id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0908.0932
|
Grenville Croll
|
M. Sriram Iyengar, John R. Svirbely
|
The Medical Algorithms Project
|
6 Pages, 2 Colour Figures
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 113-118
ISBN 978-1-905617-89-0
| null | null |
cs.HC cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Medical Algorithms Project, a web-based resource located at
www.medal.org, is the world's largest collection of medical-related
spreadsheets, consisting of over 13,500 Excel spreadsheets each encoding a
medical algorithm from 45 different areas of medical practice. This free
resource is in use worldwide with over 106,000 registered users as of March 1,
2009.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 18:52:41 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"Iyengar",
"M. Sriram",
""
],
[
"Svirbely",
"John R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.0935
|
Grenville Croll
|
Ruth McKeever, Kevin McDaid, Brian Bishop
|
An Exploratory Analysis of the Impact of Named Ranges on the Debugging
Performance of Novice Users
|
13 Pages, 4 Figures. Winner of the 2009 David Chadwick Prize for Best
Student Paper
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 69-81
ISBN 978-1-905617-89-0
| null | null |
cs.HC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes an exploratory empirical study of the effect of named
ranges on spreadsheet debugging performance. Named ranges are advocated in both
academia and industry, yet no experimental evidence has been cited to back up
these recommendations. This paper describes an exploratory experiment involving
21 participants that assesses the performance of novices debugging a
spreadsheet containing named ranges. The results are compared with the
performance of a different set of novices debugging the same spreadsheet
without named ranges. The findings suggest that novice users debug on average
significantly fewer errors if the spreadsheet contains named ranges. The
purpose of the investigative study is to derive a detailed and coherent set of
research questions regarding the impact of range names on the debugging
performance and behaviour of spreadsheet users. These will be answered through
future controlled experiments.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 19:03:02 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"McKeever",
"Ruth",
""
],
[
"McDaid",
"Kevin",
""
],
[
"Bishop",
"Brian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.0939
|
William White III
|
Eddie White
|
Clustering for Improved Learning in Maze Traversal Problem
|
29 pages, 15 figures, Undergraduate Honors Thesis
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The maze traversal problem (finding the shortest distance to the goal from
any position in a maze) has been an interesting challenge in computational
intelligence. Recent work has shown that the cellular simultaneous recurrent
neural network (CSRN) can solve this problem for simple mazes. This thesis
focuses on exploiting relevant information about the maze to improve learning
and decrease the training time for the CSRN to solve mazes. Appropriate
variables are identified to create useful clusters using relevant information.
The CSRN was next modified to allow for an additional external input. With this
additional input, several methods were tested and results show that clustering
the mazes improves the overall learning of the traversal problem for the CSRN.
|
[
{
"version": "v1",
"created": "Thu, 6 Aug 2009 19:48:20 GMT"
}
] | 2009-08-07T00:00:00 |
[
[
"White",
"Eddie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0908.0968
|
Yuval Emek
|
Yuval Emek, Amos Korman, and Yuval Shavitt
|
Approximating the Statistics of various Properties in Randomly Weighted
Graphs
|
22 pages (excluding the title page)
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider the setting of \emph{randomly weighted graphs}, namely, graphs whose
edge weights are chosen independently according to probability distributions
with finite support over the non-negative reals. Under this setting, properties
of weighted graphs typically become random variables and we are interested in
computing their statistical features. Unfortunately, this turns out to be
computationally hard for some properties albeit the problem of computing them
in the traditional setting of algorithmic graph theory is tractable. For
example, there are well known efficient algorithms that compute the
\emph{diameter} of a given weighted graph, yet, computing the \emph{expected}
diameter of a given randomly weighted graph is \SharpP{}-hard even if the edge
weights are identically distributed. In this paper, we define a family of
properties of weighted graphs and show that for each property in this family,
the problem of computing the \emph{$k^{\text{th}}$ moment} (and in particular,
the expected value) of the corresponding random variable in a given randomly
weighted graph $G$ admits a \emph{fully polynomial time randomized
approximation scheme (FPRAS)} for every fixed $k$. This family includes
fundamental properties of weighted graphs such as the diameter of $G$, the
\emph{radius} of $G$ (with respect to any designated vertex) and the weight of
a \emph{minimum spanning tree} of $G$.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 05:53:45 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Nov 2009 15:16:47 GMT"
},
{
"version": "v3",
"created": "Fri, 25 Dec 2009 17:29:32 GMT"
},
{
"version": "v4",
"created": "Sun, 28 Mar 2010 18:23:28 GMT"
}
] | 2010-03-30T00:00:00 |
[
[
"Emek",
"Yuval",
""
],
[
"Korman",
"Amos",
""
],
[
"Shavitt",
"Yuval",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.0979
|
R Doomun
|
A. Damodaram, H. Jayasri
|
Authentication Without Identification using Anonymous Credential System
|
4 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Privacy and security are often intertwined. For example, identity theft is
rampant because we have become accustomed to authentication by identification.
To obtain some service, we provide enough information about our identity for an
unscrupulous person to steal it (for example, we give our credit card number to
Amazon.com). One of the consequences is that many people avoid e-commerce
entirely due to privacy and security concerns. The solution is to perform
authentication without identification. In fact, all on-line actions should be
as anonymous as possible, for this is the only way to guarantee security for
the overall system. A credential system is a system in which users can obtain
credentials from organizations and demonstrate possession of these credentials.
Such a system is anonymous when transactions carried out by the same user
cannot be linked. An anonymous credential system is of significant practical
relevance because it is the best means of providing privacy for users.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 04:02:05 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Damodaram",
"A.",
""
],
[
"Jayasri",
"H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.0980
|
R Doomun
|
Syed S. Rizvi, Khaled M. Elleithy, Aasia Riasat
|
Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA
Networks
|
9 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Multiuser receivers suffer from their relatively higher
computational complexity that prevents widespread use of this technique. In
addition, one of the main characteristics of multi-channel communications that
can severely degrade the performance is the inconsistent and low values of SNR
that result in high BER and poor channel capacity. It has been shown that the
computational complexity of a multiuser receiver can be reduced by using the
transformation matrix (TM) algorithm [4]. In this paper, we provide
quantification of SNR based on the computational complexity of TM algorithm. We
show that the reduction of complexity results high and consistent values of SNR
that can consequently be used to achieve a desirable BER performance. In
addition, our simulation results suggest that the high and consistent values of
SNR can be achieved for a desirable BER performance. The performance measure
adopted in this paper is the consistent values of SNR.
|
[
{
"version": "v1",
"created": "Sun, 9 Aug 2009 06:57:39 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Rizvi",
"Syed S.",
""
],
[
"Elleithy",
"Khaled M.",
""
],
[
"Riasat",
"Aasia",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0981
|
R Doomun
|
Syed S. Rizvi, and Khaled M. Elleithy
|
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile
Ad Hoc Networks
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The performance of Mobile Ad hoc networks (MANET) depends on the cooperation
of all active nodes. However, supporting a MANET is a cost-intensive activity
for a mobile node. From a single mobile node perspective, the detection of
routes as well as forwarding packets consume local CPU time, memory,
network-bandwidth, and last but not least energy. We believe that this is one
of the main factors that strongly motivate a mobile node to deny packet
forwarding for others, while at the same time use their services to deliver its
own data. This behavior of an independent mobile node is commonly known as
misbehaving or selfishness. A vast amount of research has already been done for
minimizing malicious behavior of mobile nodes. However, most of them focused on
the methods/techniques/algorithms to remove such nodes from the MANET. We
believe that the frequent elimination of such miss-behaving nodes never allowed
a free and faster growth of MANET. This paper provides a critical analysis of
the recent research wok and its impact on the overall performance of a MANET.
In this paper, we clarify some of the misconceptions in the understating of
selfishness and miss-behavior of nodes. Moreover, we propose a mathematical
model that based on the time division technique to minimize the malicious
behavior of mobile nodes by avoiding unnecessary elimination of bad nodes. Our
proposed approach not only improves the resource sharing but also creates a
consistent trust and cooperation (CTC) environment among the mobile nodes. The
simulation results demonstrate the success of the proposed approach that
significantly minimizes the malicious nodes and consequently maximizes the
overall throughput of MANET than other well known schemes.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 04:33:50 GMT"
},
{
"version": "v2",
"created": "Sun, 9 Aug 2009 07:01:54 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Rizvi",
"Syed S.",
""
],
[
"Elleithy",
"Khaled M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0982
|
R Doomun
|
Maryam Hosseini-Pozveh, Mohamadali Nematbakhsh, Naser Movahhedinia
|
A multidimensional approach for context-aware recommendation in mobile
commerce
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.CY cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Context as the dynamic information describing the situation of items and
users and affecting the users decision process is essential to be used by
recommender systems in mobile commerce to guarantee the quality of
recommendation. This paper proposes a novel multidimensional approach for
context aware recommendation in mobile commerce. The approach represents users,
items, context information and the relationship between them in a
multidimensional space. It then determines the usage patterns of each user
under different contextual situations and creates a new 2 dimensional
recommendation space and does the final recommendation in that space. This
paper also represents an evaluation process by implementing the proposed
approach in a restaurant food recommendation system considering day, time,
weather and companion as the contextual information and comparing the approach
with the traditional 2 dimensional one. The results of comparison illustrates
that the multidimensional approach increases the recommendation quality.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 04:50:30 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Hosseini-Pozveh",
"Maryam",
""
],
[
"Nematbakhsh",
"Mohamadali",
""
],
[
"Movahhedinia",
"Naser",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0908.0984
|
R Doomun
|
C. Balasubramanian, K. Duraiswamy
|
An Application of Bayesian classification to Interval Encoded Temporal
mining with prioritized items
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.DB cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In real life, media information has time attributes either implicitly or
explicitly known as temporal data. This paper investigates the usefulness of
applying Bayesian classification to an interval encoded temporal database with
prioritized items. The proposed method performs temporal mining by encoding the
database with weighted items which prioritizes the items according to their
importance from the user perspective. Naive Bayesian classification helps in
making the resulting temporal rules more effective. The proposed priority based
temporal mining (PBTM) method added with classification aids in solving
problems in a well informed and systematic manner. The experimental results are
obtained from the complaints database of the telecommunications system, which
shows the feasibility of this method of classification based temporal mining.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 05:36:51 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Balasubramanian",
"C.",
""
],
[
"Duraiswamy",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0908.0986
|
Abdulqader El-Sayed
|
Abdulqader M. El-Sayed
|
Ethernet Networks: Current Trends and Tools
|
Proceedings of IEEE International Conference on Advanced Information
Networking and Applications, 8 pages
| null | null |
TR-G14-2009
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ethernet topology discovery has gained increasing interest in the recent
years. This trend is motivated mostly by increasing number of carrier Ethernet
networks as well as the size of these networks, and consequently the increasing
sales of these networks. To manage these networks efficiently, detailed and
accurate knowledge of their topology is needed. Knowledge of a network's
entities and the physical connections between them can be useful in various
prospective. Administrators can use topology information for network planning
and fault detecting. Topology information can also be used during protocol and
routing algorithm development, for performance prediction and as a basis for
accurate network simulations. From a network security perspective, threat
detection, network monitoring, network access control and forensic
investigations can benefit from accurate network topology information. In this
paper, we analyze market trends and investigate current tools available for
both research and commercial purposes.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 05:59:25 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"El-Sayed",
"Abdulqader M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.0993
|
Tobias Renk
|
Tobias Renk, Holger Jaekel, Friedrich K. Jondral
|
Outage Regions and Optimal Power Allocation for Wireless Relay Networks
|
5 pages, 4 figures, 1 table, accepted for ITW 2009, Taormina, Sicily
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study outage regions for energy-constrained multi-hop and adaptive
multi-route networks with an arbitrary number of relay nodes. Optimal power
allocation strategies in the sense that outage probability is minimized are
derived depending on the distances between the transmit nodes. We further
investigate the rate gain of adaptive multi-route and multi-hop over direct
transmission. It is shown that a combined strategy of direct transmission and
adaptive multi-route outperforms multi-hop for all values of rate R. It can be
stated that cooperation strategies are beneficial for low-rate systems where
the main goal is a very low outage probability of the network. As the rate is
increased, direct transmission becomes more and more attractive.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 07:10:43 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Renk",
"Tobias",
""
],
[
"Jaekel",
"Holger",
""
],
[
"Jondral",
"Friedrich K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.0994
|
R Doomun
|
Dr. Durgesh Kumar Mishra, Neha Koria, Nikhil Kapoor, Ravish Bahety
|
A Secure Multi-Party Computation Protocol for Malicious Computation
Prevention for preserving privacy during Data Mining
|
6 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Volume 3, Number 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secure Multi-Party Computation (SMC) allows parties with similar background
to compute results upon their private data, minimizing the threat of
disclosure. The exponential increase in sensitive data that needs to be passed
upon networked computers and the stupendous growth of internet has precipitated
vast opportunities for cooperative computation, where parties come together to
facilitate computations and draw out conclusions that are mutually beneficial;
at the same time aspiring to keep their private data secure. These computations
are generally required to be done between competitors, who are obviously weary
of each-others intentions. SMC caters not only to the needs of such parties but
also provides plausible solutions to individual organizations for problems like
privacy-preserving database query, privacy-preserving scientific computations,
privacy-preserving intrusion detection and privacy-preserving data mining. This
paper is an extension to a previously proposed protocol Encrytpo_Random, which
presented a plain sailing yet effective approach to SMC and also put forward an
aptly crafted architecture, whereby such an efficient protocol, involving the
parties that have come forward for joint-computations and the third party who
undertakes such computations, can be developed. Through this extended work an
attempt has been made to further strengthen the existing protocol thus paving
the way for a more secure multi-party computational process.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 07:22:06 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Mishra",
"Dr. Durgesh Kumar",
""
],
[
"Koria",
"Neha",
""
],
[
"Kapoor",
"Nikhil",
""
],
[
"Bahety",
"Ravish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0908.1004
|
Rui Wang
|
Rui Wang, Vincent K. N. Lau, and Kaibin Huang
|
A New Scaling Law on Throughput and Delay Performance of Wireless Mobile
Relay Networks over Parallel Fading Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, utilizing the relay buffers, we propose an opportunistic
decode-wait-and-forward relay scheme for a point-to-point communication system
with a half-duplexing relay network to better exploit the time diversity and
relay mobility. For instance, we analyze the asymptotic throughput-delay
tradeoffs in a dense relay network for two scenarios: (1) fixed relays with
\textit{microscopic fading} channels (multipath channels), and (2) mobile
relays with \textit{macroscopic fading} channels (path loss). In the first
scenario, the proposed scheme can better exploit the \textit{multi-relay
diversity} in the sense that with $K$ fixed relays and a cost of
$\mathcal{O}(K)$ average end-to-end packet delay, it could achieve the same
optimal asymptotic average throughput as the existing designs (such as regular
decode-and-forward relay schemes) with $K^2$ fixed relays. In the second
scenario, the proposed scheme achieves the maximum throughput of $\Theta(\log
K)$ at a cost of $\mathcal{O}(K/q)$ average end-to-end packet delay, where
$0<q\leq {1/2}$ measures the speed of relays' mobility. This system throughput
is unattainable for the existing designs with low relay mobility, the proposed
relay scheme can exploit the relays' mobility more efficiently.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 08:39:41 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Wang",
"Rui",
""
],
[
"Lau",
"Vincent K. N.",
""
],
[
"Huang",
"Kaibin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1027
|
Yoshitaka Sasaki
|
Yasuo Ohno, Yoshitaka Sasaki and Chika Yamazaki
|
On exponential polynomials and quantum computing
|
7pages, LaTeX
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We calculate the zeros of an exponential polynomial of three variables by a
classical algorithm and quantum algorithms which are based on the method of van
Dam and Shparlinski, they treated the case of two variables, and compare with
the time complexity of those cases. Further we compare the case of van Dam and
Shparlinski with our case by considering the ratio (classical/quantum) of the
time complexity. Then we can observe the ratio decreases.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 11:44:57 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Ohno",
"Yasuo",
""
],
[
"Sasaki",
"Yoshitaka",
""
],
[
"Yamazaki",
"Chika",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.1033
|
R Doomun
|
Kamalesh V.N, S. K. Srivatsa
|
Topological design of minimum cost survivable computer communication
networks, Bipartite Graph Method
|
5 Pages, International Journal of Computer Science and Information
Security, IJCSIS July 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A good computer network is hard to disrupt. It is desired that the computer
communication network remains connected even when some of the links or nodes
fail. Since the communication links are expensive, one wants to achieve these
goals with fewer links. The computer communication network is fault tolerant if
it has alternative paths between vertices, the more disjoint paths, the better
is the survivability. This paper presents a method for generating k-connected
computer communication network with optimal number of links using bipartite
graph concept.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 12:37:26 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"N",
"Kamalesh V.",
""
],
[
"Srivatsa",
"S. K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.1056
|
R Doomun
|
Abd El Naser A. Mohamed, Mohamed M. E. El-Halawany, Ahmed Nabih Zaki
Rashed and Mahmoud M. A. Eid
|
Recent Applications of Optical Parametric Amplifiers in Hybrid WDM TDM
Local Area Optical Networks
|
10 pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
Internation Journal of Computer Science and Information Security,
IJCSIS, Vol. 3, No.1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the present paper, the recent applications of optical parametric
amplifiers (OPAs) in hybrid wavelength division multiplexing (WDM)/time
division multiplexing (TDM) local area passive optical networks have been
modeled and parametrically investigated over wide range of the affecting
parameters. Moreover, we have analyzed the ability of the hybrid WDM/TDM
Passive optical networks to handle a triple play solution, offering voice,
video, and data services to the multiple users. Finally, we have investigated
the maximum time division multiplexing (MTDM) bit rates for optical network
units (ONUs) for maximum number of supported users with optical parametric
amplifier technique across the single mode fiber (SMF) or highly nonlinear
fiber (HNLF) cables to achieve both maximum network reach and quality of
service (QOS).
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 13:53:54 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Mohamed",
"Abd El Naser A.",
""
],
[
"El-Halawany",
"Mohamed M. E.",
""
],
[
"Rashed",
"Ahmed Nabih Zaki",
""
],
[
"Eid",
"Mahmoud M. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.1057
|
R Doomun
|
Abd El Naser A. Mohamed, Mohamed M. E. El Halawany, Ahmed Nabih Zaki
Rashed, and Amina E. M. El Nabawy
|
Transmission Performance Analysis of Digital Wire and Wireless Optical
Links in Local and Wide Areas Optical Networks
|
10 pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
Internation Journal of Computer Science and Information Security,
IJCSIS, Vol. 3, No.1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the present paper, the transmission performance analysis of digital wire
and wireless optical links in local and wide areas optical networks have been
modeled and parametrically investigated over wide range of the affecting
parameters. Moreover, we have analyzed the basic equations of the comparative
study of the performance of digital fiber optic links with wire and wireless
optical links. The development of optical wireless communication systems is
accelerating as a high cost effective to wire fiber optic links. The optical
wireless technology is used mostly in wide bandwidth data transmission
applications. Finally, we have investigated the maximum transmission distance
and data transmission bit rates that can be achieved within digital wire and
wireless optical links for local and wide areas optical network applications.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 13:57:15 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Mohamed",
"Abd El Naser A.",
""
],
[
"Halawany",
"Mohamed M. E. El",
""
],
[
"Rashed",
"Ahmed Nabih Zaki",
""
],
[
"Nabawy",
"Amina E. M. El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0908.1059
|
Chantal Enguehard
|
Chantal Enguehard (LINA), R\'emi Lehn (LINA)
|
Vulnerability analysis of three remote voting methods
|
15 pages
|
XXI IPSA World Congress of Political Science, RC10 Electronic
Democracy - Dilemmas of Change?, Santiago : Chile (2009)
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article analyses three methods of remote voting in an uncontrolled
environment: postal voting, internet voting and hybrid voting. It breaks down
the voting process into different stages and compares their vulnerabilities
considering criteria that must be respected in any democratic vote:
confidentiality, anonymity, transparency, vote unicity and authenticity.
Whether for safety or reliability, each vulnerability is quantified by three
parameters: size, visibility and difficulty to achieve. The study concludes
that the automatisation of treatments combined with the dematerialisation of
the objects used during an election tends to substitute visible vulnerabilities
of a lesser magnitude by invisible and widespread vulnerabilities.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 14:02:40 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Enguehard",
"Chantal",
"",
"LINA"
],
[
"Lehn",
"Rémi",
"",
"LINA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0908.1071
|
Ali Tajer
|
Ali Tajer, Guido H. Jajamovich, Xiaodong Wang, and George V.
Moustakides
|
Optimal Joint Target Detection and Parameter Estimation By MIMO Radar
|
37 pages, 8 figures
| null |
10.1109/JSTSP.2010.2040104
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider multiple-input multiple-output (MIMO) radar systems with
widely-spaced antennas. Such antenna configuration facilitates capturing the
inherent diversity gain due to independent signal dispersion by the target
scatterers. We consider a new MIMO radar framework for detecting a target that
lies in an unknown location. This is in contrast with conventional MIMO radars
which break the space into small cells and aim at detecting the presence of a
target in a specified cell. We treat this problem through offering a novel
composite hypothesis testing framework for target detection when (i) one or
more parameters of the target are unknown and we are interested in estimating
them, and (ii) only a finite number of observations are available. The test
offered optimizes a metric which accounts for both detection and estimation
accuracies. In this paper as the parameter of interest we focus on the vector
of time-delays that the waveforms undergo from being emitted by the transmit
antennas until being observed by the receive antennas. The analytical and
empirical results establish that for the proposed joint target detection and
time-delay estimation framework, MIMO radars exhibit significant gains over
phased-array radars for extended targets which consist of multiple independent
scatterers. For point targets modeled as single scatterers, however, the
detection/estimation accuracies of MIMO and phased-array radars for this
specific setup (joint target detection and time-delay estimation) are
comparable.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 15:28:02 GMT"
}
] | 2015-10-28T00:00:00 |
[
[
"Tajer",
"Ali",
""
],
[
"Jajamovich",
"Guido H.",
""
],
[
"Wang",
"Xiaodong",
""
],
[
"Moustakides",
"George V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1076
|
Rudy Negenborn
|
R. R. Negenborn, B. De Schutter, J. Hellendoorn
|
Multi-Agent Model Predictive Control: A Survey
| null | null | null |
04-010
|
cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this report we define characteristic control design elements and show how
conventional single-agent MPC implements these. We survey recent literature on
multi-agent MPC and discuss how this literature deals with decomposition,
problem assignment, and cooperation.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 15:43:26 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Negenborn",
"R. R.",
""
],
[
"De Schutter",
"B.",
""
],
[
"Hellendoorn",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0908.1077
|
Ali Tajer
|
Ali Tajer, Narayan Prasad, and Xiaodong Wang
|
Beamforming and Rate Allocation in MISO Cognitive Radio Networks
|
32 pages, 6 figures
| null |
10.1109/TSP.2009.2031280
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider decentralized multi-antenna cognitive radio networks where
secondary (cognitive) users are granted simultaneous spectrum access along with
license-holding (primary) users. We treat the problem of distributed
beamforming and rate allocation for the secondary users such that the minimum
weighted secondary rate is maximized. Such an optimization is subject to (1) a
limited weighted sum-power budget for the secondary users and (2) guaranteed
protection for the primary users in the sense that the interference level
imposed on each primary receiver does not exceed a specified level. Based on
the decoding method deployed by the secondary receivers, we consider three
scenarios for solving this problem. In the first scenario each secondary
receiver decodes only its designated transmitter while suppressing the rest as
Gaussian interferers (single-user decoding). In the second case each secondary
receiver employs the maximum likelihood decoder (MLD) to jointly decode all
secondary transmissions, and in the third one each secondary receiver uses the
unconstrained group decoder (UGD). By deploying the UGD, each secondary user is
allowed to decode any arbitrary subset of users (which contains its designated
user) after suppressing or canceling the remaining users.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 15:46:00 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Tajer",
"Ali",
""
],
[
"Prasad",
"Narayan",
""
],
[
"Wang",
"Xiaodong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1090
|
Anshuman Sinha
|
Anshuman Sinha
|
Study of Proposed Methods for Improving TCP Performance Over Wireless
Links
|
7 pages, 4 figures, 3 table
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
TCP is designed for networks with assumption that major losses occur only due
to congestion of network traffic. On a wireless network TCP misinterprets the
transmission losses due to bit errors and handoffs as losses caused by
congestion, and triggers congestion control mechanisms. Because of its end to
end delivery model, congestion handling and avoidance mechanisms, TCP has been
widely accepted as Transport layer protocol for internetworks. Extension of
Internetworks over wireless links is inevitable with the spread of ubiquitous
computing and mobile communications. This paper presents study of different
mechanisms proposed to extend Transport Control Protocol and other alternate
solutions to enhance end to end performance over lossy wireless links. The
paper studies details of different design choices proposed and their technical
advantages and disadvantages. Finally, an analysis and proposal for best choice
of proposed schemes are made for wireless networks.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 17:37:39 GMT"
}
] | 2009-08-10T00:00:00 |
[
[
"Sinha",
"Anshuman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.1116
|
R Doomun
|
Shahid Mumtaz, Alitio Gamerio, Rasool Sadeghi
|
Enhanced Algorithm for Link to System level Interface Mapping
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.IT cs.PF math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The current SINR mechanism does not provide the base station (BS) with any
knowledge on the frequency selectivity of channel from mobile service
station(MSS). This knowledge is important since, contrary to the AWGN channel,
in a frequency selective channel there is no longer a 1 to 1 relation between
amount of increase in power and amount of improvement in effective SINR 1.
Furthermore, the relation is dependent on MCS level. This lack of knowledge in
the BS side results in larger fade margins, which translates directly to
reduction in capacity. In this paper we propose a enhanced algorithm on the
EESM model with weighted beta (\beta) that provides the BS with sufficient
knowledge on the channel-dependent relationship between power increase, MCS
change and improvement in effective SINR.
|
[
{
"version": "v1",
"created": "Fri, 7 Aug 2009 20:27:49 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Mumtaz",
"Shahid",
""
],
[
"Gamerio",
"Alitio",
""
],
[
"Sadeghi",
"Rasool",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1143
|
Dmitri Krioukov
|
Almerima Jamakovic, Priya Mahadevan, Amin Vahdat, Marian Boguna,
Dmitri Krioukov
|
How small are building blocks of complex networks
| null | null | null | null |
physics.soc-ph cond-mat.dis-nn cond-mat.stat-mech cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network motifs are small building blocks of complex networks. Statistically
significant motifs often perform network-specific functions. However, the
precise nature of the connection between motifs and the global structure and
function of networks remains elusive. Here we show that the global structure of
some real networks is statistically determined by the probability of
connections within motifs of size at most 3, once this probability accounts for
node degrees. The connectivity profiles of node triples in these networks
capture all their local and global properties. This finding impacts methods
relying on motif statistical significance, and enriches our understanding of
the elementary forces that shape the structure of complex networks.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 03:02:05 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Mar 2015 22:58:28 GMT"
}
] | 2015-03-03T00:00:00 |
[
[
"Jamakovic",
"Almerima",
""
],
[
"Mahadevan",
"Priya",
""
],
[
"Vahdat",
"Amin",
""
],
[
"Boguna",
"Marian",
""
],
[
"Krioukov",
"Dmitri",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.1159
|
Norbert B\'atfai
|
Norbert B\'atfai
|
On the Running Time of the Shortest Programs
|
24 pages, 15 figures; added new values to the table "The increasing
of running time of the shortest programs"
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Kolmogorov complexity of the word w is equal to the length of the
shortest concatenation of program Z and its input x with which the word w is
computed by the universal turing machine U. The question introduced in this
paper is the following: How long do the shortest programs run for?
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 14:07:47 GMT"
},
{
"version": "v2",
"created": "Mon, 7 Sep 2009 10:46:14 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Bátfai",
"Norbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.1162
|
Harshan Jagadeesh
|
J. Harshan and B. Sundar Rajan
|
STBCs with Reduced Sphere Decoding Complexity for Two-User MIMO-MAC
|
6 pages, to appear in the proceedings of IEEE GLOBECOM 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, Space-Time Block Codes (STBCs) with reduced Sphere Decoding
Complexity (SDC) are constructed for two-user Multiple-Input Multiple-Output
(MIMO) fading multiple access channels. In this set-up, both the users employ
identical STBCs and the destination performs sphere decoding for the symbols of
the two users. First, we identify the positions of the zeros in the
$\textbf{R}$ matrix arising out of the Q-R decomposition of the lattice
generator such that (i) the worst case SDC (WSDC) and (ii) the average SDC
(ASDC) are reduced. Then, a set of necessary and sufficient conditions on the
lattice generator is provided such that the $\textbf{R}$ matrix has zeros at
the identified positions. Subsequently, explicit constructions of STBCs which
results in the reduced ASDC are presented. The rate (in complex symbols per
channel use) of the proposed designs is at most $2/N_{t}$ where $N_{t}$ denotes
the number of transmit antennas for each user. We also show that the class of
STBCs from complex orthogonal designs (other than the Alamouti design) reduce
the WSDC but not the ASDC.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 10:56:08 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Harshan",
"J.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1163
|
Harshan Jagadeesh
|
J. Harshan and B. Sundar Rajan
|
Trellis Coded Modulation for Two-User Unequal-Rate Gaussian MAC
|
7 pages, 5 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, code pairs based on trellis coded modulation are proposed over
PSK signal sets for a two-user Gaussian multiple access channel. In order to
provide unique decodability property to the receiver and to maximally enlarge
the constellation constrained (CC) capacity region, a relative angle of
rotation is introduced between the signal sets. Subsequently, the structure of
the \textit{sum alphabet} of two PSK signal sets is exploited to prove that
Ungerboeck labelling on the trellis of each user maximizes the guaranteed
minimum squared Euclidean distance, $d^{2}_{g, min}$ in the \textit{sum
trellis}. Hence, such a labelling scheme can be used systematically to
construct trellis code pairs for a two-user GMAC to approach \emph{any rate
pair} within the capacity region.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 11:20:46 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Harshan",
"J.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1181
|
Vijay Vazirani
|
Vijay V. Vazirani
|
2-Player Nash and Nonsymmetric Bargaining Games: Algorithms and
Structural Properties
| null | null |
10.1007/978-3-642-16170-4_28
| null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The solution to a Nash or a nonsymmetric bargaining game is obtained by
maximizing a concave function over a convex set, i.e., it is the solution to a
convex program. We show that each 2-player game whose convex program has linear
constraints, admits a rational solution and such a solution can be found in
polynomial time using only an LP solver. If in addition, the game is succinct,
i.e., the coefficients in its convex program are ``small'', then its solution
can be found in strongly polynomial time. We also give a non-succinct linear
game whose solution can be found in strongly polynomial time.
|
[
{
"version": "v1",
"created": "Sun, 9 Aug 2009 01:52:35 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Aug 2009 05:04:35 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Sep 2009 21:35:32 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Vazirani",
"Vijay V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.1185
|
Carlos Javier Hernandez-Castro
|
Carlos Javier Hernandez-Castro, Arturo Ribagorda, Yago Saez
|
Side-channel attack on labeling CAPTCHAs
| null | null | null | null |
cs.CR cs.CV cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new scheme of attack on the Microsoft's ASIRRA CAPTCHA which
represents a significant shortcut to the intended attacking path, as it is not
based in any advance in the state of the art on the field of image recognition.
After studying the ASIRRA Public Corpus, we conclude that the security margin
as stated by their authors seems to be quite optimistic. Then, we analyze which
of the studied parameters for the image files seems to disclose the most
valuable information for helping in correct classification, arriving at a
surprising discovery. This represents a completely new approach to breaking
CAPTCHAs that can be applied to many of the currently proposed image-labeling
algorithms, and to prove this point we show how to use the very same approach
against the HumanAuth CAPTCHA. Lastly, we investigate some measures that could
be used to secure the ASIRRA and HumanAuth schemes, but conclude no easy
solutions are at hand.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 19:54:01 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Hernandez-Castro",
"Carlos Javier",
""
],
[
"Ribagorda",
"Arturo",
""
],
[
"Saez",
"Yago",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.1186
|
Grenville Croll
|
Patrick O'Beirne
|
Checks and Controls in Spreadsheets
|
7 Pages
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 1-7 ISBN
978-1-905617-89-0
| null | null |
cs.HC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spreadsheets that are informally created are harder to test than they should
be. Simple cross-foot checks or being easily readable are modest but attainable
goals for every spreadsheet developer. This paper lists some tips on building
self-checking into a spreadsheet in order to provide more confidence to the
reader that a spreadsheet is robust.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 20:38:12 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"O'Beirne",
"Patrick",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.1187
|
Grenville Croll
|
Jocelyn Paine
|
Documenting Spreadsheets with Pseudo-Code: an Exercise with Cash-Flow
and Loans
|
12 Pages
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 173-183
ISBN 978-1-905617-89-0
| null | null |
cs.SE cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
"Look before you leap"; "a stitch in time saves nine"; "more haste, less
speed". Many proverbs declare the wisdom of planning before doing. We suggest
how to apply this to Excel, by explaining and specifying spreadsheets before
coding them, so there will always be documentation for auditors and maintenance
programmers. The specification method uses "pseudo-code": code that, for
precision and conciseness, resembles a programming language, but is not
executable. It is, however, based on the notation used by our Excelsior
spreadsheet generator, which is executable. This paper is structured as a
tutorial, in which we develop a simple cash-flow and loans spreadsheet.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 20:44:50 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Paine",
"Jocelyn",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.1188
|
Grenville Croll
|
Thomas A. Grossman, Ozgur Ozluk, Jan Gustavson
|
The Lookup Technique to Replace Nested-IF Formulas in Spreadsheet
Programming
|
10 Pages, 5 Figures; ISBN 978-1-905617-89-0
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 17-26
| null | null |
cs.SE cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spreadsheet programmers often implement contingent logic using a nested-IF
formula even though this technique is difficult to test and audit and is
believed to be risky. We interpret the programming of contingent logic in
spreadsheets in the context of traditional computer programming. We investigate
the "lookup technique" as an alternative to nested-IF formulas, describe its
benefits for testing and auditing, and define its limitations. The lookup
technique employs four distinct principles: 1) make logical tests visible; 2)
make outcomes visible; 3) make logical structure visible; and 4) replace a
multi-function nested-IF formula with a single-function lookup formula. It can
be used only for certain simple contingent logic. We describe how the
principles can be applied in more complex situations, and suggest avenues for
further research.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 20:53:04 GMT"
}
] | 2011-02-19T00:00:00 |
[
[
"Grossman",
"Thomas A.",
""
],
[
"Ozluk",
"Ozgur",
""
],
[
"Gustavson",
"Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.1189
|
Grenville Croll
|
Etienne Vandeput
|
Milestones for Teaching the Spreadsheet Program
|
11 Pages
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 133-143
ISBN 978-1-905617-89-0
| null | null |
cs.HC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There are different manners of teaching a spreadsheet program. In any case,
it is intended that the teacher settles the objectives of the course and adapts
them to the particular audience he/she has to deal with. This paper aims at
providing any teacher whatever his/her specific objectives and his/her audience
with elements to help him/her building a course. It focuses mainly on two
important issues: 1 - select in all that may be said about such complex tools,
what is prior to know and to teach, i.e. what leads to autonomy in using but
also to autonomy in learning (because everything cannot be taught) and 2 - show
how concepts are closely related to good formatting considerations. A method
based on the "invariants of information processing" is outlined, partially
illustrated and an implementation is described throughout a course designed for
students preparing a master in Education Sciences.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 21:02:41 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Vandeput",
"Etienne",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0908.1190
|
Grenville Croll
|
Leslie Bradley, Kevin McDaid
|
Error Estimation in Large Spreadsheets using Bayesian Statistics
|
12 Pages, 5 Colour Figures
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 27-38
ISBN 978-1-905617-89-0
| null | null |
cs.SE cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spreadsheets are ubiquitous in business with the financial sector
particularly heavily reliant on the technology. It is known that the level of
spreadsheet error can be high and that it is often necessary to review
spreadsheets based on a structured methodology which includes a cell by cell
examination of the spreadsheet. This paper outlines the early research that has
been carried out into the use of Bayesian Statistical methods to estimate the
level of error in large spreadsheets during cell be cell examination based on
expert knowledge and partial spreadsheet test data. The estimate can aid in the
decision as to the quality of the spreadsheet and the necessity to conduct
further testing or not.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 21:08:53 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Bradley",
"Leslie",
""
],
[
"McDaid",
"Kevin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.1191
|
Grenville Croll
|
Angela Collins
|
Embedded Spreadsheet Modelling
|
5 Pages
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 95-99
ISBN 978-1-905617-89-0
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In larger accounting firms, specialist modellers typically sit in separate
teams. This paper will look at the advantages of embedding a specialist
modeller within a Corporate Finance Team.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 21:13:27 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Collins",
"Angela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.1192
|
Grenville Croll
|
Matthew Dinmore
|
Documenting Problem-Solving Knowledge: Proposed Annotation Design
Guidelines and their Application to Spreadsheet Tools
|
12 Pages, 4 Figures
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 57-68
ISBN 978-1-905617-89-0
| null | null |
cs.SE cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
End-user programmers create software to solve problems, yet the
problem-solving knowledge generated in the process often remains tacit within
the software artifact. One approach to exposing this knowledge is to enable the
end-user to annotate the artifact as they create and use it. A 3-level model of
annotation is presented and guidelines are proposed for the design of end-user
programming environments supporting the explicit and literate annotation
levels. These guidelines are then applied to the spreadsheet end-user
programming paradigm.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 21:18:31 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Dinmore",
"Matthew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.1193
|
Grenville Croll
|
Derek Flood, Kevin Mc Daid, Fergal Mc Caffery
|
NLP-SIR: A Natural Language Approach for Spreadsheet Information
Retrieval
|
12 Pages, 2 Colour Figures, 3 Tables
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 101-112
ISBN 978-1-905617-89-0
| null | null |
cs.SE cs.HC cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spreadsheets are a ubiquitous software tool, used for a wide variety of tasks
such as financial modelling, statistical analysis and inventory management.
Extracting meaningful information from such data can be a difficult task,
especially for novice users unfamiliar with the advanced data processing
features of many spreadsheet applications. We believe that through the use of
Natural Language Processing (NLP) techniques this task can be made considerably
easier. This paper introduces NLP-SIR, a Natural language interface for
spreadsheet information retrieval. The results of a recent evaluation which
compared NLP-SIR with existing Information retrieval tools are also outlined.
This evaluation has shown that NLP-SIR is a more effective method of
spreadsheet information retrieval.
|
[
{
"version": "v1",
"created": "Sat, 8 Aug 2009 21:23:52 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Flood",
"Derek",
""
],
[
"Daid",
"Kevin Mc",
""
],
[
"Caffery",
"Fergal Mc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.1208
|
Seyed Abolfazl Motahari
|
Abolfazl S. Motahari, Shahab Oveis Gharan, and Amir K. Khandani
|
Real Interference Alignment with Real Numbers
|
Submitted to IEEE Trans. on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A novel coding scheme applicable in networks with single antenna nodes is
proposed. This scheme converts a single antenna system to an equivalent
Multiple Input Multiple Output (MIMO) system with fractional dimensions.
Interference can be aligned along these dimensions and higher Multiplexing
gains can be achieved. Tools from the field of Diophantine approximation in
number theory are used to show that the proposed coding scheme in fact mimics
the traditional schemes used in MIMO systems where each data stream is sent
along a direction and alignment happens when several streams arrive at the same
direction. Two types of constellation are proposed for the encoding part,
namely the single layer constellation and the multi-layer constellation.
Using the single layer constellation, the coding scheme is applied to the
two-user $X$ channel and the three-user Gaussian Interference Channel (GIC). In
case of the two-user $X$ channel, it is proved that the total
Degrees-of-Freedom (DOF), i.e. 4/3, of the channel is achievable almost surely.
This is the first example in which it is shown that a time invariant single
antenna system does not fall short of achieving its total DOF.
Using the multi-layer constellation, the coding scheme is applied to the
symmetric three-user GIC. Achievable DOFs are derived for all channel gains. As
a function of the channel gain, it is observed that the DOF is everywhere
discontinuous.
|
[
{
"version": "v1",
"created": "Sun, 9 Aug 2009 05:27:44 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Aug 2009 10:00:59 GMT"
}
] | 2009-08-12T00:00:00 |
[
[
"Motahari",
"Abolfazl S.",
""
],
[
"Gharan",
"Shahab Oveis",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1220
|
R Doomun
|
Maher Ben Jemaa, Maryam Kallel Zouari, Bachar Zouari
|
A new approach to services differentiation between mobile terminals of a
wireless LAN
|
8 Pages, IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study aims to identify the advantages and disadvantages of several
mechanisms for service differentiation in mobile terminals of a wireless LAN to
establish a more better and more optimal. At the end of the analysis of
available approaches for the quality of service of the IEEE 802.11 standard,
the objective of this paper is to suggest a new method named DF-DCF
Differentiated Frame DCF. The performance of the suggested method in a Network
Simulator (NS) environment allowed its validation through a set of testing and
simulation scenarios. Simulation results have shown that the DF-DCF method is
better suited for mobile nodes in a wireless communication network.
|
[
{
"version": "v1",
"created": "Sun, 9 Aug 2009 10:22:09 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Jemaa",
"Maher Ben",
""
],
[
"Zouari",
"Maryam Kallel",
""
],
[
"Zouari",
"Bachar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.1222
|
Rajesh Ramachandran
|
R Rajesh and Vinod Sharma
|
Distributed Joint Source-Channel Coding for Functions over a Multiple
Access Channel
|
7 Pages, 2 Figures. To Appear in IEEE GLOBECOM, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we provide sufficient conditions for lossy transmission of
functions of correlated data over a multiple access channel (MAC). The
conditions obtained can be shown as generalized version of Yamamoto's result.
We also obtain efficient joint source-channel coding schemes for transmission
of discrete and continuous alphabet sources to recover the function values.
Keywords: Joint source-channel coding, Graph coloring, Lipschitz functions,
Correlated sources.
|
[
{
"version": "v1",
"created": "Sun, 9 Aug 2009 10:34:24 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Rajesh",
"R",
""
],
[
"Sharma",
"Vinod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1223
|
Rajesh Ramachandran
|
R Rajesh and Vinod Sharma
|
Joint Source-Channel Coding over a Fading Multiple Access Channel with
Partial Channel State Information
|
7 Pages, 3 figures. To Appear in IEEE GLOBECOM, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we address the problem of transmission of correlated sources
over a fast fading multiple access channel (MAC) with partial channel state
information available at both the encoders and the decoder. We provide
sufficient conditions for transmission with given distortions. Next these
conditions are specialized to a Gaussian MAC (GMAC). We provide the optimal
power allocation strategy and compare the strategy with various levels of
channel state information.
Keywords: Fading MAC, Power allocation, Partial channel state information,
Correlated sources.
|
[
{
"version": "v1",
"created": "Sun, 9 Aug 2009 10:40:59 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Rajesh",
"R",
""
],
[
"Sharma",
"Vinod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1264
|
Manish Agarwal
|
Manish Agarwal, Michael Honig, and Baris Ata
|
Adaptive Training for Correlated Fading Channels with Feedback
|
39 pages. Submitted to IEEE Transactions on Information Theory (Aug
2009)
| null |
10.1109/TIT.2012.2201345
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider data transmission through a time-selective, correlated
(first-order Markov) Rayleigh fading channel subject to an average power
constraint. The channel is estimated at the receiver with a pilot signal, and
the estimate is fed back to the transmitter. The estimate is used for coherent
demodulation, and to adapt the data and pilot powers. We explicitly determine
the optimal pilot and data power control policies in a continuous-time limit
where the channel state evolves as an Ornstein-Uhlenbeck diffusion process, and
is estimated by a Kalman filter at the receiver. The optimal pilot policy
switches between zero and the maximum (peak-constrained) value (``bang-bang''
control), and approximates the optimal discrete-time policy at low
Signal-to-Noise Ratios (equivalently, large bandwidths). The switching boundary
is defined in terms of the system state (estimated channel mean and associated
error variance), and can be explicitly computed. Under the optimal policy, the
transmitter conserves power by decreasing the training power when the channel
is faded, thereby increasing the data rate. Numerical results show a
significant increase in achievable rate due to the adaptive training scheme
with feedback, relative to constant (non-adaptive) training, which does not
require feedback. The gain is more pronounced at relatively low SNRs and with
fast fading. Results are further verified through Monte Carlo simulations.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 02:31:08 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Agarwal",
"Manish",
""
],
[
"Honig",
"Michael",
""
],
[
"Ata",
"Baris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1273
|
Mohammad Naghshvar
|
Mohammad Naghshvar, Hairuo Zhuang, and Tara Javidi
|
A General Class of Throughput Optimal Routing Policies in Multi-hop
Wireless Networks
|
31 pages (one column), 8 figures, (revision submitted to IEEE
Transactions on Information Theory)
| null |
10.1109/TIT.2011.2178152
| null |
math.OC cs.NI cs.SY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the problem of throughput optimal routing/scheduling in
a multi-hop constrained queueing network with random connectivity whose special
case includes opportunistic multi-hop wireless networks and input-queued switch
fabrics. The main challenge in the design of throughput optimal routing
policies is closely related to identifying appropriate and universal Lyapunov
functions with negative expected drift. The few well-known throughput optimal
policies in the literature are constructed using simple quadratic or
exponential Lyapunov functions of the queue backlogs and as such they seek to
balance the queue backlogs across network independent of the topology. By
considering a class of continuous, differentiable, and piece-wise quadratic
Lyapunov functions, this paper provides a large class of throughput optimal
routing policies. The proposed class of Lyapunov functions allow for the
routing policy to control the traffic along short paths for a large portion of
state-space while ensuring a negative expected drift. This structure enables
the design of a large class of routing policies. In particular, and in addition
to recovering the throughput optimality of the well known backpressure routing
policy, an opportunistic routing policy with congestion diversity is proved to
be throughput optimal.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 06:54:38 GMT"
},
{
"version": "v2",
"created": "Thu, 11 Nov 2010 00:08:52 GMT"
},
{
"version": "v3",
"created": "Thu, 10 Mar 2011 19:49:09 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Naghshvar",
"Mohammad",
""
],
[
"Zhuang",
"Hairuo",
""
],
[
"Javidi",
"Tara",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
}
] |
0908.1298
|
Mark Flanagan
|
Mark F. Flanagan
|
Exposing Pseudoweight Layers in Regular LDPC Code Ensembles
|
5 pages, 2 figures. In Proc. Information Theory Workshop 2009
(Taormina, Sicily)
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A solution is presented for the asymptotic growth rate of the
AWGN-pseudoweight distribution of regular low-density parity-check (LDPC) code
ensembles for a selected graph cover degree M >= 1. The evaluation of the
growth rate requires solution of a system of 2M+1 nonlinear equations in 2M+1
unknowns. Simulation results for the pseudoweight distribution of two regular
LDPC code ensembles are presented for graph covers of low degree.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 11:05:30 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Flanagan",
"Mark F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1313
|
Vadim E. Levit
|
Vadim E. Levit and Eugen Mandrescu
|
On Konig-Egervary Square-Stable Graphs
|
12 pages, 9 figures
| null | null | null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The stability number of a graph G, denoted by alpha(G), is the cardinality of
a maximum stable set, and mu(G) is the cardinality of a maximum matching in G.
If alpha(G)+mu(G) equals its order, then G is a Konig-Egervary graph.
In this paper we deal with square-stable graphs, i.e., the graphs G enjoying
the equality alpha(G)=alpha(G^{2}), where G^{2} denotes the second power of G.
In particular, we show that a Konig-Egervary graph is square-stable if and only
if it has a perfect matching consisting of pendant edges, and in consequence,
we deduce that well-covered trees are exactly the square-stable trees.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 12:39:31 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Aug 2009 09:03:45 GMT"
},
{
"version": "v3",
"created": "Tue, 25 Aug 2009 11:59:15 GMT"
}
] | 2011-01-25T00:00:00 |
[
[
"Levit",
"Vadim E.",
""
],
[
"Mandrescu",
"Eugen",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.1348
|
Juergen Bierbrauer
|
J. Bierbrauer, S. Marcugini, F. Pambianco
|
The non-existence of a [[13,5,4]] quantum stabilizer code
| null | null | null | null |
cs.IT math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We solve one of the oldest problems in the theory of quantum stabilizer codes
by proving the non-existence of quantum [[13,5,4]]-codes.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 16:06:44 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Bierbrauer",
"J.",
""
],
[
"Marcugini",
"S.",
""
],
[
"Pambianco",
"F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0908.1369
|
Meijun Zhu
|
Meijun Zhu and Pengfei Zhang
|
Segmentation for radar images based on active contour
| null | null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We exam various geometric active contour methods for radar image
segmentation. Due to special properties of radar images, we propose our new
model based on modified Chan-Vese functional. Our method is efficient in
separating non-meteorological noises from meteorological images.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 18:33:51 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Zhu",
"Meijun",
""
],
[
"Zhang",
"Pengfei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0908.1379
|
Jonah Sherman
|
Jonah Sherman
|
Breaking the Multicommodity Flow Barrier for sqrt(log(n))-Approximations
to Sparsest Cut
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper ties the line of work on algorithms that find an
O(sqrt(log(n)))-approximation to the sparsest cut together with the line of
work on algorithms that run in sub-quadratic time by using only
single-commodity flows. We present an algorithm that simultaneously achieves
both goals, finding an O(sqrt(log(n)/eps))-approximation using O(n^eps log^O(1)
n) max-flows. The core of the algorithm is a stronger, algorithmic version of
Arora et al.'s structure theorem, where we show that matching-chaining argument
at the heart of their proof can be viewed as an algorithm that finds good
augmenting paths in certain geometric multicommodity flow networks. By using
that specialized algorithm in place of a black-box solver, we are able to solve
those instances much more efficiently. We also show the cut-matching game
framework can not achieve an approximation any better than Omega(log(n)/log
log(n)) without re-routing flow.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 19:57:32 GMT"
}
] | 2009-08-11T00:00:00 |
[
[
"Sherman",
"Jonah",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.1390
|
Andrew Gacek
|
Andrew Gacek, Dale Miller, and Gopalan Nadathur
|
Nominal Abstraction
|
To appear in the Journal of Information and Computation
| null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recursive relational specifications are commonly used to describe the
computational structure of formal systems. Recent research in proof theory has
identified two features that facilitate direct, logic-based reasoning about
such descriptions: the interpretation of atomic judgments through recursive
definitions and an encoding of binding constructs via generic judgments.
However, logics encompassing these two features do not currently allow for the
definition of relations that embody dynamic aspects related to binding, a
capability needed in many reasoning tasks. We propose a new relation between
terms called nominal abstraction as a means for overcoming this deficiency. We
incorporate nominal abstraction into a rich logic also including definitions,
generic quantification, induction, and co-induction that we then prove to be
consistent. We present examples to show that this logic can provide elegant
treatments of binding contexts that appear in many proofs, such as those
establishing properties of typing calculi and of arbitrarily cascading
substitutions that play a role in reducibility arguments.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 20:36:43 GMT"
},
{
"version": "v2",
"created": "Thu, 27 May 2010 11:52:45 GMT"
},
{
"version": "v3",
"created": "Thu, 23 Sep 2010 12:56:36 GMT"
}
] | 2010-09-24T00:00:00 |
[
[
"Gacek",
"Andrew",
""
],
[
"Miller",
"Dale",
""
],
[
"Nadathur",
"Gopalan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0908.1397
|
Julien Hendrickx
|
Julien M. Hendrickx and Alex Olshevsky
|
Matrix P-norms are NP-hard to approximate if p \neq 1,2,\infty
|
12 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that for any rational p \in [1,\infty) except p = 1, 2, unless P =
NP, there is no polynomial-time algorithm for approximating the matrix p-norm
to arbitrary relative precision. We also show that for any rational p\in
[1,\infty) including p = 1, 2, unless P = NP, there is no polynomial-time
algorithm approximates the \infty, p mixed norm to some fixed relative
precision.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 20:22:46 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Sep 2009 14:00:08 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Apr 2010 15:30:30 GMT"
}
] | 2010-04-26T00:00:00 |
[
[
"Hendrickx",
"Julien M.",
""
],
[
"Olshevsky",
"Alex",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.1407
|
Taposh Banerjee
|
Taposh Banerjee and Vinod Sharma
|
Generalized Analysis of a Distributed Energy Efficient Algorithm for
Change Detection
|
Accepted as a short paper in Proc. of the 12th ACM International
Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems
(MSWiM), Tenerife, Canary Islands, Spain, Oct 26-30, 2009. Please contact
[email protected] or [email protected] for any clarifications. Also
visit: http://www.ece.iisc.ernet.in/~vinod/
| null | null | null |
cs.IT cs.PF math.IT stat.AP
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An energy efficient distributed Change Detection scheme based on Page's CUSUM
algorithm was presented in \cite{icassp}. In this paper we consider a
nonparametric version of this algorithm. In the algorithm in \cite{icassp},
each sensor runs CUSUM and transmits only when the CUSUM is above some
threshold. The transmissions from the sensors are fused at the physical layer.
The channel is modeled as a Multiple Access Channel (MAC) corrupted with noise.
The fusion center performs another CUSUM to detect the change. In this paper,
we generalize the algorithm to also include nonparametric CUSUM and provide a
unified analysis.
|
[
{
"version": "v1",
"created": "Mon, 10 Aug 2009 21:21:00 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Banerjee",
"Taposh",
""
],
[
"Sharma",
"Vinod",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
}
] |
0908.1448
|
Aleksander M{\ka}dry
|
Jonathan A. Kelner, Aleksander Madry
|
Faster generation of random spanning trees
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we set forth a new algorithm for generating approximately
uniformly random spanning trees in undirected graphs. We show how to sample
from a distribution that is within a multiplicative $(1+\delta)$ of uniform in
expected time $\TO(m\sqrt{n}\log 1/\delta)$. This improves the sparse graph
case of the best previously known worst-case bound of $O(\min \{mn,
n^{2.376}\})$, which has stood for twenty years.
To achieve this goal, we exploit the connection between random walks on
graphs and electrical networks, and we use this to introduce a new approach to
the problem that integrates discrete random walk-based techniques with
continuous linear algebraic methods. We believe that our use of electrical
networks and sparse linear system solvers in conjunction with random walks and
combinatorial partitioning techniques is a useful paradigm that will find
further applications in algorithmic graph theory.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 05:14:39 GMT"
}
] | 2009-08-12T00:00:00 |
[
[
"Kelner",
"Jonathan A.",
""
],
[
"Madry",
"Aleksander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.1453
|
R Doomun
|
Roya Asadi, Norwati Mustapha, Nasir Sulaiman
|
Training Process Reduction Based On Potential Weights Linear Analysis To
Accelarate Back Propagation Network
|
11 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 3, No. 1, July 2009, USA
| null |
ISSN 1947 5500
|
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Learning is the important property of Back Propagation Network (BPN) and
finding the suitable weights and thresholds during training in order to improve
training time as well as achieve high accuracy. Currently, data pre-processing
such as dimension reduction input values and pre-training are the contributing
factors in developing efficient techniques for reducing training time with high
accuracy and initialization of the weights is the important issue which is
random and creates paradox, and leads to low accuracy with high training time.
One good data preprocessing technique for accelerating BPN classification is
dimension reduction technique but it has problem of missing data. In this
paper, we study current pre-training techniques and new preprocessing technique
called Potential Weight Linear Analysis (PWLA) which combines normalization,
dimension reduction input values and pre-training. In PWLA, the first data
preprocessing is performed for generating normalized input values and then
applying them by pre-training technique in order to obtain the potential
weights. After these phases, dimension of input values matrix will be reduced
by using real potential weights. For experiment results XOR problem and three
datasets, which are SPECT Heart, SPECTF Heart and Liver disorders (BUPA) will
be evaluated. Our results, however, will show that the new technique of PWLA
will change BPN to new Supervised Multi Layer Feed Forward Neural Network
(SMFFNN) model with high accuracy in one epoch without training cycle. Also
PWLA will be able to have power of non linear supervised and unsupervised
dimension reduction property for applying by other supervised multi layer feed
forward neural network model in future work.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 05:30:01 GMT"
}
] | 2009-08-12T00:00:00 |
[
[
"Asadi",
"Roya",
""
],
[
"Mustapha",
"Norwati",
""
],
[
"Sulaiman",
"Nasir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0908.1457
|
Francois Le Gall
|
Hirotada Kobayashi, Fran\c{c}ois Le Gall, Harumichi Nishimura, Martin
Roetteler
|
General Scheme for Perfect Quantum Network Coding with Free Classical
Communication
|
12 pages, 2 figures, generalizes some of the results in
arXiv:0902.1299 to the k-pair problem and codes over rings. Appeared in the
Proceedings of the 36th International Colloquium on Automata, Languages and
Programming (ICALP'09), LNCS 5555, pp. 622-633, 2009
|
Proceedings of the 36th International Colloquium on Automata,
Languages and Programming (ICALP'09), LNCS 5555, pp. 622-633, 2009
|
10.1007/978-3-642-02927-1_52
| null |
quant-ph cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the problem of efficiently transmitting quantum states
through a network. It has been known for some time that without additional
assumptions it is impossible to achieve this task perfectly in general --
indeed, it is impossible even for the simple butterfly network. As additional
resource we allow free classical communication between any pair of network
nodes. It is shown that perfect quantum network coding is achievable in this
model whenever classical network coding is possible over the same network when
replacing all quantum capacities by classical capacities. More precisely, it is
proved that perfect quantum network coding using free classical communication
is possible over a network with $k$ source-target pairs if there exists a
classical linear (or even vector linear) coding scheme over a finite ring. Our
proof is constructive in that we give explicit quantum coding operations for
each network node. This paper also gives an upper bound on the number of
classical communication required in terms of $k$, the maximal fan-in of any
network node, and the size of the network.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 05:55:43 GMT"
}
] | 2016-05-30T00:00:00 |
[
[
"Kobayashi",
"Hirotada",
""
],
[
"Gall",
"François Le",
""
],
[
"Nishimura",
"Harumichi",
""
],
[
"Roetteler",
"Martin",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1471
|
Fen Zhou Mr
|
Fen Zhou (IRISA / INSA Rennes), Miklos Molnar (IRISA / INSA Rennes),
Bernard Cousin (IRISA / University of Rennes I)
|
Distance priority based multicast routing in WDM networks considering
sparse light splitting
|
11th IEEE International Conference on Communication Systems,
Guangzhou. China, 19-21 Nov. 2008. (ICCS 2008)
|
IEEE International Conference on Communication Systems. (2008)
709-714
|
10.1109/ICCS.2008.4737278
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As we know, the member-only algorithm in provides the best links stress and
wavelength usage for the construction of multicast light-trees in WDM networks
with sparse splitting. However, the diameter of tree is too big and the average
delay is also too large, which are intolerant for QoS required multimedia
applications. In this paper, a distance priority based algorithm is proposed to
build light-trees for multicast routing, where the Candidate Destinations and
the Candidate Connectors are introduced. Simulations show the proposed
algorithm is able to greatly reduce the diameter and average delay of the
multicast tree (up to 51% and 50% respectively), while keep the same or get a
slightly better link stress as well as the wavelength usage than the famous
Member-Only algorithm.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 08:17:48 GMT"
}
] | 2009-08-12T00:00:00 |
[
[
"Zhou",
"Fen",
"",
"IRISA / INSA Rennes"
],
[
"Molnar",
"Miklos",
"",
"IRISA / INSA Rennes"
],
[
"Cousin",
"Bernard",
"",
"IRISA / University of Rennes I"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.1490
|
Kyatsandra Nagananda
|
K. G. Nagananda, Chandra R. Murthy
|
Asymmetric Transmitter Cooperation in Multiuser Wireless Networks:
Achievable Rate Regions
|
This paper has been withdrawn by the author due another related
publication
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we derive achievable rate regions for the three-user
interference channels with asymmetric transmitter cooperation and various
decoding capabilities at the receivers. The three-user channel facilitates
different ways of message sharing between the transmitters. We introduce two
natural ways of extending the concept of unidirectional message sharing from
two users to three users - (i) cumulative message sharing and (ii) primary-only
message sharing. In addition, we define several cognitive interference channels
based on the decoding capability of the receivers. We employ a coding
technique, which is a combination of superposition and Gel'fand-Pinsker coding
techniques, to derive an achievable rate region for each of the cognitive
interference channels. Simulation results, by considering the Gaussian channel
case, enables a visual comparison of the two message-sharing schemes considered
in this paper. It also provides useful insights into the effect of
message-splitting at the transmitters and the decoding capability of the
receivers on the achievable rates.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 10:16:08 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Feb 2011 03:24:07 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Feb 2011 01:43:55 GMT"
}
] | 2011-02-23T00:00:00 |
[
[
"Nagananda",
"K. G.",
""
],
[
"Murthy",
"Chandra R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1510
|
Avraham Reani
|
Avraham Reani, Neri Merhav
|
Efficient On-line Schemes for Encoding Individual Sequences with Side
Information at the Decoder
|
33 pages, 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present adaptive on-line schemes for lossy encoding of individual
sequences under the conditions of the Wyner-Ziv (WZ) problem. In the first part
of this article, a set of fixed-rate scalar source codes with zero delay is
presented. We propose a randomized on-line coding scheme, which achieves
asymptotically (and with high probability), the performance of the best source
code in the set, uniformly over all source sequences. The scheme uses the same
rate and has zero delay. We then present an efficient algorithm for
implementing our on-line coding scheme in the case of a relatively small set of
encoders. We also present an efficient algorithm for the case of a larger set
of encoders with a structure, using the method of the weighted graph and the
Weight Pushing Algorithm (WPA). In the second part of this article, we extend
our results to the case of variable-rate coding. A set of variable-rate scalar
source codes is presented. We generalize the randomized on-line coding scheme,
to our case. This time, the performance is measured by the Lagrangian Cost
(LC), which is defined as a weighted sum of the distortion and the length of
the encoded sequence. We present an efficient algorithm for implementing our
on-line variable-rate coding scheme in the case of a relatively small set of
encoders. We then consider the special case of lossless variable-rate coding.
An on-line scheme which use Huffman codes is presented. We show that this
scheme can be implemented efficiently using the same graphic methods from the
first part. Combining the results from former sections, we build a generalized
efficient algorithm for structured set of variable-rate encoders. The
complexity of all the algorithms is no more than linear in the sequence length.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 13:13:04 GMT"
}
] | 2009-08-12T00:00:00 |
[
[
"Reani",
"Avraham",
""
],
[
"Merhav",
"Neri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1528
|
Robert Geisberger
|
Robert Geisberger
|
Contraction of Timetable Networks with Realistic Transfers
|
15 pages, technical report
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We successfully contract timetable networks with realistic transfer times.
Contraction gradually removes nodes from the graph and adds shortcuts to
preserve shortest paths. This reduces query times to 1 ms with preprocessing
times around 6 minutes on all tested instances. We achieve this by an improved
contraction algorithm and by using a station graph model. Every node in our
graph has a one-to-one correspondence to a station and every edge has an
assigned collection of connections. Our graph model does not need parallel
edges. The query algorithm does not compute a single earliest arrival time at a
station but a set of arriving connections that allow best transfer
opportunities.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 16:03:46 GMT"
},
{
"version": "v2",
"created": "Wed, 12 Aug 2009 14:26:01 GMT"
}
] | 2009-08-12T00:00:00 |
[
[
"Geisberger",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.1564
|
Jay Kumar Sundararajan
|
Jay Kumar Sundararajan, Szymon Jakubczak, Muriel Medard, Michael
Mitzenmacher, Joao Barros
|
Interfacing network coding with TCP: an implementation
|
9 pages; Submitted to INFOCOM 2010
| null | null | null |
cs.NI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In previous work (`Network coding meets TCP') we proposed a new protocol that
interfaces network coding with TCP by means of a coding layer between TCP and
IP. Unlike the usual batch-based coding schemes, the protocol uses a
TCP-compatible sliding window code in combination with new rules for
acknowledging bytes to TCP that take into account the network coding operations
in the lower layer. The protocol was presented in a theoretical framework and
considered only in conjunction with TCP Vegas. In this paper we present a
real-world implementation of this protocol that addresses several important
practical aspects of incorporating network coding and decoding with TCP's
window management mechanism. Further, we work with the more widespread and
practical TCP Reno. Our implementation significantly advances the goal of
designing a deployable, general, TCP-compatible protocol that provides the
benefits of network coding.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 19:36:15 GMT"
}
] | 2009-08-12T00:00:00 |
[
[
"Sundararajan",
"Jay Kumar",
""
],
[
"Jakubczak",
"Szymon",
""
],
[
"Medard",
"Muriel",
""
],
[
"Mitzenmacher",
"Michael",
""
],
[
"Barros",
"Joao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1580
|
Grenville Croll
|
Francoise Tort, Francois-Marie Blondel, Eric Bruillard
|
From error detection to behaviour observation: first results from screen
capture analysis
|
13 Pages; 4 Figures, 6 Tables; ISBN 978-1-905617-89-0
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 119-132
| null | null |
cs.HC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper deals with errors in using spreadsheets and analysis of automatic
recording of user interaction with spreadsheets. After a review of literature
devoted to spreadsheet errors, we advocate the importance of going from error
detection to interaction behaviour analysis. We explain how we analyze screen
captures and give the main results we have obtained using this specific
methodology with secondary school students (N=24). Transcription provides
general characteristics: time, sequence of performed tasks, unsuccessful
attempts and user preferences. Analysis reveals preferred modes of actions
(toolbar buttons or menu commands), ways of writing formulas, and typical
approaches in searching for solutions. Time, rhythm and density appear to be
promising indicators. We think such an approach (to analyze screen captures)
could be used with more advanced spreadsheet users.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 21:05:06 GMT"
}
] | 2011-02-19T00:00:00 |
[
[
"Tort",
"Francoise",
""
],
[
"Blondel",
"Francois-Marie",
""
],
[
"Bruillard",
"Eric",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.1584
|
Grenville Croll
|
Mel Glass, David Ford, Sebastian Dewhurst
|
Reducing the Risk of Spreadsheet Usage - a Case Study
|
10 Pages, 7 Figures
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 163-172
ISBN 978-1-905617-89-0
| null | null |
cs.HC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The frequency with which spreadsheets are used and the associated risk is
well known. Many tools and techniques have been developed which help reduce
risks associate with creating and maintaining spreadsheet. However, little
consideration has been given to reducing the risks of routine usage by the
"consumers" - for example when entering and editing data. EASA's solution,
available commercially, ensures that any routine process involving spreadsheets
can be executed rapidly and without errors by the end-users, often with a
significant reduction in manual effort. Specifically, the technology enables
the rapid creation and deployment of web-based applications, connected to one
or more centralized spreadsheets; this ensures version control, easy and error
free usage, and security of intellectual property contained in spreadsheets.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 21:15:42 GMT"
}
] | 2009-08-13T00:00:00 |
[
[
"Glass",
"Mel",
""
],
[
"Ford",
"David",
""
],
[
"Dewhurst",
"Sebastian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.1597
|
George Kesidis
|
George Kesidis
|
A quantum diffusion network
| null | null | null |
Technical Report Number CSE 09-012
|
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wong's diffusion network is a stochastic, zero-input Hopfield network with a
Gibbs stationary distribution over a bounded, connected continuum. Previously,
logarithmic thermal annealing was demonstrated for the diffusion network and
digital versions of it were studied and applied to imaging. Recently, "quantum"
annealed Markov chains have garnered significant attention because of their
improved performance over "pure" thermal annealing. In this note, a joint
quantum and thermal version of Wong's diffusion network is described and its
convergence properties are studied. Different choices for "auxiliary" functions
are discussed, including those of the kinetic type previously associated with
quantum annealing.
|
[
{
"version": "v1",
"created": "Tue, 11 Aug 2009 23:45:08 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Kesidis",
"George",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0908.1599
|
Saburo Higuchi
|
Saburo Higuchi and Marc M\'ezard
|
Decimation flows in constraint satisfaction problems
|
14 pages, 2 figures
|
J. Stat. Mech. (2009) P12009
|
10.1088/1742-5468/2009/12/P12009
| null |
cond-mat.dis-nn cond-mat.stat-mech cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study hard constraint satisfaction problems with a decimation approach
based on message passing algorithms. Decimation induces a renormalization flow
in the space of problems, and we exploit the fact that this flow transforms
some of the constraints into linear constraints over GF(2). In particular, when
the flow hits the subspace of linear problems, one can stop decimation and use
Gaussian elimination. We introduce a new decimation algorithm which uses this
linear structure and shows a strongly improved performance with respect to the
usual decimation methods on some of the hardest locked occupation problems.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 00:18:43 GMT"
}
] | 2010-05-11T00:00:00 |
[
[
"Higuchi",
"Saburo",
""
],
[
"Mézard",
"Marc",
""
]
] |
[
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.1608
|
Christian Duncan
|
Christian A. Duncan, Michael T. Goodrich, Stephen G. Kobourov
|
Planar Drawings of Higher-Genus Graphs
|
A condensed version of this paper is to appear in Graph Drawing 2009.
This is just a first draft. A final draft will appear in the near future
| null | null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we give polynomial-time algorithms that can take a graph G
with a given combinatorial embedding on an orientable surface S of genus g and
produce a planar drawing of G in R^2, with a bounding face defined by a
polygonal schema P for S. Our drawings are planar, but they allow for multiple
copies of vertices and edges on P's boundary, which is a common way of
visualizing higher-genus graphs in the plane. Our drawings can be defined with
respect to either a canonical polygonal schema or a polygonal cutset schema,
which provides an interesting tradeoff, since canonical schemas have fewer
sides, and have a nice topological structure, but they can have many more
repeated vertices and edges than general polygonal cutsets. As a side note, we
show that it is NP-complete to determine whether a given graph embedded in a
genus-g surface has a set of 2g fundamental cycles with vertex-disjoint
interiors, which would be desirable from a graph-drawing perspective.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 02:53:37 GMT"
}
] | 2009-08-13T00:00:00 |
[
[
"Duncan",
"Christian A.",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Kobourov",
"Stephen G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.1613
|
Yi Su
|
Yi Su and Mihaela van der Schaar
|
Linearly Coupled Communication Games
|
20 pages, 1 figure
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses a special type of multi-user communication scenario, in
which users' utilities are linearly impacted by their competitors' actions.
First, we explicitly characterize the Nash equilibrium and Pareto boundary of
the achievable utility region. Second, the price of anarchy incurred by the
non-collaborative Nash strategy is quantified. Third, to improve the
performance in the non-cooperative scenarios, we investigate the properties of
an alternative solution concept named conjectural equilibrium, in which
individual users compensate for their lack of information by forming internal
beliefs about their competitors. The global convergence of the best response
and Jacobi update dynamics that achieve various conjectural equilibria are
analyzed. It is shown that the Pareto boundaries of the investigated linearly
coupled games can be sustained as stable conjectural equilibria if the belief
functions are properly initialized. The investigated models apply to a variety
of realistic applications encountered in the multiple access design, including
wireless random access and flow control.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 04:56:18 GMT"
}
] | 2009-08-13T00:00:00 |
[
[
"Su",
"Yi",
""
],
[
"van der Schaar",
"Mihaela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0908.1667
|
Samir Medina Perlaza
|
S.M. Perlaza, E.V. Belmega, S. Lasaulce, M. Debbah,
|
On the Base Station Selection and Base Station Sharing in
Self-Configuring Networks
|
3rd ICST/ACM International Workshop on Game Theory in Communication
Networks. October 23th 2009. Pisa, Italy
| null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We model the interaction of several radio devices aiming to obtain wireless
connectivity by using a set of base stations (BS) as a non-cooperative game.
Each radio device aims to maximize its own spectral efficiency (SE) in two
different scenarios: First, we let each player to use a unique BS (BS
selection) and second, we let them to simultaneously use several BSs (BS
Sharing). In both cases, we show that the resulting game is an exact potential
game. We found that the BS selection game posses multiple Nash equilibria (NE)
while the BS sharing game posses a unique one. We provide fully decentralized
algorithms which always converge to a NE in both games. We analyze the price of
anarchy and the price of stability for the case of BS selection. Finally, we
observed that depending on the number of transmitters, the BS selection
technique might provide a better global performance (network spectral
efficiency) than BS sharing, which suggests the existence of a Braess type
paradox.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 10:18:16 GMT"
}
] | 2009-08-13T00:00:00 |
[
[
"Perlaza",
"S. M.",
""
],
[
"Belmega",
"E. V.",
""
],
[
"Lasaulce",
"S.",
""
],
[
"Debbah",
"M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0908.1669
|
Martianus Frederic Ezerman
|
Martianus Frederic Ezerman, Markus Grassl, and Patrick Sole
|
The Weights in MDS Codes
|
5 pages, submitted to IEEE Trans. IT. This version 2 is the revised
version after the refereeing process. Accepted for publication
|
IEEE Transactions on Information Theory, vol. 57, no. 1, January
2011, pp. 392-396
|
10.1109/TIT.2010.2090246
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The weights in MDS codes of length n and dimension k over the finite field
GF(q) are studied. Up to some explicit exceptional cases, the MDS codes with
parameters given by the MDS conjecture are shown to contain all k weights in
the range n-k+1 to n. The proof uses the covering radius of the dual code
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 10:38:56 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jul 2010 10:10:11 GMT"
}
] | 2011-03-31T00:00:00 |
[
[
"Ezerman",
"Martianus Frederic",
""
],
[
"Grassl",
"Markus",
""
],
[
"Sole",
"Patrick",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1676
|
Patrick Kuppinger
|
Patrick Kuppinger, Giuseppe Durisi, and Helmut B\"olcskei
|
Improved Sparsity Thresholds Through Dictionary Splitting
|
IEEE Information Theory Workshop (ITW), Taormina, Italy, Oct. 2009,
to appear
| null |
10.1109/ITW.2009.5351511
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Known sparsity thresholds for basis pursuit to deliver the maximally sparse
solution of the compressed sensing recovery problem typically depend on the
dictionary's coherence. While the coherence is easy to compute, it can lead to
rather pessimistic thresholds as it captures only limited information about the
dictionary. In this paper, we show that viewing the dictionary as the
concatenation of two general sub-dictionaries leads to provably better sparsity
thresholds--that are explicit in the coherence parameters of the dictionary and
of the individual sub-dictionaries. Equivalently, our results can be
interpreted as sparsity thresholds for dictionaries that are unions of two
general (i.e., not necessarily orthonormal) sub-dictionaries.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 10:48:51 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Kuppinger",
"Patrick",
""
],
[
"Durisi",
"Giuseppe",
""
],
[
"Bölcskei",
"Helmut",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1769
|
Bert Huang
|
Bert Huang and Tony Jebara
|
Approximating the Permanent with Belief Propagation
| null | null | null | null |
cs.LG cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
This work describes a method of approximating matrix permanents efficiently
using belief propagation. We formulate a probability distribution whose
partition function is exactly the permanent, then use Bethe free energy to
approximate this partition function. After deriving some speedups to standard
belief propagation, the resulting algorithm requires $(n^2)$ time per
iteration. Finally, we demonstrate the advantages of using this approximation.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 18:27:54 GMT"
}
] | 2009-08-13T00:00:00 |
[
[
"Huang",
"Bert",
""
],
[
"Jebara",
"Tony",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1774
|
David Shuman
|
David I Shuman, Mingyan Liu, and Owen Q. Wu
|
Energy-Efficient Transmission Scheduling with Strict Underflow
Constraints
|
109 pages, 11 pdf figures, template.tex is main file. We have
significantly revised the paper from version 1. Additions include the case of
a single receiver with piecewise-linear convex power-rate curves, the case of
two receivers, and the infinite horizon average expected cost problem
| null | null | null |
math.OC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a single source transmitting data to one or more receivers/users
over a shared wireless channel. Due to random fading, the wireless channel
conditions vary with time and from user to user. Each user has a buffer to
store received packets before they are drained. At each time step, the source
determines how much power to use for transmission to each user. The source's
objective is to allocate power in a manner that minimizes an expected cost
measure, while satisfying strict buffer underflow constraints and a total power
constraint in each slot. The expected cost measure is composed of costs
associated with power consumption from transmission and packet holding costs.
The primary application motivating this problem is wireless media streaming.
For this application, the buffer underflow constraints prevent the user buffers
from emptying, so as to maintain playout quality. In the case of a single user
with linear power-rate curves, we show that a modified base-stock policy is
optimal under the finite horizon, infinite horizon discounted, and infinite
horizon average expected cost criteria. For a single user with piecewise-linear
convex power-rate curves, we show that a finite generalized base-stock policy
is optimal under all three expected cost criteria. We also present the
sequences of critical numbers that complete the characterization of the optimal
control laws in each of these cases when some additional technical conditions
are satisfied. We then analyze the structure of the optimal policy for the case
of two users. We conclude with a discussion of methods to identify
implementable near-optimal policies for the most general case of M users.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 18:40:19 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Feb 2010 00:20:34 GMT"
}
] | 2010-02-16T00:00:00 |
[
[
"Shuman",
"David I",
""
],
[
"Liu",
"Mingyan",
""
],
[
"Wu",
"Owen Q.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1776
|
Vincent Lariviere
|
Vincent Lariviere, Yves Gingras
|
On the relationship between interdisciplinarity and scientific impact
|
10 pages, 3 figures, 1 table. Forthcoming in JASIST
| null | null | null |
physics.soc-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper analyzes the effect of interdisciplinarity on the scientific
impact of individual papers. Using all the papers published in Web of Science
in 2000, we define the degree of interdisciplinarity of a given paper as the
percentage of its cited references made to journals of other disciplines. We
show that, although for all disciplines combined there is no clear correlation
between the level of interdisciplinarity of papers and their citation rates,
there are nonetheless some disciplines in which a higher level of
interdisciplinarity is related to a higher citation rates. For other
disciplines, citations decline as interdisciplinarity grows. One characteristic
is visible in all disciplines: highly disciplinary and highly interdisciplinary
papers have a low scientific impact. This suggests that there might be an
optimum of interdisciplinarity beyond which the research is too dispersed to
find its niche and under which it is too mainstream to have high impact.
Finally, the relationship between interdisciplinarity and scientific impact is
highly determined by the citation characteristics of the disciplines involved:
papers citing citation intensive disciplines are more likely to be cited by
those disciplines and, hence, obtain higher citation scores than papers citing
non citation intensive disciplines.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 19:08:59 GMT"
}
] | 2009-08-13T00:00:00 |
[
[
"Lariviere",
"Vincent",
""
],
[
"Gingras",
"Yves",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0908.1789
|
Naveen Kumar
|
Naveen Kumar, Pranav Agarwal, Aditya Ramamoorthy and Murti Salapaka
|
Maximum-Likelihood Sequence Detector for Dynamic Mode High Density Probe
Storage
|
This paper is published in IEEE Trans. on communication
|
IEEE Trans. on Communications vol. 58(6), pp. 1686-1694, Jun. 2010
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There is an increasing need for high density data storage devices driven by
the increased demand of consumer electronics. In this work, we consider a data
storage system that operates by encoding information as topographic profiles on
a polymer medium. A cantilever probe with a sharp tip (few nm radius) is used
to create and sense the presence of topographic profiles, resulting in a
density of few Tb per in.2. The prevalent mode of using the cantilever probe is
the static mode that is harsh on the probe and the media. In this article, the
high quality factor dynamic mode operation, that is less harsh on the media and
the probe, is analyzed. The read operation is modeled as a communication
channel which incorporates system memory due to inter-symbol interference and
the cantilever state. We demonstrate an appropriate level of abstraction of
this complex nanoscale system that obviates the need for an involved physical
model. Next, a solution to the maximum likelihood sequence detection problem
based on the Viterbi algorithm is devised. Experimental and simulation results
demonstrate that the performance of this detector is several orders of
magnitude better than the performance of other existing schemes.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 20:05:42 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Jun 2010 18:44:24 GMT"
}
] | 2010-06-28T00:00:00 |
[
[
"Kumar",
"Naveen",
""
],
[
"Agarwal",
"Pranav",
""
],
[
"Ramamoorthy",
"Aditya",
""
],
[
"Salapaka",
"Murti",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1797
|
Ted Herman
|
Kajari Ghosh Dastidar, Ted Herman
|
Separation of Circulating Tokens
|
22 pages, 7 figures, epsf and pstricks in LaTeX
| null |
10.1007/978-3-642-05118-0_25
|
TR09-02
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Self-stabilizing distributed control is often modeled by token abstractions.
A system with a single token may implement mutual exclusion; a system with
multiple tokens may ensure that immediate neighbors do not simultaneously enjoy
a privilege. For a cyber-physical system, tokens may represent physical objects
whose movement is controlled. The problem studied in this paper is to ensure
that a synchronous system with m circulating tokens has at least d distance
between tokens. This problem is first considered in a ring where d is given
whilst m and the ring size n are unknown. The protocol solving this problem can
be uniform, with all processes running the same program, or it can be
non-uniform, with some processes acting only as token relays. The protocol for
this first problem is simple, and can be expressed with Petri net formalism. A
second problem is to maximize d when m is given, and n is unknown. For the
second problem, the paper presents a non-uniform protocol with a single
corrective process.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 20:52:52 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Oct 2009 22:55:11 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Dastidar",
"Kajari Ghosh",
""
],
[
"Herman",
"Ted",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0908.1805
|
Javad Ghaderi
|
J. Ghaderi and R. Srikant
|
Towards a Theory of Anonymous Networking
| null | null | null | null |
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of anonymous networking when an eavesdropper observes packet
timings in a communication network is considered. The goal is to hide the
identities of source-destination nodes, and paths of information flow in the
network. One way to achieve such an anonymity is to use mixers. Mixers are
nodes that receive packets from multiple sources and change the timing of
packets, by mixing packets at the output links, to prevent the eavesdropper
from finding sources of outgoing packets. In this paper, we consider two simple
but fundamental scenarios: double input-single output mixer and double
input-double output mixer. For the first case, we use the information-theoretic
definition of the anonymity, based on average entropy per packet, and find an
optimal mixing strategy under a strict latency constraint. For the second case,
perfect anonymity is considered, and maximal throughput strategies with perfect
anonymity are found under a strict latency constraint and an average queue
length constraint.
|
[
{
"version": "v1",
"created": "Wed, 12 Aug 2009 22:23:13 GMT"
},
{
"version": "v2",
"created": "Sun, 20 Nov 2011 23:51:08 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Nov 2012 22:29:06 GMT"
}
] | 2012-11-14T00:00:00 |
[
[
"Ghaderi",
"J.",
""
],
[
"Srikant",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.1826
|
Hao Zhang
|
Hao Zhang, Gang Li, Huadong Meng
|
An Efficient Greedy Algorithm for Sparse Recovery in Noisy Environment
|
12 pages, 20 figures, submitted to IEEE Trans on Signal Processing.
Revised version, 2 figures are replaced
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Greedy algorithm are in widespread use for sparse recovery because of its
efficiency. But some evident flaws exists in most popular greedy algorithms,
such as CoSaMP, which includes unreasonable demands on prior knowledge of
target signal and excessive sensitivity to random noise. A new greedy algorithm
called AMOP is proposed in this paper to overcome these obstacles. Unlike
CoSaMP, AMOP can extract necessary information of target signal from sample
data adaptively and operate normally with little prior knowledge. The recovery
error of AMOP is well controlled when random noise is presented and fades away
along with increase of SNR. Moreover, AMOP has good robustness on detailed
setting of target signal and less dependence on structure of measurement
matrix. The validity of AMOP is verified by theoretical derivation. Extensive
simulation experiment is performed to illustrate the advantages of AMOP over
CoSaMP in many respects. AMOP is a good candidate of practical greedy algorithm
in various applications of Compressed Sensing.
|
[
{
"version": "v1",
"created": "Thu, 13 Aug 2009 02:58:36 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Aug 2009 11:26:35 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Zhang",
"Hao",
""
],
[
"Li",
"Gang",
""
],
[
"Meng",
"Huadong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1916
|
Urs Niesen
|
Urs Niesen, Devavrat Shah, Gregory Wornell
|
Caching in Wireless Networks
|
28 pages, to appear in IEEE Transactions on Information Theory
|
IEEE Transactions on Information Theory, vol. 58, pp. 6524 - 6540,
October 2012
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of delivering content cached in a wireless network of
n nodes randomly located on a square of area n. The network performance is
described by the n2^n-dimensional caching capacity region of the wireless
network. We provide an inner bound on this caching capacity region, and, in the
high path-loss regime, a matching (in the scaling sense) outer bound. For large
path-loss exponent, this provides an information-theoretic scaling
characterization of the entire caching capacity region. The proposed
communication scheme achieving the inner bound shows that the problems of cache
selection and channel coding can be solved separately without loss of
order-optimality. On the other hand, our results show that the common
architecture of nearest-neighbor cache selection can be arbitrarily bad,
implying that cache selection and load balancing need to be performed jointly.
|
[
{
"version": "v1",
"created": "Thu, 13 Aug 2009 15:21:28 GMT"
},
{
"version": "v2",
"created": "Fri, 15 Oct 2010 21:32:23 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Dec 2011 16:55:37 GMT"
}
] | 2012-09-28T00:00:00 |
[
[
"Niesen",
"Urs",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Wornell",
"Gregory",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1919
|
Patrick Erik Bradley
|
Patrick Erik Bradley
|
A dyadic solution of relative pose problems
|
7 pages; references added; typos and Thm 2 corrected (not affecting
the other results)
| null | null | null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A hierarchical interval subdivision is shown to lead to a $p$-adic encoding
of image data. This allows in the case of the relative pose problem in computer
vision and photogrammetry to derive equations having 2-adic numbers as
coefficients, and to use Hensel's lifting method to their solution. This method
is applied to the linear and non-linear equations coming from eight, seven or
five point correspondences. An inherent property of the method is its
robustness.
|
[
{
"version": "v1",
"created": "Thu, 13 Aug 2009 15:41:44 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Aug 2009 14:01:20 GMT"
},
{
"version": "v3",
"created": "Thu, 1 Oct 2009 06:50:18 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Bradley",
"Patrick Erik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0908.1932
|
Ketan Mulmuley D
|
Ketan D. Mulmuley
|
On P vs. NP, Geometric Complexity Theory, Explicit Proofs and the
Complexity Barrier
|
65 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Geometric complexity theory (GCT) is an approach to the P vs. NP and related
problems. This article gives its complexity theoretic overview without assuming
any background in algebraic geometry or representation theory.
|
[
{
"version": "v1",
"created": "Thu, 13 Aug 2009 18:31:54 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Aug 2009 00:22:41 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Mulmuley",
"Ketan D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.1936
|
Ketan Mulmuley D
|
Ketan D. Mulmuley
|
On P vs. NP, Geometric Complexity Theory, and the Riemann Hypothesis
|
71 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Geometric complexity theory (GCT) is an approach to the $P$ vs. $NP$ and
related problems. A high level overview of this research plan and the results
obtained so far was presented in a series of three lectures in the Institute of
Advanced study, Princeton, Feb 9-11, 2009. This article contains the material
covered in those lectures after some revision, and gives a mathematical
overview of GCT. No background in algebraic geometry, representation theory or
quantum groups is assumed.
|
[
{
"version": "v1",
"created": "Thu, 13 Aug 2009 18:05:07 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Aug 2009 00:32:52 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Mulmuley",
"Ketan D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.1948
|
I-Hsiang Wang
|
I-Hsiang Wang and David N. C. Tse
|
Interference Mitigation Through Limited Receiver Cooperation: Symmetric
Case
|
To appear in IEEE Information Theory Workshop, Taormina, October
2009. Final version
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interference is a major issue that limits the performance in wireless
networks, and cooperation among receivers can help mitigate interference by
forming distributed MIMO systems. The rate at which receivers cooperate,
however, is limited in most scenarios. How much interference can one bit of
receiver cooperation mitigate? In this paper, we study the two-user Gaussian
interference channel with conferencing decoders to answer this question in a
simple setting. We characterize the fundamental gain from cooperation: at high
SNR, when INR is below 50% of SNR in dB scale, one-bit cooperation per
direction buys roughly one-bit gain per user until full receiver cooperation
performance is reached, while when INR is between 67% and 200% of SNR in dB
scale, one-bit cooperation per direction buys roughly half-bit gain per user.
The conclusion is drawn based on the approximate characterization of the
symmetric capacity in the symmetric set-up. We propose strategies achieving the
symmetric capacity universally to within 3 bits. The strategy consists of two
parts: (1) the transmission scheme, where superposition encoding with a simple
power split is employed, and (2) the cooperative protocol, where
quantize-binning is used for relaying.
|
[
{
"version": "v1",
"created": "Thu, 13 Aug 2009 18:17:38 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Aug 2009 17:51:00 GMT"
}
] | 2009-08-20T00:00:00 |
[
[
"Wang",
"I-Hsiang",
""
],
[
"Tse",
"David N. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.1966
|
Mark Flanagan
|
Roxana Smarandache and Mark F. Flanagan
|
Spectral Graph Analysis of Quasi-Cyclic Codes
|
5 pages. Proc. IEEE Globecom 2009, Hawaii, USA, November 30 -
December 4, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we analyze the bound on the additive white Gaussian noise
channel (AWGNC) pseudo-weight of a (c,d)-regular linear block code based on the
two largest eigenvalues of H^T H. In particular, we analyze (c,d)-regular
quasi-cyclic (QC) codes of length rL described by J x L block parity-check
matrices with circulant block entries of size r x r. We proceed by showing how
the problem of computing the eigenvalues of the rL x rL matrix H^T H can be
reduced to the problem of computing eigenvalues for r matrices of size L x L.
We also give a necessary condition for the bound to be attained for a circulant
matrix H and show a few classes of cyclic codes satisfying this criterion.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 14:54:20 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Aug 2009 19:27:38 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Smarandache",
"Roxana",
""
],
[
"Flanagan",
"Mark F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2005
|
Danny Bickson
|
Danny Bickson, Dror Baron, Alex T. Ihler, Harel Avissar and Danny
Dolev
|
Fault Identification via Non-parametric Belief Propagation
|
In IEEE Tran. On Signal Processing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of identifying a pattern of faults from a set of
noisy linear measurements. Unfortunately, maximum a posteriori probability
estimation of the fault pattern is computationally intractable. To solve the
fault identification problem, we propose a non-parametric belief propagation
approach. We show empirically that our belief propagation solver is more
accurate than recent state-of-the-art algorithms including interior point
methods and semidefinite programming. Our superior performance is explained by
the fact that we take into account both the binary nature of the individual
faults and the sparsity of the fault pattern arising from their rarity.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 02:16:47 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Sep 2009 14:20:29 GMT"
},
{
"version": "v3",
"created": "Thu, 24 Sep 2009 13:42:05 GMT"
},
{
"version": "v4",
"created": "Mon, 12 Jul 2010 17:54:42 GMT"
},
{
"version": "v5",
"created": "Fri, 5 Nov 2010 14:59:45 GMT"
},
{
"version": "v6",
"created": "Mon, 8 Nov 2010 16:16:31 GMT"
},
{
"version": "v7",
"created": "Wed, 24 Nov 2010 14:55:23 GMT"
},
{
"version": "v8",
"created": "Tue, 1 Feb 2011 18:21:51 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Bickson",
"Danny",
""
],
[
"Baron",
"Dror",
""
],
[
"Ihler",
"Alex T.",
""
],
[
"Avissar",
"Harel",
""
],
[
"Dolev",
"Danny",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2007
|
Fabio Soldo
|
Fabio Soldo, Anh Le, Athina Markopoulou
|
Predictive Blacklisting as an Implicit Recommendation System
|
Comments: 11 pages; Submitted to INFOCOM 2010
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A widely used defense practice against malicious traffic on the Internet is
through blacklists: lists of prolific attack sources are compiled and shared.
The goal of blacklists is to predict and block future attack sources. Existing
blacklisting techniques have focused on the most prolific attack sources and,
more recently, on collaborative blacklisting. In this paper, we formulate the
problem of forecasting attack sources (also referred to as predictive
blacklisting) based on shared attack logs as an implicit recommendation system.
We compare the performance of existing approaches against the upper bound for
prediction, and we demonstrate that there is much room for improvement.
Inspired by the recent Netflix competition, we propose a multi-level prediction
model that is adjusted and tuned specifically for the attack forecasting
problem. Our model captures and combines various factors, namely:
attacker-victim history (using time-series) and attackers and/or victims
interactions (using neighborhood models). We evaluate our combined method on
one month of logs from Dshield.org and demonstrate that it improves
significantly the state-of-the-art.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 03:45:12 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Soldo",
"Fabio",
""
],
[
"Le",
"Anh",
""
],
[
"Markopoulou",
"Athina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.2024
|
Wilfred Ndifon
|
Wilfred Ndifon, Joshua B. Plotkin, Jonathan Dushoff
|
On the accessibility of adaptive phenotypes of a bacterial metabolic
network
|
48 pages, 9 figures, 1 table. Accepted in PLoS Computational Biology
(July '09)
| null |
10.1371/journal.pcbi.1000472
| null |
q-bio.PE cs.IT math.IT q-bio.MN q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The mechanisms by which adaptive phenotypes spread within an evolving
population after their emergence are understood fairly well. Much less is known
about the factors that influence the evolutionary accessibility of such
phenotypes, a pre-requisite for their emergence in a population. Here, we
investigate the influence of environmental quality on the accessibility of
adaptive phenotypes of Escherichia coli's central metabolic network. We used an
established flux-balance model of metabolism as the basis for a
genotype-phenotype map (GPM). We quantified the effects of seven qualitatively
different environments (corresponding to both carbohydrate and gluconeogenic
metabolic substrates) on the structure of this GPM. We found that the GPM has a
more rugged structure in qualitatively poorer environments, suggesting that
adaptive phenotypes could be intrinsically less accessible in such
environments. Nevertheless, on average ~74% of the genotype can be altered by
neutral drift, in the environment where the GPM is most rugged; this could
allow evolving populations to circumvent such ruggedness. Furthermore, we found
that the normalized mutual information (NMI) of genotype differences relative
to phenotype differences, which measures the GPM's capacity to transmit
information about phenotype differences, is positively correlated with
(simulation-based) estimates of the accessibility of adaptive phenotypes in
different environments. These results are consistent with the predictions of a
simple analytic theory and they suggest an intuitive information-theoretic
principle for evolutionary adaptation; adaptation could be faster in
environments where the GPM has a greater capacity to transmit information about
phenotype differences.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 08:30:40 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Ndifon",
"Wilfred",
""
],
[
"Plotkin",
"Joshua B.",
""
],
[
"Dushoff",
"Jonathan",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0908.2032
|
Eric Meyer
|
Eric T. Meyer, Ralph Schroeder
|
Untangling the Web of E-Research: Towards a Sociology of Online
Knowledge
| null |
Journal of Informetrics (2009) 3(3):246-260
| null | null |
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
e-Research is a rapidly growing research area, both in terms of publications
and in terms of funding. In this article we argue that it is necessary to
reconceptualize the ways in which we seek to measure and understand e-Research
by developing a sociology of knowledge based on our understanding of how
science has been transformed historically and shifted into online forms. Next,
we report data which allows the examination of e-Research through a variety of
traces in order to begin to understand how the knowledge in the realm of
e-Research has been and is being constructed. These data indicate that
e-Research has had a variable impact in different fields of research. We argue
that only an overall account of the scale and scope of e-Research within and
between different fields makes it possible to identify the organizational
coherence and diffuseness of e-Research in terms of its socio-technical
networks, and thus to identify the contributions of e-Research to various
research fronts in the online production of knowledge.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 10:09:36 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Meyer",
"Eric T.",
""
],
[
"Schroeder",
"Ralph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0908.2042
|
Ryutaroh Matsumoto
|
Ryutaroh Matsumoto
|
Problems in application of LDPC codes to information reconciliation in
quantum key distribution protocols
|
10 pages, 1 figure. short survey article
| null | null |
IT2009-41
|
cs.IT cs.CR math.IT quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The information reconciliation in a quantum key distribution protocol can be
studied separately from other steps in the protocol. The problem of information
reconciliation can be reduced to that of distributed source coding. Its
solution by LDPC codes is reviewed. We list some obstacles preventing the
LDPC-based distributed source coding from becoming a more favorable alternative
to the Cascade protocol for information reconciliation in quantum key
distribution protocols. This exposition does not require knowledge of the
quantum theory.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 11:36:12 GMT"
},
{
"version": "v2",
"created": "Sun, 13 Sep 2009 10:19:58 GMT"
}
] | 2009-09-13T00:00:00 |
[
[
"Matsumoto",
"Ryutaroh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0908.2050
|
Guido Tack
|
Christian Schulte and Guido Tack
|
View-based Propagator Derivation
|
28 pages, 7 tables, 3 figures
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When implementing a propagator for a constraint, one must decide about
variants: When implementing min, should one also implement max? Should one
implement linear constraints both with unit and non-unit coefficients?
Constraint variants are ubiquitous: implementing them requires considerable (if
not prohibitive) effort and decreases maintainability, but will deliver better
performance than resorting to constraint decomposition.
This paper shows how to use views to derive perfect propagator variants. A
model for views and derived propagators is introduced. Derived propagators are
proved to be indeed perfect in that they inherit essential properties such as
correctness and domain and bounds consistency. Techniques for systematically
deriving propagators such as transformation, generalization, specialization,
and type conversion are developed. The paper introduces an implementation
architecture for views that is independent of the underlying constraint
programming system. A detailed evaluation of views implemented in Gecode shows
that derived propagators are efficient and that views often incur no overhead.
Without views, Gecode would either require 180 000 rather than 40 000 lines of
propagator code, or would lack many efficient propagator variants. Compared to
8 000 lines of code for views, the reduction in code for propagators yields a
1750% return on investment.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 12:27:51 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Schulte",
"Christian",
""
],
[
"Tack",
"Guido",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.2056
|
Sebastian Roch
|
Yuval Peres and Sebastien Roch
|
Reconstruction on Trees: Exponential Moment Bounds for Linear Estimators
| null | null | null | null |
math.PR cs.DS math.ST q-bio.PE stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider a Markov chain $(\xi_v)_{v \in V} \in [k]^V$ on the infinite $b$-ary
tree $T = (V,E)$ with irreducible edge transition matrix $M$, where $b \geq 2$,
$k \geq 2$ and $[k] = \{1,...,k\}$. We denote by $L_n$ the level-$n$ vertices
of $T$. Assume $M$ has a real second-largest (in absolute value) eigenvalue
$\lambda$ with corresponding real eigenvector $\nu \neq 0$. Letting $\sigma_v =
\nu_{\xi_v}$, we consider the following root-state estimator, which was
introduced by Mossel and Peres (2003) in the context of the "recontruction
problem" on trees: \begin{equation*} S_n = (b\lambda)^{-n} \sum_{x\in L_n}
\sigma_x. \end{equation*} As noted by Mossel and Peres, when $b\lambda^2 > 1$
(the so-called Kesten-Stigum reconstruction phase) the quantity $S_n$ has
uniformly bounded variance. Here, we give bounds on the moment-generating
functions of $S_n$ and $S_n^2$ when $b\lambda^2 > 1$. Our results have
implications for the inference of evolutionary trees.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 13:05:32 GMT"
}
] | 2011-09-07T00:00:00 |
[
[
"Peres",
"Yuval",
""
],
[
"Roch",
"Sebastien",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0908.2061
|
Sebastian Roch
|
Sebastien Roch
|
Sequence-Length Requirement of Distance-Based Phylogeny Reconstruction:
Breaking the Polynomial Barrier
| null | null | null | null |
math.PR cs.CE cs.DS math.ST q-bio.PE q-bio.QM stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a new distance-based phylogeny reconstruction technique which
provably achieves, at sufficiently short branch lengths, a polylogarithmic
sequence-length requirement -- improving significantly over previous polynomial
bounds for distance-based methods. The technique is based on an averaging
procedure that implicitly reconstructs ancestral sequences.
In the same token, we extend previous results on phase transitions in
phylogeny reconstruction to general time-reversible models. More precisely, we
show that in the so-called Kesten-Stigum zone (roughly, a region of the
parameter space where ancestral sequences are well approximated by ``linear
combinations'' of the observed sequences) sequences of length $\poly(\log n)$
suffice for reconstruction when branch lengths are discretized. Here $n$ is the
number of extant species.
Our results challenge, to some extent, the conventional wisdom that estimates
of evolutionary distances alone carry significantly less information about
phylogenies than full sequence datasets.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 13:20:44 GMT"
}
] | 2011-09-30T00:00:00 |
[
[
"Roch",
"Sebastien",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.PE",
"description": "Population dynamics, spatio-temporal and epidemiological models, dynamic speciation, co-evolution, biodiversity, foodwebs, aging; molecular evolution and phylogeny; directed evolution; origin of life",
"span": "(Populations and Evolution)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0908.2083
|
Janusz Brzozowski
|
J. Brzozowski, G. Jir\'askov\'a, B. Li
|
Quotient complexity of ideal languages
|
24 pages, 9 .eepic figures, 2 tables, use llncs.cls
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the state complexity of regular operations in the class of ideal
languages. A language L over an alphabet Sigma is a right (left) ideal if it
satisfies L = L Sigma* (L = Sigma* L). It is a two-sided ideal if L = Sigma* L
Sigma *, and an all-sided ideal if it is the shuffle of Sigma* with L. We
prefer the term "quotient complexity" instead of "state complexity", and we use
derivatives to calculate upper bounds on quotient complexity, whenever it is
convenient. We find tight upper bounds on the quotient complexity of each type
of ideal language in terms of the complexity of an arbitrary generator and of
its minimal generator, the complexity of the minimal generator, and also on the
operations union, intersection, set difference, symmetric difference,
concatenation, star and reversal of ideal languages.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 15:24:15 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Brzozowski",
"J.",
""
],
[
"Jirásková",
"G.",
""
],
[
"Li",
"B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0908.2117
|
Babak Seyfe
|
Masoud Zaerin, Babak Seyfe, and Hamid R. Nikoofar
|
Multiuser Modulation Classification Based on Cumulants in AWGN Channel
|
25 Pages, 7 Figures, 1 Table, Submitted to IEEE Transaction on
Communications. Submitted to IEEE Transaction on Communications
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper the negative impacts of interference transmitters on automatic
modulation classification (AMC) have been discussed. We proposed two approaches
for AMC in the presence of interference: single user modulation classification
(SUMC) and multiuser modulation classification (MUMC). When the received power
of one transmitter is larger than the other transmitters, SUMC approach
recognizes the modulation type of that transmitter and other transmitters are
treated as interferences. Alternatively when the received powers of all
transmitters are close to each other we propose MUMC method to recognize the
modulation type of all of the transmitted signals. The features being used to
recognize the modulation types of transmitters for both approaches, SUMC and
MUMC are higher order cumulants. The super-position property of cumulants for
independent random variables is utilized for SUMC and MUMC. We investigated the
robustness of our classifier with respect to different powers of the received
signals via analytical and simulation results and we have shown the analytical
results will be confirmed by simulations. Also we studied the effect of signal
synchroni-zation error via simulation results in the both condition for MUMC
and SUMC.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 18:46:20 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Zaerin",
"Masoud",
""
],
[
"Seyfe",
"Babak",
""
],
[
"Nikoofar",
"Hamid R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2119
|
Bobak Nazer
|
Bobak Nazer and Michael Gastpar
|
Compute-and-Forward: Harnessing Interference through Structured Codes
|
IEEE Trans. Info Theory, to appear. 23 pages, 13 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Interference is usually viewed as an obstacle to communication in wireless
networks. This paper proposes a new strategy, compute-and-forward, that
exploits interference to obtain significantly higher rates between users in a
network. The key idea is that relays should decode linear functions of
transmitted messages according to their observed channel coefficients rather
than ignoring the interference as noise. After decoding these linear equations,
the relays simply send them towards the destinations, which given enough
equations, can recover their desired messages. The underlying codes are based
on nested lattices whose algebraic structure ensures that integer combinations
of codewords can be decoded reliably. Encoders map messages from a finite field
to a lattice and decoders recover equations of lattice points which are then
mapped back to equations over the finite field. This scheme is applicable even
if the transmitters lack channel state information.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 19:56:39 GMT"
},
{
"version": "v2",
"created": "Fri, 14 Aug 2009 23:58:36 GMT"
},
{
"version": "v3",
"created": "Mon, 13 Jun 2011 01:01:00 GMT"
}
] | 2011-06-14T00:00:00 |
[
[
"Nazer",
"Bobak",
""
],
[
"Gastpar",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2122
|
Michael Freedman
|
M. Bordewich, M. Freedman, L. Lov\'asz and D. Welsh
|
Approximate Counting and Quantum Computation
| null |
Combinatorics, Probability and Computing (2005) 14,737-754
| null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by the result that an `approximate' evaluation of the Jones
polynomial of a braid at a $5^{th}$ root of unity can be used to simulate the
quantum part of any algorithm in the quantum complexity class BQP, and results
relating BQP to the counting class GapP, we introduce a form of additive
approximation which can be used to simulate a function in BQP. We show that all
functions in the classes #P and GapP have such an approximation scheme under
certain natural normalisations. However we are unable to determine whether the
particular functions we are motivated by, such as the above evaluation of the
Jones polynomial, can be approximated in this way. We close with some open
problems motivated by this work.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 19:29:07 GMT"
}
] | 2009-08-17T00:00:00 |
[
[
"Bordewich",
"M.",
""
],
[
"Freedman",
"M.",
""
],
[
"Lovász",
"L.",
""
],
[
"Welsh",
"D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.2128
|
Toby S. Cubitt
|
Toby S. Cubitt, Jens Eisert and Michael M. Wolf
|
The Complexity of Relating Quantum Channels to Master Equations
|
V1: 43 pages, single column, 8 figures. V2: titled changed; added
proof-overview and accompanying figure; 50 pages, single column, 9 figures
|
Commun. Math. Phys. 310, 383 (2012)
| null | null |
math-ph cs.CC math.MP quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Completely positive, trace preserving (CPT) maps and Lindblad master
equations are both widely used to describe the dynamics of open quantum
systems. The connection between these two descriptions is a classic topic in
mathematical physics. One direction was solved by the now famous result due to
Lindblad, Kossakowski Gorini and Sudarshan, who gave a complete
characterisation of the master equations that generate completely positive
semi-groups. However, the other direction has remained open: given a CPT map,
is there a Lindblad master equation that generates it (and if so, can we find
it's form)? This is sometimes known as the Markovianity problem. Physically, it
is asking how one can deduce underlying physical processes from experimental
observations.
We give a complexity theoretic answer to this problem: it is NP-hard. We also
give an explicit algorithm that reduces the problem to integer semi-definite
programming, a well-known NP problem. Together, these results imply that
resolving the question of which CPT maps can be generated by master equations
is tantamount to solving P=NP: any efficiently computable criterion for
Markovianity would imply P=NP; whereas a proof that P=NP would imply that our
algorithm already gives an efficiently computable criterion. Thus, unless P
does equal NP, there cannot exist any simple criterion for determining when a
CPT map has a master equation description.
However, we also show that if the system dimension is fixed (relevant for
current quantum process tomography experiments), then our algorithm scales
efficiently in the required precision, allowing an underlying Lindblad master
equation to be determined efficiently from even a single snapshot in this case.
Our work also leads to similar complexity-theoretic answers to a related
long-standing open problem in probability theory.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 15:51:17 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Sep 2011 12:46:41 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Cubitt",
"Toby S.",
""
],
[
"Eisert",
"Jens",
""
],
[
"Wolf",
"Michael M.",
""
]
] |
[
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0908.2141
|
Yucel Altug
|
Yucel Altug and Aaron B. Wagner
|
Source and Channel Simulation Using Arbitrary Randomness
|
26 pages, 2 figures, submitted to IEEE Trans. on Information Theory.
A shorter version will be presented at 2009 Allerton Conference on
Communication, Control, and Computing
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Necessary and sufficient conditions for approximation of a general channel by
a general source are proved. For the special case in which the channel input is
deterministic, which corresponds to source simulation, we prove a stronger
necessary condition. As the approximation criteria, vanishing variational
distance between the original and the approximated quantity is used for both of
the problems. Both necessary and sufficient conditions for the two problems are
based on some individual properties of the sources and the channel and are
relatively easy to evaluate. In particular, unlike prior results for this
problem, our results do not require solving an optimization problem to test
simulatability. The results are illustrated with several non-ergodic examples.
|
[
{
"version": "v1",
"created": "Fri, 14 Aug 2009 21:14:10 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Altug",
"Yucel",
""
],
[
"Wagner",
"Aaron B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2153
|
Sergiy Vorobyov
|
Aboulnasr Hassanien and Sergiy A. Vorobyov
|
Phased-MIMO Radar: A Tradeoff Between Phased-Array and MIMO Radars
|
33 pages, 14 figures, Submitted to the IEEE Transactions on Signal
Processing in July 2009
|
A. Hassanien and S.A. Vorobyov, "Phased-MIMO radar: A tradeoff
between phased-array and MIMO radars," IEEE Trans. Signal Processing, vol.
58, no. 6, pp. 3137-3151, June 2010
|
10.1109/TSP.2010.2043976
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a new technique for multiple-input multiple-output (MIMO) radar
with colocated antennas which we call phased-MIMO radar. The new technique
enjoys the advantages of MIMO radar without sacrificing the main advantage of
phased-array radar which is the coherent processing gain at the transmitting
side. The essence of the proposed technique is to partition the transmitting
array into a number of subarrays that are allowed to overlap. Then, each
subarray is used to coherently transmit a waveform which is orthogonal to the
waveforms transmitted by other subarrays. Coherent processing gain can be
achieved by designing a weight vector for each subarray to form a beam towards
a certain direction in space. Moreover, the subarrays are combined jointly to
form a MIMO radar resulting in higher resolution capabilities. The substantial
improvements offered by the proposed phased-MIMO radar technique as compared to
previous techniques are demonstrated analytically and by simulations through
analysis of the corresponding beampatterns and achievable output
signal-to-noise-plus-interference ratios. Both analytical and simulation
results validate the effectiveness of the proposed phased-MIMO radar.
|
[
{
"version": "v1",
"created": "Sat, 15 Aug 2009 01:51:32 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Hassanien",
"Aboulnasr",
""
],
[
"Vorobyov",
"Sergiy A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2174
|
Suhan Choi
|
Suhan Choi
|
Distributed Source Coding with One Distortion Criterion and Correlated
Messages
|
20 pages, 7 figures, submitted to IEEE Trans. on Info. Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, distributed (or multiterminal) source coding with one
distortion criterion and correlated messages is considered. This problem can be
also called ``Berger-Yeung problem with correlated messages''. It corresponds
to the source coding part of the graph-based framework for transmission of a
pair of correlated sources over the multiple-access channel (MAC) where one is
lossless and the other is lossy. As a result, the achievable rate-distortion
region for this problem is provided. It is an information-theoretic
characterization of the rate of exponential growth (as a function of the number
of source samples) of the size of the bipartite graphs which can represent a
pair of correlated sources with satisfying one distortion criterion. A rigorous
proof of the achievability and the converse part is given. It is also shown
that there exists functional duality between Berger-Yeung problem with
correlated messages and semi-deterministic broadcast channel with correlated
messages. This means that the optimal encoder-decoder mappings for one problem
become the optimal decoder-encoder mappings for the dual problem. In the
duality setup, the correlation structure of the messages in the two dual
problems, source distortion measure and channel cost measure are also
specified.
|
[
{
"version": "v1",
"created": "Sat, 15 Aug 2009 14:11:44 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Choi",
"Suhan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2198
|
Maria Bras-Amor\'os
|
Maria Bras-Amor\'os and Michael E. O'Sullivan
|
The Berlekamp-Massey Algorithm and the Euclidean Algorithm: a Closer
Link
| null | null | null | null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The two primary decoding algorithms for Reed-Solomon codes are the
Berlekamp-Massey algorithm and the Sugiyama et al. adaptation of the Euclidean
algorithm, both designed to solve a key equation. In this article an
alternative version of the key equation and a new way to use the Euclidean
algorithm to solve it are presented, which yield the Berlekamp-Massey
algorithm. This results in a new, simpler, and compacter presentation of the
Berlekamp-Massey algorithm.
|
[
{
"version": "v1",
"created": "Sat, 15 Aug 2009 21:01:42 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Bras-Amorós",
"Maria",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2203
|
Makesh Pravin John Wilson
|
Makesh Pravin Wilson and Krishna Narayanan
|
Transmitting an analog Gaussian source over a Gaussian wiretap channel
under SNR mismatch
|
6 pages and 3 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work we study encoding/decoding schemes for the transmission of a
discrete time analog Gaussian source over a Gaussian wiretap channel. The
intended receiver is assumed to have a certain minimum signal to noise ratio
(SNR) and the eavesdropper is assumed to have a strictly lower SNR compared to
the intended receiver. For a fixed information leakage to the eavesdropper, we
are interested in minimizing the distortion in source reconstruction at the
intended receiver, and we propose joint source channel coding (JSCC) schemes
for this setup. For a fixed information leakage to the eavesdropper, we also
show that the schemes considered give a graceful degradation of distortion with
SNR under SNR mismatch, i.e., when the actual channel SNR is observed to be
different from the design SNR.
|
[
{
"version": "v1",
"created": "Sat, 15 Aug 2009 22:10:52 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Wilson",
"Makesh Pravin",
""
],
[
"Narayanan",
"Krishna",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2222
|
Gerald Krafft
|
Gerald Krafft, Vladimir Getov
|
Transaction-Oriented Simulation In Ad Hoc Grids: Design and Experience
|
7 pages, 6 figures, 1 tables, Proceedings of the 2008 High
Performance Computing and Simulation Conference (HPCS 2008), 3 - 6 June 2008,
Nicosia, Cyprus. pp. 38-44; http://westminsterresearch.wmin.ac.uk/5341/
| null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we analyse the requirements of performing parallel
transaction-oriented simulations within loosely coupled systems like ad hoc
grids. We focus especially on the space-parallel approach to parallel
simulation and on discrete event synchronisation algorithms that are suitable
for transaction-oriented simulation and the target environment of ad hoc grids.
To demonstrate our findings, a Java-based parallel simulator for the
transaction-oriented language GPSS/H is implemented on the basis of the most
promising shock-resistant Time Warp (SRTW) synchronisation algorithm and using
the grid framework ProActive. The analysis of our parallel simulator, based on
experiments using the Grid5000 platform, shows that the SRTW algorithm can
successfully reduce the number of rolled back transaction moves but it also
reveals circumstances in which the SRTW algorithm can be outperformed by the
normal Time Warp algorithm. Finally, possible improvements to the SRTW
algorithm are proposed in order to avoid such problems.
|
[
{
"version": "v1",
"created": "Sun, 16 Aug 2009 08:30:48 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Krafft",
"Gerald",
""
],
[
"Getov",
"Vladimir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.