even in such restrictive settings, we can learn efficiently in just one pass and get accuracies comparable to other state-of-the-art SVM solvers (batch and online). We also give an analysis of the algorithm, and discuss some open issues and possible extensions.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 00:40:23 GMT" } ]
2009-08-06T00:00:00
[ [ "Rai", "Piyush", "" ], [ "Daumé", "Hal", "III" ], [ "Venkatasubramanian", "Suresh", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0908.0583
Gene Golovchinsky
Jeremy Pickens, Gene Golovchinsky, Meredith Ringel Morris
Proceedings of 1st International Workshop on Collaborative Information Seeking
Fixed some typos
null
null
null
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The goal of the workshop is to bring together researchers interested in various aspects of small-team collaborative search to share ideas, to stimulate research in the area, and to increase the visibility of this emerging area. We expect to identify promising directions for further exploration and to establish collaborative links among research groups. The workshop took place on June 20, 2008 in Pittsburgh, Pennsylvania, USA, in conjunction with the JCDL 2008 conference. The workshop was organized around three themes: practices, models, and evaluation. We started with a discussion (still ongoing) about terminology, about how to situate our work in the existing research space. We also wanted to motivate our modeling and design discussions with real-world examples of collaboration. We discussed examples from the healthcare domain, students, faculty members, the military, and businesses such as pharmaceutical companies that conduct research. We discussed several models of collaborative information seeking, including sense-making, communication, and information seeking theory based on Marcia Bates' Berrypicking theory. Finally, presenters described several systems that implement various aspects of collaboration, including using search paths, simulations of user behavior to model system performance, and characterizing properties of groups that lead to more effective collaboration.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 04:32:38 GMT" }, { "version": "v2", "created": "Thu, 6 Aug 2009 18:23:08 GMT" }, { "version": "v3", "created": "Fri, 7 Aug 2009 21:52:54 GMT" } ]
2009-08-11T00:00:00
[ [ "Pickens", "Jeremy", "" ], [ "Golovchinsky", "Gene", "" ], [ "Morris", "Meredith Ringel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.0586
Gene Golovchinsky
Meredith Ringel Morris and Jaime Teevan
Understanding Groups' Properties as a Means of Improving Collaborative Search Systems
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/mortee
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding the similar properties of people involved in group search sessions has the potential to significantly improve collaborative search systems; such systems could be enhanced by information retrieval algorithms and user interface modifications that take advantage of important properties, for example by re-ordering search results using information from group members' combined user profiles. Understanding what makes group members similar can also assist with the identification of groups, which can be valuable for connecting users with others with whom they might undertake a collaborative search. In this workshop paper, we describe our current research efforts towards studying the properties of a variety of group types. We discuss properties of groups that may be relevant to designers of collaborative search systems, and propose ways in which understanding such properties could influence the design of interfaces and algorithms for collaborative Web search.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 05:05:03 GMT" } ]
2009-08-06T00:00:00
[ [ "Morris", "Meredith Ringel", "" ], [ "Teevan", "Jaime", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.0587
I-Hong Hou
I-Hong Hou and P.R. Kumar
Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop a general approach for designing scheduling policies for real-time traffic over wireless channels. We extend prior work, which characterizes a real-time flow by its traffic pattern, delay bound, timely-throughput requirement, and channel reliability, to allow time-varying channels, allow clients to have different deadlines, and allow for the optional employment of rate adaptation. Thus, our model allow the treatment of more realistic fading channels as well as scenarios with mobile nodes, and the usage of more general transmission strategies. We derive a sufficient condition for a scheduling policy to be feasibility optimal, and thereby establish a class of feasibility optimal policies. We demonstrate the utility of the identified class by deriving a feasibility optimal policy for the scenario with rate adaptation, time-varying channels, and heterogeneous delay bounds. When rate adaptation is not available, we also derive a feasibility optimal policy for time-varying channels. For the scenario where rate adaptation is not available but clients have different delay bounds, we describe a heuristic. Simulation results are also presented which indicate the usefulness of the scheduling policies for more realistic and complex scenarios.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 05:13:34 GMT" } ]
2009-08-06T00:00:00
[ [ "Hou", "I-Hong", "" ], [ "Kumar", "P. R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0588
Ke Xu
Ke Xu, Liandong Liu, Xiao Liang
Complex networks: A mixture of power-law and Weibull distributions
5 pages, 3 figures. Added a new finding about the degree distribution
null
null
null
cs.NI cond-mat.stat-mech physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Complex networks have recently aroused a lot of interest. However, network edges are considered to be the same in almost all these studies. In this paper, we present a simple classification method, which divides the edges of undirected, unweighted networks into two types: p2c and p2p. The p2c edge represents a hierarchical relationship between two nodes, while the p2p edge represents an equal relationship between two nodes. It is surprising and unexpected that for many real-world networks from a wide variety of domains (including computer science, transportation, biology, engineering and social science etc), the p2c degree distribution follows a power law more strictly than the total degree distribution, while the p2p degree distribution follows the Weibull distribution very well. Thus, the total degree distribution can be seen as a mixture of power-law and Weibull distributions. More surprisingly, it is found that in many cases, the total degree distribution can be better described by the Weibull distribution, rather than a power law as previously suggested. By comparing two topology models, we think that the origin of the Weibull distribution in complex networks might be a mixture of both preferential and random attachments when networks evolve.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 05:13:36 GMT" }, { "version": "v2", "created": "Tue, 11 Aug 2009 01:21:34 GMT" }, { "version": "v3", "created": "Tue, 1 Sep 2009 06:15:52 GMT" } ]
2009-09-01T00:00:00
[ [ "Xu", "Ke", "" ], [ "Liu", "Liandong", "" ], [ "Liang", "Xiao", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0908.0595
Gene Golovchinsky
Brynn M. Evans and Ed H. Chi
Towards a Model of Understanding Social Search
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/evachi
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Search engine researchers typically depict search as the solitary activity of an individual searcher. In contrast, results from our critical-incident survey of 150 users on Amazon's Mechanical Turk service suggest that social interactions play an important role throughout the search process. Our main contribution is that we have integrated models from previous work in sensemaking and information seeking behavior to present a canonical social model of user activities before, during, and after search, suggesting where in the search process even implicitly shared information may be valuable to individual searchers.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 17:09:45 GMT" } ]
2009-08-06T00:00:00
[ [ "Evans", "Brynn M.", "" ], [ "Chi", "Ed H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.0619
Arash Amini
Arash Amini and Farokh Marvasti
Deterministic Construction of Compressed Sensing Matrices using BCH Codes
8 pages, 2 figures, 1 table
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce deterministic $m\times n$ RIP fulfilling $\pm 1$ matrices of order $k$ such that $\frac{\log m}{\log k}\approx \frac{\log(\log_2 n)}{\log(\log_2 k)}$. The columns of these matrices are binary BCH code vectors that their zeros are replaced with -1 (excluding the normalization factor). The samples obtained by these matrices can be easily converted to the original sparse signal; more precisely, for the noiseless samples, the simple Matching Pursuit technique, even with less than the common computational complexity, exactly reconstructs the sparse signal. In addition, using Devore's binary matrices, we expand the binary scheme to matrices with $\{0,1,-1\}$ elements.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 08:52:57 GMT" }, { "version": "v2", "created": "Fri, 7 Aug 2009 13:32:49 GMT" } ]
2009-08-07T00:00:00
[ [ "Amini", "Arash", "" ], [ "Marvasti", "Farokh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0660
Laurent Jacques
Laurent Jacques
A Short Note on Compressed Sensing with Partially Known Signal Support
null
null
null
TR-LJ-2009.02
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This short note studies a variation of the Compressed Sensing paradigm introduced recently by Vaswani et al., i.e. the recovery of sparse signals from a certain number of linear measurements when the signal support is partially known. The reconstruction method is based on a convex minimization program coined "innovative Basis Pursuit DeNoise" (or iBPDN). Under the common $\ell_2$-fidelity constraint made on the available measurements, this optimization promotes the ($\ell_1$) sparsity of the candidate signal over the complement of this known part. In particular, this paper extends the results of Vaswani et al. to the cases of compressible signals and noisy measurements. Our proof relies on a small adaption of the results of Candes in 2008 for characterizing the stability of the Basis Pursuit DeNoise (BPDN) program. We emphasize also an interesting link between our method and the recent work of Davenport et al. on the $\delta$-stable embeddings and the "cancel-then-recover" strategy applied to our problem. For both approaches, reconstructions are indeed stabilized when the sensing matrix respects the Restricted Isometry Property for the same sparsity order. We conclude by sketching an easy numerical method relying on monotone operator splitting and proximal methods that iteratively solves iBPDN.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 12:46:59 GMT" }, { "version": "v2", "created": "Sun, 21 Feb 2010 21:05:31 GMT" } ]
2010-02-21T00:00:00
[ [ "Jacques", "Laurent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0667
Paolo Dini
Paolo Dini, Jaume Nin-Guerrero, Josep Mangues-Bafalluy, Lillian Dai, Sateesh Addepalli
Interworking Scheme Using Optimized SIP Mobility for MultiHomed Mobile Nodes in Wireless Heterogeneous Networks
null
null
null
null
cs.NI cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays, mobile users wish to use their multi-interface mobile devices to access the Internet through network points of attachment (PoA) based on heterogeneous wireless technologies. They also wish to seamlessly change the PoAs during their ongoing sessions to improve service quality and/or reduce monetary cost. If appropriately handled, multihomed mobile nodes offer a potential solution to this issue. In this sense, the management of multihomed mobile nodes in heterogeneous environment is a key research topic. In this paper, we present an improvement of SIP mobility (pre-call plus mid-call mobility) to support seamless mobility of multihomed mobile nodes in heterogeneous wireless networks. Pre-call mobility is extended to associate user identifier (i.e. SIP URI) and interface identifiers (i.e. IP addresses). The multiple addresses of a mobile device are weighted by the user to create a priority list in the SIP server so as to guarantee resilient reachability of mobile nodes and to avoid unnecessary signaling through wireless links, thus saving radio resources. Then, three variations of mid-call mobility, called hard, hybrid and soft procedures, are also proposed. Their main aim is to minimize, or even avoid, packet losses during interface switching at the mobile node. The proposed solutions have been implemented in a wireless heterogeneous testbed composed of 802.11 WLAN plus 3.5 cellular network, which are fully controlled and configurable. The testbed has been used to study the performance and the robustness of the three proposed mid-call mobility procedures.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 13:55:36 GMT" } ]
2009-08-06T00:00:00
[ [ "Dini", "Paolo", "" ], [ "Nin-Guerrero", "Jaume", "" ], [ "Mangues-Bafalluy", "Josep", "" ], [ "Dai", "Lillian", "" ], [ "Addepalli", "Sateesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0908.0697
Christian Wulff-Nilsen
Christian Wulff-Nilsen
Girth of a Planar Digraph with Real Edge Weights in O(n(log n)^3) Time
8 pages, no figures, zip file containing tex and pdf file
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The girth of a graph is the length of its shortest cycle. We give an algorithm that computes in O(n(log n)^3) time and O(n) space the (weighted) girth of an n-vertex planar digraph with arbitrary real edge weights. This is an improvement of a previous time bound of O(n^(3/2)), a bound which was only valid for non-negative edge-weights. Our algorithm can be modified to output a shortest cycle within the same time and space bounds if such a cycle exists.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 15:59:23 GMT" } ]
2009-08-06T00:00:00
[ [ "Wulff-Nilsen", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.0703
Gene Golovchinsky
Max L. Wilson, m.c. schraefel
Evaluating Collaborative Search Interfaces with Information Seeking Theory
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/wilsch
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Despite the many implicit references to the social aspects of search within Information Seeking and Retrieval research, there has been relatively little work that has specifically investigated the additional requirements for collaborative search software. In this paper we re-assess a recent evaluation framework, designed for individual information seeking experiences, to see a) how it could still be applied to collaborative search software; b) how it could produce additional requirements for collaborative search; and c) how it could be extended in future work to be even more appropriate for collaborative search evaluation. The position held after the assessment is that it can be used to evaluate collaborative search software, while providing new insights into their requirements. Finally, future work will validate the frameworks applicability to collaborative search and investigate roles within collaborative groups as a means to extend the framework.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 16:43:45 GMT" } ]
2009-08-06T00:00:00
[ [ "Wilson", "Max L.", "" ], [ "schraefel", "m. c.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.0704
Gene Golovchinsky
Gene Golovchinsky, Jeremy Pickens and Maribeth Back
A Taxonomy of Collaboration in Online Information Seeking
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/golpicbac
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
People can help other people find information in networked information seeking environments. Recently, many such systems and algorithms have proliferated in industry and in academia. Unfortunately, it is difficult to compare the systems in meaningful ways because they often define collaboration in different ways. In this paper, we propose a model of possible kinds of collaboration, and illustrate it with examples from literature. The model contains four dimensions: intent, depth, concurrency and location. This model can be used to classify existing systems and to suggest possible opportunities for design in this space.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 16:48:18 GMT" } ]
2009-08-06T00:00:00
[ [ "Golovchinsky", "Gene", "" ], [ "Pickens", "Jeremy", "" ], [ "Back", "Maribeth", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.0709
Gene Golovchinsky
Chirag Shah
Toward Collaborative Information Seeking (CIS)
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/sha
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is natural for humans to collaborate while dealing with complex problems. In this article I consider this process of collaboration in the context of information seeking. The study and discussion presented here are driven by two dissatisfactions: (1) the majority of IR systems today do not facilitate collaboration directly, and (2) the concept of collaboration itself is not well-understood. I begin by probing the notion of collaboration and propose a model that helps us understand the requirements for a successful collaboration. A model of a Collaborative Information Seeking (CIS) environment is then rendered based on an extended model of information seeking.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 17:33:03 GMT" } ]
2009-08-06T00:00:00
[ [ "Shah", "Chirag", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.0711
Hongyi Yao
Hongyi Yao, Sidharth Jaggi, Minghua Chen
Passive network tomography for erroneous networks: A network coding approach
40 pages, under submission for IEEE Trans. on Information Theory
null
10.1109/TIT.2012.2204532
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Passive network tomography uses end-to-end observations of network communication to characterize the network, for instance to estimate the network topology and to localize random or adversarial glitches. Under the setting of linear network coding this work provides a comprehensive study of passive network tomography in the presence of network (random or adversarial) glitches. To be concrete, this work is developed along two directions: 1. Tomographic upper and lower bounds (i.e., the most adverse conditions in each problem setting under which network tomography is possible, and corresponding schemes (computationally efficient, if possible) that achieve this performance) are presented for random linear network coding (RLNC). We consider RLNC designed with common randomness, i.e., the receiver knows the random code-books all nodes. (To justify this, we show an upper bound for the problem of topology estimation in networks using RLNC without common randomness.) In this setting we present the first set of algorithms that characterize the network topology exactly. Our algorithm for topology estimation with random network errors has time complexity that is polynomial in network parameters. For the problem of network error localization given the topology information, we present the first computationally tractable algorithm to localize random errors, and prove it is computationally intractable to localize adversarial errors. 2. New network coding schemes are designed that improve the tomographic performance of RLNC while maintaining the desirable low-complexity, throughput-optimal, distributed linear network coding properties of RLNC. In particular, we design network codes based on Reed-Solomon codes so that a maximal number of adversarial errors can be localized in a computationally efficient manner even without the information of network topology.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 17:35:10 GMT" }, { "version": "v2", "created": "Tue, 13 Oct 2009 13:30:41 GMT" }, { "version": "v3", "created": "Thu, 15 Apr 2010 09:28:38 GMT" } ]
2016-11-15T00:00:00
[ [ "Yao", "Hongyi", "" ], [ "Jaggi", "Sidharth", "" ], [ "Chen", "Minghua", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0722
Osameh Al-Kofahi
Osameh M. Al-Kofahi and Ahmed E. Kamal
Max-Flow Protection using Network Coding
9 pages, submitted to INFOCOM 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In any communication network, the maximum number of link-disjoint paths between any pair of communicating nodes, S and T, is limited by the S-T minimum link-cut. Multipath routing protocols have been proposed in the literature to make use of these S-T paths in enhancing the survivability of the S-T information flow. This is usually accomplished by using a subset of these paths to forward redundant data units or combinations (if network coding is allowed) from S to T. Therefore, this enhancement in survivability reduces the useful S-T information rate. In this paper we present a new way to enhance the survivability of the S-T information flow without compromising the maximum achievable S-T information rate. To do this, bottleneck links (in the min-cut) should only forward useful information, and not redundant data units. We introduce the idea of extra source or destination connectivity with respect to a certain S-T max-flow, and then we study two problems: namely, pre-cut protection and post-cut protection. Although our objective in both problems is the same, where we aim to maximize the number of protected paths, our analysis shows that the nature of these two problems are very different, and that the pre-cut protection problem is much harder. Specifically, we prove the hardness of the pre-cut protection problem, formulate it as an integer linear program, and propose a heuristic approach to solve it. Simulations show that the performance of the heuristic is acceptable even on relatively large networks. In the post-cut problem we show that all the data units, forwarded by the min-cut edges not incident to T, can be post-cut-protected.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 18:36:37 GMT" } ]
2009-08-06T00:00:00
[ [ "Al-Kofahi", "Osameh M.", "" ], [ "Kamal", "Ahmed E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0744
Gongguo Tang
Gongguo Tang and Arye Nehorai
Performance analysis for sparse support recovery
Submitted to IEEE Trans. Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of estimating the common support for jointly sparse signals based on their projections onto lower-dimensional space is analyzed. Support recovery is formulated as a multiple-hypothesis testing problem. Both upper and lower bounds on the probability of error are derived for general measurement matrices, by using the Chernoff bound and Fano's inequality, respectively. The upper bound shows that the performance is determined by a quantity measuring the measurement matrix incoherence, while the lower bound reveals the importance of the total measurement gain. The lower bound is applied to derive the minimal number of samples needed for accurate direction-of-arrival (DOA) estimation for a sparse representation based algorithm. When applied to Gaussian measurement ensembles, these bounds give necessary and sufficient conditions for a vanishing probability of error for majority realizations of the measurement matrix. Our results offer surprising insights into sparse signal recovery. For example, as far as support recovery is concerned, the well-known bound in Compressive Sensing with the Gaussian measurement matrix is generally not sufficient unless the noise level is low. Our study provides an alternative performance measure, one that is natural and important in practice, for signal recovery in Compressive Sensing and other application areas exploiting signal sparsity.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 20:12:02 GMT" }, { "version": "v2", "created": "Thu, 5 Nov 2009 15:19:48 GMT" } ]
2009-11-05T00:00:00
[ [ "Tang", "Gongguo", "" ], [ "Nehorai", "Arye", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0753
Heide Gluesing-Luerssen
H. Gluesing-Luerssen, U. Helmke, J. I. Iglesias Curto
Algebraic Decoding for Doubly Cyclic Convolutional Codes
16 pages
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An iterative decoding algorithm for convolutional codes is presented. It successively processes $N$ consecutive blocks of the received word in order to decode the first block. A bound is presented showing which error configurations can be corrected. The algorithm can be efficiently used on a particular class of convolutional codes, known as doubly cyclic convolutional codes. Due to their highly algebraic structure those codes are well suited for the algorithm and the main step of the procedure can be carried out using Reed-Solomon decoding. Examples illustrate the decoding and a comparison with existing algorithms is being made.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 20:31:53 GMT" } ]
2009-08-07T00:00:00
[ [ "Gluesing-Luerssen", "H.", "" ], [ "Helmke", "U.", "" ], [ "Curto", "J. I. Iglesias", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0908.0764
Gene Golovchinsky
Madhu Reddy and Bernard J. Jansen
Learning about Potential Users of Collaborative Information Retrieval Systems
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/redjan
cs.IR cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the key components of designing usable and useful collaborative information retrieval systems is to understand the needs of the users of these systems. Our research team has been exploring collaborative information behavior in a variety of organizational settings. Our research goals have been two-fold: First, to develop a conceptual understanding of collaborative information behavior and second, gather requirements for the design of collaborative information retrieval systems. In this paper, we present a brief overview of our fieldwork in a three different organizational settings, discuss our methodology for collecting data on collaborative information behavior, and highlight some lessons that we are learning about potential users of collaborative information retrieval systems in these domains.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 21:54:21 GMT" } ]
2009-08-07T00:00:00
[ [ "Reddy", "Madhu", "" ], [ "Jansen", "Bernard J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.0772
Daniel Golovin
Daniel Golovin, Andreas Krause, and Matthew Streeter
Online Learning of Assignments that Maximize Submodular Functions
12 pages
null
null
0908.0772
cs.LG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Which ads should we display in sponsored search in order to maximize our revenue? How should we dynamically rank information sources to maximize value of information? These applications exhibit strong diminishing returns: Selection of redundant ads and information sources decreases their marginal utility. We show that these and other problems can be formalized as repeatedly selecting an assignment of items to positions to maximize a sequence of monotone submodular functions that arrive one by one. We present an efficient algorithm for this general problem and analyze it in the no-regret model. Our algorithm possesses strong theoretical guarantees, such as a performance ratio that converges to the optimal constant of 1-1/e. We empirically evaluate our algorithm on two real-world online optimization problems on the web: ad allocation with submodular utilities, and dynamically ranking blogs to detect information cascades.
[ { "version": "v1", "created": "Wed, 5 Aug 2009 23:56:22 GMT" } ]
2009-08-07T00:00:00
[ [ "Golovin", "Daniel", "" ], [ "Krause", "Andreas", "" ], [ "Streeter", "Matthew", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.0775
Andrea Baronchelli
Andrea Baronchelli, Tao Gong, Andrea Puglisi, Vittorio Loreto
Modeling the emergence of universality in color naming patterns
Supplementery Information available here http://www.pnas.org/content/107/6/2403/suppl/DCSupplemental
Proc. Natl. Acad. Sci. USA 107, 2403 (2010)
10.1073/pnas.0908533107
null
physics.soc-ph cond-mat.stat-mech cs.GT cs.MA q-bio.PE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The empirical evidence that human color categorization exhibits some universal patterns beyond superficial discrepancies across different cultures is a major breakthrough in cognitive science. As observed in the World Color Survey (WCS), indeed, any two groups of individuals develop quite different categorization patterns, but some universal properties can be identified by a statistical analysis over a large number of populations. Here, we reproduce the WCS in a numerical model in which different populations develop independently their own categorization systems by playing elementary language games. We find that a simple perceptual constraint shared by all humans, namely the human Just Noticeable Difference (JND), is sufficient to trigger the emergence of universal patterns that unconstrained cultural interaction fails to produce. We test the results of our experiment against real data by performing the same statistical analysis proposed to quantify the universal tendencies shown in the WCS [Kay P and Regier T. (2003) Proc. Natl. Acad. Sci. USA 100: 9085-9089], and obtain an excellent quantitative agreement. This work confirms that synthetic modeling has nowadays reached the maturity to contribute significantly to the ongoing debate in cognitive science.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 13:54:20 GMT" }, { "version": "v2", "created": "Thu, 8 Jul 2010 09:42:11 GMT" } ]
2010-07-09T00:00:00
[ [ "Baronchelli", "Andrea", "" ], [ "Gong", "Tao", "" ], [ "Puglisi", "Andrea", "" ], [ "Loreto", "Vittorio", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" } ]
0908.0794
Li Li
Li Li, Yudong Chen
Quantization Errors of Modulo Sigma-Delta Modulated ARMA Processes
An abbreviated version of this paper had been published as Li Li, Yudong Chen, "Quantization errors of modulo sigma-delta modulated ARMA processes," Proceedings of IEEE China Summit & International Conference on Signal and Information Processing, pp. 86-90, 2013
null
10.1109/ChinaSIP.2013.6625303
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the quantization errors of modulo sigma-delta modulated finite, asymptotically-infinite, infinite causal stable ARMA processes. We prove that the normalized quantization error can be taken as a uniformly distributed white noise for all the cases. Moreover, we find that this nice property is guaranteed by two different mechanisms: the high-enough quantization resolution \cite{Bennett1948}-\cite{WidrowKollar2008} and the asymptotic convergence of quantization errors for some quasi-stationary processes \cite{ChouGray1991}-\cite{LiChenLiZhang2009}, for different cases. But the assumption of the smooth density of the sampled random processes is needed in all the cases.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 06:20:37 GMT" }, { "version": "v2", "created": "Mon, 24 Aug 2009 12:58:43 GMT" }, { "version": "v3", "created": "Sat, 7 Jun 2014 14:42:34 GMT" } ]
2016-11-17T00:00:00
[ [ "Li", "Li", "" ], [ "Chen", "Yudong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0812
Silvio Valenti
Dario Rossi, Claudio Testa, Silvio Valenti, Paolo Veglia, Luca Muscariello
News from the Internet congestion control world
9 pages, 4 figures, submitted to IEEE INFOCOM 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A few months ago, the BitTorrent developers announced that the transfer of torrent data in the official client was about to switch to uTP, an application-layer congestion-control protocol using UDP at the transport-layer. This announcement immediately raised an unmotivated buzz about a new, imminent congestion collapse of the whole Internet. Though this reaction was not built on solid technical foundation, nevertheless a legitimate question remains: i.e., whether this novel algorithm is a necessary building block for future Internet applications, or whether it may result in an umpteenth addition to the already well populated world of Internet congestion control algorithms. In this paper, we tackle precisely this issue. The novel protocol is now under discussion at the IETF LEDBAT working group, and has been defined in a draft document in March 2009, whose adoption decision will be taken at the beginning of August 2009. Adhering to the IETF draft definition, we implement the LEDBAT congestion control algorithm and investigate its performance by means of packet-level simulations. Considering a simple bottleneck scenario where LEDBAT competes against either TCP or other LEDBAT flows, we evaluate the fairness of the resource share as well as its efficiency. Our preliminary results show that indeed, there is an undoubted appeal behind the novel application-layer congestion-control protocol. Yet, care must be taken in order to ensure that some important points, such as intra-protocol fairness, are fully clarified in the draft specification -- which we hope that this work can contribute to.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 08:45:18 GMT" } ]
2009-08-07T00:00:00
[ [ "Rossi", "Dario", "" ], [ "Testa", "Claudio", "" ], [ "Valenti", "Silvio", "" ], [ "Veglia", "Paolo", "" ], [ "Muscariello", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0828
Andrew Adamatzky
Genaro J. Martinez, Andrew Adamatzky, Harold V. McIntosh
Localization dynamics in a binary two-dimensional cellular automaton: the Diffusion Rule
Accepted to Journal of Cellular Automata
null
10.1007/978-1-84996-217-9_16
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a two-dimensional cellular automaton (CA), called Diffusion Rule (DR), which exhibits diffusion-like dynamics of propagating patterns. In computational experiments we discover a wide range of mobile and stationary localizations (gliders, oscillators, glider guns, puffer trains, etc), analyze spatio-temporal dynamics of collisions between localizations, and discuss possible applications in unconventional computing.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 09:33:34 GMT" } ]
2015-05-13T00:00:00
[ [ "Martinez", "Genaro J.", "" ], [ "Adamatzky", "Andrew", "" ], [ "McIntosh", "Harold V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0908.0833
Petr Ivankov
Petr R. Ivankov
Top-down Paradigm in Engineering Software Integration
29 pages, 44 figures, 5 references
null
null
null
cs.CE cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The top-down approach of engineering software integration is considered in this parer. A set of advantages of this approach are presented, by examples. All examples are supplied by open source code.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 12:21:22 GMT" } ]
2009-08-07T00:00:00
[ [ "Ivankov", "Petr R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.0850
Andrew Adamatzky
Andrew Adamatzky
Steering plasmodium with light: Dynamical programming of Physarum machine
Accepted for publication in New Mathematics and Natural Computation Journal (April, 2009)
null
null
null
nlin.PS cs.ET nlin.AO q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A plasmodium of Physarum polycephalum is a very large cell visible by unaided eye. The plasmodium is capable for distributed sensing, parallel information processing, and decentralized optimization. It is an ideal substrate for future and emerging bio-computing devices. We study space-time dynamics of plasmodium reactiom to localised illumination, and provide analogies between propagating plasmodium and travelling wave-fragments in excitable media. We show how plasmodium-based computing devices can be precisely controlled and shaped by planar domains of illumination.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 12:23:34 GMT" } ]
2012-08-14T00:00:00
[ [ "Adamatzky", "Andrew", "" ] ]
[ { "class": "Physics", "code": "nlin.PS", "description": "Pattern formation, coherent structures, solitons", "span": "(Pattern Formation and Solitons)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0908.0853
Andrew Adamatzky
Andrew Adamatzky, Genaro Martinez, Liang Zhang, Andrew Wuensche
Operating binary strings using gliders and eaters in reaction-diffusion cellular automaton
null
Mathematical and Computer Modelling, Volume 52, Issues 1-2, July 2010, Pages 177-190
10.1016/j.mcm.2010.02.006
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study transformations of 2-, 4- and 6-bit numbers in interactions between traveling and stationary localizations in the Spiral Rule reaction-diffusion cellular automaton. The Spiral Rule automaton is a hexagonal ternary-state two-dimensional cellular automaton -- a finite-state machine imitation of an activator-inhibitor reaction-diffusion system. The activator is self-inhibited in certain concentrations. The inhibitor dissociates in the absence of the activator. The Spiral Rule cellular automaton has rich spatio-temporal dynamics of traveling (glider) and stationary (eater) patterns. When a glider brushes an eater the eater may slightly change its configuration, which is updated once more every next hit. We encode binary strings in the states of eaters and sequences of gliders. We study what types of binary compositions of binary strings are implementable by sequences of gliders brushing an eater. The models developed will be used in future laboratory designs of reaction-diffusion chemical computers.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 12:42:05 GMT" } ]
2010-11-23T00:00:00
[ [ "Adamatzky", "Andrew", "" ], [ "Martinez", "Genaro", "" ], [ "Zhang", "Liang", "" ], [ "Wuensche", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0908.0856
Tobias Renk
Tobias Renk, Holger Jaekel, Friedrich K. Jondral, Deniz Gunduz, Andrea Goldsmith
Outage Capacity of Incremental Relaying at Low Signal-to-Noise Ratios
5 pages, 4 figures, to be presented at VTC Fall 2009 in Anchorage, Alaska
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present the \epsilon-outage capacity of incremental relaying at low signal-to-noise ratios (SNR) in a wireless cooperative network with slow Rayleigh fading channels. The relay performs decode-and-forward and repetition coding is employed in the network, which is optimal in the low SNR regime. We derive an expression on the optimal relay location that maximizes the \epsilon-outage capacity. It is shown that this location is independent of the outage probability and SNR but only depends on the channel conditions represented by a path-loss factor. We compare our results to the \epsilon-outage capacity of the cut-set bound and demonstrate that the ratio between the \epsilon-outage capacity of incremental relaying and the cut-set bound lies within 1/\sqrt{2} and 1. Furthermore, we derive lower bounds on the \epsilon-outage capacity for the case of K relays.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 13:06:26 GMT" } ]
2009-08-07T00:00:00
[ [ "Renk", "Tobias", "" ], [ "Jaekel", "Holger", "" ], [ "Jondral", "Friedrich K.", "" ], [ "Gunduz", "Deniz", "" ], [ "Goldsmith", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0893
Moustafa Seifeldin
Moustafa Seifeldin and Moustafa Youssef
Nuzzer: A Large-Scale Device-Free Passive Localization System for Wireless Environments
9 pages
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The widespread usage of wireless local area networks and mobile devices has fostered the interest in localization systems for wireless environments. The majority of research in the context of wireless-based localization systems has focused on device-based active localization, in which a device is attached to tracked entities. Recently, device-free passive localization (DfP) has been proposed where the tracked entity is neither required to carry devices nor participate actively in the localization process. DfP systems are based on the fact that RF signals are affected by the presence of people and objects in the environment. The DfP concept enables a wide range of applications including intrusion detection and tracking, border protection, and smart buildings automation. Previous studies have focused on small areas with direct line of sight and/or controlled environments. In this paper, we present the design, implementation and analysis of Nuzzer, a large-scale device-free passive localization system for real environments. Without any additional hardware, it makes use of the already installed wireless data networks to monitor and process changes in the received signal strength (RSS) transmitted from access points at one or more monitoring points. We present probabilistic techniques for DfP localization and evaluate their performance in a typical office building, rich in multipath, with an area of 1500 square meters. Our results show that the Nuzzer system gives device-free location estimates with less than 2 meters median distance error using only two monitoring laptops and three access points. This indicates the suitability of Nuzzer to a large number of application domains.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 15:31:12 GMT" } ]
2009-08-07T00:00:00
[ [ "Seifeldin", "Moustafa", "" ], [ "Youssef", "Moustafa", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0908.0898
Onur Ozan Koyluoglu
O. Ozan Koyluoglu, C. Emre Koksal, and Hesham El Gamal
On Secrecy Capacity Scaling in Wireless Networks
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work studies the achievable secure rate per source-destination pair in wireless networks. First, a path loss model is considered, where the legitimate and eavesdropper nodes are assumed to be placed according to Poisson point processes with intensities $\lambda$ and $\lambda_e$, respectively. It is shown that, as long as $\lambda_e/\lambda=o((\log n)^{-2})$, almost all of the nodes achieve a perfectly secure rate of $\Omega(\frac{1}{\sqrt{n}})$ for the extended and dense network models. Therefore, under these assumptions, securing the network does not entail a loss in the per-node throughput. The achievability argument is based on a novel multi-hop forwarding scheme where randomization is added in every hop to ensure maximal ambiguity at the eavesdropper(s). Secondly, an ergodic fading model with $n$ source-destination pairs and $n_e$ eavesdroppers is considered. Employing the ergodic interference alignment scheme with an appropriate secrecy pre-coding, each user is shown to achieve a constant positive secret rate for sufficiently large $n$. Remarkably, the scheme does not require eavesdropper CSI (only the statistical knowledge is assumed) and the secure throughput per node increases as we add more legitimate users to the network in this setting. Finally, the effect of eavesdropper collusion on the performance of the proposed schemes is characterized.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 18:58:19 GMT" }, { "version": "v2", "created": "Sat, 10 Apr 2010 02:50:27 GMT" } ]
2010-04-13T00:00:00
[ [ "Koyluoglu", "O. Ozan", "" ], [ "Koksal", "C. Emre", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0912
Gene Golovchinsky
Colum Foley and Alan F. Smeaton
Evaluation of Coordination Techniques in Synchronous Collaborative Information Retrieval
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/folsme
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional Information Retrieval (IR) research has focussed on a single user interaction modality, where a user searches to satisfy an information need. Recent advances in web technologies and computer hardware have enabled multiple users to collaborate on many computer-supported tasks, therefore there is an increasing opportunity to support two or more users searching together at the same time in order to satisfy a shared information need, which we refer to as Synchronous Collaborative Information Retrieval (SCIR). SCIR systems represent a significant paradigmatic shift from traditional IR systems. In order to support effective SCIR, new techniques are required to coordinate users' activities. In addition, the novel domain of SCIR presents challenges for effective evaluations of these systems. In this paper we will propose an effective and re-usable evaluation methodology based on simulating users searching together. We will outline how we have used this evaluation in empirical studies of the effects of different division of labour and sharing of knowledge techniques for SCIR.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 17:23:01 GMT" } ]
2009-08-07T00:00:00
[ [ "Foley", "Colum", "" ], [ "Smeaton", "Alan F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.0919
Gene Golovchinsky
Frank Hopfgartner, David Vallet, Martin Halvey and Joemon Jose
Collaborative Search Trails for Video Search
Presented at 1st Intl Workshop on Collaborative Information Seeking, 2008 (arXiv:0908.0583)
null
null
JCDL2008CIRWS/2008/hopvalhaljos
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present an approach for supporting users in the difficult task of searching for video. We use collaborative feedback mined from the interactions of earlier users of a video search system to help users in their current search tasks. Our objective is to improve the quality of the results that users find, and in doing so also assist users to explore a large and complex information space. It is hoped that this will lead to them considering search options that they may not have considered otherwise. We performed a user centred evaluation. The results of our evaluation indicate that we achieved our goals, the performance of the users in finding relevant video clips was enhanced with our system; users were able to explore the collection of video clips more and users demonstrated a preference for our system that provided recommendations.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 17:28:21 GMT" } ]
2009-08-07T00:00:00
[ [ "Hopfgartner", "Frank", "" ], [ "Vallet", "David", "" ], [ "Halvey", "Martin", "" ], [ "Jose", "Joemon", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.0928
Grenville Croll
Angus Dunn
Automated Spreadsheet Development
8 Pages, 3 Colour Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 39-46 ISBN 978-1-905617-89-0
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Few major commercial or economic decisions are made today which are not underpinned by analysis using spreadsheets. It is virtually impossible to avoid making mistakes during their drafting and some of these errors remain, unseen and uncorrected, until something turns the spotlight on them. By then it may be too late. The challenge is to find a way of creating spreadsheets which will preserve the benefit of their power and flexibility while making their creation more transparent and safer. Full documentation and documented version and quality control, section by section, of the eventual spreadsheet would be a bonus. And if the whole process could be made quicker, too, that would be a further bonus.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 18:33:10 GMT" } ]
2009-08-07T00:00:00
[ [ "Dunn", "Angus", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.0930
Grenville Croll
Bill Bekenn, Ray Hooper
Some Spreadsheet Poka-Yoke
12 Pages, 8 Colour Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 83-94 ISBN 978-1-905617-89-0
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Whilst not all spreadsheet defects are structural in nature, poor layout choices can compromise spreadsheet quality. These defects may be avoided at the development stage by some simple mistake prevention and detection devices. Poka-Yoke (Japanese for Mistake Proofing), which owes its genesis to the Toyota Production System (the standard for manufacturing excellence throughout the world) offers some principles that may be applied to reducing spreadsheet defects. In this paper we examine spreadsheet structure and how it can lead to defects and illustrate some basic spreadsheet Poka-Yokes to reduce them. These include guidelines on how to arrange areas of cells so that whole rows and columns can be inserted anywhere without causing errors, and rules for when to use relative and absolute references with respect to what type of area is being referred to.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 18:41:34 GMT" } ]
2009-08-07T00:00:00
[ [ "Bekenn", "Bill", "" ], [ "Hooper", "Ray", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]