id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0908.0932
Grenville Croll
M. Sriram Iyengar, John R. Svirbely
The Medical Algorithms Project
6 Pages, 2 Colour Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 113-118 ISBN 978-1-905617-89-0
null
null
cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Medical Algorithms Project, a web-based resource located at www.medal.org, is the world's largest collection of medical-related spreadsheets, consisting of over 13,500 Excel spreadsheets each encoding a medical algorithm from 45 different areas of medical practice. This free resource is in use worldwide with over 106,000 registered users as of March 1, 2009.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 18:52:41 GMT" } ]
2009-08-07T00:00:00
[ [ "Iyengar", "M. Sriram", "" ], [ "Svirbely", "John R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.0935
Grenville Croll
Ruth McKeever, Kevin McDaid, Brian Bishop
An Exploratory Analysis of the Impact of Named Ranges on the Debugging Performance of Novice Users
13 Pages, 4 Figures. Winner of the 2009 David Chadwick Prize for Best Student Paper
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 69-81 ISBN 978-1-905617-89-0
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes an exploratory empirical study of the effect of named ranges on spreadsheet debugging performance. Named ranges are advocated in both academia and industry, yet no experimental evidence has been cited to back up these recommendations. This paper describes an exploratory experiment involving 21 participants that assesses the performance of novices debugging a spreadsheet containing named ranges. The results are compared with the performance of a different set of novices debugging the same spreadsheet without named ranges. The findings suggest that novice users debug on average significantly fewer errors if the spreadsheet contains named ranges. The purpose of the investigative study is to derive a detailed and coherent set of research questions regarding the impact of range names on the debugging performance and behaviour of spreadsheet users. These will be answered through future controlled experiments.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 19:03:02 GMT" } ]
2009-08-07T00:00:00
[ [ "McKeever", "Ruth", "" ], [ "McDaid", "Kevin", "" ], [ "Bishop", "Brian", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.0939
William White III
Eddie White
Clustering for Improved Learning in Maze Traversal Problem
29 pages, 15 figures, Undergraduate Honors Thesis
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The maze traversal problem (finding the shortest distance to the goal from any position in a maze) has been an interesting challenge in computational intelligence. Recent work has shown that the cellular simultaneous recurrent neural network (CSRN) can solve this problem for simple mazes. This thesis focuses on exploiting relevant information about the maze to improve learning and decrease the training time for the CSRN to solve mazes. Appropriate variables are identified to create useful clusters using relevant information. The CSRN was next modified to allow for an additional external input. With this additional input, several methods were tested and results show that clustering the mazes improves the overall learning of the traversal problem for the CSRN.
[ { "version": "v1", "created": "Thu, 6 Aug 2009 19:48:20 GMT" } ]
2009-08-07T00:00:00
[ [ "White", "Eddie", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0908.0968
Yuval Emek
Yuval Emek, Amos Korman, and Yuval Shavitt
Approximating the Statistics of various Properties in Randomly Weighted Graphs
22 pages (excluding the title page)
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider the setting of \emph{randomly weighted graphs}, namely, graphs whose edge weights are chosen independently according to probability distributions with finite support over the non-negative reals. Under this setting, properties of weighted graphs typically become random variables and we are interested in computing their statistical features. Unfortunately, this turns out to be computationally hard for some properties albeit the problem of computing them in the traditional setting of algorithmic graph theory is tractable. For example, there are well known efficient algorithms that compute the \emph{diameter} of a given weighted graph, yet, computing the \emph{expected} diameter of a given randomly weighted graph is \SharpP{}-hard even if the edge weights are identically distributed. In this paper, we define a family of properties of weighted graphs and show that for each property in this family, the problem of computing the \emph{$k^{\text{th}}$ moment} (and in particular, the expected value) of the corresponding random variable in a given randomly weighted graph $G$ admits a \emph{fully polynomial time randomized approximation scheme (FPRAS)} for every fixed $k$. This family includes fundamental properties of weighted graphs such as the diameter of $G$, the \emph{radius} of $G$ (with respect to any designated vertex) and the weight of a \emph{minimum spanning tree} of $G$.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 05:53:45 GMT" }, { "version": "v2", "created": "Fri, 6 Nov 2009 15:16:47 GMT" }, { "version": "v3", "created": "Fri, 25 Dec 2009 17:29:32 GMT" }, { "version": "v4", "created": "Sun, 28 Mar 2010 18:23:28 GMT" } ]
2010-03-30T00:00:00
[ [ "Emek", "Yuval", "" ], [ "Korman", "Amos", "" ], [ "Shavitt", "Yuval", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.0979
R Doomun
A. Damodaram, H. Jayasri
Authentication Without Identification using Anonymous Credential System
4 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely due to privacy and security concerns. The solution is to perform authentication without identification. In fact, all on-line actions should be as anonymous as possible, for this is the only way to guarantee security for the overall system. A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 04:02:05 GMT" } ]
2009-08-10T00:00:00
[ [ "Damodaram", "A.", "" ], [ "Jayasri", "H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.0980
R Doomun
Syed S. Rizvi, Khaled M. Elleithy, Aasia Riasat
Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks
9 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Multiuser receivers suffer from their relatively higher computational complexity that prevents widespread use of this technique. In addition, one of the main characteristics of multi-channel communications that can severely degrade the performance is the inconsistent and low values of SNR that result in high BER and poor channel capacity. It has been shown that the computational complexity of a multiuser receiver can be reduced by using the transformation matrix (TM) algorithm [4]. In this paper, we provide quantification of SNR based on the computational complexity of TM algorithm. We show that the reduction of complexity results high and consistent values of SNR that can consequently be used to achieve a desirable BER performance. In addition, our simulation results suggest that the high and consistent values of SNR can be achieved for a desirable BER performance. The performance measure adopted in this paper is the consistent values of SNR.
[ { "version": "v1", "created": "Sun, 9 Aug 2009 06:57:39 GMT" } ]
2009-08-10T00:00:00
[ [ "Rizvi", "Syed S.", "" ], [ "Elleithy", "Khaled M.", "" ], [ "Riasat", "Aasia", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0981
R Doomun
Syed S. Rizvi, and Khaled M. Elleithy
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
ISSN 1947 5500
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation of all active nodes. However, supporting a MANET is a cost-intensive activity for a mobile node. From a single mobile node perspective, the detection of routes as well as forwarding packets consume local CPU time, memory, network-bandwidth, and last but not least energy. We believe that this is one of the main factors that strongly motivate a mobile node to deny packet forwarding for others, while at the same time use their services to deliver its own data. This behavior of an independent mobile node is commonly known as misbehaving or selfishness. A vast amount of research has already been done for minimizing malicious behavior of mobile nodes. However, most of them focused on the methods/techniques/algorithms to remove such nodes from the MANET. We believe that the frequent elimination of such miss-behaving nodes never allowed a free and faster growth of MANET. This paper provides a critical analysis of the recent research wok and its impact on the overall performance of a MANET. In this paper, we clarify some of the misconceptions in the understating of selfishness and miss-behavior of nodes. Moreover, we propose a mathematical model that based on the time division technique to minimize the malicious behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our proposed approach not only improves the resource sharing but also creates a consistent trust and cooperation (CTC) environment among the mobile nodes. The simulation results demonstrate the success of the proposed approach that significantly minimizes the malicious nodes and consequently maximizes the overall throughput of MANET than other well known schemes.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 04:33:50 GMT" }, { "version": "v2", "created": "Sun, 9 Aug 2009 07:01:54 GMT" } ]
2009-08-10T00:00:00
[ [ "Rizvi", "Syed S.", "" ], [ "Elleithy", "Khaled M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0982
R Doomun
Maryam Hosseini-Pozveh, Mohamadali Nematbakhsh, Naser Movahhedinia
A multidimensional approach for context-aware recommendation in mobile commerce
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
ISSN 1947 5500
cs.CY cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Context as the dynamic information describing the situation of items and users and affecting the users decision process is essential to be used by recommender systems in mobile commerce to guarantee the quality of recommendation. This paper proposes a novel multidimensional approach for context aware recommendation in mobile commerce. The approach represents users, items, context information and the relationship between them in a multidimensional space. It then determines the usage patterns of each user under different contextual situations and creates a new 2 dimensional recommendation space and does the final recommendation in that space. This paper also represents an evaluation process by implementing the proposed approach in a restaurant food recommendation system considering day, time, weather and companion as the contextual information and comparing the approach with the traditional 2 dimensional one. The results of comparison illustrates that the multidimensional approach increases the recommendation quality.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 04:50:30 GMT" } ]
2009-08-10T00:00:00
[ [ "Hosseini-Pozveh", "Maryam", "" ], [ "Nematbakhsh", "Mohamadali", "" ], [ "Movahhedinia", "Naser", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0908.0984
R Doomun
C. Balasubramanian, K. Duraiswamy
An Application of Bayesian classification to Interval Encoded Temporal mining with prioritized items
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
ISSN 1947 5500
cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In real life, media information has time attributes either implicitly or explicitly known as temporal data. This paper investigates the usefulness of applying Bayesian classification to an interval encoded temporal database with prioritized items. The proposed method performs temporal mining by encoding the database with weighted items which prioritizes the items according to their importance from the user perspective. Naive Bayesian classification helps in making the resulting temporal rules more effective. The proposed priority based temporal mining (PBTM) method added with classification aids in solving problems in a well informed and systematic manner. The experimental results are obtained from the complaints database of the telecommunications system, which shows the feasibility of this method of classification based temporal mining.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 05:36:51 GMT" } ]
2009-08-10T00:00:00
[ [ "Balasubramanian", "C.", "" ], [ "Duraiswamy", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0908.0986
Abdulqader El-Sayed
Abdulqader M. El-Sayed
Ethernet Networks: Current Trends and Tools
Proceedings of IEEE International Conference on Advanced Information Networking and Applications, 8 pages
null
null
TR-G14-2009
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ethernet topology discovery has gained increasing interest in the recent years. This trend is motivated mostly by increasing number of carrier Ethernet networks as well as the size of these networks, and consequently the increasing sales of these networks. To manage these networks efficiently, detailed and accurate knowledge of their topology is needed. Knowledge of a network's entities and the physical connections between them can be useful in various prospective. Administrators can use topology information for network planning and fault detecting. Topology information can also be used during protocol and routing algorithm development, for performance prediction and as a basis for accurate network simulations. From a network security perspective, threat detection, network monitoring, network access control and forensic investigations can benefit from accurate network topology information. In this paper, we analyze market trends and investigate current tools available for both research and commercial purposes.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 05:59:25 GMT" } ]
2009-08-10T00:00:00
[ [ "El-Sayed", "Abdulqader M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.0993
Tobias Renk
Tobias Renk, Holger Jaekel, Friedrich K. Jondral
Outage Regions and Optimal Power Allocation for Wireless Relay Networks
5 pages, 4 figures, 1 table, accepted for ITW 2009, Taormina, Sicily
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study outage regions for energy-constrained multi-hop and adaptive multi-route networks with an arbitrary number of relay nodes. Optimal power allocation strategies in the sense that outage probability is minimized are derived depending on the distances between the transmit nodes. We further investigate the rate gain of adaptive multi-route and multi-hop over direct transmission. It is shown that a combined strategy of direct transmission and adaptive multi-route outperforms multi-hop for all values of rate R. It can be stated that cooperation strategies are beneficial for low-rate systems where the main goal is a very low outage probability of the network. As the rate is increased, direct transmission becomes more and more attractive.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 07:10:43 GMT" } ]
2009-08-10T00:00:00
[ [ "Renk", "Tobias", "" ], [ "Jaekel", "Holger", "" ], [ "Jondral", "Friedrich K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.0994
R Doomun
Dr. Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor, Ravish Bahety
A Secure Multi-Party Computation Protocol for Malicious Computation Prevention for preserving privacy during Data Mining
6 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Volume 3, Number 1, July 2009, USA
null
ISSN 1947 5500
cs.CR cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations and draw out conclusions that are mutually beneficial; at the same time aspiring to keep their private data secure. These computations are generally required to be done between competitors, who are obviously weary of each-others intentions. SMC caters not only to the needs of such parties but also provides plausible solutions to individual organizations for problems like privacy-preserving database query, privacy-preserving scientific computations, privacy-preserving intrusion detection and privacy-preserving data mining. This paper is an extension to a previously proposed protocol Encrytpo_Random, which presented a plain sailing yet effective approach to SMC and also put forward an aptly crafted architecture, whereby such an efficient protocol, involving the parties that have come forward for joint-computations and the third party who undertakes such computations, can be developed. Through this extended work an attempt has been made to further strengthen the existing protocol thus paving the way for a more secure multi-party computational process.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 07:22:06 GMT" } ]
2009-08-10T00:00:00
[ [ "Mishra", "Dr. Durgesh Kumar", "" ], [ "Koria", "Neha", "" ], [ "Kapoor", "Nikhil", "" ], [ "Bahety", "Ravish", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0908.1004
Rui Wang
Rui Wang, Vincent K. N. Lau, and Kaibin Huang
A New Scaling Law on Throughput and Delay Performance of Wireless Mobile Relay Networks over Parallel Fading Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, utilizing the relay buffers, we propose an opportunistic decode-wait-and-forward relay scheme for a point-to-point communication system with a half-duplexing relay network to better exploit the time diversity and relay mobility. For instance, we analyze the asymptotic throughput-delay tradeoffs in a dense relay network for two scenarios: (1) fixed relays with \textit{microscopic fading} channels (multipath channels), and (2) mobile relays with \textit{macroscopic fading} channels (path loss). In the first scenario, the proposed scheme can better exploit the \textit{multi-relay diversity} in the sense that with $K$ fixed relays and a cost of $\mathcal{O}(K)$ average end-to-end packet delay, it could achieve the same optimal asymptotic average throughput as the existing designs (such as regular decode-and-forward relay schemes) with $K^2$ fixed relays. In the second scenario, the proposed scheme achieves the maximum throughput of $\Theta(\log K)$ at a cost of $\mathcal{O}(K/q)$ average end-to-end packet delay, where $0<q\leq {1/2}$ measures the speed of relays' mobility. This system throughput is unattainable for the existing designs with low relay mobility, the proposed relay scheme can exploit the relays' mobility more efficiently.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 08:39:41 GMT" } ]
2009-08-10T00:00:00
[ [ "Wang", "Rui", "" ], [ "Lau", "Vincent K. N.", "" ], [ "Huang", "Kaibin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1027
Yoshitaka Sasaki
Yasuo Ohno, Yoshitaka Sasaki and Chika Yamazaki
On exponential polynomials and quantum computing
7pages, LaTeX
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We calculate the zeros of an exponential polynomial of three variables by a classical algorithm and quantum algorithms which are based on the method of van Dam and Shparlinski, they treated the case of two variables, and compare with the time complexity of those cases. Further we compare the case of van Dam and Shparlinski with our case by considering the ratio (classical/quantum) of the time complexity. Then we can observe the ratio decreases.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 11:44:57 GMT" } ]
2009-08-10T00:00:00
[ [ "Ohno", "Yasuo", "" ], [ "Sasaki", "Yoshitaka", "" ], [ "Yamazaki", "Chika", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.1033
R Doomun
Kamalesh V.N, S. K. Srivatsa
Topological design of minimum cost survivable computer communication networks, Bipartite Graph Method
5 Pages, International Journal of Computer Science and Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A good computer network is hard to disrupt. It is desired that the computer communication network remains connected even when some of the links or nodes fail. Since the communication links are expensive, one wants to achieve these goals with fewer links. The computer communication network is fault tolerant if it has alternative paths between vertices, the more disjoint paths, the better is the survivability. This paper presents a method for generating k-connected computer communication network with optimal number of links using bipartite graph concept.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 12:37:26 GMT" } ]
2009-08-10T00:00:00
[ [ "N", "Kamalesh V.", "" ], [ "Srivatsa", "S. K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.1056
R Doomun
Abd El Naser A. Mohamed, Mohamed M. E. El-Halawany, Ahmed Nabih Zaki Rashed and Mahmoud M. A. Eid
Recent Applications of Optical Parametric Amplifiers in Hybrid WDM TDM Local Area Optical Networks
10 pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
Internation Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No.1, July 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the present paper, the recent applications of optical parametric amplifiers (OPAs) in hybrid wavelength division multiplexing (WDM)/time division multiplexing (TDM) local area passive optical networks have been modeled and parametrically investigated over wide range of the affecting parameters. Moreover, we have analyzed the ability of the hybrid WDM/TDM Passive optical networks to handle a triple play solution, offering voice, video, and data services to the multiple users. Finally, we have investigated the maximum time division multiplexing (MTDM) bit rates for optical network units (ONUs) for maximum number of supported users with optical parametric amplifier technique across the single mode fiber (SMF) or highly nonlinear fiber (HNLF) cables to achieve both maximum network reach and quality of service (QOS).
[ { "version": "v1", "created": "Fri, 7 Aug 2009 13:53:54 GMT" } ]
2009-08-10T00:00:00
[ [ "Mohamed", "Abd El Naser A.", "" ], [ "El-Halawany", "Mohamed M. E.", "" ], [ "Rashed", "Ahmed Nabih Zaki", "" ], [ "Eid", "Mahmoud M. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.1057
R Doomun
Abd El Naser A. Mohamed, Mohamed M. E. El Halawany, Ahmed Nabih Zaki Rashed, and Amina E. M. El Nabawy
Transmission Performance Analysis of Digital Wire and Wireless Optical Links in Local and Wide Areas Optical Networks
10 pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
Internation Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No.1, July 2009, USA
null
ISSN 1947 5500
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the present paper, the transmission performance analysis of digital wire and wireless optical links in local and wide areas optical networks have been modeled and parametrically investigated over wide range of the affecting parameters. Moreover, we have analyzed the basic equations of the comparative study of the performance of digital fiber optic links with wire and wireless optical links. The development of optical wireless communication systems is accelerating as a high cost effective to wire fiber optic links. The optical wireless technology is used mostly in wide bandwidth data transmission applications. Finally, we have investigated the maximum transmission distance and data transmission bit rates that can be achieved within digital wire and wireless optical links for local and wide areas optical network applications.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 13:57:15 GMT" } ]
2009-08-10T00:00:00
[ [ "Mohamed", "Abd El Naser A.", "" ], [ "Halawany", "Mohamed M. E. El", "" ], [ "Rashed", "Ahmed Nabih Zaki", "" ], [ "Nabawy", "Amina E. M. El", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0908.1059
Chantal Enguehard
Chantal Enguehard (LINA), R\'emi Lehn (LINA)
Vulnerability analysis of three remote voting methods
15 pages
XXI IPSA World Congress of Political Science, RC10 Electronic Democracy - Dilemmas of Change?, Santiago : Chile (2009)
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 14:02:40 GMT" } ]
2009-08-10T00:00:00
[ [ "Enguehard", "Chantal", "", "LINA" ], [ "Lehn", "Rémi", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0908.1071
Ali Tajer
Ali Tajer, Guido H. Jajamovich, Xiaodong Wang, and George V. Moustakides
Optimal Joint Target Detection and Parameter Estimation By MIMO Radar
37 pages, 8 figures
null
10.1109/JSTSP.2010.2040104
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider multiple-input multiple-output (MIMO) radar systems with widely-spaced antennas. Such antenna configuration facilitates capturing the inherent diversity gain due to independent signal dispersion by the target scatterers. We consider a new MIMO radar framework for detecting a target that lies in an unknown location. This is in contrast with conventional MIMO radars which break the space into small cells and aim at detecting the presence of a target in a specified cell. We treat this problem through offering a novel composite hypothesis testing framework for target detection when (i) one or more parameters of the target are unknown and we are interested in estimating them, and (ii) only a finite number of observations are available. The test offered optimizes a metric which accounts for both detection and estimation accuracies. In this paper as the parameter of interest we focus on the vector of time-delays that the waveforms undergo from being emitted by the transmit antennas until being observed by the receive antennas. The analytical and empirical results establish that for the proposed joint target detection and time-delay estimation framework, MIMO radars exhibit significant gains over phased-array radars for extended targets which consist of multiple independent scatterers. For point targets modeled as single scatterers, however, the detection/estimation accuracies of MIMO and phased-array radars for this specific setup (joint target detection and time-delay estimation) are comparable.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 15:28:02 GMT" } ]
2015-10-28T00:00:00
[ [ "Tajer", "Ali", "" ], [ "Jajamovich", "Guido H.", "" ], [ "Wang", "Xiaodong", "" ], [ "Moustakides", "George V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1076
Rudy Negenborn
R. R. Negenborn, B. De Schutter, J. Hellendoorn
Multi-Agent Model Predictive Control: A Survey
null
null
null
04-010
cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this report we define characteristic control design elements and show how conventional single-agent MPC implements these. We survey recent literature on multi-agent MPC and discuss how this literature deals with decomposition, problem assignment, and cooperation.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 15:43:26 GMT" } ]
2009-08-10T00:00:00
[ [ "Negenborn", "R. R.", "" ], [ "De Schutter", "B.", "" ], [ "Hellendoorn", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0908.1077
Ali Tajer
Ali Tajer, Narayan Prasad, and Xiaodong Wang
Beamforming and Rate Allocation in MISO Cognitive Radio Networks
32 pages, 6 figures
null
10.1109/TSP.2009.2031280
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider decentralized multi-antenna cognitive radio networks where secondary (cognitive) users are granted simultaneous spectrum access along with license-holding (primary) users. We treat the problem of distributed beamforming and rate allocation for the secondary users such that the minimum weighted secondary rate is maximized. Such an optimization is subject to (1) a limited weighted sum-power budget for the secondary users and (2) guaranteed protection for the primary users in the sense that the interference level imposed on each primary receiver does not exceed a specified level. Based on the decoding method deployed by the secondary receivers, we consider three scenarios for solving this problem. In the first scenario each secondary receiver decodes only its designated transmitter while suppressing the rest as Gaussian interferers (single-user decoding). In the second case each secondary receiver employs the maximum likelihood decoder (MLD) to jointly decode all secondary transmissions, and in the third one each secondary receiver uses the unconstrained group decoder (UGD). By deploying the UGD, each secondary user is allowed to decode any arbitrary subset of users (which contains its designated user) after suppressing or canceling the remaining users.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 15:46:00 GMT" } ]
2015-05-13T00:00:00
[ [ "Tajer", "Ali", "" ], [ "Prasad", "Narayan", "" ], [ "Wang", "Xiaodong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1090
Anshuman Sinha
Anshuman Sinha
Study of Proposed Methods for Improving TCP Performance Over Wireless Links
7 pages, 4 figures, 3 table
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
TCP is designed for networks with assumption that major losses occur only due to congestion of network traffic. On a wireless network TCP misinterprets the transmission losses due to bit errors and handoffs as losses caused by congestion, and triggers congestion control mechanisms. Because of its end to end delivery model, congestion handling and avoidance mechanisms, TCP has been widely accepted as Transport layer protocol for internetworks. Extension of Internetworks over wireless links is inevitable with the spread of ubiquitous computing and mobile communications. This paper presents study of different mechanisms proposed to extend Transport Control Protocol and other alternate solutions to enhance end to end performance over lossy wireless links. The paper studies details of different design choices proposed and their technical advantages and disadvantages. Finally, an analysis and proposal for best choice of proposed schemes are made for wireless networks.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 17:37:39 GMT" } ]
2009-08-10T00:00:00
[ [ "Sinha", "Anshuman", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.1116
R Doomun
Shahid Mumtaz, Alitio Gamerio, Rasool Sadeghi
Enhanced Algorithm for Link to System level Interface Mapping
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
ISSN 1947 5500
cs.IT cs.PF math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The current SINR mechanism does not provide the base station (BS) with any knowledge on the frequency selectivity of channel from mobile service station(MSS). This knowledge is important since, contrary to the AWGN channel, in a frequency selective channel there is no longer a 1 to 1 relation between amount of increase in power and amount of improvement in effective SINR 1. Furthermore, the relation is dependent on MCS level. This lack of knowledge in the BS side results in larger fade margins, which translates directly to reduction in capacity. In this paper we propose a enhanced algorithm on the EESM model with weighted beta (\beta) that provides the BS with sufficient knowledge on the channel-dependent relationship between power increase, MCS change and improvement in effective SINR.
[ { "version": "v1", "created": "Fri, 7 Aug 2009 20:27:49 GMT" } ]
2009-08-11T00:00:00
[ [ "Mumtaz", "Shahid", "" ], [ "Gamerio", "Alitio", "" ], [ "Sadeghi", "Rasool", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1143
Dmitri Krioukov
Almerima Jamakovic, Priya Mahadevan, Amin Vahdat, Marian Boguna, Dmitri Krioukov
How small are building blocks of complex networks
null
null
null
null
physics.soc-ph cond-mat.dis-nn cond-mat.stat-mech cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network motifs are small building blocks of complex networks. Statistically significant motifs often perform network-specific functions. However, the precise nature of the connection between motifs and the global structure and function of networks remains elusive. Here we show that the global structure of some real networks is statistically determined by the probability of connections within motifs of size at most 3, once this probability accounts for node degrees. The connectivity profiles of node triples in these networks capture all their local and global properties. This finding impacts methods relying on motif statistical significance, and enriches our understanding of the elementary forces that shape the structure of complex networks.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 03:02:05 GMT" }, { "version": "v2", "created": "Sun, 1 Mar 2015 22:58:28 GMT" } ]
2015-03-03T00:00:00
[ [ "Jamakovic", "Almerima", "" ], [ "Mahadevan", "Priya", "" ], [ "Vahdat", "Amin", "" ], [ "Boguna", "Marian", "" ], [ "Krioukov", "Dmitri", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.1159
Norbert B\'atfai
Norbert B\'atfai
On the Running Time of the Shortest Programs
24 pages, 15 figures; added new values to the table "The increasing of running time of the shortest programs"
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kolmogorov complexity of the word w is equal to the length of the shortest concatenation of program Z and its input x with which the word w is computed by the universal turing machine U. The question introduced in this paper is the following: How long do the shortest programs run for?
[ { "version": "v1", "created": "Mon, 10 Aug 2009 14:07:47 GMT" }, { "version": "v2", "created": "Mon, 7 Sep 2009 10:46:14 GMT" } ]
2009-09-07T00:00:00
[ [ "Bátfai", "Norbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.1162
Harshan Jagadeesh
J. Harshan and B. Sundar Rajan
STBCs with Reduced Sphere Decoding Complexity for Two-User MIMO-MAC
6 pages, to appear in the proceedings of IEEE GLOBECOM 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, Space-Time Block Codes (STBCs) with reduced Sphere Decoding Complexity (SDC) are constructed for two-user Multiple-Input Multiple-Output (MIMO) fading multiple access channels. In this set-up, both the users employ identical STBCs and the destination performs sphere decoding for the symbols of the two users. First, we identify the positions of the zeros in the $\textbf{R}$ matrix arising out of the Q-R decomposition of the lattice generator such that (i) the worst case SDC (WSDC) and (ii) the average SDC (ASDC) are reduced. Then, a set of necessary and sufficient conditions on the lattice generator is provided such that the $\textbf{R}$ matrix has zeros at the identified positions. Subsequently, explicit constructions of STBCs which results in the reduced ASDC are presented. The rate (in complex symbols per channel use) of the proposed designs is at most $2/N_{t}$ where $N_{t}$ denotes the number of transmit antennas for each user. We also show that the class of STBCs from complex orthogonal designs (other than the Alamouti design) reduce the WSDC but not the ASDC.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 10:56:08 GMT" } ]
2009-08-11T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1163
Harshan Jagadeesh
J. Harshan and B. Sundar Rajan
Trellis Coded Modulation for Two-User Unequal-Rate Gaussian MAC
7 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, code pairs based on trellis coded modulation are proposed over PSK signal sets for a two-user Gaussian multiple access channel. In order to provide unique decodability property to the receiver and to maximally enlarge the constellation constrained (CC) capacity region, a relative angle of rotation is introduced between the signal sets. Subsequently, the structure of the \textit{sum alphabet} of two PSK signal sets is exploited to prove that Ungerboeck labelling on the trellis of each user maximizes the guaranteed minimum squared Euclidean distance, $d^{2}_{g, min}$ in the \textit{sum trellis}. Hence, such a labelling scheme can be used systematically to construct trellis code pairs for a two-user GMAC to approach \emph{any rate pair} within the capacity region.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 11:20:46 GMT" } ]
2009-08-11T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1181
Vijay Vazirani
Vijay V. Vazirani
2-Player Nash and Nonsymmetric Bargaining Games: Algorithms and Structural Properties
null
null
10.1007/978-3-642-16170-4_28
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The solution to a Nash or a nonsymmetric bargaining game is obtained by maximizing a concave function over a convex set, i.e., it is the solution to a convex program. We show that each 2-player game whose convex program has linear constraints, admits a rational solution and such a solution can be found in polynomial time using only an LP solver. If in addition, the game is succinct, i.e., the coefficients in its convex program are ``small'', then its solution can be found in strongly polynomial time. We also give a non-succinct linear game whose solution can be found in strongly polynomial time.
[ { "version": "v1", "created": "Sun, 9 Aug 2009 01:52:35 GMT" }, { "version": "v2", "created": "Fri, 14 Aug 2009 05:04:35 GMT" }, { "version": "v3", "created": "Thu, 24 Sep 2009 21:35:32 GMT" } ]
2015-05-13T00:00:00
[ [ "Vazirani", "Vijay V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.1185
Carlos Javier Hernandez-Castro
Carlos Javier Hernandez-Castro, Arturo Ribagorda, Yago Saez
Side-channel attack on labeling CAPTCHAs
null
null
null
null
cs.CR cs.CV cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new scheme of attack on the Microsoft's ASIRRA CAPTCHA which represents a significant shortcut to the intended attacking path, as it is not based in any advance in the state of the art on the field of image recognition. After studying the ASIRRA Public Corpus, we conclude that the security margin as stated by their authors seems to be quite optimistic. Then, we analyze which of the studied parameters for the image files seems to disclose the most valuable information for helping in correct classification, arriving at a surprising discovery. This represents a completely new approach to breaking CAPTCHAs that can be applied to many of the currently proposed image-labeling algorithms, and to prove this point we show how to use the very same approach against the HumanAuth CAPTCHA. Lastly, we investigate some measures that could be used to secure the ASIRRA and HumanAuth schemes, but conclude no easy solutions are at hand.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 19:54:01 GMT" } ]
2009-08-11T00:00:00
[ [ "Hernandez-Castro", "Carlos Javier", "" ], [ "Ribagorda", "Arturo", "" ], [ "Saez", "Yago", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.1186
Grenville Croll
Patrick O'Beirne
Checks and Controls in Spreadsheets
7 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 1-7 ISBN 978-1-905617-89-0
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spreadsheets that are informally created are harder to test than they should be. Simple cross-foot checks or being easily readable are modest but attainable goals for every spreadsheet developer. This paper lists some tips on building self-checking into a spreadsheet in order to provide more confidence to the reader that a spreadsheet is robust.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 20:38:12 GMT" } ]
2009-08-11T00:00:00
[ [ "O'Beirne", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.1187
Grenville Croll
Jocelyn Paine
Documenting Spreadsheets with Pseudo-Code: an Exercise with Cash-Flow and Loans
12 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 173-183 ISBN 978-1-905617-89-0
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
"Look before you leap"; "a stitch in time saves nine"; "more haste, less speed". Many proverbs declare the wisdom of planning before doing. We suggest how to apply this to Excel, by explaining and specifying spreadsheets before coding them, so there will always be documentation for auditors and maintenance programmers. The specification method uses "pseudo-code": code that, for precision and conciseness, resembles a programming language, but is not executable. It is, however, based on the notation used by our Excelsior spreadsheet generator, which is executable. This paper is structured as a tutorial, in which we develop a simple cash-flow and loans spreadsheet.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 20:44:50 GMT" } ]
2009-08-11T00:00:00
[ [ "Paine", "Jocelyn", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.1188
Grenville Croll
Thomas A. Grossman, Ozgur Ozluk, Jan Gustavson
The Lookup Technique to Replace Nested-IF Formulas in Spreadsheet Programming
10 Pages, 5 Figures; ISBN 978-1-905617-89-0
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 17-26
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spreadsheet programmers often implement contingent logic using a nested-IF formula even though this technique is difficult to test and audit and is believed to be risky. We interpret the programming of contingent logic in spreadsheets in the context of traditional computer programming. We investigate the "lookup technique" as an alternative to nested-IF formulas, describe its benefits for testing and auditing, and define its limitations. The lookup technique employs four distinct principles: 1) make logical tests visible; 2) make outcomes visible; 3) make logical structure visible; and 4) replace a multi-function nested-IF formula with a single-function lookup formula. It can be used only for certain simple contingent logic. We describe how the principles can be applied in more complex situations, and suggest avenues for further research.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 20:53:04 GMT" } ]
2011-02-19T00:00:00
[ [ "Grossman", "Thomas A.", "" ], [ "Ozluk", "Ozgur", "" ], [ "Gustavson", "Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.1189
Grenville Croll
Etienne Vandeput
Milestones for Teaching the Spreadsheet Program
11 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 133-143 ISBN 978-1-905617-89-0
null
null
cs.HC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are different manners of teaching a spreadsheet program. In any case, it is intended that the teacher settles the objectives of the course and adapts them to the particular audience he/she has to deal with. This paper aims at providing any teacher whatever his/her specific objectives and his/her audience with elements to help him/her building a course. It focuses mainly on two important issues: 1 - select in all that may be said about such complex tools, what is prior to know and to teach, i.e. what leads to autonomy in using but also to autonomy in learning (because everything cannot be taught) and 2 - show how concepts are closely related to good formatting considerations. A method based on the "invariants of information processing" is outlined, partially illustrated and an implementation is described throughout a course designed for students preparing a master in Education Sciences.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 21:02:41 GMT" } ]
2009-08-11T00:00:00
[ [ "Vandeput", "Etienne", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0908.1190
Grenville Croll
Leslie Bradley, Kevin McDaid
Error Estimation in Large Spreadsheets using Bayesian Statistics
12 Pages, 5 Colour Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 27-38 ISBN 978-1-905617-89-0
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spreadsheets are ubiquitous in business with the financial sector particularly heavily reliant on the technology. It is known that the level of spreadsheet error can be high and that it is often necessary to review spreadsheets based on a structured methodology which includes a cell by cell examination of the spreadsheet. This paper outlines the early research that has been carried out into the use of Bayesian Statistical methods to estimate the level of error in large spreadsheets during cell be cell examination based on expert knowledge and partial spreadsheet test data. The estimate can aid in the decision as to the quality of the spreadsheet and the necessity to conduct further testing or not.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 21:08:53 GMT" } ]
2009-08-11T00:00:00
[ [ "Bradley", "Leslie", "" ], [ "McDaid", "Kevin", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.1191
Grenville Croll
Angela Collins
Embedded Spreadsheet Modelling
5 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 95-99 ISBN 978-1-905617-89-0
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In larger accounting firms, specialist modellers typically sit in separate teams. This paper will look at the advantages of embedding a specialist modeller within a Corporate Finance Team.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 21:13:27 GMT" } ]
2009-08-11T00:00:00
[ [ "Collins", "Angela", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.1192
Grenville Croll
Matthew Dinmore
Documenting Problem-Solving Knowledge: Proposed Annotation Design Guidelines and their Application to Spreadsheet Tools
12 Pages, 4 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 57-68 ISBN 978-1-905617-89-0
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
End-user programmers create software to solve problems, yet the problem-solving knowledge generated in the process often remains tacit within the software artifact. One approach to exposing this knowledge is to enable the end-user to annotate the artifact as they create and use it. A 3-level model of annotation is presented and guidelines are proposed for the design of end-user programming environments supporting the explicit and literate annotation levels. These guidelines are then applied to the spreadsheet end-user programming paradigm.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 21:18:31 GMT" } ]
2009-08-11T00:00:00
[ [ "Dinmore", "Matthew", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.1193
Grenville Croll
Derek Flood, Kevin Mc Daid, Fergal Mc Caffery
NLP-SIR: A Natural Language Approach for Spreadsheet Information Retrieval
12 Pages, 2 Colour Figures, 3 Tables
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 101-112 ISBN 978-1-905617-89-0
null
null
cs.SE cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spreadsheets are a ubiquitous software tool, used for a wide variety of tasks such as financial modelling, statistical analysis and inventory management. Extracting meaningful information from such data can be a difficult task, especially for novice users unfamiliar with the advanced data processing features of many spreadsheet applications. We believe that through the use of Natural Language Processing (NLP) techniques this task can be made considerably easier. This paper introduces NLP-SIR, a Natural language interface for spreadsheet information retrieval. The results of a recent evaluation which compared NLP-SIR with existing Information retrieval tools are also outlined. This evaluation has shown that NLP-SIR is a more effective method of spreadsheet information retrieval.
[ { "version": "v1", "created": "Sat, 8 Aug 2009 21:23:52 GMT" } ]
2009-08-11T00:00:00
[ [ "Flood", "Derek", "" ], [ "Daid", "Kevin Mc", "" ], [ "Caffery", "Fergal Mc", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.1208
Seyed Abolfazl Motahari
Abolfazl S. Motahari, Shahab Oveis Gharan, and Amir K. Khandani
Real Interference Alignment with Real Numbers
Submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A novel coding scheme applicable in networks with single antenna nodes is proposed. This scheme converts a single antenna system to an equivalent Multiple Input Multiple Output (MIMO) system with fractional dimensions. Interference can be aligned along these dimensions and higher Multiplexing gains can be achieved. Tools from the field of Diophantine approximation in number theory are used to show that the proposed coding scheme in fact mimics the traditional schemes used in MIMO systems where each data stream is sent along a direction and alignment happens when several streams arrive at the same direction. Two types of constellation are proposed for the encoding part, namely the single layer constellation and the multi-layer constellation. Using the single layer constellation, the coding scheme is applied to the two-user $X$ channel and the three-user Gaussian Interference Channel (GIC). In case of the two-user $X$ channel, it is proved that the total Degrees-of-Freedom (DOF), i.e. 4/3, of the channel is achievable almost surely. This is the first example in which it is shown that a time invariant single antenna system does not fall short of achieving its total DOF. Using the multi-layer constellation, the coding scheme is applied to the symmetric three-user GIC. Achievable DOFs are derived for all channel gains. As a function of the channel gain, it is observed that the DOF is everywhere discontinuous.
[ { "version": "v1", "created": "Sun, 9 Aug 2009 05:27:44 GMT" }, { "version": "v2", "created": "Wed, 12 Aug 2009 10:00:59 GMT" } ]
2009-08-12T00:00:00
[ [ "Motahari", "Abolfazl S.", "" ], [ "Gharan", "Shahab Oveis", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1220
R Doomun
Maher Ben Jemaa, Maryam Kallel Zouari, Bachar Zouari
A new approach to services differentiation between mobile terminals of a wireless LAN
8 Pages, IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study aims to identify the advantages and disadvantages of several mechanisms for service differentiation in mobile terminals of a wireless LAN to establish a more better and more optimal. At the end of the analysis of available approaches for the quality of service of the IEEE 802.11 standard, the objective of this paper is to suggest a new method named DF-DCF Differentiated Frame DCF. The performance of the suggested method in a Network Simulator (NS) environment allowed its validation through a set of testing and simulation scenarios. Simulation results have shown that the DF-DCF method is better suited for mobile nodes in a wireless communication network.
[ { "version": "v1", "created": "Sun, 9 Aug 2009 10:22:09 GMT" } ]
2009-08-11T00:00:00
[ [ "Jemaa", "Maher Ben", "" ], [ "Zouari", "Maryam Kallel", "" ], [ "Zouari", "Bachar", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.1222
Rajesh Ramachandran
R Rajesh and Vinod Sharma
Distributed Joint Source-Channel Coding for Functions over a Multiple Access Channel
7 Pages, 2 Figures. To Appear in IEEE GLOBECOM, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we provide sufficient conditions for lossy transmission of functions of correlated data over a multiple access channel (MAC). The conditions obtained can be shown as generalized version of Yamamoto's result. We also obtain efficient joint source-channel coding schemes for transmission of discrete and continuous alphabet sources to recover the function values. Keywords: Joint source-channel coding, Graph coloring, Lipschitz functions, Correlated sources.
[ { "version": "v1", "created": "Sun, 9 Aug 2009 10:34:24 GMT" } ]
2009-08-11T00:00:00
[ [ "Rajesh", "R", "" ], [ "Sharma", "Vinod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1223
Rajesh Ramachandran
R Rajesh and Vinod Sharma
Joint Source-Channel Coding over a Fading Multiple Access Channel with Partial Channel State Information
7 Pages, 3 figures. To Appear in IEEE GLOBECOM, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we address the problem of transmission of correlated sources over a fast fading multiple access channel (MAC) with partial channel state information available at both the encoders and the decoder. We provide sufficient conditions for transmission with given distortions. Next these conditions are specialized to a Gaussian MAC (GMAC). We provide the optimal power allocation strategy and compare the strategy with various levels of channel state information. Keywords: Fading MAC, Power allocation, Partial channel state information, Correlated sources.
[ { "version": "v1", "created": "Sun, 9 Aug 2009 10:40:59 GMT" } ]
2009-08-11T00:00:00
[ [ "Rajesh", "R", "" ], [ "Sharma", "Vinod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1264
Manish Agarwal
Manish Agarwal, Michael Honig, and Baris Ata
Adaptive Training for Correlated Fading Channels with Feedback
39 pages. Submitted to IEEE Transactions on Information Theory (Aug 2009)
null
10.1109/TIT.2012.2201345
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider data transmission through a time-selective, correlated (first-order Markov) Rayleigh fading channel subject to an average power constraint. The channel is estimated at the receiver with a pilot signal, and the estimate is fed back to the transmitter. The estimate is used for coherent demodulation, and to adapt the data and pilot powers. We explicitly determine the optimal pilot and data power control policies in a continuous-time limit where the channel state evolves as an Ornstein-Uhlenbeck diffusion process, and is estimated by a Kalman filter at the receiver. The optimal pilot policy switches between zero and the maximum (peak-constrained) value (``bang-bang'' control), and approximates the optimal discrete-time policy at low Signal-to-Noise Ratios (equivalently, large bandwidths). The switching boundary is defined in terms of the system state (estimated channel mean and associated error variance), and can be explicitly computed. Under the optimal policy, the transmitter conserves power by decreasing the training power when the channel is faded, thereby increasing the data rate. Numerical results show a significant increase in achievable rate due to the adaptive training scheme with feedback, relative to constant (non-adaptive) training, which does not require feedback. The gain is more pronounced at relatively low SNRs and with fast fading. Results are further verified through Monte Carlo simulations.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 02:31:08 GMT" } ]
2016-11-15T00:00:00
[ [ "Agarwal", "Manish", "" ], [ "Honig", "Michael", "" ], [ "Ata", "Baris", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1273
Mohammad Naghshvar
Mohammad Naghshvar, Hairuo Zhuang, and Tara Javidi
A General Class of Throughput Optimal Routing Policies in Multi-hop Wireless Networks
31 pages (one column), 8 figures, (revision submitted to IEEE Transactions on Information Theory)
null
10.1109/TIT.2011.2178152
null
math.OC cs.NI cs.SY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of throughput optimal routing/scheduling in a multi-hop constrained queueing network with random connectivity whose special case includes opportunistic multi-hop wireless networks and input-queued switch fabrics. The main challenge in the design of throughput optimal routing policies is closely related to identifying appropriate and universal Lyapunov functions with negative expected drift. The few well-known throughput optimal policies in the literature are constructed using simple quadratic or exponential Lyapunov functions of the queue backlogs and as such they seek to balance the queue backlogs across network independent of the topology. By considering a class of continuous, differentiable, and piece-wise quadratic Lyapunov functions, this paper provides a large class of throughput optimal routing policies. The proposed class of Lyapunov functions allow for the routing policy to control the traffic along short paths for a large portion of state-space while ensuring a negative expected drift. This structure enables the design of a large class of routing policies. In particular, and in addition to recovering the throughput optimality of the well known backpressure routing policy, an opportunistic routing policy with congestion diversity is proved to be throughput optimal.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 06:54:38 GMT" }, { "version": "v2", "created": "Thu, 11 Nov 2010 00:08:52 GMT" }, { "version": "v3", "created": "Thu, 10 Mar 2011 19:49:09 GMT" } ]
2015-03-13T00:00:00
[ [ "Naghshvar", "Mohammad", "" ], [ "Zhuang", "Hairuo", "" ], [ "Javidi", "Tara", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" } ]
0908.1298
Mark Flanagan
Mark F. Flanagan
Exposing Pseudoweight Layers in Regular LDPC Code Ensembles
5 pages, 2 figures. In Proc. Information Theory Workshop 2009 (Taormina, Sicily)
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A solution is presented for the asymptotic growth rate of the AWGN-pseudoweight distribution of regular low-density parity-check (LDPC) code ensembles for a selected graph cover degree M >= 1. The evaluation of the growth rate requires solution of a system of 2M+1 nonlinear equations in 2M+1 unknowns. Simulation results for the pseudoweight distribution of two regular LDPC code ensembles are presented for graph covers of low degree.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 11:05:30 GMT" } ]
2009-08-11T00:00:00
[ [ "Flanagan", "Mark F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1313
Vadim E. Levit
Vadim E. Levit and Eugen Mandrescu
On Konig-Egervary Square-Stable Graphs
12 pages, 9 figures
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stability number of a graph G, denoted by alpha(G), is the cardinality of a maximum stable set, and mu(G) is the cardinality of a maximum matching in G. If alpha(G)+mu(G) equals its order, then G is a Konig-Egervary graph. In this paper we deal with square-stable graphs, i.e., the graphs G enjoying the equality alpha(G)=alpha(G^{2}), where G^{2} denotes the second power of G. In particular, we show that a Konig-Egervary graph is square-stable if and only if it has a perfect matching consisting of pendant edges, and in consequence, we deduce that well-covered trees are exactly the square-stable trees.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 12:39:31 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2009 09:03:45 GMT" }, { "version": "v3", "created": "Tue, 25 Aug 2009 11:59:15 GMT" } ]
2011-01-25T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Mandrescu", "Eugen", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.1348
Juergen Bierbrauer
J. Bierbrauer, S. Marcugini, F. Pambianco
The non-existence of a [[13,5,4]] quantum stabilizer code
null
null
null
null
cs.IT math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We solve one of the oldest problems in the theory of quantum stabilizer codes by proving the non-existence of quantum [[13,5,4]]-codes.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 16:06:44 GMT" } ]
2009-08-11T00:00:00
[ [ "Bierbrauer", "J.", "" ], [ "Marcugini", "S.", "" ], [ "Pambianco", "F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0908.1369
Meijun Zhu
Meijun Zhu and Pengfei Zhang
Segmentation for radar images based on active contour
null
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We exam various geometric active contour methods for radar image segmentation. Due to special properties of radar images, we propose our new model based on modified Chan-Vese functional. Our method is efficient in separating non-meteorological noises from meteorological images.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 18:33:51 GMT" } ]
2009-08-11T00:00:00
[ [ "Zhu", "Meijun", "" ], [ "Zhang", "Pengfei", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0908.1379
Jonah Sherman
Jonah Sherman
Breaking the Multicommodity Flow Barrier for sqrt(log(n))-Approximations to Sparsest Cut
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper ties the line of work on algorithms that find an O(sqrt(log(n)))-approximation to the sparsest cut together with the line of work on algorithms that run in sub-quadratic time by using only single-commodity flows. We present an algorithm that simultaneously achieves both goals, finding an O(sqrt(log(n)/eps))-approximation using O(n^eps log^O(1) n) max-flows. The core of the algorithm is a stronger, algorithmic version of Arora et al.'s structure theorem, where we show that matching-chaining argument at the heart of their proof can be viewed as an algorithm that finds good augmenting paths in certain geometric multicommodity flow networks. By using that specialized algorithm in place of a black-box solver, we are able to solve those instances much more efficiently. We also show the cut-matching game framework can not achieve an approximation any better than Omega(log(n)/log log(n)) without re-routing flow.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 19:57:32 GMT" } ]
2009-08-11T00:00:00
[ [ "Sherman", "Jonah", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.1390
Andrew Gacek
Andrew Gacek, Dale Miller, and Gopalan Nadathur
Nominal Abstraction
To appear in the Journal of Information and Computation
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recursive relational specifications are commonly used to describe the computational structure of formal systems. Recent research in proof theory has identified two features that facilitate direct, logic-based reasoning about such descriptions: the interpretation of atomic judgments through recursive definitions and an encoding of binding constructs via generic judgments. However, logics encompassing these two features do not currently allow for the definition of relations that embody dynamic aspects related to binding, a capability needed in many reasoning tasks. We propose a new relation between terms called nominal abstraction as a means for overcoming this deficiency. We incorporate nominal abstraction into a rich logic also including definitions, generic quantification, induction, and co-induction that we then prove to be consistent. We present examples to show that this logic can provide elegant treatments of binding contexts that appear in many proofs, such as those establishing properties of typing calculi and of arbitrarily cascading substitutions that play a role in reducibility arguments.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 20:36:43 GMT" }, { "version": "v2", "created": "Thu, 27 May 2010 11:52:45 GMT" }, { "version": "v3", "created": "Thu, 23 Sep 2010 12:56:36 GMT" } ]
2010-09-24T00:00:00
[ [ "Gacek", "Andrew", "" ], [ "Miller", "Dale", "" ], [ "Nadathur", "Gopalan", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0908.1397
Julien Hendrickx
Julien M. Hendrickx and Alex Olshevsky
Matrix P-norms are NP-hard to approximate if p \neq 1,2,\infty
12 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that for any rational p \in [1,\infty) except p = 1, 2, unless P = NP, there is no polynomial-time algorithm for approximating the matrix p-norm to arbitrary relative precision. We also show that for any rational p\in [1,\infty) including p = 1, 2, unless P = NP, there is no polynomial-time algorithm approximates the \infty, p mixed norm to some fixed relative precision.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 20:22:46 GMT" }, { "version": "v2", "created": "Fri, 18 Sep 2009 14:00:08 GMT" }, { "version": "v3", "created": "Fri, 23 Apr 2010 15:30:30 GMT" } ]
2010-04-26T00:00:00
[ [ "Hendrickx", "Julien M.", "" ], [ "Olshevsky", "Alex", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.1407
Taposh Banerjee
Taposh Banerjee and Vinod Sharma
Generalized Analysis of a Distributed Energy Efficient Algorithm for Change Detection
Accepted as a short paper in Proc. of the 12th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Tenerife, Canary Islands, Spain, Oct 26-30, 2009. Please contact [email protected] or [email protected] for any clarifications. Also visit: http://www.ece.iisc.ernet.in/~vinod/
null
null
null
cs.IT cs.PF math.IT stat.AP
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An energy efficient distributed Change Detection scheme based on Page's CUSUM algorithm was presented in \cite{icassp}. In this paper we consider a nonparametric version of this algorithm. In the algorithm in \cite{icassp}, each sensor runs CUSUM and transmits only when the CUSUM is above some threshold. The transmissions from the sensors are fused at the physical layer. The channel is modeled as a Multiple Access Channel (MAC) corrupted with noise. The fusion center performs another CUSUM to detect the change. In this paper, we generalize the algorithm to also include nonparametric CUSUM and provide a unified analysis.
[ { "version": "v1", "created": "Mon, 10 Aug 2009 21:21:00 GMT" } ]
2009-08-17T00:00:00
[ [ "Banerjee", "Taposh", "" ], [ "Sharma", "Vinod", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" } ]
0908.1448
Aleksander M{\ka}dry
Jonathan A. Kelner, Aleksander Madry
Faster generation of random spanning trees
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we set forth a new algorithm for generating approximately uniformly random spanning trees in undirected graphs. We show how to sample from a distribution that is within a multiplicative $(1+\delta)$ of uniform in expected time $\TO(m\sqrt{n}\log 1/\delta)$. This improves the sparse graph case of the best previously known worst-case bound of $O(\min \{mn, n^{2.376}\})$, which has stood for twenty years. To achieve this goal, we exploit the connection between random walks on graphs and electrical networks, and we use this to introduce a new approach to the problem that integrates discrete random walk-based techniques with continuous linear algebraic methods. We believe that our use of electrical networks and sparse linear system solvers in conjunction with random walks and combinatorial partitioning techniques is a useful paradigm that will find further applications in algorithmic graph theory.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 05:14:39 GMT" } ]
2009-08-12T00:00:00
[ [ "Kelner", "Jonathan A.", "" ], [ "Madry", "Aleksander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.1453
R Doomun
Roya Asadi, Norwati Mustapha, Nasir Sulaiman
Training Process Reduction Based On Potential Weights Linear Analysis To Accelarate Back Propagation Network
11 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
International Journal of Computer Science and Information Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
null
ISSN 1947 5500
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Learning is the important property of Back Propagation Network (BPN) and finding the suitable weights and thresholds during training in order to improve training time as well as achieve high accuracy. Currently, data pre-processing such as dimension reduction input values and pre-training are the contributing factors in developing efficient techniques for reducing training time with high accuracy and initialization of the weights is the important issue which is random and creates paradox, and leads to low accuracy with high training time. One good data preprocessing technique for accelerating BPN classification is dimension reduction technique but it has problem of missing data. In this paper, we study current pre-training techniques and new preprocessing technique called Potential Weight Linear Analysis (PWLA) which combines normalization, dimension reduction input values and pre-training. In PWLA, the first data preprocessing is performed for generating normalized input values and then applying them by pre-training technique in order to obtain the potential weights. After these phases, dimension of input values matrix will be reduced by using real potential weights. For experiment results XOR problem and three datasets, which are SPECT Heart, SPECTF Heart and Liver disorders (BUPA) will be evaluated. Our results, however, will show that the new technique of PWLA will change BPN to new Supervised Multi Layer Feed Forward Neural Network (SMFFNN) model with high accuracy in one epoch without training cycle. Also PWLA will be able to have power of non linear supervised and unsupervised dimension reduction property for applying by other supervised multi layer feed forward neural network model in future work.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 05:30:01 GMT" } ]
2009-08-12T00:00:00
[ [ "Asadi", "Roya", "" ], [ "Mustapha", "Norwati", "" ], [ "Sulaiman", "Nasir", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0908.1457
Francois Le Gall
Hirotada Kobayashi, Fran\c{c}ois Le Gall, Harumichi Nishimura, Martin Roetteler
General Scheme for Perfect Quantum Network Coding with Free Classical Communication
12 pages, 2 figures, generalizes some of the results in arXiv:0902.1299 to the k-pair problem and codes over rings. Appeared in the Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), LNCS 5555, pp. 622-633, 2009
Proceedings of the 36th International Colloquium on Automata, Languages and Programming (ICALP'09), LNCS 5555, pp. 622-633, 2009
10.1007/978-3-642-02927-1_52
null
quant-ph cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the problem of efficiently transmitting quantum states through a network. It has been known for some time that without additional assumptions it is impossible to achieve this task perfectly in general -- indeed, it is impossible even for the simple butterfly network. As additional resource we allow free classical communication between any pair of network nodes. It is shown that perfect quantum network coding is achievable in this model whenever classical network coding is possible over the same network when replacing all quantum capacities by classical capacities. More precisely, it is proved that perfect quantum network coding using free classical communication is possible over a network with $k$ source-target pairs if there exists a classical linear (or even vector linear) coding scheme over a finite ring. Our proof is constructive in that we give explicit quantum coding operations for each network node. This paper also gives an upper bound on the number of classical communication required in terms of $k$, the maximal fan-in of any network node, and the size of the network.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 05:55:43 GMT" } ]
2016-05-30T00:00:00
[ [ "Kobayashi", "Hirotada", "" ], [ "Gall", "François Le", "" ], [ "Nishimura", "Harumichi", "" ], [ "Roetteler", "Martin", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1471
Fen Zhou Mr
Fen Zhou (IRISA / INSA Rennes), Miklos Molnar (IRISA / INSA Rennes), Bernard Cousin (IRISA / University of Rennes I)
Distance priority based multicast routing in WDM networks considering sparse light splitting
11th IEEE International Conference on Communication Systems, Guangzhou. China, 19-21 Nov. 2008. (ICCS 2008)
IEEE International Conference on Communication Systems. (2008) 709-714
10.1109/ICCS.2008.4737278
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As we know, the member-only algorithm in provides the best links stress and wavelength usage for the construction of multicast light-trees in WDM networks with sparse splitting. However, the diameter of tree is too big and the average delay is also too large, which are intolerant for QoS required multimedia applications. In this paper, a distance priority based algorithm is proposed to build light-trees for multicast routing, where the Candidate Destinations and the Candidate Connectors are introduced. Simulations show the proposed algorithm is able to greatly reduce the diameter and average delay of the multicast tree (up to 51% and 50% respectively), while keep the same or get a slightly better link stress as well as the wavelength usage than the famous Member-Only algorithm.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 08:17:48 GMT" } ]
2009-08-12T00:00:00
[ [ "Zhou", "Fen", "", "IRISA / INSA Rennes" ], [ "Molnar", "Miklos", "", "IRISA / INSA Rennes" ], [ "Cousin", "Bernard", "", "IRISA / University of Rennes I" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.1490
Kyatsandra Nagananda
K. G. Nagananda, Chandra R. Murthy
Asymmetric Transmitter Cooperation in Multiuser Wireless Networks: Achievable Rate Regions
This paper has been withdrawn by the author due another related publication
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we derive achievable rate regions for the three-user interference channels with asymmetric transmitter cooperation and various decoding capabilities at the receivers. The three-user channel facilitates different ways of message sharing between the transmitters. We introduce two natural ways of extending the concept of unidirectional message sharing from two users to three users - (i) cumulative message sharing and (ii) primary-only message sharing. In addition, we define several cognitive interference channels based on the decoding capability of the receivers. We employ a coding technique, which is a combination of superposition and Gel'fand-Pinsker coding techniques, to derive an achievable rate region for each of the cognitive interference channels. Simulation results, by considering the Gaussian channel case, enables a visual comparison of the two message-sharing schemes considered in this paper. It also provides useful insights into the effect of message-splitting at the transmitters and the decoding capability of the receivers on the achievable rates.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 10:16:08 GMT" }, { "version": "v2", "created": "Mon, 21 Feb 2011 03:24:07 GMT" }, { "version": "v3", "created": "Tue, 22 Feb 2011 01:43:55 GMT" } ]
2011-02-23T00:00:00
[ [ "Nagananda", "K. G.", "" ], [ "Murthy", "Chandra R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1510
Avraham Reani
Avraham Reani, Neri Merhav
Efficient On-line Schemes for Encoding Individual Sequences with Side Information at the Decoder
33 pages, 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present adaptive on-line schemes for lossy encoding of individual sequences under the conditions of the Wyner-Ziv (WZ) problem. In the first part of this article, a set of fixed-rate scalar source codes with zero delay is presented. We propose a randomized on-line coding scheme, which achieves asymptotically (and with high probability), the performance of the best source code in the set, uniformly over all source sequences. The scheme uses the same rate and has zero delay. We then present an efficient algorithm for implementing our on-line coding scheme in the case of a relatively small set of encoders. We also present an efficient algorithm for the case of a larger set of encoders with a structure, using the method of the weighted graph and the Weight Pushing Algorithm (WPA). In the second part of this article, we extend our results to the case of variable-rate coding. A set of variable-rate scalar source codes is presented. We generalize the randomized on-line coding scheme, to our case. This time, the performance is measured by the Lagrangian Cost (LC), which is defined as a weighted sum of the distortion and the length of the encoded sequence. We present an efficient algorithm for implementing our on-line variable-rate coding scheme in the case of a relatively small set of encoders. We then consider the special case of lossless variable-rate coding. An on-line scheme which use Huffman codes is presented. We show that this scheme can be implemented efficiently using the same graphic methods from the first part. Combining the results from former sections, we build a generalized efficient algorithm for structured set of variable-rate encoders. The complexity of all the algorithms is no more than linear in the sequence length.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 13:13:04 GMT" } ]
2009-08-12T00:00:00
[ [ "Reani", "Avraham", "" ], [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1528
Robert Geisberger
Robert Geisberger
Contraction of Timetable Networks with Realistic Transfers
15 pages, technical report
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We successfully contract timetable networks with realistic transfer times. Contraction gradually removes nodes from the graph and adds shortcuts to preserve shortest paths. This reduces query times to 1 ms with preprocessing times around 6 minutes on all tested instances. We achieve this by an improved contraction algorithm and by using a station graph model. Every node in our graph has a one-to-one correspondence to a station and every edge has an assigned collection of connections. Our graph model does not need parallel edges. The query algorithm does not compute a single earliest arrival time at a station but a set of arriving connections that allow best transfer opportunities.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 16:03:46 GMT" }, { "version": "v2", "created": "Wed, 12 Aug 2009 14:26:01 GMT" } ]
2009-08-12T00:00:00
[ [ "Geisberger", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.1564
Jay Kumar Sundararajan
Jay Kumar Sundararajan, Szymon Jakubczak, Muriel Medard, Michael Mitzenmacher, Joao Barros
Interfacing network coding with TCP: an implementation
9 pages; Submitted to INFOCOM 2010
null
null
null
cs.NI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In previous work (`Network coding meets TCP') we proposed a new protocol that interfaces network coding with TCP by means of a coding layer between TCP and IP. Unlike the usual batch-based coding schemes, the protocol uses a TCP-compatible sliding window code in combination with new rules for acknowledging bytes to TCP that take into account the network coding operations in the lower layer. The protocol was presented in a theoretical framework and considered only in conjunction with TCP Vegas. In this paper we present a real-world implementation of this protocol that addresses several important practical aspects of incorporating network coding and decoding with TCP's window management mechanism. Further, we work with the more widespread and practical TCP Reno. Our implementation significantly advances the goal of designing a deployable, general, TCP-compatible protocol that provides the benefits of network coding.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 19:36:15 GMT" } ]
2009-08-12T00:00:00
[ [ "Sundararajan", "Jay Kumar", "" ], [ "Jakubczak", "Szymon", "" ], [ "Medard", "Muriel", "" ], [ "Mitzenmacher", "Michael", "" ], [ "Barros", "Joao", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1580
Grenville Croll
Francoise Tort, Francois-Marie Blondel, Eric Bruillard
From error detection to behaviour observation: first results from screen capture analysis
13 Pages; 4 Figures, 6 Tables; ISBN 978-1-905617-89-0
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 119-132
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper deals with errors in using spreadsheets and analysis of automatic recording of user interaction with spreadsheets. After a review of literature devoted to spreadsheet errors, we advocate the importance of going from error detection to interaction behaviour analysis. We explain how we analyze screen captures and give the main results we have obtained using this specific methodology with secondary school students (N=24). Transcription provides general characteristics: time, sequence of performed tasks, unsuccessful attempts and user preferences. Analysis reveals preferred modes of actions (toolbar buttons or menu commands), ways of writing formulas, and typical approaches in searching for solutions. Time, rhythm and density appear to be promising indicators. We think such an approach (to analyze screen captures) could be used with more advanced spreadsheet users.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 21:05:06 GMT" } ]
2011-02-19T00:00:00
[ [ "Tort", "Francoise", "" ], [ "Blondel", "Francois-Marie", "" ], [ "Bruillard", "Eric", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.1584
Grenville Croll
Mel Glass, David Ford, Sebastian Dewhurst
Reducing the Risk of Spreadsheet Usage - a Case Study
10 Pages, 7 Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 163-172 ISBN 978-1-905617-89-0
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The frequency with which spreadsheets are used and the associated risk is well known. Many tools and techniques have been developed which help reduce risks associate with creating and maintaining spreadsheet. However, little consideration has been given to reducing the risks of routine usage by the "consumers" - for example when entering and editing data. EASA's solution, available commercially, ensures that any routine process involving spreadsheets can be executed rapidly and without errors by the end-users, often with a significant reduction in manual effort. Specifically, the technology enables the rapid creation and deployment of web-based applications, connected to one or more centralized spreadsheets; this ensures version control, easy and error free usage, and security of intellectual property contained in spreadsheets.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 21:15:42 GMT" } ]
2009-08-13T00:00:00
[ [ "Glass", "Mel", "" ], [ "Ford", "David", "" ], [ "Dewhurst", "Sebastian", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.1597
George Kesidis
George Kesidis
A quantum diffusion network
null
null
null
Technical Report Number CSE 09-012
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wong's diffusion network is a stochastic, zero-input Hopfield network with a Gibbs stationary distribution over a bounded, connected continuum. Previously, logarithmic thermal annealing was demonstrated for the diffusion network and digital versions of it were studied and applied to imaging. Recently, "quantum" annealed Markov chains have garnered significant attention because of their improved performance over "pure" thermal annealing. In this note, a joint quantum and thermal version of Wong's diffusion network is described and its convergence properties are studied. Different choices for "auxiliary" functions are discussed, including those of the kinetic type previously associated with quantum annealing.
[ { "version": "v1", "created": "Tue, 11 Aug 2009 23:45:08 GMT" } ]
2009-11-02T00:00:00
[ [ "Kesidis", "George", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0908.1599
Saburo Higuchi
Saburo Higuchi and Marc M\'ezard
Decimation flows in constraint satisfaction problems
14 pages, 2 figures
J. Stat. Mech. (2009) P12009
10.1088/1742-5468/2009/12/P12009
null
cond-mat.dis-nn cond-mat.stat-mech cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study hard constraint satisfaction problems with a decimation approach based on message passing algorithms. Decimation induces a renormalization flow in the space of problems, and we exploit the fact that this flow transforms some of the constraints into linear constraints over GF(2). In particular, when the flow hits the subspace of linear problems, one can stop decimation and use Gaussian elimination. We introduce a new decimation algorithm which uses this linear structure and shows a strongly improved performance with respect to the usual decimation methods on some of the hardest locked occupation problems.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 00:18:43 GMT" } ]
2010-05-11T00:00:00
[ [ "Higuchi", "Saburo", "" ], [ "Mézard", "Marc", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.1608
Christian Duncan
Christian A. Duncan, Michael T. Goodrich, Stephen G. Kobourov
Planar Drawings of Higher-Genus Graphs
A condensed version of this paper is to appear in Graph Drawing 2009. This is just a first draft. A final draft will appear in the near future
null
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give polynomial-time algorithms that can take a graph G with a given combinatorial embedding on an orientable surface S of genus g and produce a planar drawing of G in R^2, with a bounding face defined by a polygonal schema P for S. Our drawings are planar, but they allow for multiple copies of vertices and edges on P's boundary, which is a common way of visualizing higher-genus graphs in the plane. Our drawings can be defined with respect to either a canonical polygonal schema or a polygonal cutset schema, which provides an interesting tradeoff, since canonical schemas have fewer sides, and have a nice topological structure, but they can have many more repeated vertices and edges than general polygonal cutsets. As a side note, we show that it is NP-complete to determine whether a given graph embedded in a genus-g surface has a set of 2g fundamental cycles with vertex-disjoint interiors, which would be desirable from a graph-drawing perspective.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 02:53:37 GMT" } ]
2009-08-13T00:00:00
[ [ "Duncan", "Christian A.", "" ], [ "Goodrich", "Michael T.", "" ], [ "Kobourov", "Stephen G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.1613
Yi Su
Yi Su and Mihaela van der Schaar
Linearly Coupled Communication Games
20 pages, 1 figure
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses a special type of multi-user communication scenario, in which users' utilities are linearly impacted by their competitors' actions. First, we explicitly characterize the Nash equilibrium and Pareto boundary of the achievable utility region. Second, the price of anarchy incurred by the non-collaborative Nash strategy is quantified. Third, to improve the performance in the non-cooperative scenarios, we investigate the properties of an alternative solution concept named conjectural equilibrium, in which individual users compensate for their lack of information by forming internal beliefs about their competitors. The global convergence of the best response and Jacobi update dynamics that achieve various conjectural equilibria are analyzed. It is shown that the Pareto boundaries of the investigated linearly coupled games can be sustained as stable conjectural equilibria if the belief functions are properly initialized. The investigated models apply to a variety of realistic applications encountered in the multiple access design, including wireless random access and flow control.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 04:56:18 GMT" } ]
2009-08-13T00:00:00
[ [ "Su", "Yi", "" ], [ "van der Schaar", "Mihaela", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0908.1667
Samir Medina Perlaza
S.M. Perlaza, E.V. Belmega, S. Lasaulce, M. Debbah,
On the Base Station Selection and Base Station Sharing in Self-Configuring Networks
3rd ICST/ACM International Workshop on Game Theory in Communication Networks. October 23th 2009. Pisa, Italy
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We model the interaction of several radio devices aiming to obtain wireless connectivity by using a set of base stations (BS) as a non-cooperative game. Each radio device aims to maximize its own spectral efficiency (SE) in two different scenarios: First, we let each player to use a unique BS (BS selection) and second, we let them to simultaneously use several BSs (BS Sharing). In both cases, we show that the resulting game is an exact potential game. We found that the BS selection game posses multiple Nash equilibria (NE) while the BS sharing game posses a unique one. We provide fully decentralized algorithms which always converge to a NE in both games. We analyze the price of anarchy and the price of stability for the case of BS selection. Finally, we observed that depending on the number of transmitters, the BS selection technique might provide a better global performance (network spectral efficiency) than BS sharing, which suggests the existence of a Braess type paradox.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 10:18:16 GMT" } ]
2009-08-13T00:00:00
[ [ "Perlaza", "S. M.", "" ], [ "Belmega", "E. V.", "" ], [ "Lasaulce", "S.", "" ], [ "Debbah", "M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0908.1669
Martianus Frederic Ezerman
Martianus Frederic Ezerman, Markus Grassl, and Patrick Sole
The Weights in MDS Codes
5 pages, submitted to IEEE Trans. IT. This version 2 is the revised version after the refereeing process. Accepted for publication
IEEE Transactions on Information Theory, vol. 57, no. 1, January 2011, pp. 392-396
10.1109/TIT.2010.2090246
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The weights in MDS codes of length n and dimension k over the finite field GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with parameters given by the MDS conjecture are shown to contain all k weights in the range n-k+1 to n. The proof uses the covering radius of the dual code
[ { "version": "v1", "created": "Wed, 12 Aug 2009 10:38:56 GMT" }, { "version": "v2", "created": "Fri, 30 Jul 2010 10:10:11 GMT" } ]
2011-03-31T00:00:00
[ [ "Ezerman", "Martianus Frederic", "" ], [ "Grassl", "Markus", "" ], [ "Sole", "Patrick", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1676
Patrick Kuppinger
Patrick Kuppinger, Giuseppe Durisi, and Helmut B\"olcskei
Improved Sparsity Thresholds Through Dictionary Splitting
IEEE Information Theory Workshop (ITW), Taormina, Italy, Oct. 2009, to appear
null
10.1109/ITW.2009.5351511
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Known sparsity thresholds for basis pursuit to deliver the maximally sparse solution of the compressed sensing recovery problem typically depend on the dictionary's coherence. While the coherence is easy to compute, it can lead to rather pessimistic thresholds as it captures only limited information about the dictionary. In this paper, we show that viewing the dictionary as the concatenation of two general sub-dictionaries leads to provably better sparsity thresholds--that are explicit in the coherence parameters of the dictionary and of the individual sub-dictionaries. Equivalently, our results can be interpreted as sparsity thresholds for dictionaries that are unions of two general (i.e., not necessarily orthonormal) sub-dictionaries.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 10:48:51 GMT" } ]
2016-11-18T00:00:00
[ [ "Kuppinger", "Patrick", "" ], [ "Durisi", "Giuseppe", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1769
Bert Huang
Bert Huang and Tony Jebara
Approximating the Permanent with Belief Propagation
null
null
null
null
cs.LG cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
This work describes a method of approximating matrix permanents efficiently using belief propagation. We formulate a probability distribution whose partition function is exactly the permanent, then use Bethe free energy to approximate this partition function. After deriving some speedups to standard belief propagation, the resulting algorithm requires $(n^2)$ time per iteration. Finally, we demonstrate the advantages of using this approximation.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 18:27:54 GMT" } ]
2009-08-13T00:00:00
[ [ "Huang", "Bert", "" ], [ "Jebara", "Tony", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1774
David Shuman
David I Shuman, Mingyan Liu, and Owen Q. Wu
Energy-Efficient Transmission Scheduling with Strict Underflow Constraints
109 pages, 11 pdf figures, template.tex is main file. We have significantly revised the paper from version 1. Additions include the case of a single receiver with piecewise-linear convex power-rate curves, the case of two receivers, and the infinite horizon average expected cost problem
null
null
null
math.OC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a single source transmitting data to one or more receivers/users over a shared wireless channel. Due to random fading, the wireless channel conditions vary with time and from user to user. Each user has a buffer to store received packets before they are drained. At each time step, the source determines how much power to use for transmission to each user. The source's objective is to allocate power in a manner that minimizes an expected cost measure, while satisfying strict buffer underflow constraints and a total power constraint in each slot. The expected cost measure is composed of costs associated with power consumption from transmission and packet holding costs. The primary application motivating this problem is wireless media streaming. For this application, the buffer underflow constraints prevent the user buffers from emptying, so as to maintain playout quality. In the case of a single user with linear power-rate curves, we show that a modified base-stock policy is optimal under the finite horizon, infinite horizon discounted, and infinite horizon average expected cost criteria. For a single user with piecewise-linear convex power-rate curves, we show that a finite generalized base-stock policy is optimal under all three expected cost criteria. We also present the sequences of critical numbers that complete the characterization of the optimal control laws in each of these cases when some additional technical conditions are satisfied. We then analyze the structure of the optimal policy for the case of two users. We conclude with a discussion of methods to identify implementable near-optimal policies for the most general case of M users.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 18:40:19 GMT" }, { "version": "v2", "created": "Tue, 16 Feb 2010 00:20:34 GMT" } ]
2010-02-16T00:00:00
[ [ "Shuman", "David I", "" ], [ "Liu", "Mingyan", "" ], [ "Wu", "Owen Q.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1776
Vincent Lariviere
Vincent Lariviere, Yves Gingras
On the relationship between interdisciplinarity and scientific impact
10 pages, 3 figures, 1 table. Forthcoming in JASIST
null
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper analyzes the effect of interdisciplinarity on the scientific impact of individual papers. Using all the papers published in Web of Science in 2000, we define the degree of interdisciplinarity of a given paper as the percentage of its cited references made to journals of other disciplines. We show that, although for all disciplines combined there is no clear correlation between the level of interdisciplinarity of papers and their citation rates, there are nonetheless some disciplines in which a higher level of interdisciplinarity is related to a higher citation rates. For other disciplines, citations decline as interdisciplinarity grows. One characteristic is visible in all disciplines: highly disciplinary and highly interdisciplinary papers have a low scientific impact. This suggests that there might be an optimum of interdisciplinarity beyond which the research is too dispersed to find its niche and under which it is too mainstream to have high impact. Finally, the relationship between interdisciplinarity and scientific impact is highly determined by the citation characteristics of the disciplines involved: papers citing citation intensive disciplines are more likely to be cited by those disciplines and, hence, obtain higher citation scores than papers citing non citation intensive disciplines.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 19:08:59 GMT" } ]
2009-08-13T00:00:00
[ [ "Lariviere", "Vincent", "" ], [ "Gingras", "Yves", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0908.1789
Naveen Kumar
Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy and Murti Salapaka
Maximum-Likelihood Sequence Detector for Dynamic Mode High Density Probe Storage
This paper is published in IEEE Trans. on communication
IEEE Trans. on Communications vol. 58(6), pp. 1686-1694, Jun. 2010
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There is an increasing need for high density data storage devices driven by the increased demand of consumer electronics. In this work, we consider a data storage system that operates by encoding information as topographic profiles on a polymer medium. A cantilever probe with a sharp tip (few nm radius) is used to create and sense the presence of topographic profiles, resulting in a density of few Tb per in.2. The prevalent mode of using the cantilever probe is the static mode that is harsh on the probe and the media. In this article, the high quality factor dynamic mode operation, that is less harsh on the media and the probe, is analyzed. The read operation is modeled as a communication channel which incorporates system memory due to inter-symbol interference and the cantilever state. We demonstrate an appropriate level of abstraction of this complex nanoscale system that obviates the need for an involved physical model. Next, a solution to the maximum likelihood sequence detection problem based on the Viterbi algorithm is devised. Experimental and simulation results demonstrate that the performance of this detector is several orders of magnitude better than the performance of other existing schemes.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 20:05:42 GMT" }, { "version": "v2", "created": "Fri, 25 Jun 2010 18:44:24 GMT" } ]
2010-06-28T00:00:00
[ [ "Kumar", "Naveen", "" ], [ "Agarwal", "Pranav", "" ], [ "Ramamoorthy", "Aditya", "" ], [ "Salapaka", "Murti", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1797
Ted Herman
Kajari Ghosh Dastidar, Ted Herman
Separation of Circulating Tokens
22 pages, 7 figures, epsf and pstricks in LaTeX
null
10.1007/978-3-642-05118-0_25
TR09-02
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self-stabilizing distributed control is often modeled by token abstractions. A system with a single token may implement mutual exclusion; a system with multiple tokens may ensure that immediate neighbors do not simultaneously enjoy a privilege. For a cyber-physical system, tokens may represent physical objects whose movement is controlled. The problem studied in this paper is to ensure that a synchronous system with m circulating tokens has at least d distance between tokens. This problem is first considered in a ring where d is given whilst m and the ring size n are unknown. The protocol solving this problem can be uniform, with all processes running the same program, or it can be non-uniform, with some processes acting only as token relays. The protocol for this first problem is simple, and can be expressed with Petri net formalism. A second problem is to maximize d when m is given, and n is unknown. For the second problem, the paper presents a non-uniform protocol with a single corrective process.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 20:52:52 GMT" }, { "version": "v2", "created": "Sat, 10 Oct 2009 22:55:11 GMT" } ]
2015-05-13T00:00:00
[ [ "Dastidar", "Kajari Ghosh", "" ], [ "Herman", "Ted", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0908.1805
Javad Ghaderi
J. Ghaderi and R. Srikant
Towards a Theory of Anonymous Networking
null
null
null
null
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and maximal throughput strategies with perfect anonymity are found under a strict latency constraint and an average queue length constraint.
[ { "version": "v1", "created": "Wed, 12 Aug 2009 22:23:13 GMT" }, { "version": "v2", "created": "Sun, 20 Nov 2011 23:51:08 GMT" }, { "version": "v3", "created": "Mon, 12 Nov 2012 22:29:06 GMT" } ]
2012-11-14T00:00:00
[ [ "Ghaderi", "J.", "" ], [ "Srikant", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.1826
Hao Zhang
Hao Zhang, Gang Li, Huadong Meng
An Efficient Greedy Algorithm for Sparse Recovery in Noisy Environment
12 pages, 20 figures, submitted to IEEE Trans on Signal Processing. Revised version, 2 figures are replaced
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Greedy algorithm are in widespread use for sparse recovery because of its efficiency. But some evident flaws exists in most popular greedy algorithms, such as CoSaMP, which includes unreasonable demands on prior knowledge of target signal and excessive sensitivity to random noise. A new greedy algorithm called AMOP is proposed in this paper to overcome these obstacles. Unlike CoSaMP, AMOP can extract necessary information of target signal from sample data adaptively and operate normally with little prior knowledge. The recovery error of AMOP is well controlled when random noise is presented and fades away along with increase of SNR. Moreover, AMOP has good robustness on detailed setting of target signal and less dependence on structure of measurement matrix. The validity of AMOP is verified by theoretical derivation. Extensive simulation experiment is performed to illustrate the advantages of AMOP over CoSaMP in many respects. AMOP is a good candidate of practical greedy algorithm in various applications of Compressed Sensing.
[ { "version": "v1", "created": "Thu, 13 Aug 2009 02:58:36 GMT" }, { "version": "v2", "created": "Tue, 18 Aug 2009 11:26:35 GMT" } ]
2009-08-18T00:00:00
[ [ "Zhang", "Hao", "" ], [ "Li", "Gang", "" ], [ "Meng", "Huadong", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1916
Urs Niesen
Urs Niesen, Devavrat Shah, Gregory Wornell
Caching in Wireless Networks
28 pages, to appear in IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol. 58, pp. 6524 - 6540, October 2012
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of delivering content cached in a wireless network of n nodes randomly located on a square of area n. The network performance is described by the n2^n-dimensional caching capacity region of the wireless network. We provide an inner bound on this caching capacity region, and, in the high path-loss regime, a matching (in the scaling sense) outer bound. For large path-loss exponent, this provides an information-theoretic scaling characterization of the entire caching capacity region. The proposed communication scheme achieving the inner bound shows that the problems of cache selection and channel coding can be solved separately without loss of order-optimality. On the other hand, our results show that the common architecture of nearest-neighbor cache selection can be arbitrarily bad, implying that cache selection and load balancing need to be performed jointly.
[ { "version": "v1", "created": "Thu, 13 Aug 2009 15:21:28 GMT" }, { "version": "v2", "created": "Fri, 15 Oct 2010 21:32:23 GMT" }, { "version": "v3", "created": "Thu, 29 Dec 2011 16:55:37 GMT" } ]
2012-09-28T00:00:00
[ [ "Niesen", "Urs", "" ], [ "Shah", "Devavrat", "" ], [ "Wornell", "Gregory", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1919
Patrick Erik Bradley
Patrick Erik Bradley
A dyadic solution of relative pose problems
7 pages; references added; typos and Thm 2 corrected (not affecting the other results)
null
null
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A hierarchical interval subdivision is shown to lead to a $p$-adic encoding of image data. This allows in the case of the relative pose problem in computer vision and photogrammetry to derive equations having 2-adic numbers as coefficients, and to use Hensel's lifting method to their solution. This method is applied to the linear and non-linear equations coming from eight, seven or five point correspondences. An inherent property of the method is its robustness.
[ { "version": "v1", "created": "Thu, 13 Aug 2009 15:41:44 GMT" }, { "version": "v2", "created": "Fri, 14 Aug 2009 14:01:20 GMT" }, { "version": "v3", "created": "Thu, 1 Oct 2009 06:50:18 GMT" } ]
2009-10-01T00:00:00
[ [ "Bradley", "Patrick Erik", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0908.1932
Ketan Mulmuley D
Ketan D. Mulmuley
On P vs. NP, Geometric Complexity Theory, Explicit Proofs and the Complexity Barrier
65 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geometric complexity theory (GCT) is an approach to the P vs. NP and related problems. This article gives its complexity theoretic overview without assuming any background in algebraic geometry or representation theory.
[ { "version": "v1", "created": "Thu, 13 Aug 2009 18:31:54 GMT" }, { "version": "v2", "created": "Wed, 19 Aug 2009 00:22:41 GMT" } ]
2009-08-19T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.1936
Ketan Mulmuley D
Ketan D. Mulmuley
On P vs. NP, Geometric Complexity Theory, and the Riemann Hypothesis
71 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geometric complexity theory (GCT) is an approach to the $P$ vs. $NP$ and related problems. A high level overview of this research plan and the results obtained so far was presented in a series of three lectures in the Institute of Advanced study, Princeton, Feb 9-11, 2009. This article contains the material covered in those lectures after some revision, and gives a mathematical overview of GCT. No background in algebraic geometry, representation theory or quantum groups is assumed.
[ { "version": "v1", "created": "Thu, 13 Aug 2009 18:05:07 GMT" }, { "version": "v2", "created": "Wed, 19 Aug 2009 00:32:52 GMT" } ]
2009-08-19T00:00:00
[ [ "Mulmuley", "Ketan D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.1948
I-Hsiang Wang
I-Hsiang Wang and David N. C. Tse
Interference Mitigation Through Limited Receiver Cooperation: Symmetric Case
To appear in IEEE Information Theory Workshop, Taormina, October 2009. Final version
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interference is a major issue that limits the performance in wireless networks, and cooperation among receivers can help mitigate interference by forming distributed MIMO systems. The rate at which receivers cooperate, however, is limited in most scenarios. How much interference can one bit of receiver cooperation mitigate? In this paper, we study the two-user Gaussian interference channel with conferencing decoders to answer this question in a simple setting. We characterize the fundamental gain from cooperation: at high SNR, when INR is below 50% of SNR in dB scale, one-bit cooperation per direction buys roughly one-bit gain per user until full receiver cooperation performance is reached, while when INR is between 67% and 200% of SNR in dB scale, one-bit cooperation per direction buys roughly half-bit gain per user. The conclusion is drawn based on the approximate characterization of the symmetric capacity in the symmetric set-up. We propose strategies achieving the symmetric capacity universally to within 3 bits. The strategy consists of two parts: (1) the transmission scheme, where superposition encoding with a simple power split is employed, and (2) the cooperative protocol, where quantize-binning is used for relaying.
[ { "version": "v1", "created": "Thu, 13 Aug 2009 18:17:38 GMT" }, { "version": "v2", "created": "Thu, 20 Aug 2009 17:51:00 GMT" } ]
2009-08-20T00:00:00
[ [ "Wang", "I-Hsiang", "" ], [ "Tse", "David N. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.1966
Mark Flanagan
Roxana Smarandache and Mark F. Flanagan
Spectral Graph Analysis of Quasi-Cyclic Codes
5 pages. Proc. IEEE Globecom 2009, Hawaii, USA, November 30 - December 4, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we analyze the bound on the additive white Gaussian noise channel (AWGNC) pseudo-weight of a (c,d)-regular linear block code based on the two largest eigenvalues of H^T H. In particular, we analyze (c,d)-regular quasi-cyclic (QC) codes of length rL described by J x L block parity-check matrices with circulant block entries of size r x r. We proceed by showing how the problem of computing the eigenvalues of the rL x rL matrix H^T H can be reduced to the problem of computing eigenvalues for r matrices of size L x L. We also give a necessary condition for the bound to be attained for a circulant matrix H and show a few classes of cyclic codes satisfying this criterion.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 14:54:20 GMT" }, { "version": "v2", "created": "Sun, 16 Aug 2009 19:27:38 GMT" } ]
2009-08-17T00:00:00
[ [ "Smarandache", "Roxana", "" ], [ "Flanagan", "Mark F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2005
Danny Bickson
Danny Bickson, Dror Baron, Alex T. Ihler, Harel Avissar and Danny Dolev
Fault Identification via Non-parametric Belief Propagation
In IEEE Tran. On Signal Processing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of identifying a pattern of faults from a set of noisy linear measurements. Unfortunately, maximum a posteriori probability estimation of the fault pattern is computationally intractable. To solve the fault identification problem, we propose a non-parametric belief propagation approach. We show empirically that our belief propagation solver is more accurate than recent state-of-the-art algorithms including interior point methods and semidefinite programming. Our superior performance is explained by the fact that we take into account both the binary nature of the individual faults and the sparsity of the fault pattern arising from their rarity.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 02:16:47 GMT" }, { "version": "v2", "created": "Mon, 21 Sep 2009 14:20:29 GMT" }, { "version": "v3", "created": "Thu, 24 Sep 2009 13:42:05 GMT" }, { "version": "v4", "created": "Mon, 12 Jul 2010 17:54:42 GMT" }, { "version": "v5", "created": "Fri, 5 Nov 2010 14:59:45 GMT" }, { "version": "v6", "created": "Mon, 8 Nov 2010 16:16:31 GMT" }, { "version": "v7", "created": "Wed, 24 Nov 2010 14:55:23 GMT" }, { "version": "v8", "created": "Tue, 1 Feb 2011 18:21:51 GMT" } ]
2015-03-13T00:00:00
[ [ "Bickson", "Danny", "" ], [ "Baron", "Dror", "" ], [ "Ihler", "Alex T.", "" ], [ "Avissar", "Harel", "" ], [ "Dolev", "Danny", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2007
Fabio Soldo
Fabio Soldo, Anh Le, Athina Markopoulou
Predictive Blacklisting as an Implicit Recommendation System
Comments: 11 pages; Submitted to INFOCOM 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A widely used defense practice against malicious traffic on the Internet is through blacklists: lists of prolific attack sources are compiled and shared. The goal of blacklists is to predict and block future attack sources. Existing blacklisting techniques have focused on the most prolific attack sources and, more recently, on collaborative blacklisting. In this paper, we formulate the problem of forecasting attack sources (also referred to as predictive blacklisting) based on shared attack logs as an implicit recommendation system. We compare the performance of existing approaches against the upper bound for prediction, and we demonstrate that there is much room for improvement. Inspired by the recent Netflix competition, we propose a multi-level prediction model that is adjusted and tuned specifically for the attack forecasting problem. Our model captures and combines various factors, namely: attacker-victim history (using time-series) and attackers and/or victims interactions (using neighborhood models). We evaluate our combined method on one month of logs from Dshield.org and demonstrate that it improves significantly the state-of-the-art.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 03:45:12 GMT" } ]
2009-08-17T00:00:00
[ [ "Soldo", "Fabio", "" ], [ "Le", "Anh", "" ], [ "Markopoulou", "Athina", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.2024
Wilfred Ndifon
Wilfred Ndifon, Joshua B. Plotkin, Jonathan Dushoff
On the accessibility of adaptive phenotypes of a bacterial metabolic network
48 pages, 9 figures, 1 table. Accepted in PLoS Computational Biology (July '09)
null
10.1371/journal.pcbi.1000472
null
q-bio.PE cs.IT math.IT q-bio.MN q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The mechanisms by which adaptive phenotypes spread within an evolving population after their emergence are understood fairly well. Much less is known about the factors that influence the evolutionary accessibility of such phenotypes, a pre-requisite for their emergence in a population. Here, we investigate the influence of environmental quality on the accessibility of adaptive phenotypes of Escherichia coli's central metabolic network. We used an established flux-balance model of metabolism as the basis for a genotype-phenotype map (GPM). We quantified the effects of seven qualitatively different environments (corresponding to both carbohydrate and gluconeogenic metabolic substrates) on the structure of this GPM. We found that the GPM has a more rugged structure in qualitatively poorer environments, suggesting that adaptive phenotypes could be intrinsically less accessible in such environments. Nevertheless, on average ~74% of the genotype can be altered by neutral drift, in the environment where the GPM is most rugged; this could allow evolving populations to circumvent such ruggedness. Furthermore, we found that the normalized mutual information (NMI) of genotype differences relative to phenotype differences, which measures the GPM's capacity to transmit information about phenotype differences, is positively correlated with (simulation-based) estimates of the accessibility of adaptive phenotypes in different environments. These results are consistent with the predictions of a simple analytic theory and they suggest an intuitive information-theoretic principle for evolutionary adaptation; adaptation could be faster in environments where the GPM has a greater capacity to transmit information about phenotype differences.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 08:30:40 GMT" } ]
2015-05-13T00:00:00
[ [ "Ndifon", "Wilfred", "" ], [ "Plotkin", "Joshua B.", "" ], [ "Dushoff", "Jonathan", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0908.2032
Eric Meyer
Eric T. Meyer, Ralph Schroeder
Untangling the Web of E-Research: Towards a Sociology of Online Knowledge
null
Journal of Informetrics (2009) 3(3):246-260
null
null
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
e-Research is a rapidly growing research area, both in terms of publications and in terms of funding. In this article we argue that it is necessary to reconceptualize the ways in which we seek to measure and understand e-Research by developing a sociology of knowledge based on our understanding of how science has been transformed historically and shifted into online forms. Next, we report data which allows the examination of e-Research through a variety of traces in order to begin to understand how the knowledge in the realm of e-Research has been and is being constructed. These data indicate that e-Research has had a variable impact in different fields of research. We argue that only an overall account of the scale and scope of e-Research within and between different fields makes it possible to identify the organizational coherence and diffuseness of e-Research in terms of its socio-technical networks, and thus to identify the contributions of e-Research to various research fronts in the online production of knowledge.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 10:09:36 GMT" } ]
2009-08-17T00:00:00
[ [ "Meyer", "Eric T.", "" ], [ "Schroeder", "Ralph", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0908.2042
Ryutaroh Matsumoto
Ryutaroh Matsumoto
Problems in application of LDPC codes to information reconciliation in quantum key distribution protocols
10 pages, 1 figure. short survey article
null
null
IT2009-41
cs.IT cs.CR math.IT quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The information reconciliation in a quantum key distribution protocol can be studied separately from other steps in the protocol. The problem of information reconciliation can be reduced to that of distributed source coding. Its solution by LDPC codes is reviewed. We list some obstacles preventing the LDPC-based distributed source coding from becoming a more favorable alternative to the Cascade protocol for information reconciliation in quantum key distribution protocols. This exposition does not require knowledge of the quantum theory.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 11:36:12 GMT" }, { "version": "v2", "created": "Sun, 13 Sep 2009 10:19:58 GMT" } ]
2009-09-13T00:00:00
[ [ "Matsumoto", "Ryutaroh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0908.2050
Guido Tack
Christian Schulte and Guido Tack
View-based Propagator Derivation
28 pages, 7 tables, 3 figures
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When implementing a propagator for a constraint, one must decide about variants: When implementing min, should one also implement max? Should one implement linear constraints both with unit and non-unit coefficients? Constraint variants are ubiquitous: implementing them requires considerable (if not prohibitive) effort and decreases maintainability, but will deliver better performance than resorting to constraint decomposition. This paper shows how to use views to derive perfect propagator variants. A model for views and derived propagators is introduced. Derived propagators are proved to be indeed perfect in that they inherit essential properties such as correctness and domain and bounds consistency. Techniques for systematically deriving propagators such as transformation, generalization, specialization, and type conversion are developed. The paper introduces an implementation architecture for views that is independent of the underlying constraint programming system. A detailed evaluation of views implemented in Gecode shows that derived propagators are efficient and that views often incur no overhead. Without views, Gecode would either require 180 000 rather than 40 000 lines of propagator code, or would lack many efficient propagator variants. Compared to 8 000 lines of code for views, the reduction in code for propagators yields a 1750% return on investment.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 12:27:51 GMT" } ]
2009-08-17T00:00:00
[ [ "Schulte", "Christian", "" ], [ "Tack", "Guido", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.2056
Sebastian Roch
Yuval Peres and Sebastien Roch
Reconstruction on Trees: Exponential Moment Bounds for Linear Estimators
null
null
null
null
math.PR cs.DS math.ST q-bio.PE stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a Markov chain $(\xi_v)_{v \in V} \in [k]^V$ on the infinite $b$-ary tree $T = (V,E)$ with irreducible edge transition matrix $M$, where $b \geq 2$, $k \geq 2$ and $[k] = \{1,...,k\}$. We denote by $L_n$ the level-$n$ vertices of $T$. Assume $M$ has a real second-largest (in absolute value) eigenvalue $\lambda$ with corresponding real eigenvector $\nu \neq 0$. Letting $\sigma_v = \nu_{\xi_v}$, we consider the following root-state estimator, which was introduced by Mossel and Peres (2003) in the context of the "recontruction problem" on trees: \begin{equation*} S_n = (b\lambda)^{-n} \sum_{x\in L_n} \sigma_x. \end{equation*} As noted by Mossel and Peres, when $b\lambda^2 > 1$ (the so-called Kesten-Stigum reconstruction phase) the quantity $S_n$ has uniformly bounded variance. Here, we give bounds on the moment-generating functions of $S_n$ and $S_n^2$ when $b\lambda^2 > 1$. Our results have implications for the inference of evolutionary trees.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 13:05:32 GMT" } ]
2011-09-07T00:00:00
[ [ "Peres", "Yuval", "" ], [ "Roch", "Sebastien", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0908.2061
Sebastian Roch
Sebastien Roch
Sequence-Length Requirement of Distance-Based Phylogeny Reconstruction: Breaking the Polynomial Barrier
null
null
null
null
math.PR cs.CE cs.DS math.ST q-bio.PE q-bio.QM stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a new distance-based phylogeny reconstruction technique which provably achieves, at sufficiently short branch lengths, a polylogarithmic sequence-length requirement -- improving significantly over previous polynomial bounds for distance-based methods. The technique is based on an averaging procedure that implicitly reconstructs ancestral sequences. In the same token, we extend previous results on phase transitions in phylogeny reconstruction to general time-reversible models. More precisely, we show that in the so-called Kesten-Stigum zone (roughly, a region of the parameter space where ancestral sequences are well approximated by ``linear combinations'' of the observed sequences) sequences of length $\poly(\log n)$ suffice for reconstruction when branch lengths are discretized. Here $n$ is the number of extant species. Our results challenge, to some extent, the conventional wisdom that estimates of evolutionary distances alone carry significantly less information about phylogenies than full sequence datasets.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 13:20:44 GMT" } ]
2011-09-30T00:00:00
[ [ "Roch", "Sebastien", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.PE", "description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life", "span": "(Populations and Evolution)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0908.2083
Janusz Brzozowski
J. Brzozowski, G. Jir\'askov\'a, B. Li
Quotient complexity of ideal languages
24 pages, 9 .eepic figures, 2 tables, use llncs.cls
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the state complexity of regular operations in the class of ideal languages. A language L over an alphabet Sigma is a right (left) ideal if it satisfies L = L Sigma* (L = Sigma* L). It is a two-sided ideal if L = Sigma* L Sigma *, and an all-sided ideal if it is the shuffle of Sigma* with L. We prefer the term "quotient complexity" instead of "state complexity", and we use derivatives to calculate upper bounds on quotient complexity, whenever it is convenient. We find tight upper bounds on the quotient complexity of each type of ideal language in terms of the complexity of an arbitrary generator and of its minimal generator, the complexity of the minimal generator, and also on the operations union, intersection, set difference, symmetric difference, concatenation, star and reversal of ideal languages.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 15:24:15 GMT" } ]
2009-08-17T00:00:00
[ [ "Brzozowski", "J.", "" ], [ "Jirásková", "G.", "" ], [ "Li", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0908.2117
Babak Seyfe
Masoud Zaerin, Babak Seyfe, and Hamid R. Nikoofar
Multiuser Modulation Classification Based on Cumulants in AWGN Channel
25 Pages, 7 Figures, 1 Table, Submitted to IEEE Transaction on Communications. Submitted to IEEE Transaction on Communications
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper the negative impacts of interference transmitters on automatic modulation classification (AMC) have been discussed. We proposed two approaches for AMC in the presence of interference: single user modulation classification (SUMC) and multiuser modulation classification (MUMC). When the received power of one transmitter is larger than the other transmitters, SUMC approach recognizes the modulation type of that transmitter and other transmitters are treated as interferences. Alternatively when the received powers of all transmitters are close to each other we propose MUMC method to recognize the modulation type of all of the transmitted signals. The features being used to recognize the modulation types of transmitters for both approaches, SUMC and MUMC are higher order cumulants. The super-position property of cumulants for independent random variables is utilized for SUMC and MUMC. We investigated the robustness of our classifier with respect to different powers of the received signals via analytical and simulation results and we have shown the analytical results will be confirmed by simulations. Also we studied the effect of signal synchroni-zation error via simulation results in the both condition for MUMC and SUMC.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 18:46:20 GMT" } ]
2009-08-17T00:00:00
[ [ "Zaerin", "Masoud", "" ], [ "Seyfe", "Babak", "" ], [ "Nikoofar", "Hamid R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2119
Bobak Nazer
Bobak Nazer and Michael Gastpar
Compute-and-Forward: Harnessing Interference through Structured Codes
IEEE Trans. Info Theory, to appear. 23 pages, 13 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Interference is usually viewed as an obstacle to communication in wireless networks. This paper proposes a new strategy, compute-and-forward, that exploits interference to obtain significantly higher rates between users in a network. The key idea is that relays should decode linear functions of transmitted messages according to their observed channel coefficients rather than ignoring the interference as noise. After decoding these linear equations, the relays simply send them towards the destinations, which given enough equations, can recover their desired messages. The underlying codes are based on nested lattices whose algebraic structure ensures that integer combinations of codewords can be decoded reliably. Encoders map messages from a finite field to a lattice and decoders recover equations of lattice points which are then mapped back to equations over the finite field. This scheme is applicable even if the transmitters lack channel state information.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 19:56:39 GMT" }, { "version": "v2", "created": "Fri, 14 Aug 2009 23:58:36 GMT" }, { "version": "v3", "created": "Mon, 13 Jun 2011 01:01:00 GMT" } ]
2011-06-14T00:00:00
[ [ "Nazer", "Bobak", "" ], [ "Gastpar", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2122
Michael Freedman
M. Bordewich, M. Freedman, L. Lov\'asz and D. Welsh
Approximate Counting and Quantum Computation
null
Combinatorics, Probability and Computing (2005) 14,737-754
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by the result that an `approximate' evaluation of the Jones polynomial of a braid at a $5^{th}$ root of unity can be used to simulate the quantum part of any algorithm in the quantum complexity class BQP, and results relating BQP to the counting class GapP, we introduce a form of additive approximation which can be used to simulate a function in BQP. We show that all functions in the classes #P and GapP have such an approximation scheme under certain natural normalisations. However we are unable to determine whether the particular functions we are motivated by, such as the above evaluation of the Jones polynomial, can be approximated in this way. We close with some open problems motivated by this work.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 19:29:07 GMT" } ]
2009-08-17T00:00:00
[ [ "Bordewich", "M.", "" ], [ "Freedman", "M.", "" ], [ "Lovász", "L.", "" ], [ "Welsh", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.2128
Toby S. Cubitt
Toby S. Cubitt, Jens Eisert and Michael M. Wolf
The Complexity of Relating Quantum Channels to Master Equations
V1: 43 pages, single column, 8 figures. V2: titled changed; added proof-overview and accompanying figure; 50 pages, single column, 9 figures
Commun. Math. Phys. 310, 383 (2012)
null
null
math-ph cs.CC math.MP quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Completely positive, trace preserving (CPT) maps and Lindblad master equations are both widely used to describe the dynamics of open quantum systems. The connection between these two descriptions is a classic topic in mathematical physics. One direction was solved by the now famous result due to Lindblad, Kossakowski Gorini and Sudarshan, who gave a complete characterisation of the master equations that generate completely positive semi-groups. However, the other direction has remained open: given a CPT map, is there a Lindblad master equation that generates it (and if so, can we find it's form)? This is sometimes known as the Markovianity problem. Physically, it is asking how one can deduce underlying physical processes from experimental observations. We give a complexity theoretic answer to this problem: it is NP-hard. We also give an explicit algorithm that reduces the problem to integer semi-definite programming, a well-known NP problem. Together, these results imply that resolving the question of which CPT maps can be generated by master equations is tantamount to solving P=NP: any efficiently computable criterion for Markovianity would imply P=NP; whereas a proof that P=NP would imply that our algorithm already gives an efficiently computable criterion. Thus, unless P does equal NP, there cannot exist any simple criterion for determining when a CPT map has a master equation description. However, we also show that if the system dimension is fixed (relevant for current quantum process tomography experiments), then our algorithm scales efficiently in the required precision, allowing an underlying Lindblad master equation to be determined efficiently from even a single snapshot in this case. Our work also leads to similar complexity-theoretic answers to a related long-standing open problem in probability theory.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 15:51:17 GMT" }, { "version": "v2", "created": "Mon, 12 Sep 2011 12:46:41 GMT" } ]
2012-02-22T00:00:00
[ [ "Cubitt", "Toby S.", "" ], [ "Eisert", "Jens", "" ], [ "Wolf", "Michael M.", "" ] ]
[ { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0908.2141
Yucel Altug
Yucel Altug and Aaron B. Wagner
Source and Channel Simulation Using Arbitrary Randomness
26 pages, 2 figures, submitted to IEEE Trans. on Information Theory. A shorter version will be presented at 2009 Allerton Conference on Communication, Control, and Computing
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Necessary and sufficient conditions for approximation of a general channel by a general source are proved. For the special case in which the channel input is deterministic, which corresponds to source simulation, we prove a stronger necessary condition. As the approximation criteria, vanishing variational distance between the original and the approximated quantity is used for both of the problems. Both necessary and sufficient conditions for the two problems are based on some individual properties of the sources and the channel and are relatively easy to evaluate. In particular, unlike prior results for this problem, our results do not require solving an optimization problem to test simulatability. The results are illustrated with several non-ergodic examples.
[ { "version": "v1", "created": "Fri, 14 Aug 2009 21:14:10 GMT" } ]
2009-08-18T00:00:00
[ [ "Altug", "Yucel", "" ], [ "Wagner", "Aaron B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2153
Sergiy Vorobyov
Aboulnasr Hassanien and Sergiy A. Vorobyov
Phased-MIMO Radar: A Tradeoff Between Phased-Array and MIMO Radars
33 pages, 14 figures, Submitted to the IEEE Transactions on Signal Processing in July 2009
A. Hassanien and S.A. Vorobyov, "Phased-MIMO radar: A tradeoff between phased-array and MIMO radars," IEEE Trans. Signal Processing, vol. 58, no. 6, pp. 3137-3151, June 2010
10.1109/TSP.2010.2043976
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a new technique for multiple-input multiple-output (MIMO) radar with colocated antennas which we call phased-MIMO radar. The new technique enjoys the advantages of MIMO radar without sacrificing the main advantage of phased-array radar which is the coherent processing gain at the transmitting side. The essence of the proposed technique is to partition the transmitting array into a number of subarrays that are allowed to overlap. Then, each subarray is used to coherently transmit a waveform which is orthogonal to the waveforms transmitted by other subarrays. Coherent processing gain can be achieved by designing a weight vector for each subarray to form a beam towards a certain direction in space. Moreover, the subarrays are combined jointly to form a MIMO radar resulting in higher resolution capabilities. The substantial improvements offered by the proposed phased-MIMO radar technique as compared to previous techniques are demonstrated analytically and by simulations through analysis of the corresponding beampatterns and achievable output signal-to-noise-plus-interference ratios. Both analytical and simulation results validate the effectiveness of the proposed phased-MIMO radar.
[ { "version": "v1", "created": "Sat, 15 Aug 2009 01:51:32 GMT" } ]
2015-05-13T00:00:00
[ [ "Hassanien", "Aboulnasr", "" ], [ "Vorobyov", "Sergiy A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2174
Suhan Choi
Suhan Choi
Distributed Source Coding with One Distortion Criterion and Correlated Messages
20 pages, 7 figures, submitted to IEEE Trans. on Info. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, distributed (or multiterminal) source coding with one distortion criterion and correlated messages is considered. This problem can be also called ``Berger-Yeung problem with correlated messages''. It corresponds to the source coding part of the graph-based framework for transmission of a pair of correlated sources over the multiple-access channel (MAC) where one is lossless and the other is lossy. As a result, the achievable rate-distortion region for this problem is provided. It is an information-theoretic characterization of the rate of exponential growth (as a function of the number of source samples) of the size of the bipartite graphs which can represent a pair of correlated sources with satisfying one distortion criterion. A rigorous proof of the achievability and the converse part is given. It is also shown that there exists functional duality between Berger-Yeung problem with correlated messages and semi-deterministic broadcast channel with correlated messages. This means that the optimal encoder-decoder mappings for one problem become the optimal decoder-encoder mappings for the dual problem. In the duality setup, the correlation structure of the messages in the two dual problems, source distortion measure and channel cost measure are also specified.
[ { "version": "v1", "created": "Sat, 15 Aug 2009 14:11:44 GMT" } ]
2009-08-18T00:00:00
[ [ "Choi", "Suhan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2198
Maria Bras-Amor\'os
Maria Bras-Amor\'os and Michael E. O'Sullivan
The Berlekamp-Massey Algorithm and the Euclidean Algorithm: a Closer Link
null
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The two primary decoding algorithms for Reed-Solomon codes are the Berlekamp-Massey algorithm and the Sugiyama et al. adaptation of the Euclidean algorithm, both designed to solve a key equation. In this article an alternative version of the key equation and a new way to use the Euclidean algorithm to solve it are presented, which yield the Berlekamp-Massey algorithm. This results in a new, simpler, and compacter presentation of the Berlekamp-Massey algorithm.
[ { "version": "v1", "created": "Sat, 15 Aug 2009 21:01:42 GMT" } ]
2009-08-18T00:00:00
[ [ "Bras-Amorós", "Maria", "" ], [ "O'Sullivan", "Michael E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2203
Makesh Pravin John Wilson
Makesh Pravin Wilson and Krishna Narayanan
Transmitting an analog Gaussian source over a Gaussian wiretap channel under SNR mismatch
6 pages and 3 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work we study encoding/decoding schemes for the transmission of a discrete time analog Gaussian source over a Gaussian wiretap channel. The intended receiver is assumed to have a certain minimum signal to noise ratio (SNR) and the eavesdropper is assumed to have a strictly lower SNR compared to the intended receiver. For a fixed information leakage to the eavesdropper, we are interested in minimizing the distortion in source reconstruction at the intended receiver, and we propose joint source channel coding (JSCC) schemes for this setup. For a fixed information leakage to the eavesdropper, we also show that the schemes considered give a graceful degradation of distortion with SNR under SNR mismatch, i.e., when the actual channel SNR is observed to be different from the design SNR.
[ { "version": "v1", "created": "Sat, 15 Aug 2009 22:10:52 GMT" } ]
2009-08-18T00:00:00
[ [ "Wilson", "Makesh Pravin", "" ], [ "Narayanan", "Krishna", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2222
Gerald Krafft
Gerald Krafft, Vladimir Getov
Transaction-Oriented Simulation In Ad Hoc Grids: Design and Experience
7 pages, 6 figures, 1 tables, Proceedings of the 2008 High Performance Computing and Simulation Conference (HPCS 2008), 3 - 6 June 2008, Nicosia, Cyprus. pp. 38-44; http://westminsterresearch.wmin.ac.uk/5341/
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we analyse the requirements of performing parallel transaction-oriented simulations within loosely coupled systems like ad hoc grids. We focus especially on the space-parallel approach to parallel simulation and on discrete event synchronisation algorithms that are suitable for transaction-oriented simulation and the target environment of ad hoc grids. To demonstrate our findings, a Java-based parallel simulator for the transaction-oriented language GPSS/H is implemented on the basis of the most promising shock-resistant Time Warp (SRTW) synchronisation algorithm and using the grid framework ProActive. The analysis of our parallel simulator, based on experiments using the Grid5000 platform, shows that the SRTW algorithm can successfully reduce the number of rolled back transaction moves but it also reveals circumstances in which the SRTW algorithm can be outperformed by the normal Time Warp algorithm. Finally, possible improvements to the SRTW algorithm are proposed in order to avoid such problems.
[ { "version": "v1", "created": "Sun, 16 Aug 2009 08:30:48 GMT" } ]
2009-08-18T00:00:00
[ [ "Krafft", "Gerald", "" ], [ "Getov", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]