id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0907.5402
|
Juan Jose Jaramillo
|
Juan Jose Jaramillo and R. Srikant
|
Optimal Scheduling for Fair Resource Allocation in Ad Hoc Networks with
Elastic and Inelastic Traffic
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the problem of congestion control and scheduling in ad hoc
wireless networks that have to support a mixture of best-effort and real-time
traffic. Optimization and stochastic network theory have been successful in
designing architectures for fair resource allocation to meet long-term
throughput demands. However, to the best of our knowledge, strict packet delay
deadlines were not considered in this framework previously. In this paper, we
propose a model for incorporating the quality of service (QoS) requirements of
packets with deadlines in the optimization framework. The solution to the
problem results in a joint congestion control and scheduling algorithm which
fairly allocates resources to meet the fairness objectives of both elastic and
inelastic flows, and per-packet delay requirements of inelastic flows.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 19:40:20 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Jul 2009 19:53:20 GMT"
},
{
"version": "v3",
"created": "Fri, 31 Jul 2009 20:34:30 GMT"
},
{
"version": "v4",
"created": "Tue, 25 Aug 2009 20:35:30 GMT"
},
{
"version": "v5",
"created": "Fri, 23 Oct 2009 19:36:07 GMT"
},
{
"version": "v6",
"created": "Mon, 26 Oct 2009 18:44:06 GMT"
},
{
"version": "v7",
"created": "Thu, 10 Dec 2009 22:53:00 GMT"
},
{
"version": "v8",
"created": "Sun, 13 Dec 2009 00:41:41 GMT"
}
] | 2009-12-13T00:00:00 |
[
[
"Jaramillo",
"Juan Jose",
""
],
[
"Srikant",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.5427
|
Gregory Gutin
|
Gregory Gutin, Eun Jung Kim, Matthias Mnich, Anders Yeo
|
Betweenness Parameterized Above Tight Lower Bound
| null | null | null | null |
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study ordinal embedding relaxations in the realm of parameterized
complexity. We prove the existence of a quadratic kernel for the {\sc
Betweenness} problem parameterized above its tight lower bound, which is stated
as follows. For a set $V$ of variables and set $\mathcal C$ of constraints
"$v_i$ \mbox{is between} $v_j$ \mbox{and} $v_k$", decide whether there is a
bijection from $V$ to the set $\{1,\ldots,|V|\}$ satisfying at least $|\mathcal
C|/3 + \kappa$ of the constraints in $\mathcal C$. Our result solves an open
problem attributed to Benny Chor in Niedermeier's monograph "Invitation to
Fixed-Parameter Algorithms." The betweenness problem is of interest in
molecular biology. An approach developed in this paper can be used to determine
parameterized complexity of a number of other optimization problems on
permutations parameterized above or below tight bounds.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 21:26:12 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Nov 2009 19:28:20 GMT"
},
{
"version": "v3",
"created": "Sat, 22 Jun 2013 10:56:57 GMT"
}
] | 2013-06-25T00:00:00 |
[
[
"Gutin",
"Gregory",
""
],
[
"Kim",
"Eun Jung",
""
],
[
"Mnich",
"Matthias",
""
],
[
"Yeo",
"Anders",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.5429
|
R Doomun
|
Muhammad Sohail, Abdur Rashid Khan
|
Knowledge Elecitation for Factors Affecting Taskforce Productivity using
a Questionnaire
|
7 pages, International Journal of Computer Science and Information
Security, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, July 2009, Volume 3. No.1
| null | null |
cs.CY cs.GL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present the process of Knowledge Elicitation through a
structured questionnaire technique. This is an effort to depict a problem
domain as Investigation of factors affecting taskforce productivity. The
problem has to be solved using the expert system technology. This problem is
the very first step how to acquire knowledge from the domain experts. Knowledge
Elicitation is one of the difficult tasks in knowledge base formation which is
a key component of expert system. The questionnaire was distributed among 105
different domain experts of Public and Private Organizations (i.e. Education
Institutions, Industries and Research etc) in Pakistan. A total 61 responses
from these experts were received. All the experts were well qualified, highly
experienced and has been remained the members for selection committees a number
of times for different posts. Facts acquired were analyzed from which knowledge
was extracted and elicited. A standard shape was given to the questionnaire for
further research as a knowledge learning tool. This tool may be used as a
standard document for selection and promotion of employees.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 21:06:19 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Sohail",
"Muhammad",
""
],
[
"Khan",
"Abdur Rashid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0907.5430
|
Lucile Sassatelli
|
Eitan Altman, Francesco De Pellegrini, Lucile Sassatelli
|
Dynamic control of Coding in Delay Tolerant Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Delay tolerant Networks (DTNs) leverage the mobility of relay nodes to
compensate for lack of permanent connectivity and thus enable communication
between nodes that are out of range of each other. To decrease message delivery
delay, the information to be transmitted is replicated in the network. We study
replication mechanisms that include Reed-Solomon type codes as well as network
coding in order to improve the probability of successful delivery within a
given time limit. We propose an analytical approach that allows us to compute
the probability of successful delivery. We study the effect of coding on the
performance of the network while optimizing parameters that govern routing.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 21:12:04 GMT"
},
{
"version": "v2",
"created": "Tue, 4 Aug 2009 19:08:32 GMT"
},
{
"version": "v3",
"created": "Wed, 5 Aug 2009 19:46:09 GMT"
},
{
"version": "v4",
"created": "Fri, 7 Aug 2009 18:15:11 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Altman",
"Eitan",
""
],
[
"De Pellegrini",
"Francesco",
""
],
[
"Sassatelli",
"Lucile",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.5433
|
R Doomun
|
Ratnesh Kumar Jain, Dr. R. S. Kasana, Dr. Suresh Jain
|
Efficient Web Log Mining using Doubly Linked Tree
|
5 pages, International Journal of Computer Science and Information
Security, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, July 2009, Volume 3. No.1, USA
| null | null |
cs.IR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
World Wide Web is a huge data repository and is growing with the explosive
rate of about 1 million pages a day. As the information available on World Wide
Web is growing the usage of the web sites is also growing. Web log records each
access of the web page and number of entries in the web logs is increasing
rapidly. These web logs, when mined properly can provide useful information for
decision-making. The designer of the web site, analyst and management
executives are interested in extracting this hidden information from web logs
for decision making. Web access pattern, which is the frequently used sequence
of accesses, is one of the important information that can be mined from the web
logs. This information can be used to gather business intelligence to improve
sales and advertisement, personalization for a user, to analyze system
performance and to improve the web site organization. There exist many
techniques to mine access patterns from the web logs. This paper describes the
powerful algorithm that mines the web logs efficiently. Proposed algorithm
firstly converts the web access data available in a special doubly linked tree.
Each access is called an event. This tree keeps the critical mining related
information in very compressed form based on the frequent event count. Proposed
recursive algorithm uses this tree to efficiently find all access patterns that
satisfy user specified criteria. To prove that our algorithm is efficient from
the other GSP (Generalized Sequential Pattern) algorithms we have done
experimental studies on sample data.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 21:37:46 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Jain",
"Ratnesh Kumar",
""
],
[
"Kasana",
"Dr. R. S.",
""
],
[
"Jain",
"Dr. Suresh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5438
|
Pranav Agrawal
|
Pranav Agrawal, Joy Kuri
|
Key Distribution Scheme without Deployment Knowledge
|
8 pages, 5 figures, Accepted in ICUMT 2009
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many basic key distribution schemes specifically tuned to wireless sensor
networks have been proposed in the literature. Recently, several researchers
have proposed schemes in which they have used group-based deployment models and
assumed predeployment knowledge of the expected locations of nodes. They have
shown that these schemes achieve better performance than the basic schemes, in
terms of connectivity, resilience against node capture and storage
requirements. But in many situations expected locations of nodes are not
available. In this paper we propose a solution which uses the basic scheme, but
does not use group-based deployment model and predeployment knowledge of the
locations of nodes, and yet performs better than schemes which make the
aforementioned assumptions.
In our scheme, groups are formed after deployment of sensor nodes, on the
basis of their physical locations, and the nodes sample keys from disjoint key
pools. Compromise of a node affects secure links with other nodes that are part
of its group only. Because of this reason, our scheme performs better than the
basic schemes and the schemes using predeployment knowledge, in terms of
connectivity, storage requirement, and security. Moreover, the post-deployment
key generation process completes sooner than in schemes like LEAP+.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 22:58:53 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Aug 2009 10:50:52 GMT"
}
] | 2009-08-29T00:00:00 |
[
[
"Agrawal",
"Pranav",
""
],
[
"Kuri",
"Joy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0907.5441
|
R Doomun
|
B.Narasimhan, S.Santhosh baboo
|
A Hop-by-Hop Congestion-Aware Routing Protocol for Heterogeneous Mobile
Ad-hoc Networks
|
7 pages, International Journal of Computer Science and Information
Security, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, July 2009, Volume 3. No.1, USA
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Heterogeneous mobile ad hoc networks (MANETs) congestion occurs with
limited resources. Due to the shared wireless channel and dynamic topology,
packet transmissions suffer from interference and fading. In heterogeneous ad
hoc networks, throughput via a given route is depending on the minimum data
rate of all its links. In a route of links with various data rates, if a high
data rate node forwards more traffic to a low data rate node, there is a chance
of congestion, which leads to long queuing delays in such routes. Since hop
count is used as a routing metric in traditional routing, it do not adapt well
to mobile nodes. A congestion-aware routing metric for MANETs should
incorporate transmission capability, reliability, and congestion around a link.
In this paper, we propose to develop a hop-by-hop congestion aware routing
protocol which employs a combined weight value as a routing metric, based on
the data rate, queuing delay, link quality and MAC overhead. Among the
discovered routes, the route with minimum cost index is selected, which is
based on the node weight of all the in-network nodes. Simulation results prove
that our proposed routing protocol attains high throughput and packet delivery
ratio, by reducing the packet drop and delay.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 22:31:08 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Narasimhan",
"B.",
""
],
[
"baboo",
"S. Santhosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.5442
|
Jian Li
|
Jian Li, Amol Deshpande, Samir Khuller
|
On Computing Compression Trees for Data Collection in Sensor Networks
| null | null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We address the problem of efficiently gathering correlated data from a wired
or a wireless sensor network, with the aim of designing algorithms with
provable optimality guarantees, and understanding how close we can get to the
known theoretical lower bounds. Our proposed approach is based on finding an
optimal or a near-optimal {\em compression tree} for a given sensor network: a
compression tree is a directed tree over the sensor network nodes such that the
value of a node is compressed using the value of its parent. We consider this
problem under different communication models, including the {\em broadcast
communication} model that enables many new opportunities for energy-efficient
data collection. We draw connections between the data collection problem and a
previously studied graph concept, called {\em weakly connected dominating
sets}, and we use this to develop novel approximation algorithms for the
problem. We present comparative results on several synthetic and real-world
datasets showing that our algorithms construct near-optimal compression trees
that yield a significant reduction in the data collection cost.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 22:40:53 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Li",
"Jian",
""
],
[
"Deshpande",
"Amol",
""
],
[
"Khuller",
"Samir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0907.5443
|
R Doomun
|
H S Guruprasad, H D Maheshappa
|
Dynamic Bandwidth Management in Distributed VoD based on the User Class
Using Agents
|
7 pages, International Journal of Computer Science and Information
Security, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, July 2009, Volume 3. No.1, USA
| null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes a dynamic bandwidth management algorithm in which more
bandwidth is allocated for higher class users and also higher priority is given
to the videos with higher popularity within a class using agent technology. The
popularity and weight profile of the videos which is used for efficiently
allocating bandwidth is periodically updated by a mobile agent. The proposed
approach allocates more bandwidth for higher class users and gives higher
priority for higher weight videos [popular videos] so that they can be served
with high QoS, reduces the load on the central multimedia server and maximizes
the channel utilization between the neighboring proxy servers and the central
multimedia server and lower video rejection ratio. The simulation results prove
the reduction of load on central multimedia server by load sharing among the
neighboring proxy servers, maximum bandwidth utilization, and more bandwidth
allocation for higher class users.
|
[
{
"version": "v1",
"created": "Thu, 30 Jul 2009 22:53:48 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Guruprasad",
"H S",
""
],
[
"Maheshappa",
"H D",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0907.5469
|
Pierre Lescanne
|
Pierre Lescanne (LIP)
|
Feasibility/Desirability Games for Normal Form Games, Choice Models and
Evolutionary Games
|
17 pages
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An abstraction of normal form games is proposed, called
Feasibility/Desirability Games (or FD Games in short). FD Games can be seen
from three points of view: as a new presentation of games in which Nash
equilibria can be found, as choice models in microeconomics or as a model of
evolution in games.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 04:44:57 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Lescanne",
"Pierre",
"",
"LIP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0907.5474
|
Kevin Wortman
|
David Eppstein and Kevin A. Wortman
|
Optimal Angular Resolution for Face-Symmetric Drawings
|
10 pages, 6 figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let G be a graph that may be drawn in the plane in such a way that all
internal faces are centrally symmetric convex polygons. We show how to find a
drawing of this type that maximizes the angular resolution of the drawing, the
minimum angle between any two incident edges, in polynomial time, by reducing
the problem to one of finding parametric shortest paths in an auxiliary graph.
The running time is at most O(t^3), where t is a parameter of the input graph
that is at most O(n) but is more typically proportional to n^.5.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 06:27:19 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Wortman",
"Kevin A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0907.5477
|
Lee-Ad Gottlieb
|
Lee-Ad Gottlieb, and Robert Krauthgamer
|
A Nonlinear Approach to Dimension Reduction
| null | null |
10.1007/s00454-015-9707-9
| null |
cs.CG cs.DS math.FA math.MG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The $l_2$ flattening lemma of Johnson and Lindenstrauss [JL84] is a powerful
tool for dimension reduction. It has been conjectured that the target dimension
bounds can be refined and bounded in terms of the intrinsic dimensionality of
the data set (for example, the doubling dimension). One such problem was
proposed by Lang and Plaut [LP01] (see also
[GKL03,MatousekProblems07,ABN08,CGT10]), and is still open. We prove another
result in this line of work:
The snowflake metric $d^{1/2}$ of a doubling set $S \subset l_2$ embeds with
constant distortion into $l_2^D$, for dimension $D$ that depends solely on the
doubling constant of the metric. In fact, the distortion can be made
arbitrarily close to 1, and the target dimension is polylogarithmic in the
doubling constant. Our techniques are robust and extend to the more difficult
spaces $l_1$ and $l_\infty$, although the dimension bounds here are
quantitatively inferior than those for $l_2$.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 07:10:04 GMT"
},
{
"version": "v2",
"created": "Sun, 11 Apr 2010 01:29:04 GMT"
},
{
"version": "v3",
"created": "Sun, 3 Apr 2011 10:51:24 GMT"
},
{
"version": "v4",
"created": "Thu, 14 May 2015 11:25:45 GMT"
}
] | 2015-06-09T00:00:00 |
[
[
"Gottlieb",
"Lee-Ad",
""
],
[
"Krauthgamer",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Mathematics",
"code": "math.MG",
"description": "Euclidean, hyperbolic, discrete, convex, coarse geometry, comparisons in Riemannian geometry, symmetric spaces",
"span": "(Metric Geometry)"
}
] |
0907.5481
|
Yong Gao
|
Yong Gao
|
Treewidth of Erd\"{o}s-R\'{e}nyi Random Graphs, Random Intersection
Graphs, and Scale-Free Random Graphs
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that the treewidth of an Erd\"{o}s-R\'{e}nyi random graph $\rg{n,
m}$ is, with high probability, greater than $\beta n$ for some constant $\beta
> 0$ if the edge/vertex ratio $\frac{m}{n}$ is greater than 1.073. Our lower
bound $\frac{m}{n} > 1.073$ improves the only previously-known lower bound. We
also study the treewidth of random graphs under two other random models for
large-scale complex networks. In particular, our result on the treewidth of
\rigs strengths a previous observation on the average-case behavior of the
\textit{gate matrix layout} problem. For scale-free random graphs based on the
Barab\'{a}si-Albert preferential-attachment model, our result shows that if
more than 12 vertices are attached to a new vertex, then the treewidth of the
obtained network is linear in the size of the network with high probability.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 08:17:58 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Gao",
"Yong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0907.5488
|
Lucile Sassatelli
|
Lucile Sassatelli, Muriel Medard
|
Network Coding for Delay Tolerant Networks with Byzantine Adversaries
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article has been withdrawn by the authors
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 17:24:50 GMT"
},
{
"version": "v2",
"created": "Sat, 1 Aug 2009 00:35:06 GMT"
},
{
"version": "v3",
"created": "Fri, 19 Feb 2010 16:43:14 GMT"
},
{
"version": "v4",
"created": "Tue, 23 Feb 2010 13:03:25 GMT"
}
] | 2010-02-23T00:00:00 |
[
[
"Sassatelli",
"Lucile",
""
],
[
"Medard",
"Muriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.5489
|
Shan Zhou
|
Shan Zhou, Lei Ying
|
On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc
Networks
|
12 pages,8 figures, conference
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the delay constrained multicast capacity of large scale
mobile ad hoc networks (MANETs). We consider a MANET consists of $n_s$
multicast sessions. Each multicast session has one source and $p$ destinations.
The wireless mobiles move according to a two-dimensional i.i.d. mobility model.
Each source sends identical information to the $p$ destinations in its
multicast session, and the information is required to be delivered to all the
$p$ destinations within $D$ time-slots. Given the delay constraint $D,$ we
first prove that the capacity per multicast session is $O(\min\{1, (\log
p)(\log (n_sp)) \sqrt{\frac{D}{n_s}}\}).$ Given non-negative functions $f(n)$
and $g(n)$: $f(n)=O(g(n))$ means there exist positive constants $c$ and $m$
such that $f(n) \leq cg(n)$ for all $ n\geq m;$ $f(n)=\Omega(g(n))$ means there
exist positive constants $c$ and $m$ such that $f(n)\geq cg(n)$ for all $n\geq
m;$ $f(n)=\Theta(g(n))$ means that both $f(n)=\Omega(g(n))$ and $f(n)=O(g(n))$
hold; $f(n)=o(g(n))$ means that $\lim_{n\to \infty} f(n)/g(n)=0;$ and
$f(n)=\omega(g(n))$ means that $\lim_{n\to \infty} g(n)/f(n)=0.$ We then
propose a joint coding/scheduling algorithm achieving a throughput of
$\Theta(\min\{1,\sqrt{\frac{D}{n_s}}\}).$ Our simulations show that the joint
coding/scheduling algorithm achieves a throughput of the same order
($\Theta(\min\{1, \sqrt{\frac{D}{n_s}}\})$) under random walk model and random
waypoint model.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 09:07:50 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Aug 2009 05:59:05 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Zhou",
"Shan",
""
],
[
"Ying",
"Lei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0907.5500
|
Laurent Bougrain
|
Nanying Liang (INRIA Lorraine - LORIA), Laurent Bougrain (INRIA
Lorraine - LORIA)
|
Decoding Finger Flexion using amplitude modulation from band-specific
ECoG
| null |
European Symposium on Artificial Neural Networks (ESANN) (2009)
467-472
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
EEG-BCIs have been well studied in the past decades and implemented into
several famous applications, like P300 speller and wheelchair controller.
However, these interfaces are indirect due to low spatial resolution of EEG.
Recently, direct ECoG-BCIs attract intensive attention because ECoG provides a
higher spatial resolution and signal quality. This makes possible localization
of the source of neural signals with respect to certain brain functions. In
this article, we present a realization of ECoG-BCIs for finger flexion
prediction provided by BCI competition IV. Methods for finger flexion
prediction including feature extraction and selection are provided in this
article. Results show that the predicted finger movement is highly correlated
with the true movement when we use band-specific amplitude modulation.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 10:06:29 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Liang",
"Nanying",
"",
"INRIA Lorraine - LORIA"
],
[
"Bougrain",
"Laurent",
"",
"INRIA\n Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0907.5527
|
Georg Moser
|
Georg Moser
|
Proof Theory at Work: Complexity Analysis of Term Rewrite Systems
|
Cumulative Habilitation Thesis, submitted to the University of
Innsbruck
| null | null | null |
cs.LO cs.CC cs.SC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This thesis is concerned with investigations into the "complexity of term
rewriting systems". Moreover the majority of the presented work deals with the
"automation" of such a complexity analysis. The aim of this introduction is to
present the main ideas in an easily accessible fashion to make the result
presented accessible to the general public. Necessarily some technical points
are stated in an over-simplified way.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 13:19:25 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Dec 2009 08:40:50 GMT"
}
] | 2009-12-30T00:00:00 |
[
[
"Moser",
"Georg",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0907.5538
|
Francesco Carraro
|
Francesco Carraro, Sergio Fonte, Diego Turrini, Maria Cristina De
Sanctis, Livia Giacomini
|
A preliminary XML-based search system for planetary data
|
10 pages, 5 figures, submitted to Computers and Geosciences
| null | null | null |
cs.IR astro-ph.EP cs.DB physics.geo-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Planetary sciences can benefit from several different sources of information,
i.e. ground-based or near Earth-based observations, space missions and
laboratory experiments. The data collected from these sources, however, are
spread over a number of smaller, separate communities and stored through
different facilities: this makes it difficult to integrate them. The IDIS
initiative, born in the context of the Europlanet project, performed a pilot
study of the viability and the issues to be overcome in order to create an
integrated search system for planetary data. As part of the results of such
pilot study, the IDIS Small Bodies and Dust node developed a search system
based on a preliminary XML data model. Here we introduce the goals of the IDIS
initiative and describe the structure and the working of this search system.
The source code of the search system is released under GPL license to allow
people interested in participating to the IDIS initiative both as developers
and as data providers to familiarise with the search environment and to allow
the creation of volunteer nodes to be integrated into the existing network.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 14:17:34 GMT"
}
] | 2009-08-03T00:00:00 |
[
[
"Carraro",
"Francesco",
""
],
[
"Fonte",
"Sergio",
""
],
[
"Turrini",
"Diego",
""
],
[
"De Sanctis",
"Maria Cristina",
""
],
[
"Giacomini",
"Livia",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "astro-ph.EP",
"description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system",
"span": "(Earth and Planetary Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Physics",
"code": "physics.geo-ph",
"description": "Atmospheric physics. Biogeosciences. Computational geophysics. Geographic location. Geoinformatics. Geophysical techniques. Hydrospheric geophysics. Magnetospheric physics. Mathematical geophysics. Planetology. Solar system. Solid earth geophysics. Space plasma physics. Mineral physics. High pressure physics.",
"span": "(Geophysics)"
}
] |
0907.5575
|
Pascal Koiran
|
Pascal Koiran (LIP)
|
A hitting set construction, with application to arithmetic circuit lower
bounds
|
14 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A polynomial identity testing algorithm must determine whether a given input
polynomial is identically equal to 0. We give a deterministic black-box
identity testing algorithm for univariate polynomials of the form $\sum_{j=0}^t
c_j X^{\alpha_j} (a + b X)^{\beta_j}$. From our algorithm we derive an
exponential lower bound for representations of polynomials such as
$\prod_{i=1}^{2^n} (X^i-1)$ under this form. It has been conjectured that these
polynomials are hard to compute by general arithmetic circuits. Our result
shows that the "hardness from derandomization" approach to lower bounds is
feasible for a restricted class of arithmetic circuits. The proof is based on
techniques from algebraic number theory, and more precisely on properties of
the height function of algebraic numbers.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 16:51:06 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Dec 2009 07:33:54 GMT"
}
] | 2009-12-08T00:00:00 |
[
[
"Koiran",
"Pascal",
"",
"LIP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0907.5598
|
Peter de Blanc
|
Peter de Blanc
|
Convergence of Expected Utility for Universal AI
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a sequence of repeated interactions between an agent and an
environment. Uncertainty about the environment is captured by a probability
distribution over a space of hypotheses, which includes all computable
functions. Given a utility function, we can evaluate the expected utility of
any computational policy for interaction with the environment. After making
some plausible assumptions (and maybe one not-so-plausible assumption), we show
that if the utility function is unbounded, then the expected utility of any
policy is undefined.
|
[
{
"version": "v1",
"created": "Fri, 31 Jul 2009 19:16:09 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Dec 2009 21:16:44 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"de Blanc",
"Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.0014
|
Mohamed Abdel Latif Mr
|
Mohamed Abdel Latif, Ahmed Sultan, and Hesham El Gamal
|
Keys through ARQ
|
21 Files 11 Figures Submitted to the IEEE Transactions on Information
Theory on July 31st, 2009
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper develops a novel framework for sharing secret keys using the
well-known Automatic Repeat reQuest (ARQ) protocol. The proposed key sharing
protocol does not assume any prior knowledge about the channel state
information (CSI), but, harnesses the available opportunistic secrecy gains
using only the one bit feedback, in the form of ACK/NACK. The distribution of
key bits among multiple ARQ epochs, in our approach, allows for mitigating the
secrecy outage phenomenon observed in earlier works. We characterize the
information theoretic limits of the proposed scheme, under different
assumptions on the channel spatial and temporal correlation function, and
develop low complexity explicit implementations. Our analysis reveals a novel
role of "dumb antennas" in overcoming the negative impact of spatial
correlation, between the legitimate and eavesdropper channels, on the
achievable secrecy rates. We further develop an adaptive rate allocation policy
which achieves higher secrecy rates by exploiting the channel temporal
correlation. Finally, our theoretical claims are validated by numerical results
that establish the achievability of non-zero secrecy rates even when the
eavesdropper channel is less noisy, on the average, than the legitimate
channel.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 00:40:37 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Latif",
"Mohamed Abdel",
""
],
[
"Sultan",
"Ahmed",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0043
|
Ashwinkumar B.V.
|
Ashwinkumar B. V. and Robert Kleinberg
|
Randomized Online Algorithms for the Buyback Problem
| null |
WINE 2009, LNCS 5929, pp. 529-536, 2009
| null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the matroid buyback problem, an algorithm observes a sequence of bids and
must decide whether to accept each bid at the moment it arrives, subject to a
matroid constraint on the set of accepted bids. Decisions to reject bids are
irrevocable, whereas decisions to accept bids may be canceled at a cost which
is a fixed fraction of the bid value. We present a new randomized algorithm for
this problem, and we prove matching upper and lower bounds to establish that
the competitive ratio of this algorithm, against an oblivious adversary, is the
best possible. We also observe that when the adversary is adaptive, no
randomized algorithm can improve the competitive ratio of the optimal
deterministic algorithm. Thus, our work completely resolves the question of
what competitive ratios can be achieved by randomized algorithms for the
matroid buyback problem.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 04:21:22 GMT"
}
] | 2009-11-30T00:00:00 |
[
[
"V.",
"Ashwinkumar B.",
""
],
[
"Kleinberg",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0908.0045
|
Tadashi Wadyama
|
Tadashi Wadayama
|
On Random Construction of a Bipolar Sensing Matrix with Compact
Representation
|
6 pages, to be presented at 2009 IEEE Information Theory Workshop,
Taormina
| null |
10.1109/ITW.2009.5351188
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A random construction of bipolar sensing matrices based on binary linear
codes is introduced and its RIP (Restricted Isometry Property) is analyzed
based on an argument on the ensemble average of the weight distribution of
binary linear codes.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 05:09:33 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Wadayama",
"Tadashi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0050
|
Julien Mairal
|
Julien Mairal (INRIA Rocquencourt), Francis Bach (INRIA Rocquencourt),
Jean Ponce (INRIA Rocquencourt, LIENS), Guillermo Sapiro
|
Online Learning for Matrix Factorization and Sparse Coding
|
revised version
|
Journal of Machine Learning Research 11 (2010) 19--60
| null | null |
stat.ML cs.LG math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sparse coding--that is, modelling data vectors as sparse linear combinations
of basis elements--is widely used in machine learning, neuroscience, signal
processing, and statistics. This paper focuses on the large-scale matrix
factorization problem that consists of learning the basis set, adapting it to
specific data. Variations of this problem include dictionary learning in signal
processing, non-negative matrix factorization and sparse principal component
analysis. In this paper, we propose to address these tasks with a new online
optimization algorithm, based on stochastic approximations, which scales up
gracefully to large datasets with millions of training samples, and extends
naturally to various matrix factorization formulations, making it suitable for
a wide range of learning problems. A proof of convergence is presented, along
with experiments with natural images and genomic data demonstrating that it
leads to state-of-the-art performance in terms of speed and optimization for
both small and large datasets.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 06:09:18 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Feb 2010 07:33:02 GMT"
}
] | 2010-02-11T00:00:00 |
[
[
"Mairal",
"Julien",
"",
"INRIA Rocquencourt"
],
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
],
[
"Ponce",
"Jean",
"",
"INRIA Rocquencourt, LIENS"
],
[
"Sapiro",
"Guillermo",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0908.0051
|
Harshan Jagadeesh
|
J. Harshan, B. Sundar Rajan and Are Hj{\o}rungnes
|
High-Rate, Distributed Training-Embedded Complex Orthogonal Designs for
Relay Networks
|
6 pages, 2 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed Space-Time Block Codes (DSTBCs) from Complex Orthogonal Designs
(CODs) (both square and non-square CODs other than the Alamouti design) are
known to lose their single-symbol ML decodable (SSD) property when used in
two-hop wireless relay networks using amplify and forward protocol. For such a
network, in this paper, a new class of high rate, training-embedded (TE) SSD
DSTBCs are constructed from TE-CODs. The proposed codes include the training
symbols in the structure of the code which is shown to be the key point to
obtain high rate as well as the SSD property. TE-CODs are shown to offer
full-diversity for arbitrary complex constellations. Non-square TE-CODs are
shown to provide higher rates (in symbols per channel use) compared to the
known SSD DSTBCs for relay networks with number of relays less than $10.$
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 06:24:08 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Harshan",
"J.",
""
],
[
"Rajan",
"B. Sundar",
""
],
[
"Hjørungnes",
"Are",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0060
|
Mugurel Ionut Andreica
|
Mugurel Ionut Andreica
|
Algorithmic Decision Optimization Techniques for Multiple Types of
Agents with Contrasting Interests
| null |
Metalurgia International, vol. 14, special issue no. 11, pp.
162-170, 2009. (ISSN: 1582-2214)
| null | null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper I present several algorithmic techniques for improving the
decision process of multiple types of agents behaving in environments where
their interests are in conflict. The interactions between the agents are
modelled by using several types of two-player games, where the agents have
identical roles and compete for the same resources, or where they have
different roles, like in query-response games. The described situations have
applications in modelling behavior in many types of environments, like
distributed systems, learning environments, resource negotiation environments,
and many others. The mentioned models are applicable in a wide range of
domains, like computer science or the industrial (e.g. metallurgical), economic
or financial sector.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 10:06:49 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Andreica",
"Mugurel Ionut",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.0076
|
R Doomun
|
J.C. Miraclin Joyce Pamila, K. Thanushkodi
|
Log Management support for recovery in mobile computing Environment
|
6 Pages, International Journal of Computer Science and Information
Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rapid and innovative improvement in wireless communication technologies has
led to an increase in the demand for mobile internet transactions. However,
internet access from mobile devices is very expensive due to limited bandwidth
available on wireless links and high mobility rate of mobile hosts. When a user
executes a transaction with a web portal from a mobile device, the
disconnection necessitates failure of the transaction or redoing all the steps
after reconnection, to get back into consistent application state. Thus
considering challenges in wireless mobile networks, a new log management scheme
is proposed for recovery of mobile transactions.
In this proposed approach, the model parameters that affect application state
recovery are analyzed. The proposed scheme is compared with the existing Lazy
and Pessimistic scheme and a trade off analysis between the cost invested to
manage log and the return of investment in terms of improved failure
recoverability is made. From the analysis, the best checkpoint interval period
that yields the best return of investment is identified.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 13:32:37 GMT"
}
] | 2010-02-23T00:00:00 |
[
[
"Pamila",
"J. C. Miraclin Joyce",
""
],
[
"Thanushkodi",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0078
|
Abhik Das
|
Abhik Das, Shweta Agarwal and Sriram Vishwanath
|
On Algebraic Traceback in Dynamic Networks
|
9 pages, 4 figures
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces the concept of incremental traceback for determining
changes in the trace of a network as it evolves with time. A distributed
algorithm, based on the methodology of algebraic traceback developed by Dean et
al, is proposed which can completely determine a path of d nodes/routers using
O(d) marked packets, and subsequently determine the changes in its topology
using O(log d) marked packets with high probability. The algorithm is
established to be order-wise optimal i.e., no other distributed algorithm can
determine changes in the path topology using lesser order of bits (i.e., marked
packets). The algorithm is shown to have a computational complexity of O(d log
d), which is significantly less than that of any existing non-incremental
algorithm of algebraic traceback. Extensions of this algorithm to settings with
node identity spoofing and network coding are also presented.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 13:45:17 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Aug 2009 07:07:26 GMT"
},
{
"version": "v3",
"created": "Wed, 20 Jan 2010 01:55:43 GMT"
}
] | 2010-01-20T00:00:00 |
[
[
"Das",
"Abhik",
""
],
[
"Agarwal",
"Shweta",
""
],
[
"Vishwanath",
"Sriram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0080
|
R Doomun
|
Manas Paul, Tanmay Bhattacharya, Suvajit Pal, Ranit Saha
|
A Novel Generic Session Based Bit Level Encryption Technique to Enhance
Information Security
|
7 Pages, International Journal of Computer Science and Information
Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
- In this paper a session based symmetric key encryption system has been
proposed and is termed as Permutated Cipher Technique (PCT). This technique is
more fast, suitable and secure for larger files. In this technique the input
file is broken down into blocks of various sizes (of 2 power n order) and
encrypted by shifting the position of each bit by a certain value for a certain
number of times. A key is generated randomly wherein the length of each block
is determined. Each block length generates a unique value of number of bits to
be skipped. This value determines the new position of the bits within the block
that are to be shifted. After the shifting and inverting each block is XORed
with SHA 512 digest of the key. The resultant blocks from the cipher text. The
key is generated according to the binary value of the input file size.
Decryption is done following the same process as the technique is symmetric.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 13:53:00 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Paul",
"Manas",
""
],
[
"Bhattacharya",
"Tanmay",
""
],
[
"Pal",
"Suvajit",
""
],
[
"Saha",
"Ranit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0089
|
\^Hamed \"Owladeghaffari O.Ghaffari
|
H. O. Ghaffari, M. Ejtemaei, M. Irannajad
|
Knowledge Discovery of Hydrocyclone s Circuit Based on SONFIS and SORST
|
Proceedings of the 11th International Mineral Processing Symposium
21-23 October 2008, Belek-Antalya, Turkey
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study describes application of some approximate reasoning methods to
analysis of hydrocyclone performance. In this manner, using a combining of Self
Organizing Map (SOM), Neuro-Fuzzy Inference System (NFIS)-SONFIS- and Rough Set
Theory (RST)-SORST-crisp and fuzzy granules are obtained. Balancing of crisp
granules and non-crisp granules can be implemented in close-open iteration.
Using different criteria and based on granulation level balance point
(interval) or a pseudo-balance point is estimated. Validation of the proposed
methods, on the data set of the hydrocyclone is rendered.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 17:28:13 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Ghaffari",
"H. O.",
""
],
[
"Ejtemaei",
"M.",
""
],
[
"Irannajad",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.0099
|
R Doomun
|
Azeez Nureni Ayofe, Osunade Oluwaseyifunmitan
|
Approach To Solving Cybercrime And Cybersecurity
|
11 Pages, International Journal of Computer Science and Information
Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3, No. 1, USA
| null | null |
cs.CY cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cybercrime is becoming ever more serious. Findings from 2002 Computer Crime
and Security Survey show an upward trend that demonstrates a need for a timely
review of existing approaches to fighting this new phenomenon in the
information age. In this paper, we provide an overview of Cybercrime and
present an international perspective on fighting Cybercrime.
This work seeks to define the concept of cyber-crime, identify reasons for
cyber-crime, how it can be eradicated, look at those involved and the reasons
for their involvement, we would look at how best to detect a criminal mail and
in conclusion, proffer recommendations that would help in checking the
increasing rate of cyber-crimes and criminals.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 20:33:56 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Ayofe",
"Azeez Nureni",
""
],
[
"Oluwaseyifunmitan",
"Osunade",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0100
|
Florentin Smarandache
|
Florentin Smarandache, Mark Alford
|
A Class of DSm Conditional Rules
|
9 pages. SUbmitted to COGIS 2009 International Conference in PAris
|
Proceedings of COGIS 2009 International Conference, Paris, France,
16-18 November 2009. Also, presented at this conference
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce two new DSm fusion conditioning rules with
example, and as a generalization of them a class of DSm fusion conditioning
rules, and then extend them to a class of DSm conditioning rules.
|
[
{
"version": "v1",
"created": "Sat, 1 Aug 2009 22:40:37 GMT"
}
] | 2009-11-23T00:00:00 |
[
[
"Smarandache",
"Florentin",
""
],
[
"Alford",
"Mark",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.0122
|
R Doomun
|
Kalpana Sharma, M.K. Ghose, Kuldeep
|
Complete Security Framework for Wireless Sensor Networks
|
7 pages, International Journal of Computer Science and Information
Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3 No. 1, USA
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Security concern for a Sensor Networks and level of security desired may
differ according to application specific needs where the sensor networks are
deployed. Till now, most of the security solutions proposed for sensor networks
are layer wise i.e a particular solution is applicable to single layer itself.
So, to integrate them all is a new research challenge. In this paper we took up
the challenge and have proposed an integrated comprehensive security framework
that will provide security services for all services of sensor network. We have
added one extra component i.e. Intelligent Security Agent (ISA) to assess level
of security and cross layer interactions. This framework has many components
like Intrusion Detection System, Trust Framework, Key Management scheme and
Link layer communication protocol. We have also tested it on three different
application scenarios in Castalia and Omnet++ simulator.
|
[
{
"version": "v1",
"created": "Sun, 2 Aug 2009 10:58:51 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Sharma",
"Kalpana",
""
],
[
"Ghose",
"M. K.",
""
],
[
"Kuldeep",
"",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0124
|
R Doomun
|
Atta E. E. Elalfi, and M. E. ElAlami
|
Intelligent Advisory System for Supporting University Managers in Law
|
6 pages, International Journal of Computer Science and Information
Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3 No. 1, USA
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The rights and duties of both staff members and students are regulated by a
large and different numbers of legal regulations and rules. This large number
of rules and regulations makes the decision-making process time consuming and
error boring. Smart advisory systems could provide rapid and accurate advices
to managers and give the arguments for these advices. This paper presents an
intelligent advisory system in law to assist the legal educational processes in
universities and institutes. The aims of the system are: to provide smart legal
advisors in the universities and institutes, to integrate rules and regulations
of universities and institutes in the e-government, to ease the burden on the
legal advisor and the provision of consulting services to users, to achieve
accurate and timely presentation of the legal opinion to a given problem and to
assure flexibility for accepting changes in the rules and legal regulations.
The system is based on experienced jurists and the rules and regulations of the
law organizing Saudi Arabia universities and institutes.
|
[
{
"version": "v1",
"created": "Sun, 2 Aug 2009 11:23:34 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Elalfi",
"Atta E. E.",
""
],
[
"ElAlami",
"M. E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0908.0126
|
R Doomun
|
Alexei Barbosa de Aguiar, Alvaro de M. S. Neto, Placido Rogerio
Pinheiro, Andre L. V. Coelho
|
Applicability of a Novel Integer Programming Model for Wireless Sensor
Networks
|
7 pages, International Journal of Computer Science and Information
Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3 No. 1, USA
| null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an applicability analysis over a novel integer
programming model devoted to optimize power consumption efficiency in
heterogeneous wireless sensor networks. This model is based upon a schedule of
sensor allocation plans in multiple time intervals subject to coverage and
connectivity constraints. By turning off a specific set of redundant sensors in
each time interval, it is possible to reduce the total energy consumption in
the network and, at the same time, avoid partitioning the whole network by
losing some strategic sensors too prematurely. Since the network is
heterogeneous, sensors can sense different phenomena from different demand
points, with different sample rates. As the problem instances grows the time
spent to the execution turns impracticable.
|
[
{
"version": "v1",
"created": "Sun, 2 Aug 2009 11:57:15 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"de Aguiar",
"Alexei Barbosa",
""
],
[
"Neto",
"Alvaro de M. S.",
""
],
[
"Pinheiro",
"Placido Rogerio",
""
],
[
"Coelho",
"Andre L. V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0908.0160
|
Danny Dolev
|
Ariel Daliot and Danny Dolev
|
Self-stabilizing Byzantine Agreement
|
A revision of PODC06 submission that includes full proofs and
corrections of mistakes
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Byzantine agreement algorithms typically assume implicit initial state
consistency and synchronization among the correct nodes and then operate in
coordinated rounds of information exchange to reach agreement based on the
input values. The implicit initial assumptions enable correct nodes to infer
about the progression of the algorithm at other nodes from their local state.
This paper considers a more severe fault model than permanent Byzantine
failures, one in which the system can in addition be subject to severe
transient failures that can temporarily throw the system out of its assumption
boundaries. When the system eventually returns to behave according to the
presumed assumptions it may be in an arbitrary state in which any
synchronization among the nodes might be lost, and each node may be at an
arbitrary state. We present a self-stabilizing Byzantine agreement algorithm
that reaches agreement among the correct nodes in an optimal ration of faulty
to correct, by using only the assumption of eventually bounded message
transmission delay. In the process of solving the problem, two additional
important and challenging building blocks were developed: a unique
self-stabilizing protocol for assigning consistent relative times to protocol
initialization and a Reliable Broadcast primitive that progresses at the speed
of actual message delivery time.
|
[
{
"version": "v1",
"created": "Sun, 2 Aug 2009 21:09:20 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Daliot",
"Ariel",
""
],
[
"Dolev",
"Danny",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0908.0163
|
Liang-Liang Xie
|
Liang-Liang Xie
|
An Improvement of Cover/El Gamal's Compress-and-Forward Relay Scheme
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The compress-and-forward relay scheme developed by (Cover and El Gamal, 1979)
is improved with a modification on the decoding process. The improvement
follows as a result of realizing that it is not necessary for the destination
to decode the compressed observation of the relay; and even if the compressed
observation is to be decoded, it can be more easily done by joint decoding with
the original message, rather than in a successive way. An extension to multiple
relays is also discussed.
|
[
{
"version": "v1",
"created": "Sun, 2 Aug 2009 21:31:40 GMT"
},
{
"version": "v2",
"created": "Sat, 15 Aug 2009 12:56:19 GMT"
}
] | 2009-08-15T00:00:00 |
[
[
"Xie",
"Liang-Liang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0175
|
Alex Stewart
|
Alex A. Stewart and Marta F. Antoszkiewicz
|
BGP Route Analysis and Management Systems
|
IEEE Proceedings of 5th International Conference on Information
Technology
| null | null |
ITNG'08
|
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Border Gateway Protocol (BGP) is an important component in today's IP
network infrastructure. As the main routing protocol of the Internet, clear
understanding of its dynamics is crucial for configuring, diagnosing and
debugging Internet routing problems. Despite the increase in the services that
BGP provide such as MPLS VPNs, there is no much progress achieved in automating
the BGP management tasks. In this paper we discuss some of the problems
encountered by network engineers when managing BGP networks. We also describe
some of the open source tools and methods that attempt to resolve these issues.
Then we present some of the features that, if implemented, will ease BGP
management related tasks.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 01:53:06 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Stewart",
"Alex A.",
""
],
[
"Antoszkiewicz",
"Marta F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0191
|
Wenguang Wang
|
Wenguang WANG (1), Andreas TOLK (2), Weiping WANG (1) ((1) College of
Information System and Management, National University of Defense Technology,
Changsha, China, (2) Engineering Management & Systems Engineering, Old
Dominion University, Norfolk, VA, United States)
|
The Levels of Conceptual Interoperability Model: Applying Systems
Engineering Principles to M&S
|
9 pages, 2 figures, 4 tables, Proceedings of Spring Simulation
Multiconference (SpringSim'09). San Diego, CA, USA
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes the use of the Levels of Conceptual Interoperability
Model (LCIM) as a framework for conceptual modeling and its descriptive and
prescriptive uses. LCIM is applied to show its potential and shortcomings in
the current simulation interoperability approaches, in particular the High
Level Architecture (HLA) and Base Object Models (BOM). It emphasizes the need
to apply rigorous engineering methods and principles and replace ad-hoc
approaches.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 06:14:40 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"WANG",
"Wenguang",
""
],
[
"TOLK",
"Andreas",
""
],
[
"WANG",
"Weiping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.0216
|
R Doomun
|
A.W. Naji, Shihab A. Hameed,, B.B.Zaidan, Wajdi F. Al-Khateeb, Othman
O. Khalifa, A.A.Zaidan and Teddy S. Gunawan
|
Novel Framework for Hidden Data in the Image Page within Executable File
Using Computation between Advanced Encryption Standard and Distortion
Techniques
|
6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3, No. 1, USA
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 10:00:25 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Naji",
"A. W.",
""
],
[
"Hameed",
"Shihab A.",
""
],
[
"Zaidan",
"B. B.",
""
],
[
"Al-Khateeb",
"Wajdi F.",
""
],
[
"Khalifa",
"Othman O.",
""
],
[
"Zaidan",
"A. A.",
""
],
[
"Gunawan",
"Teddy S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0221
|
R Doomun
|
Shilpa Kale, S. S. Shriramwar
|
FPGA-based Controller for a Mobile Robot
|
5 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3, No. 1, USA
| null | null |
cs.RO cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
With application in the robotics and automation, more and more it becomes
necessary the development of applications based on methodologies that
facilitate future modifications, updates and enhancements in the original
projected system. This project presents a conception of mobile robots using
rapid prototyping, distributing the several control actions in growing levels
of complexity and computing proposal oriented to embed systems implementation.
This kind of controller can be tested on different platform representing the
mobile robots using reprogrammable logic components (FPGA). This mobile robot
will detect obstacle and also be able to control the speed. Different modules
will be Actuators, Sensors, wireless transmission. All this modules will be
interfaced using FPGA controller. I would like to construct a mechanically
simple robot model, which can measure the distance from obstacle with the aid
of sensor and accordingly should able to control the speed of motor. I would
like to construct a mechanically simple robot model, which can measure the
distance from obstacle with the aid of sensor and accordingly should able to
control the speed of motor.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 10:30:55 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Kale",
"Shilpa",
""
],
[
"Shriramwar",
"S. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0908.0222
|
R Doomun
|
E.A.Mary Anita, and V.Vasudevan
|
Performance Evaluation of Mesh based Multicast Reactive Routing Protocol
under Black Hole Attack
|
6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3, No. 1, USA
| null | null |
cs.CR cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A mobile ad-hoc network is an autonomous system of mobile nodes connected by
wireless links in which nodes cooperate by forwarding packets for each other
thereby enabling communication beyond direct wireless transmission range. The
wireless and dynamic nature of ad-hoc networks makes them vulnerable to attacks
especially in routing protocols. Providing security in mobile ad-hoc networks
has been a major issue over the recent years. One of the prominent mesh base
reactive multicast routing protocols used in ad-hoc networks is On Demand
Multicast Routing protocol (ODMRP). The security of ODMRP is compromised by a
primary routing attack called black hole attack. In this attack a malicious
node advertises itself as having the shortest path to the node whose packets it
wants to intercept. This paper discusses the impact of black hole attack on
ODMRP under various scenarios. The performance is evaluated using metrics such
as packet delivery ratio and end to end delay for various numbers of senders
and receivers via simulation. Simulations are carried out using network
simulator ns-2. The results enable us to propose solutions to counter the
effect of black hole attack.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 10:47:42 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Anita",
"E. A. Mary",
""
],
[
"Vasudevan",
"V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0908.0239
|
Manfred Kufleitner
|
Manfred Kufleitner
|
On Bijective Variants of the Burrows-Wheeler Transform
|
15 pages, presented at the Prague Stringology Conference 2009 (PSC
2009)
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The sort transform (ST) is a modification of the Burrows-Wheeler transform
(BWT). Both transformations map an arbitrary word of length n to a pair
consisting of a word of length n and an index between 1 and n. The BWT sorts
all rotation conjugates of the input word, whereas the ST of order k only uses
the first k letters for sorting all such conjugates. If two conjugates start
with the same prefix of length k, then the indices of the rotations are used
for tie-breaking. Both transforms output the sequence of the last letters of
the sorted list and the index of the input within the sorted list. In this
paper, we discuss a bijective variant of the BWT (due to Scott), proving its
correctness and relations to other results due to Gessel and Reutenauer (1993)
and Crochemore, Desarmenien, and Perrin (2005). Further, we present a novel
bijective variant of the ST.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 13:10:48 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Kufleitner",
"Manfred",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.0302
|
Eren Sasoglu
|
Eren Sasoglu, Emre Telatar, Erdal Arikan
|
Polarization for arbitrary discrete memoryless channels
|
12 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Channel polarization, originally proposed for binary-input channels, is
generalized to arbitrary discrete memoryless channels. Specifically, it is
shown that when the input alphabet size is a prime number, a similar
construction to that for the binary case leads to polarization. This method can
be extended to channels of composite input alphabet sizes by decomposing such
channels into a set of channels with prime input alphabet sizes. It is also
shown that all discrete memoryless channels can be polarized by randomized
constructions. The introduction of randomness does not change the order of
complexity of polar code construction, encoding, and decoding. A previous
result on the error probability behavior of polar codes is also extended to the
case of arbitrary discrete memoryless channels. The generalization of
polarization to channels with arbitrary finite input alphabet sizes leads to
polar-coding methods for approaching the true (as opposed to symmetric) channel
capacity of arbitrary channels with discrete or continuous input alphabets.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 17:24:39 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Sasoglu",
"Eren",
""
],
[
"Telatar",
"Emre",
""
],
[
"Arikan",
"Erdal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0319
|
Sarah Filippi
|
Sarah Filippi (LTCI), Olivier Capp\'e (LTCI), Aur\'elien Garivier
(LTCI)
|
Regret Bounds for Opportunistic Channel Access
| null | null | null | null |
stat.ML cs.AI cs.LG cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the task of opportunistic channel access in a primary system
composed of independent Gilbert-Elliot channels where the secondary (or
opportunistic) user does not dispose of a priori information regarding the
statistical characteristics of the system. It is shown that this problem may be
cast into the framework of model-based learning in a specific class of
Partially Observed Markov Decision Processes (POMDPs) for which we introduce an
algorithm aimed at striking an optimal tradeoff between the exploration (or
estimation) and exploitation requirements. We provide finite horizon regret
bounds for this algorithm as well as a numerical evaluation of its performance
in the single channel model as well as in the case of stochastically identical
channels.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 19:25:58 GMT"
}
] | 2009-08-04T00:00:00 |
[
[
"Filippi",
"Sarah",
"",
"LTCI"
],
[
"Cappé",
"Olivier",
"",
"LTCI"
],
[
"Garivier",
"Aurélien",
"",
"LTCI"
]
] |
[
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0320
|
Jerome Jaffre
|
Adimurthi Adimurthi, G.D. Veerappa Gowda, J\'er\^ome Jaffr\'e (INRIA
Rocquencourt, INRIA Rocquencourt)
|
Applications of the DFLU flux to systems of conservation laws
| null |
Journal of Computational and Applied Mathematics 247 (2013)
102-103
|
10.1016/j.cam.2012.12.025
|
RR-7009
|
cs.NA math.AP math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The DFLU numerical flux was introduced in order to solve hyperbolic scalar
conservation laws with a flux function discontinuous in space. We show how this
flux can be used to solve systems of conservation laws. The obtained numerical
flux is very close to a Godunov flux. As an example we consider a system
modeling polymer flooding in oil reservoir engineering.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 19:27:57 GMT"
}
] | 2014-01-16T00:00:00 |
[
[
"Adimurthi",
"Adimurthi",
"",
"INRIA\n Rocquencourt, INRIA Rocquencourt"
],
[
"Gowda",
"G. D. Veerappa",
"",
"INRIA\n Rocquencourt, INRIA Rocquencourt"
],
[
"Jaffré",
"Jérôme",
"",
"INRIA\n Rocquencourt, INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0908.0350
|
Siddharth Barman
|
Siddharth Barman, Shuchi Chawla
|
Region growing for multi-route cuts
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a number of multi-route cut problems: given a graph G=(V,E) and
connectivity thresholds k_(u,v) on pairs of nodes, the goal is to find a
minimum cost set of edges or vertices the removal of which reduces the
connectivity between every pair (u,v) to strictly below its given threshold.
These problems arise in the context of reliability in communication networks;
They are natural generalizations of traditional minimum cut problems where the
thresholds are either 1 (we want to completely separate the pair) or infinity
(we don't care about the connectivity for the pair). We provide the first
non-trivial approximations to a number of variants of the problem including for
both node-disjoint and edge-disjoint connectivity thresholds. A main
contribution of our work is an extension of the region growing technique for
approximating minimum multicuts to the multi-route setting. When the
connectivity thresholds are either 2 or infinity (the "2-route cut" case), we
obtain polylogarithmic approximations while satisfying the thresholds exactly.
For arbitrary connectivity thresholds this approach leads to bicriteria
approximations where we approximately satisfy the thresholds and approximately
minimize the cost. We present a number of different algorithms achieving
different cost-connectivity tradeoffs.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 21:21:06 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Barman",
"Siddharth",
""
],
[
"Chawla",
"Shuchi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.0358
|
Yang Weng
|
Yang Weng and Daniela Tuninetti
|
Outage analysis of Block-Fading Gaussian Interference Channels
|
39 pages, 9 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the asymptotic behavior of two-source block-fading
single-antenna Gaussian interference channels in the high-SNR regime by means
of the diversity-multiplexing tradeoff. We consider a general setting where the
users and the average channel gains are not restricted to be symmetric. Our
results are not just extensions of previous results for symmetric networks, as
our setting covers scenarios that are not possible under the symmetric
assumption, such as the case of "mixed" interference, i.e., when difference
sources have different distances from their intended receivers. We derive upper
and lower bounds on the diversity. We show that for a fairly large set of
channel parameters the two bounds coincides.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 22:47:34 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Weng",
"Yang",
""
],
[
"Tuninetti",
"Daniela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0362
|
I-Hong Hou
|
I-Hong Hou and P.R. Kumar
|
Utility Maximization for Delay Constrained QoS in Wireless
|
submitted to INFOCOM 2010
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies the problem of utility maximization for clients with delay
based QoS requirements in wireless networks. We adopt a model used in a
previous work that characterizes the QoS requirements of clients by their delay
constraints, channel reliabilities, and delivery ratio requirements. In this
work, we assume that the utility of a client is a function of the delivery
ratio it obtains. We treat the delivery ratio for a client as a tunable
parameter by the access point (AP), instead of a given value as in the previous
work. We then study how the AP should assign delivery ratios to clients so that
the total utility of all clients is maximized.
We apply the techniques introduced in two previous papers to decompose the
utility maximization problem into two simpler problems, a CLIENT problem and an
ACCESS-POINT problem. We show that this decomposition actually describes a
bidding game, where clients bid for the service time from the AP. We prove that
although all clients behave selfishly in this game, the resulting equilibrium
point of the game maximizes the total utility. In addition, we also establish
an efficient scheduling policy for the AP to reach the optimal point of the
ACCESS-POINT problem. We prove that the policy not only approaches the optimal
point but also achieves some forms of fairness among clients. Finally,
simulation results show that our proposed policy does achieve higher utility
than all other compared policies.
|
[
{
"version": "v1",
"created": "Mon, 3 Aug 2009 23:10:55 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Hou",
"I-Hong",
""
],
[
"Kumar",
"P. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0373
|
Marko A. Rodriguez
|
Marko A. Rodriguez
|
A Reflection on the Structure and Process of the Web of Data
| null |
Bulletin of the American Society for Information Science and
Technology, American Society for Information Science and Technology, volume
35, number 6, ISSN: 1550-8366, LA-UR-09-03724, pages 38-43, September 2009
| null |
LA-UR-09-03724
|
cs.AI cs.DL cs.GL
|
http://creativecommons.org/licenses/publicdomain/
|
The Web community has introduced a set of standards and technologies for
representing, querying, and manipulating a globally distributed data structure
known as the Web of Data. The proponents of the Web of Data envision much of
the world's data being interrelated and openly accessible to the general
public. This vision is analogous in many ways to the Web of Documents of common
knowledge, but instead of making documents and media openly accessible, the
focus is on making data openly accessible. In providing data for public use,
there has been a stimulated interest in a movement dubbed Open Data. Open Data
is analogous in many ways to the Open Source movement. However, instead of
focusing on software, Open Data is focused on the legal and licensing issues
around publicly exposed data. Together, various technological and legal tools
are laying the groundwork for the future of global-scale data management on the
Web. As of today, in its early form, the Web of Data hosts a variety of data
sets that include encyclopedic facts, drug and protein data, metadata on music,
books and scholarly articles, social network representations, geospatial
information, and many other types of information. The size and diversity of the
Web of Data is a demonstration of the flexibility of the underlying standards
and the overall feasibility of the project as a whole. The purpose of this
article is to provide a review of the technological underpinnings of the Web of
Data as well as some of the hurdles that need to be overcome if the Web of Data
is to emerge as the defacto medium for data representation, distribution, and
ultimately, processing.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 01:59:07 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Rodriguez",
"Marko A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0908.0375
|
Karthekeyan Chandrasekaran
|
Karthekeyan Chandrasekaran, Navin Goyal, Bernhard Haeupler
|
Deterministic Algorithms for the Lovasz Local Lemma
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Lovasz Local Lemma (LLL) is a powerful result in probability theory that
states that the probability that none of a set of bad events happens is nonzero
if the probability of each event is small compared to the number of events that
depend on it. It is often used in combination with the probabilistic method for
non-constructive existence proofs. A prominent application is to k-CNF
formulas, where LLL implies that, if every clause in the formula shares
variables with at most d <= 2^k/e other clauses then such a formula has a
satisfying assignment. Recently, a randomized algorithm to efficiently
construct a satisfying assignment was given by Moser. Subsequently Moser and
Tardos gave a randomized algorithm to construct the structures guaranteed by
the LLL in a very general algorithmic framework. We address the main problem
left open by Moser and Tardos of derandomizing these algorithms efficiently.
Specifically, for a k-CNF formula with m clauses and d <= 2^{k/(1+\eps)}/e for
any \eps\in (0,1), we give an algorithm that finds a satisfying assignment in
time \tilde{O}(m^{2(1+1/\eps)}). This improves upon the deterministic
algorithms of Moser and of Moser-Tardos with running time m^{\Omega(k^2)} which
is superpolynomial for k=\omega(1) and upon other previous algorithms which
work only for d\leq 2^{k/16}/4. Our algorithm works efficiently for a general
version of LLL under the algorithmic framework of Moser and Tardos, and is also
parallelizable, i.e., has polylogarithmic running time using polynomially many
processors.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 02:13:54 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Aug 2019 23:11:39 GMT"
}
] | 2019-08-07T00:00:00 |
[
[
"Chandrasekaran",
"Karthekeyan",
""
],
[
"Goyal",
"Navin",
""
],
[
"Haeupler",
"Bernhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.0390
|
Zohir Bouzid
|
Zohir Bouzid (LIP6), Maria Potop-Butucaru (LIP6, INRIA Rocquencourt),
S\'ebastien Tixeuil (LIP6)
|
Byzantine Convergence in Robots Networks: The Price of Asynchrony
| null | null | null | null |
cs.DC cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the convergence problem in fully asynchronous, uni-dimensional robot
networks that are prone to Byzantine (i.e. malicious) failures. In these
settings, oblivious anonymous robots with arbitrary initial positions are
required to eventually converge to an a apriori unknown position despite a
subset of them exhibiting Byzantine behavior. Our contribution is twofold. We
propose a deterministic algorithm that solves the problem in the most generic
settings: fully asynchronous robots that operate in the non-atomic CORDA model.
Our algorithm provides convergence in 5f+1-sized networks where f is the upper
bound on the number of Byzantine robots. Additionally, we prove that 5f+1 is a
lower bound whenever robot scheduling is fully asynchronous. This constrasts
with previous results in partially synchronous robots networks, where 3f+1
robots are necessary and sufficient.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 06:15:33 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Bouzid",
"Zohir",
"",
"LIP6"
],
[
"Potop-Butucaru",
"Maria",
"",
"LIP6, INRIA Rocquencourt"
],
[
"Tixeuil",
"Sébastien",
"",
"LIP6"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0908.0398
|
Emmanuelle Anceaume
|
Emmanuelle Anceaume (INRIA - Irisa), R. Ludinard (INRIA - Irisa), B.
Sericola (INRIA - Irisa), F. Tronel, F. Brasiliero
|
Analytical Study of Adversarial Strategies in Cluster-based Overlays
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Scheideler has shown that peer-to-peer overlays networks can only survive
Byzantine attacks if malicious nodes are not able to predict what is going to
be the topology of the network for a given sequence of join and leave
operations. In this paper we investigate adversarial strategies by following
specific games. Our analysis demonstrates first that an adversary can very
quickly subvert DHT-based overlays by simply never triggering leave operations.
We then show that when all nodes (honest and malicious ones) are imposed on a
limited lifetime, the system eventually reaches a stationary regime where the
ratio of polluted clusters is bounded, independently from the initial amount of
corruption in the system.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 07:17:57 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Anceaume",
"Emmanuelle",
"",
"INRIA - Irisa"
],
[
"Ludinard",
"R.",
"",
"INRIA - Irisa"
],
[
"Sericola",
"B.",
"",
"INRIA - Irisa"
],
[
"Tronel",
"F.",
""
],
[
"Brasiliero",
"F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0908.0411
|
Gerhard Mayer
|
Gerhard Mayer
|
Data management in systems biology I - Overview and bibliography
|
20 pages
| null | null | null |
cs.DB cs.DS q-bio.OT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Large systems biology projects can encompass several workgroups often located
in different countries. An overview about existing data standards in systems
biology and the management, storage, exchange and integration of the generated
data in large distributed research projects is given, the pros and cons of the
different approaches are illustrated from a practical point of view, the
existing software - open source as well as commercial - and the relevant
literature is extensively overview, so that the reader should be enabled to
decide which data management approach is the best suited for his special needs.
An emphasis is laid on the use of workflow systems and of TAB-based formats.
The data in this format can be viewed and edited easily using spreadsheet
programs which are familiar to the working experimental biologists. The use of
workflows for the standardized access to data in either own or publicly
available databanks and the standardization of operation procedures is
presented. The use of ontologies and semantic web technologies for data
management will be discussed in a further paper.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 08:53:33 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Sep 2009 08:35:53 GMT"
},
{
"version": "v3",
"created": "Tue, 15 Dec 2009 09:09:32 GMT"
}
] | 2009-12-15T00:00:00 |
[
[
"Mayer",
"Gerhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.OT",
"description": "Work in quantitative biology that does not fit into the other q-bio classifications",
"span": "(Other Quantitative Biology)"
}
] |
0908.0464
|
S{\l}awomir Staworko
|
Slawomir Staworko, Jan Chomicki and Jerzy Marcinkowski
|
Prioritized Repairing and Consistent Query Answering in Relational
Databases
|
Accepted to the special SUM'08 issue of AMAI
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A consistent query answer in an inconsistent database is an answer obtained
in every (minimal) repair. The repairs are obtained by resolving all conflicts
in all possible ways. Often, however, the user is able to provide a preference
on how conflicts should be resolved. We investigate here the framework of
preferred consistent query answers, in which user preferences are used to
narrow down the set of repairs to a set of preferred repairs. We axiomatize
desirable properties of preferred repairs. We present three different families
of preferred repairs and study their mutual relationships. Finally, we
investigate the complexity of preferred repairing and computing preferred
consistent query answers.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 15:10:25 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Mar 2010 13:27:17 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Oct 2011 16:45:52 GMT"
}
] | 2011-10-10T00:00:00 |
[
[
"Staworko",
"Slawomir",
""
],
[
"Chomicki",
"Jan",
""
],
[
"Marcinkowski",
"Jerzy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0908.0482
|
Shenghui Su
|
Shenghui Su, Shuwang Lu
|
REESSE1+ . Reward . Proof by Experiment . A New Approach to Proof of P
!= NP
|
5 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The authors discuss what is provable security in cryptography. Think that
provable security is asymptotic, relative, and dynamic, and only a supplement
to but not a replacement of exact security analysis. Because the conjecture P
!= NP has not been proven yet, and it is possible in terms of the two
incompleteness theorems of Kurt Godel that there is some cryptosystem of which
the security cannot or only ideally be proven in the random oracle model, the
security of a cryptosystem is between provability and unprovability, and any
academic conclusion must be checked and verified with practices or experiments
as much as possible. Extra, a new approach to proof of P != NP is pointed out.
Lastly, a reward is offered for the subexponential time solutions to the three
REESSE1+ problems: MPP, ASPP, and TLP with n >= 80 and lg M >= 80, which may be
regarded as a type of security proof by experiment.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 16:09:39 GMT"
},
{
"version": "v2",
"created": "Sun, 10 Oct 2010 06:41:11 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Dec 2011 10:37:32 GMT"
},
{
"version": "v4",
"created": "Thu, 7 Feb 2013 06:19:55 GMT"
},
{
"version": "v5",
"created": "Tue, 26 Aug 2014 03:13:05 GMT"
}
] | 2014-08-27T00:00:00 |
[
[
"Su",
"Shenghui",
""
],
[
"Lu",
"Shuwang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0488
|
Andre Schulz
|
Ares Rib\'o Mor, G\"unter Rote, Andr\'e Schulz
|
Small grid embeddings of 3-polytopes
| null |
Discrete and Computational Geometry 45 (2011), 65-87
|
10.1007/s00454-010-9301-0
| null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce an algorithm that embeds a given 3-connected planar graph as a
convex 3-polytope with integer coordinates. The size of the coordinates is
bounded by $O(2^{7.55n})=O(188^{n})$. If the graph contains a triangle we can
bound the integer coordinates by $O(2^{4.82n})$. If the graph contains a
quadrilateral we can bound the integer coordinates by $O(2^{5.46n})$. The
crucial part of the algorithm is to find a convex plane embedding whose edges
can be weighted such that the sum of the weighted edges, seen as vectors,
cancel at every point. It is well known that this can be guaranteed for the
interior vertices by applying a technique of Tutte. We show how to extend
Tutte's ideas to construct a plane embedding where the weighted vector sums
cancel also on the vertices of the boundary face.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 16:35:20 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jul 2010 15:13:41 GMT"
}
] | 2017-11-20T00:00:00 |
[
[
"Mor",
"Ares Ribó",
""
],
[
"Rote",
"Günter",
""
],
[
"Schulz",
"André",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.0494
|
Stephan Merz
|
Francisco L\'opez Fraguas, Stephan Merz (INRIA Lorraine - LORIA), Juan
Rodr\'iguez Hortal\'a
|
A Formalization of the Semantics of Functional-Logic Programming in
Isabelle
| null |
22nd International Conference Theorem Proving for Higher-Order
Logics (TPHOLs 2009): emerging trends session (2009)
| null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Modern functional-logic programming languages like Toy or Curry feature
non-strict non-deterministic functions that behave under call-time choice
semantics. A standard formulation for this semantics is the CRWL logic, that
specifies a proof calculus for computing the set of possible results for each
expression. In this paper we present a formalization of that calculus in the
Isabelle/HOL proof assistant. We have proved some basic properties of CRWL:
closedness under c-substitutions, polarity and compositionality. We also
discuss some insights that have been gained, such as the fact that left
linearity of program rules is not needed for any of these results to hold.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 17:01:24 GMT"
}
] | 2009-08-05T00:00:00 |
[
[
"Fraguas",
"Francisco López",
"",
"INRIA Lorraine - LORIA"
],
[
"Merz",
"Stephan",
"",
"INRIA Lorraine - LORIA"
],
[
"Hortalá",
"Juan Rodríguez",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0908.0497
|
MinJi Kim
|
MinJi Kim, Daniel Lucani, Xiaomeng Shi, Fang Zhao, Muriel Medard
|
Network Coding for Multi-Resolution Multicast
|
9 pages, 16 figures, submitted to IEEE INFOCOM 2010
| null |
10.1109/INFCOM.2010.5462001
| null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multi-resolution codes enable multicast at different rates to different
receivers, a setup that is often desirable for graphics or video streaming. We
propose a simple, distributed, two-stage message passing algorithm to generate
network codes for single-source multicast of multi-resolution codes. The goal
of this "pushback algorithm" is to maximize the total rate achieved by all
receivers, while guaranteeing decodability of the base layer at each receiver.
By conducting pushback and code generation stages, this algorithm takes
advantage of inter-layer as well as intra-layer coding. Numerical simulations
show that in terms of total rate achieved, the pushback algorithm outperforms
routing and intra-layer coding schemes, even with codeword sizes as small as 10
bits. In addition, the performance gap widens as the number of receivers and
the number of nodes in the network increases. We also observe that naiive
inter-layer coding schemes may perform worse than intra-layer schemes under
certain network conditions.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 17:27:19 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Kim",
"MinJi",
""
],
[
"Lucani",
"Daniel",
""
],
[
"Shi",
"Xiaomeng",
""
],
[
"Zhao",
"Fang",
""
],
[
"Medard",
"Muriel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0512
|
Greg Kuperberg
|
Greg Kuperberg (UC Davis)
|
How hard is it to approximate the Jones polynomial?
|
19 pages. Don't miss this major revision! Includes more complete
explanations of all results, and refinements of both Aaronson's theorem and
the Solovay-Kitaev theorem. To appear in ToC
|
Theory Comput. 11 (2015), 183-219
| null | null |
quant-ph cs.CC math.QA
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Freedman, Kitaev, and Wang [arXiv:quant-ph/0001071], and later Aharonov,
Jones, and Landau [arXiv:quant-ph/0511096], established a quantum algorithm to
"additively" approximate the Jones polynomial V(L,t) at any principal root of
unity t. The strength of this additive approximation depends exponentially on
the bridge number of the link presentation. Freedman, Larsen, and Wang
[arXiv:math/0103200] established that the approximation is universal for
quantum computation at a non-lattice, principal root of unity; and Aharonov and
Arad [arXiv:quant-ph/0605181] established a uniform version of this result.
In this article, we show that any value-dependent approximation of the Jones
polynomial at these non-lattice roots of unity is #P-hard. If given the power
to decide whether |V(L,t)| > a or |V(L,t)| < b for fixed constants a > b > 0,
there is a polynomial-time algorithm to exactly count the solutions to
arbitrary combinatorial equations. In our argument, the result follows fairly
directly from the universality result and Aaronson's theorem that PostBQP = PP
[arXiv:quant-ph/0412187].
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 18:55:02 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Oct 2014 05:04:49 GMT"
}
] | 2019-09-16T00:00:00 |
[
[
"Kuperberg",
"Greg",
"",
"UC Davis"
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
}
] |
0908.0515
|
Hongyang Chen
|
Hongyang Chen, Qingjiang Shi, Pei Huang, H.Vincent Poor, and Kaoru
Sezaki
|
Mobile Anchor Assisted Node Localization for Wireless Sensor Networks
|
5 pages, 6 figures, IEEE PIMRC 2009
| null |
10.1109/PIMRC.2009.5449959
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a cooperative localization algorithm is proposed that
considers the existence of obstacles in mobilityassisted wireless sensor
networks (WSNs). In this scheme, a mobile anchor (MA) node cooperates with
static sensor nodes and moves actively to refine location performance. The
localization accuracy of the proposed algorithm can be improved further by
changing the transmission range of mobile anchor node. The algorithm takes
advantage of cooperation betweenMAs and static sensors while, at the same time,
taking into account the relay node availability to make the best use of beacon
signals. For achieving high localization accuracy and coverage, a novel convex
position estimation algorithm is proposed, which can effectively solve the
localization problem when infeasible points occur because of the effects of
radio irregularity and obstacles. This method is the only range-free based
convex method to solve the localization problem when the feasible set of
localization inequalities is empty. Simulation results demonstrate the
effectiveness of this algorithm.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 19:13:42 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Chen",
"Hongyang",
""
],
[
"Shi",
"Qingjiang",
""
],
[
"Huang",
"Pei",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Sezaki",
"Kaoru",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0516
|
Juan J. Merelo Pr.
|
Juan J. Merelo Guervos
|
Still doing evolutionary algorithms with Perl
|
Corrected version of the paper published in YAPC::EU::2009, Corporate
Perl, pp 83-97
| null | null | null |
cs.NE
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Algorithm::Evolutionary (A::E from now on) was introduced in 2002, after a
talk in YAPC::EU in Munich. 7 years later, A::E is in its 0.67 version (past
its "number of the beast" 0.666), and has been used extensively, to the point
of being the foundation of much of the (computer) science being done by our
research group (and, admittedly, not many others). All is not done, however;
now A::E is being integrated with POE so that evolutionary algorithms (EAs) can
be combined with all kinds of servers and used in client, servers, and anything
in between. In this companion to the talk I will explain what evolutionary
algorithms are, what they are being used for, how to do them with Perl (using
these or other fine modules found in CPAN) and what evolutionary algorithms can
do for Perl at large.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 19:16:14 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Guervos",
"Juan J. Merelo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0908.0548
|
R Doomun
|
Hanumanthappa J., Manjaiah D. H
|
IPv6 and IPv4 Threat reviews with Automatic Tunneling and Configuration
Tunneling Considerations Transitional Model:A Case Study for University of
Mysore Network
|
12 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3, No. 1, USA
| null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The actual transition from IPv4 to IPv6 requires network administrators to
become aware of the next generation protocol and the associated risk
problems.Due to the scale and complexity of current internet architecture how
to protect from the existing investment and reduce the negative influence to
users and service providers during the transition from IPv4 to IPv6 is a very
important future topic for the advanced version of an internet
architecture.This paper summarizes and compares the IPv6 transition mechanism
methods like Dual Stack,Tunneling issues like IPv6 Automatic tunneling and
manually configured tunneling considerations, the IPv6 transition
scenarios,IPv6 transition security problems,highlights IPv6 and IPv4 threat
review with automatic tunneling and configuration tunneling considerations.In
this paper we have proposed a transitional threat model for automatic tunneling
and a configuration tunneling that could be followed by the University of
Mysore(UoM),to estimate automatic tunneling and a manually configured tunneling
threat review issues.Furthermore,there are different tunneling mechanisms such
as IPv6 over IPv4 GRE Tunnel,Tunnel broker,Automatic IPv4 Compatible Tunnel and
Automatic 6 to 4 Tunnel and also outlines many of the common known threats
against IPv6 and then it compares and contrast how these threats are similar
ones,might affect an IPv6 network.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 21:12:21 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"J.",
"Hanumanthappa",
""
],
[
"H",
"Manjaiah D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0551
|
R Doomun
|
Dr. Shishir Kumar, U.S. Rawat, Sameer Kumar Jasra, Akshay Kumar Jain
|
Efficient methodology for implementation of Encrypted File System in
User Space
|
8 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS July 2009, Vol. 3, No. 1, USA
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Encrypted File System (EFS) pushes encryption services into the file
system itself. EFS supports secure storage at the system level through a
standard UNIX file system interface to encrypted files. User can associate a
cryptographic key with the directories they wish to protect. Files in these
directories (as well as their pathname components) are transparently encrypted
and decrypted with the specified key without further user intervention; clear
text is never stored on a disk or sent to a remote file server. EFS can use any
available file system for its underlying storage without modifications,
including remote file servers such as NFS. System management functions, such as
file backup, work in a normal manner and without knowledge of the key.
Performance is an important factor to users since encryption can be time
consuming. This paper describes the design and implementation of EFS in user
space using faster cryptographic algorithms on UNIX Operating system.
Implementing EFS in user space makes it portable and flexible; Kernel size will
also not increase resulting in more reliable & efficient Operating System.
Encryption techniques for file system level encryption are described, and
general issues of cryptographic system interfaces to support routine secure
computing are discussed.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 21:30:18 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Kumar",
"Dr. Shishir",
""
],
[
"Rawat",
"U. S.",
""
],
[
"Jasra",
"Sameer Kumar",
""
],
[
"Jain",
"Akshay Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0554
|
Aran Nayebi
|
Aran Nayebi
|
On integers as the sum of a prime and a $k$-th power
|
This paper has been withdrawn by the author due to several errors in
the manuscript, a prominent problem being that it has been known at least
since Tarski that in real numbers there exists a deterministic Turing machine
which determines if a variety is empty or nonempty
| null | null | null |
math.NT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\mathcal{R}_k(n)$ be the number of representations of an integer $n$ as
the sum of a prime and a $k$-th power. Define E_k(X) := |\{n \le X, n \in I_k,
n\text{not a sum of a prime and a $k$-th power}\}|.
Hardy and Littlewood conjectured that for $k = 2$ and $k=3$, E_k(X) \ll_{k}
1. In this note we present an alternative approach grounded in the theory of
Diophantine equations towards a proof of the conjecture for all $k \ge 2$.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 18:33:44 GMT"
},
{
"version": "v10",
"created": "Wed, 7 Oct 2009 00:58:30 GMT"
},
{
"version": "v11",
"created": "Mon, 12 Oct 2009 16:29:17 GMT"
},
{
"version": "v12",
"created": "Wed, 14 Oct 2009 02:36:10 GMT"
},
{
"version": "v13",
"created": "Thu, 15 Oct 2009 06:13:11 GMT"
},
{
"version": "v14",
"created": "Wed, 21 Oct 2009 22:50:16 GMT"
},
{
"version": "v15",
"created": "Mon, 26 Oct 2009 03:40:59 GMT"
},
{
"version": "v16",
"created": "Sun, 6 Dec 2009 04:05:36 GMT"
},
{
"version": "v17",
"created": "Mon, 14 Dec 2009 04:17:58 GMT"
},
{
"version": "v18",
"created": "Mon, 4 Jan 2010 05:07:56 GMT"
},
{
"version": "v19",
"created": "Mon, 5 Apr 2010 17:29:32 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Aug 2009 17:07:56 GMT"
},
{
"version": "v20",
"created": "Sun, 5 Sep 2010 01:03:35 GMT"
},
{
"version": "v21",
"created": "Mon, 7 Mar 2011 19:01:06 GMT"
},
{
"version": "v22",
"created": "Wed, 9 Mar 2011 17:52:11 GMT"
},
{
"version": "v23",
"created": "Sun, 10 Apr 2011 05:35:39 GMT"
},
{
"version": "v24",
"created": "Sun, 24 Apr 2011 17:02:04 GMT"
},
{
"version": "v25",
"created": "Mon, 13 Jun 2011 23:33:32 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Aug 2009 16:33:24 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Aug 2009 00:55:02 GMT"
},
{
"version": "v5",
"created": "Wed, 12 Aug 2009 15:11:41 GMT"
},
{
"version": "v6",
"created": "Fri, 14 Aug 2009 14:51:45 GMT"
},
{
"version": "v7",
"created": "Sun, 23 Aug 2009 17:11:32 GMT"
},
{
"version": "v8",
"created": "Mon, 5 Oct 2009 07:45:51 GMT"
},
{
"version": "v9",
"created": "Tue, 6 Oct 2009 05:25:27 GMT"
}
] | 2011-06-15T00:00:00 |
[
[
"Nayebi",
"Aran",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.0567
|
Oktie Hassanzadeh
|
Oktie Hassanzadeh, Anastasios Kementsietsidis, Lipyeow Lim, Renee J.
Miller, Min Wang
|
LinkedCT: A Linked Data Space for Clinical Trials
|
5 pages, 1 figure, 4 tables
| null | null | null |
cs.DB cs.CE cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Linked Clinical Trials (LinkedCT) project aims at publishing the first
open semantic web data source for clinical trials data. The database exposed by
LinkedCT is generated by (1) transforming existing data sources of clinical
trials into RDF, and (2) discovering semantic links between the records in the
trials data and several other data sources. In this paper, we discuss several
challenges involved in these two steps and present the methodology used in
LinkedCT to overcome these challenges. Our approach for semantic link discovery
involves using state-of-the-art approximate string matching techniques combined
with ontology-based semantic matching of the records, all performed in a
declarative and easy-to-use framework. We present an evaluation of the
performance of our proposed techniques in several link discovery scenarios in
LinkedCT.
|
[
{
"version": "v1",
"created": "Tue, 4 Aug 2009 23:30:46 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Hassanzadeh",
"Oktie",
""
],
[
"Kementsietsidis",
"Anastasios",
""
],
[
"Lim",
"Lipyeow",
""
],
[
"Miller",
"Renee J.",
""
],
[
"Wang",
"Min",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.0570
|
Piyush Rai
|
Piyush Rai and Hal Daum\'e III
|
The Infinite Hierarchical Factor Regression Model
| null |
NIPS 2008
| null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a nonparametric Bayesian factor regression model that accounts for
uncertainty in the number of factors, and the relationship between factors. To
accomplish this, we propose a sparse variant of the Indian Buffet Process and
couple this with a hierarchical model over factors, based on Kingman's
coalescent. We apply this model to two problems (factor analysis and factor
regression) in gene-expression data analysis.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 01:10:09 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Rai",
"Piyush",
""
],
[
"Daumé",
"Hal",
"III"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0908.0572
|
Piyush Rai
|
Piyush Rai, Hal Daum\'e III, Suresh Venkatasubramanian
|
Streamed Learning: One-Pass SVMs
| null |
IJCAI 2009
| null | null |
cs.LG stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a streaming model for large-scale classification (in the context
of $\ell_2$-SVM) by leveraging connections between learning and computational
geometry. The streaming model imposes the constraint that only a single pass
over the data is allowed. The $\ell_2$-SVM is known to have an equivalent
formulation in terms of the minimum enclosing ball (MEB) problem, and an
efficient algorithm based on the idea of \emph{core sets} exists (Core Vector
Machine, CVM). CVM learns a $(1+\varepsilon)$-approximate MEB for a set of
points and yields an approximate solution to corresponding SVM instance.
However CVM works in batch mode requiring multiple passes over the data. This
paper presents a single-pass SVM which is based on the minimum enclosing ball
of streaming data. We show that the MEB updates for the streaming case can be
easily adapted to learn the SVM weight vector in a way similar to using online
stochastic gradient updates. Our algorithm performs polylogarithmic computation
at each example, and requires very small and constant storage. Experimental
results show that, even in such restrictive settings, we can learn efficiently
in just one pass and get accuracies comparable to other state-of-the-art SVM
solvers (batch and online). We also give an analysis of the algorithm, and
discuss some open issues and possible extensions.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 00:40:23 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Rai",
"Piyush",
""
],
[
"Daumé",
"Hal",
"III"
],
[
"Venkatasubramanian",
"Suresh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0908.0583
|
Gene Golovchinsky
|
Jeremy Pickens, Gene Golovchinsky, Meredith Ringel Morris
|
Proceedings of 1st International Workshop on Collaborative Information
Seeking
|
Fixed some typos
| null | null | null |
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The goal of the workshop is to bring together researchers interested in
various aspects of small-team collaborative search to share ideas, to stimulate
research in the area, and to increase the visibility of this emerging area. We
expect to identify promising directions for further exploration and to
establish collaborative links among research groups. The workshop took place on
June 20, 2008 in Pittsburgh, Pennsylvania, USA, in conjunction with the JCDL
2008 conference.
The workshop was organized around three themes: practices, models, and
evaluation. We started with a discussion (still ongoing) about terminology,
about how to situate our work in the existing research space. We also wanted to
motivate our modeling and design discussions with real-world examples of
collaboration. We discussed examples from the healthcare domain, students,
faculty members, the military, and businesses such as pharmaceutical companies
that conduct research.
We discussed several models of collaborative information seeking, including
sense-making, communication, and information seeking theory based on Marcia
Bates' Berrypicking theory.
Finally, presenters described several systems that implement various aspects
of collaboration, including using search paths, simulations of user behavior to
model system performance, and characterizing properties of groups that lead to
more effective collaboration.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 04:32:38 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Aug 2009 18:23:08 GMT"
},
{
"version": "v3",
"created": "Fri, 7 Aug 2009 21:52:54 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Pickens",
"Jeremy",
""
],
[
"Golovchinsky",
"Gene",
""
],
[
"Morris",
"Meredith Ringel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.0586
|
Gene Golovchinsky
|
Meredith Ringel Morris and Jaime Teevan
|
Understanding Groups' Properties as a Means of Improving Collaborative
Search Systems
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/mortee
|
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Understanding the similar properties of people involved in group search
sessions has the potential to significantly improve collaborative search
systems; such systems could be enhanced by information retrieval algorithms and
user interface modifications that take advantage of important properties, for
example by re-ordering search results using information from group members'
combined user profiles. Understanding what makes group members similar can also
assist with the identification of groups, which can be valuable for connecting
users with others with whom they might undertake a collaborative search. In
this workshop paper, we describe our current research efforts towards studying
the properties of a variety of group types. We discuss properties of groups
that may be relevant to designers of collaborative search systems, and propose
ways in which understanding such properties could influence the design of
interfaces and algorithms for collaborative Web search.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 05:05:03 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Morris",
"Meredith Ringel",
""
],
[
"Teevan",
"Jaime",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.0587
|
I-Hong Hou
|
I-Hong Hou and P.R. Kumar
|
Scheduling Heterogeneous Real-Time Traffic over Fading Wireless Channels
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop a general approach for designing scheduling policies for real-time
traffic over wireless channels. We extend prior work, which characterizes a
real-time flow by its traffic pattern, delay bound, timely-throughput
requirement, and channel reliability, to allow time-varying channels, allow
clients to have different deadlines, and allow for the optional employment of
rate adaptation. Thus, our model allow the treatment of more realistic fading
channels as well as scenarios with mobile nodes, and the usage of more general
transmission strategies.
We derive a sufficient condition for a scheduling policy to be feasibility
optimal, and thereby establish a class of feasibility optimal policies. We
demonstrate the utility of the identified class by deriving a feasibility
optimal policy for the scenario with rate adaptation, time-varying channels,
and heterogeneous delay bounds. When rate adaptation is not available, we also
derive a feasibility optimal policy for time-varying channels. For the scenario
where rate adaptation is not available but clients have different delay bounds,
we describe a heuristic. Simulation results are also presented which indicate
the usefulness of the scheduling policies for more realistic and complex
scenarios.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 05:13:34 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Hou",
"I-Hong",
""
],
[
"Kumar",
"P. R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0588
|
Ke Xu
|
Ke Xu, Liandong Liu, Xiao Liang
|
Complex networks: A mixture of power-law and Weibull distributions
|
5 pages, 3 figures. Added a new finding about the degree distribution
| null | null | null |
cs.NI cond-mat.stat-mech physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Complex networks have recently aroused a lot of interest. However, network
edges are considered to be the same in almost all these studies. In this paper,
we present a simple classification method, which divides the edges of
undirected, unweighted networks into two types: p2c and p2p. The p2c edge
represents a hierarchical relationship between two nodes, while the p2p edge
represents an equal relationship between two nodes. It is surprising and
unexpected that for many real-world networks from a wide variety of domains
(including computer science, transportation, biology, engineering and social
science etc), the p2c degree distribution follows a power law more strictly
than the total degree distribution, while the p2p degree distribution follows
the Weibull distribution very well. Thus, the total degree distribution can be
seen as a mixture of power-law and Weibull distributions. More surprisingly, it
is found that in many cases, the total degree distribution can be better
described by the Weibull distribution, rather than a power law as previously
suggested. By comparing two topology models, we think that the origin of the
Weibull distribution in complex networks might be a mixture of both
preferential and random attachments when networks evolve.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 05:13:36 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Aug 2009 01:21:34 GMT"
},
{
"version": "v3",
"created": "Tue, 1 Sep 2009 06:15:52 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Xu",
"Ke",
""
],
[
"Liu",
"Liandong",
""
],
[
"Liang",
"Xiao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0908.0595
|
Gene Golovchinsky
|
Brynn M. Evans and Ed H. Chi
|
Towards a Model of Understanding Social Search
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/evachi
|
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Search engine researchers typically depict search as the solitary activity of
an individual searcher. In contrast, results from our critical-incident survey
of 150 users on Amazon's Mechanical Turk service suggest that social
interactions play an important role throughout the search process. Our main
contribution is that we have integrated models from previous work in
sensemaking and information seeking behavior to present a canonical social
model of user activities before, during, and after search, suggesting where in
the search process even implicitly shared information may be valuable to
individual searchers.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 17:09:45 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Evans",
"Brynn M.",
""
],
[
"Chi",
"Ed H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.0619
|
Arash Amini
|
Arash Amini and Farokh Marvasti
|
Deterministic Construction of Compressed Sensing Matrices using BCH
Codes
|
8 pages, 2 figures, 1 table
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce deterministic $m\times n$ RIP fulfilling $\pm 1$
matrices of order $k$ such that $\frac{\log m}{\log k}\approx \frac{\log(\log_2
n)}{\log(\log_2 k)}$. The columns of these matrices are binary BCH code vectors
that their zeros are replaced with -1 (excluding the normalization factor). The
samples obtained by these matrices can be easily converted to the original
sparse signal; more precisely, for the noiseless samples, the simple Matching
Pursuit technique, even with less than the common computational complexity,
exactly reconstructs the sparse signal. In addition, using Devore's binary
matrices, we expand the binary scheme to matrices with $\{0,1,-1\}$ elements.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 08:52:57 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Aug 2009 13:32:49 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Amini",
"Arash",
""
],
[
"Marvasti",
"Farokh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0660
|
Laurent Jacques
|
Laurent Jacques
|
A Short Note on Compressed Sensing with Partially Known Signal Support
| null | null | null |
TR-LJ-2009.02
|
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This short note studies a variation of the Compressed Sensing paradigm
introduced recently by Vaswani et al., i.e. the recovery of sparse signals from
a certain number of linear measurements when the signal support is partially
known. The reconstruction method is based on a convex minimization program
coined "innovative Basis Pursuit DeNoise" (or iBPDN). Under the common
$\ell_2$-fidelity constraint made on the available measurements, this
optimization promotes the ($\ell_1$) sparsity of the candidate signal over the
complement of this known part. In particular, this paper extends the results of
Vaswani et al. to the cases of compressible signals and noisy measurements. Our
proof relies on a small adaption of the results of Candes in 2008 for
characterizing the stability of the Basis Pursuit DeNoise (BPDN) program. We
emphasize also an interesting link between our method and the recent work of
Davenport et al. on the $\delta$-stable embeddings and the
"cancel-then-recover" strategy applied to our problem. For both approaches,
reconstructions are indeed stabilized when the sensing matrix respects the
Restricted Isometry Property for the same sparsity order. We conclude by
sketching an easy numerical method relying on monotone operator splitting and
proximal methods that iteratively solves iBPDN.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 12:46:59 GMT"
},
{
"version": "v2",
"created": "Sun, 21 Feb 2010 21:05:31 GMT"
}
] | 2010-02-21T00:00:00 |
[
[
"Jacques",
"Laurent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0667
|
Paolo Dini
|
Paolo Dini, Jaume Nin-Guerrero, Josep Mangues-Bafalluy, Lillian Dai,
Sateesh Addepalli
|
Interworking Scheme Using Optimized SIP Mobility for MultiHomed Mobile
Nodes in Wireless Heterogeneous Networks
| null | null | null | null |
cs.NI cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays, mobile users wish to use their multi-interface mobile devices to
access the Internet through network points of attachment (PoA) based on
heterogeneous wireless technologies. They also wish to seamlessly change the
PoAs during their ongoing sessions to improve service quality and/or reduce
monetary cost. If appropriately handled, multihomed mobile nodes offer a
potential solution to this issue. In this sense, the management of multihomed
mobile nodes in heterogeneous environment is a key research topic. In this
paper, we present an improvement of SIP mobility (pre-call plus mid-call
mobility) to support seamless mobility of multihomed mobile nodes in
heterogeneous wireless networks. Pre-call mobility is extended to associate
user identifier (i.e. SIP URI) and interface identifiers (i.e. IP addresses).
The multiple addresses of a mobile device are weighted by the user to create a
priority list in the SIP server so as to guarantee resilient reachability of
mobile nodes and to avoid unnecessary signaling through wireless links, thus
saving radio resources. Then, three variations of mid-call mobility, called
hard, hybrid and soft procedures, are also proposed. Their main aim is to
minimize, or even avoid, packet losses during interface switching at the mobile
node. The proposed solutions have been implemented in a wireless heterogeneous
testbed composed of 802.11 WLAN plus 3.5 cellular network, which are fully
controlled and configurable. The testbed has been used to study the performance
and the robustness of the three proposed mid-call mobility procedures.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 13:55:36 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Dini",
"Paolo",
""
],
[
"Nin-Guerrero",
"Jaume",
""
],
[
"Mangues-Bafalluy",
"Josep",
""
],
[
"Dai",
"Lillian",
""
],
[
"Addepalli",
"Sateesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0908.0697
|
Christian Wulff-Nilsen
|
Christian Wulff-Nilsen
|
Girth of a Planar Digraph with Real Edge Weights in O(n(log n)^3) Time
|
8 pages, no figures, zip file containing tex and pdf file
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The girth of a graph is the length of its shortest cycle. We give an
algorithm that computes in O(n(log n)^3) time and O(n) space the (weighted)
girth of an n-vertex planar digraph with arbitrary real edge weights. This is
an improvement of a previous time bound of O(n^(3/2)), a bound which was only
valid for non-negative edge-weights. Our algorithm can be modified to output a
shortest cycle within the same time and space bounds if such a cycle exists.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 15:59:23 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Wulff-Nilsen",
"Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.0703
|
Gene Golovchinsky
|
Max L. Wilson, m.c. schraefel
|
Evaluating Collaborative Search Interfaces with Information Seeking
Theory
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/wilsch
|
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Despite the many implicit references to the social aspects of search within
Information Seeking and Retrieval research, there has been relatively little
work that has specifically investigated the additional requirements for
collaborative search software. In this paper we re-assess a recent evaluation
framework, designed for individual information seeking experiences, to see a)
how it could still be applied to collaborative search software; b) how it could
produce additional requirements for collaborative search; and c) how it could
be extended in future work to be even more appropriate for collaborative search
evaluation. The position held after the assessment is that it can be used to
evaluate collaborative search software, while providing new insights into their
requirements. Finally, future work will validate the frameworks applicability
to collaborative search and investigate roles within collaborative groups as a
means to extend the framework.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 16:43:45 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Wilson",
"Max L.",
""
],
[
"schraefel",
"m. c.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.0704
|
Gene Golovchinsky
|
Gene Golovchinsky, Jeremy Pickens and Maribeth Back
|
A Taxonomy of Collaboration in Online Information Seeking
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/golpicbac
|
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
People can help other people find information in networked information
seeking environments. Recently, many such systems and algorithms have
proliferated in industry and in academia. Unfortunately, it is difficult to
compare the systems in meaningful ways because they often define collaboration
in different ways. In this paper, we propose a model of possible kinds of
collaboration, and illustrate it with examples from literature. The model
contains four dimensions: intent, depth, concurrency and location. This model
can be used to classify existing systems and to suggest possible opportunities
for design in this space.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 16:48:18 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Golovchinsky",
"Gene",
""
],
[
"Pickens",
"Jeremy",
""
],
[
"Back",
"Maribeth",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.0709
|
Gene Golovchinsky
|
Chirag Shah
|
Toward Collaborative Information Seeking (CIS)
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/sha
|
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is natural for humans to collaborate while dealing with complex problems.
In this article I consider this process of collaboration in the context of
information seeking. The study and discussion presented here are driven by two
dissatisfactions: (1) the majority of IR systems today do not facilitate
collaboration directly, and (2) the concept of collaboration itself is not
well-understood. I begin by probing the notion of collaboration and propose a
model that helps us understand the requirements for a successful collaboration.
A model of a Collaborative Information Seeking (CIS) environment is then
rendered based on an extended model of information seeking.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 17:33:03 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Shah",
"Chirag",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.0711
|
Hongyi Yao
|
Hongyi Yao, Sidharth Jaggi, Minghua Chen
|
Passive network tomography for erroneous networks: A network coding
approach
|
40 pages, under submission for IEEE Trans. on Information Theory
| null |
10.1109/TIT.2012.2204532
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Passive network tomography uses end-to-end observations of network
communication to characterize the network, for instance to estimate the network
topology and to localize random or adversarial glitches. Under the setting of
linear network coding this work provides a comprehensive study of passive
network tomography in the presence of network (random or adversarial) glitches.
To be concrete, this work is developed along two directions: 1. Tomographic
upper and lower bounds (i.e., the most adverse conditions in each problem
setting under which network tomography is possible, and corresponding schemes
(computationally efficient, if possible) that achieve this performance) are
presented for random linear network coding (RLNC). We consider RLNC designed
with common randomness, i.e., the receiver knows the random code-books all
nodes. (To justify this, we show an upper bound for the problem of topology
estimation in networks using RLNC without common randomness.) In this setting
we present the first set of algorithms that characterize the network topology
exactly. Our algorithm for topology estimation with random network errors has
time complexity that is polynomial in network parameters. For the problem of
network error localization given the topology information, we present the first
computationally tractable algorithm to localize random errors, and prove it is
computationally intractable to localize adversarial errors. 2. New network
coding schemes are designed that improve the tomographic performance of RLNC
while maintaining the desirable low-complexity, throughput-optimal, distributed
linear network coding properties of RLNC. In particular, we design network
codes based on Reed-Solomon codes so that a maximal number of adversarial
errors can be localized in a computationally efficient manner even without the
information of network topology.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 17:35:10 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Oct 2009 13:30:41 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Apr 2010 09:28:38 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Yao",
"Hongyi",
""
],
[
"Jaggi",
"Sidharth",
""
],
[
"Chen",
"Minghua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0722
|
Osameh Al-Kofahi
|
Osameh M. Al-Kofahi and Ahmed E. Kamal
|
Max-Flow Protection using Network Coding
|
9 pages, submitted to INFOCOM 2010
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In any communication network, the maximum number of link-disjoint paths
between any pair of communicating nodes, S and T, is limited by the S-T minimum
link-cut. Multipath routing protocols have been proposed in the literature to
make use of these S-T paths in enhancing the survivability of the S-T
information flow. This is usually accomplished by using a subset of these paths
to forward redundant data units or combinations (if network coding is allowed)
from S to T. Therefore, this enhancement in survivability reduces the useful
S-T information rate. In this paper we present a new way to enhance the
survivability of the S-T information flow without compromising the maximum
achievable S-T information rate. To do this, bottleneck links (in the min-cut)
should only forward useful information, and not redundant data units. We
introduce the idea of extra source or destination connectivity with respect to
a certain S-T max-flow, and then we study two problems: namely, pre-cut
protection and post-cut protection. Although our objective in both problems is
the same, where we aim to maximize the number of protected paths, our analysis
shows that the nature of these two problems are very different, and that the
pre-cut protection problem is much harder. Specifically, we prove the hardness
of the pre-cut protection problem, formulate it as an integer linear program,
and propose a heuristic approach to solve it. Simulations show that the
performance of the heuristic is acceptable even on relatively large networks.
In the post-cut problem we show that all the data units, forwarded by the
min-cut edges not incident to T, can be post-cut-protected.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 18:36:37 GMT"
}
] | 2009-08-06T00:00:00 |
[
[
"Al-Kofahi",
"Osameh M.",
""
],
[
"Kamal",
"Ahmed E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0744
|
Gongguo Tang
|
Gongguo Tang and Arye Nehorai
|
Performance analysis for sparse support recovery
|
Submitted to IEEE Trans. Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The performance of estimating the common support for jointly sparse signals
based on their projections onto lower-dimensional space is analyzed. Support
recovery is formulated as a multiple-hypothesis testing problem. Both upper and
lower bounds on the probability of error are derived for general measurement
matrices, by using the Chernoff bound and Fano's inequality, respectively. The
upper bound shows that the performance is determined by a quantity measuring
the measurement matrix incoherence, while the lower bound reveals the
importance of the total measurement gain. The lower bound is applied to derive
the minimal number of samples needed for accurate direction-of-arrival (DOA)
estimation for a sparse representation based algorithm. When applied to
Gaussian measurement ensembles, these bounds give necessary and sufficient
conditions for a vanishing probability of error for majority realizations of
the measurement matrix. Our results offer surprising insights into sparse
signal recovery. For example, as far as support recovery is concerned, the
well-known bound in Compressive Sensing with the Gaussian measurement matrix is
generally not sufficient unless the noise level is low. Our study provides an
alternative performance measure, one that is natural and important in practice,
for signal recovery in Compressive Sensing and other application areas
exploiting signal sparsity.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 20:12:02 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Nov 2009 15:19:48 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Tang",
"Gongguo",
""
],
[
"Nehorai",
"Arye",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0753
|
Heide Gluesing-Luerssen
|
H. Gluesing-Luerssen, U. Helmke, J. I. Iglesias Curto
|
Algebraic Decoding for Doubly Cyclic Convolutional Codes
|
16 pages
| null | null | null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An iterative decoding algorithm for convolutional codes is presented. It
successively processes $N$ consecutive blocks of the received word in order to
decode the first block. A bound is presented showing which error configurations
can be corrected. The algorithm can be efficiently used on a particular class
of convolutional codes, known as doubly cyclic convolutional codes. Due to
their highly algebraic structure those codes are well suited for the algorithm
and the main step of the procedure can be carried out using Reed-Solomon
decoding. Examples illustrate the decoding and a comparison with existing
algorithms is being made.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 20:31:53 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Gluesing-Luerssen",
"H.",
""
],
[
"Helmke",
"U.",
""
],
[
"Curto",
"J. I. Iglesias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0908.0764
|
Gene Golovchinsky
|
Madhu Reddy and Bernard J. Jansen
|
Learning about Potential Users of Collaborative Information Retrieval
Systems
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/redjan
|
cs.IR cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the key components of designing usable and useful collaborative
information retrieval systems is to understand the needs of the users of these
systems. Our research team has been exploring collaborative information
behavior in a variety of organizational settings. Our research goals have been
two-fold: First, to develop a conceptual understanding of collaborative
information behavior and second, gather requirements for the design of
collaborative information retrieval systems. In this paper, we present a brief
overview of our fieldwork in a three different organizational settings, discuss
our methodology for collecting data on collaborative information behavior, and
highlight some lessons that we are learning about potential users of
collaborative information retrieval systems in these domains.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 21:54:21 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Reddy",
"Madhu",
""
],
[
"Jansen",
"Bernard J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.0772
|
Daniel Golovin
|
Daniel Golovin, Andreas Krause, and Matthew Streeter
|
Online Learning of Assignments that Maximize Submodular Functions
|
12 pages
| null | null |
0908.0772
|
cs.LG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Which ads should we display in sponsored search in order to maximize our
revenue? How should we dynamically rank information sources to maximize value
of information? These applications exhibit strong diminishing returns:
Selection of redundant ads and information sources decreases their marginal
utility. We show that these and other problems can be formalized as repeatedly
selecting an assignment of items to positions to maximize a sequence of
monotone submodular functions that arrive one by one. We present an efficient
algorithm for this general problem and analyze it in the no-regret model. Our
algorithm possesses strong theoretical guarantees, such as a performance ratio
that converges to the optimal constant of 1-1/e. We empirically evaluate our
algorithm on two real-world online optimization problems on the web: ad
allocation with submodular utilities, and dynamically ranking blogs to detect
information cascades.
|
[
{
"version": "v1",
"created": "Wed, 5 Aug 2009 23:56:22 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Golovin",
"Daniel",
""
],
[
"Krause",
"Andreas",
""
],
[
"Streeter",
"Matthew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.0775
|
Andrea Baronchelli
|
Andrea Baronchelli, Tao Gong, Andrea Puglisi, Vittorio Loreto
|
Modeling the emergence of universality in color naming patterns
|
Supplementery Information available here
http://www.pnas.org/content/107/6/2403/suppl/DCSupplemental
|
Proc. Natl. Acad. Sci. USA 107, 2403 (2010)
|
10.1073/pnas.0908533107
| null |
physics.soc-ph cond-mat.stat-mech cs.GT cs.MA q-bio.PE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The empirical evidence that human color categorization exhibits some
universal patterns beyond superficial discrepancies across different cultures
is a major breakthrough in cognitive science. As observed in the World Color
Survey (WCS), indeed, any two groups of individuals develop quite different
categorization patterns, but some universal properties can be identified by a
statistical analysis over a large number of populations. Here, we reproduce the
WCS in a numerical model in which different populations develop independently
their own categorization systems by playing elementary language games. We find
that a simple perceptual constraint shared by all humans, namely the human Just
Noticeable Difference (JND), is sufficient to trigger the emergence of
universal patterns that unconstrained cultural interaction fails to produce. We
test the results of our experiment against real data by performing the same
statistical analysis proposed to quantify the universal tendencies shown in the
WCS [Kay P and Regier T. (2003) Proc. Natl. Acad. Sci. USA 100: 9085-9089], and
obtain an excellent quantitative agreement. This work confirms that synthetic
modeling has nowadays reached the maturity to contribute significantly to the
ongoing debate in cognitive science.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 13:54:20 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Jul 2010 09:42:11 GMT"
}
] | 2010-07-09T00:00:00 |
[
[
"Baronchelli",
"Andrea",
""
],
[
"Gong",
"Tao",
""
],
[
"Puglisi",
"Andrea",
""
],
[
"Loreto",
"Vittorio",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
}
] |
0908.0794
|
Li Li
|
Li Li, Yudong Chen
|
Quantization Errors of Modulo Sigma-Delta Modulated ARMA Processes
|
An abbreviated version of this paper had been published as Li Li,
Yudong Chen, "Quantization errors of modulo sigma-delta modulated ARMA
processes," Proceedings of IEEE China Summit & International Conference on
Signal and Information Processing, pp. 86-90, 2013
| null |
10.1109/ChinaSIP.2013.6625303
| null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the quantization errors of modulo sigma-delta
modulated finite, asymptotically-infinite, infinite causal stable ARMA
processes. We prove that the normalized quantization error can be taken as a
uniformly distributed white noise for all the cases. Moreover, we find that
this nice property is guaranteed by two different mechanisms: the high-enough
quantization resolution \cite{Bennett1948}-\cite{WidrowKollar2008} and the
asymptotic convergence of quantization errors for some quasi-stationary
processes \cite{ChouGray1991}-\cite{LiChenLiZhang2009}, for different cases.
But the assumption of the smooth density of the sampled random processes is
needed in all the cases.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 06:20:37 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Aug 2009 12:58:43 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Jun 2014 14:42:34 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Li",
"Li",
""
],
[
"Chen",
"Yudong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0812
|
Silvio Valenti
|
Dario Rossi, Claudio Testa, Silvio Valenti, Paolo Veglia, Luca
Muscariello
|
News from the Internet congestion control world
|
9 pages, 4 figures, submitted to IEEE INFOCOM 2010
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A few months ago, the BitTorrent developers announced that the transfer of
torrent data in the official client was about to switch to uTP, an
application-layer congestion-control protocol using UDP at the transport-layer.
This announcement immediately raised an unmotivated buzz about a new, imminent
congestion collapse of the whole Internet. Though this reaction was not built
on solid technical foundation, nevertheless a legitimate question remains:
i.e., whether this novel algorithm is a necessary building block for future
Internet applications, or whether it may result in an umpteenth addition to the
already well populated world of Internet congestion control algorithms.
In this paper, we tackle precisely this issue. The novel protocol is now
under discussion at the IETF LEDBAT working group, and has been defined in a
draft document in March 2009, whose adoption decision will be taken at the
beginning of August 2009. Adhering to the IETF draft definition, we implement
the LEDBAT congestion control algorithm and investigate its performance by
means of packet-level simulations. Considering a simple bottleneck scenario
where LEDBAT competes against either TCP or other LEDBAT flows, we evaluate the
fairness of the resource share as well as its efficiency. Our preliminary
results show that indeed, there is an undoubted appeal behind the novel
application-layer congestion-control protocol. Yet, care must be taken in order
to ensure that some important points, such as intra-protocol fairness, are
fully clarified in the draft specification -- which we hope that this work can
contribute to.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 08:45:18 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Rossi",
"Dario",
""
],
[
"Testa",
"Claudio",
""
],
[
"Valenti",
"Silvio",
""
],
[
"Veglia",
"Paolo",
""
],
[
"Muscariello",
"Luca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0828
|
Andrew Adamatzky
|
Genaro J. Martinez, Andrew Adamatzky, Harold V. McIntosh
|
Localization dynamics in a binary two-dimensional cellular automaton:
the Diffusion Rule
|
Accepted to Journal of Cellular Automata
| null |
10.1007/978-1-84996-217-9_16
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a two-dimensional cellular automaton (CA), called Diffusion Rule
(DR), which exhibits diffusion-like dynamics of propagating patterns. In
computational experiments we discover a wide range of mobile and stationary
localizations (gliders, oscillators, glider guns, puffer trains, etc), analyze
spatio-temporal dynamics of collisions between localizations, and discuss
possible applications in unconventional computing.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 09:33:34 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Martinez",
"Genaro J.",
""
],
[
"Adamatzky",
"Andrew",
""
],
[
"McIntosh",
"Harold V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0908.0833
|
Petr Ivankov
|
Petr R. Ivankov
|
Top-down Paradigm in Engineering Software Integration
|
29 pages, 44 figures, 5 references
| null | null | null |
cs.CE cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The top-down approach of engineering software integration is considered in
this parer. A set of advantages of this approach are presented, by examples.
All examples are supplied by open source code.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 12:21:22 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Ivankov",
"Petr R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.0850
|
Andrew Adamatzky
|
Andrew Adamatzky
|
Steering plasmodium with light: Dynamical programming of Physarum
machine
|
Accepted for publication in New Mathematics and Natural Computation
Journal (April, 2009)
| null | null | null |
nlin.PS cs.ET nlin.AO q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A plasmodium of Physarum polycephalum is a very large cell visible by unaided
eye. The plasmodium is capable for distributed sensing, parallel information
processing, and decentralized optimization. It is an ideal substrate for future
and emerging bio-computing devices. We study space-time dynamics of plasmodium
reactiom to localised illumination, and provide analogies between propagating
plasmodium and travelling wave-fragments in excitable media. We show how
plasmodium-based computing devices can be precisely controlled and shaped by
planar domains of illumination.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 12:23:34 GMT"
}
] | 2012-08-14T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
]
] |
[
{
"class": "Physics",
"code": "nlin.PS",
"description": "Pattern formation, coherent structures, solitons",
"span": "(Pattern Formation and Solitons)"
},
{
"class": "Computer Science",
"code": "cs.ET",
"description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.",
"span": "(Emerging Technologies)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0908.0853
|
Andrew Adamatzky
|
Andrew Adamatzky, Genaro Martinez, Liang Zhang, Andrew Wuensche
|
Operating binary strings using gliders and eaters in reaction-diffusion
cellular automaton
| null |
Mathematical and Computer Modelling, Volume 52, Issues 1-2, July
2010, Pages 177-190
|
10.1016/j.mcm.2010.02.006
| null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study transformations of 2-, 4- and 6-bit numbers in interactions between
traveling and stationary localizations in the Spiral Rule reaction-diffusion
cellular automaton. The Spiral Rule automaton is a hexagonal ternary-state
two-dimensional cellular automaton -- a finite-state machine imitation of an
activator-inhibitor reaction-diffusion system. The activator is self-inhibited
in certain concentrations. The inhibitor dissociates in the absence of the
activator. The Spiral Rule cellular automaton has rich spatio-temporal dynamics
of traveling (glider) and stationary (eater) patterns. When a glider brushes an
eater the eater may slightly change its configuration, which is updated once
more every next hit. We encode binary strings in the states of eaters and
sequences of gliders. We study what types of binary compositions of binary
strings are implementable by sequences of gliders brushing an eater. The models
developed will be used in future laboratory designs of reaction-diffusion
chemical computers.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 12:42:05 GMT"
}
] | 2010-11-23T00:00:00 |
[
[
"Adamatzky",
"Andrew",
""
],
[
"Martinez",
"Genaro",
""
],
[
"Zhang",
"Liang",
""
],
[
"Wuensche",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0908.0856
|
Tobias Renk
|
Tobias Renk, Holger Jaekel, Friedrich K. Jondral, Deniz Gunduz, Andrea
Goldsmith
|
Outage Capacity of Incremental Relaying at Low Signal-to-Noise Ratios
|
5 pages, 4 figures, to be presented at VTC Fall 2009 in Anchorage,
Alaska
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present the \epsilon-outage capacity of incremental relaying at low
signal-to-noise ratios (SNR) in a wireless cooperative network with slow
Rayleigh fading channels. The relay performs decode-and-forward and repetition
coding is employed in the network, which is optimal in the low SNR regime. We
derive an expression on the optimal relay location that maximizes the
\epsilon-outage capacity. It is shown that this location is independent of the
outage probability and SNR but only depends on the channel conditions
represented by a path-loss factor. We compare our results to the
\epsilon-outage capacity of the cut-set bound and demonstrate that the ratio
between the \epsilon-outage capacity of incremental relaying and the cut-set
bound lies within 1/\sqrt{2} and 1. Furthermore, we derive lower bounds on the
\epsilon-outage capacity for the case of K relays.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 13:06:26 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Renk",
"Tobias",
""
],
[
"Jaekel",
"Holger",
""
],
[
"Jondral",
"Friedrich K.",
""
],
[
"Gunduz",
"Deniz",
""
],
[
"Goldsmith",
"Andrea",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0893
|
Moustafa Seifeldin
|
Moustafa Seifeldin and Moustafa Youssef
|
Nuzzer: A Large-Scale Device-Free Passive Localization System for
Wireless Environments
|
9 pages
| null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The widespread usage of wireless local area networks and mobile devices has
fostered the interest in localization systems for wireless environments. The
majority of research in the context of wireless-based localization systems has
focused on device-based active localization, in which a device is attached to
tracked entities. Recently, device-free passive localization (DfP) has been
proposed where the tracked entity is neither required to carry devices nor
participate actively in the localization process. DfP systems are based on the
fact that RF signals are affected by the presence of people and objects in the
environment. The DfP concept enables a wide range of applications including
intrusion detection and tracking, border protection, and smart buildings
automation. Previous studies have focused on small areas with direct line of
sight and/or controlled environments. In this paper, we present the design,
implementation and analysis of Nuzzer, a large-scale device-free passive
localization system for real environments.
Without any additional hardware, it makes use of the already installed
wireless data networks to monitor and process changes in the received signal
strength (RSS) transmitted from access points at one or more monitoring points.
We present probabilistic techniques for DfP localization and evaluate their
performance in a typical office building, rich in multipath, with an area of
1500 square meters. Our results show that the Nuzzer system gives device-free
location estimates with less than 2 meters median distance error using only two
monitoring laptops and three access points. This indicates the suitability of
Nuzzer to a large number of application domains.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 15:31:12 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Seifeldin",
"Moustafa",
""
],
[
"Youssef",
"Moustafa",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0908.0898
|
Onur Ozan Koyluoglu
|
O. Ozan Koyluoglu, C. Emre Koksal, and Hesham El Gamal
|
On Secrecy Capacity Scaling in Wireless Networks
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work studies the achievable secure rate per source-destination pair in
wireless networks. First, a path loss model is considered, where the legitimate
and eavesdropper nodes are assumed to be placed according to Poisson point
processes with intensities $\lambda$ and $\lambda_e$, respectively. It is shown
that, as long as $\lambda_e/\lambda=o((\log n)^{-2})$, almost all of the nodes
achieve a perfectly secure rate of $\Omega(\frac{1}{\sqrt{n}})$ for the
extended and dense network models. Therefore, under these assumptions, securing
the network does not entail a loss in the per-node throughput. The
achievability argument is based on a novel multi-hop forwarding scheme where
randomization is added in every hop to ensure maximal ambiguity at the
eavesdropper(s). Secondly, an ergodic fading model with $n$ source-destination
pairs and $n_e$ eavesdroppers is considered. Employing the ergodic interference
alignment scheme with an appropriate secrecy pre-coding, each user is shown to
achieve a constant positive secret rate for sufficiently large $n$. Remarkably,
the scheme does not require eavesdropper CSI (only the statistical knowledge is
assumed) and the secure throughput per node increases as we add more legitimate
users to the network in this setting. Finally, the effect of eavesdropper
collusion on the performance of the proposed schemes is characterized.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 18:58:19 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Apr 2010 02:50:27 GMT"
}
] | 2010-04-13T00:00:00 |
[
[
"Koyluoglu",
"O. Ozan",
""
],
[
"Koksal",
"C. Emre",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0912
|
Gene Golovchinsky
|
Colum Foley and Alan F. Smeaton
|
Evaluation of Coordination Techniques in Synchronous Collaborative
Information Retrieval
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/folsme
|
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditional Information Retrieval (IR) research has focussed on a single user
interaction modality, where a user searches to satisfy an information need.
Recent advances in web technologies and computer hardware have enabled multiple
users to collaborate on many computer-supported tasks, therefore there is an
increasing opportunity to support two or more users searching together at the
same time in order to satisfy a shared information need, which we refer to as
Synchronous Collaborative Information Retrieval (SCIR). SCIR systems represent
a significant paradigmatic shift from traditional IR systems. In order to
support effective SCIR, new techniques are required to coordinate users'
activities. In addition, the novel domain of SCIR presents challenges for
effective evaluations of these systems. In this paper we will propose an
effective and re-usable evaluation methodology based on simulating users
searching together. We will outline how we have used this evaluation in
empirical studies of the effects of different division of labour and sharing of
knowledge techniques for SCIR.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 17:23:01 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Foley",
"Colum",
""
],
[
"Smeaton",
"Alan F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.0919
|
Gene Golovchinsky
|
Frank Hopfgartner, David Vallet, Martin Halvey and Joemon Jose
|
Collaborative Search Trails for Video Search
|
Presented at 1st Intl Workshop on Collaborative Information Seeking,
2008 (arXiv:0908.0583)
| null | null |
JCDL2008CIRWS/2008/hopvalhaljos
|
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present an approach for supporting users in the difficult
task of searching for video. We use collaborative feedback mined from the
interactions of earlier users of a video search system to help users in their
current search tasks. Our objective is to improve the quality of the results
that users find, and in doing so also assist users to explore a large and
complex information space. It is hoped that this will lead to them considering
search options that they may not have considered otherwise. We performed a user
centred evaluation. The results of our evaluation indicate that we achieved our
goals, the performance of the users in finding relevant video clips was
enhanced with our system; users were able to explore the collection of video
clips more and users demonstrated a preference for our system that provided
recommendations.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 17:28:21 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Hopfgartner",
"Frank",
""
],
[
"Vallet",
"David",
""
],
[
"Halvey",
"Martin",
""
],
[
"Jose",
"Joemon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.0928
|
Grenville Croll
|
Angus Dunn
|
Automated Spreadsheet Development
|
8 Pages, 3 Colour Figures
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 39-46
ISBN 978-1-905617-89-0
| null | null |
cs.HC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Few major commercial or economic decisions are made today which are not
underpinned by analysis using spreadsheets. It is virtually impossible to avoid
making mistakes during their drafting and some of these errors remain, unseen
and uncorrected, until something turns the spotlight on them. By then it may be
too late. The challenge is to find a way of creating spreadsheets which will
preserve the benefit of their power and flexibility while making their creation
more transparent and safer. Full documentation and documented version and
quality control, section by section, of the eventual spreadsheet would be a
bonus. And if the whole process could be made quicker, too, that would be a
further bonus.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 18:33:10 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Dunn",
"Angus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.0930
|
Grenville Croll
|
Bill Bekenn, Ray Hooper
|
Some Spreadsheet Poka-Yoke
|
12 Pages, 8 Colour Figures
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 83-94
ISBN 978-1-905617-89-0
| null | null |
cs.HC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Whilst not all spreadsheet defects are structural in nature, poor layout
choices can compromise spreadsheet quality. These defects may be avoided at the
development stage by some simple mistake prevention and detection devices.
Poka-Yoke (Japanese for Mistake Proofing), which owes its genesis to the Toyota
Production System (the standard for manufacturing excellence throughout the
world) offers some principles that may be applied to reducing spreadsheet
defects. In this paper we examine spreadsheet structure and how it can lead to
defects and illustrate some basic spreadsheet Poka-Yokes to reduce them. These
include guidelines on how to arrange areas of cells so that whole rows and
columns can be inserted anywhere without causing errors, and rules for when to
use relative and absolute references with respect to what type of area is being
referred to.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 18:41:34 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Bekenn",
"Bill",
""
],
[
"Hooper",
"Ray",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.