id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0908.2231
|
Redouane Ali
|
Redouane Ali, Suksant Sae Lor, Miguel Rio
|
Two Algorithms for Network Size Estimation for Master/Slave Ad Hoc
Networks
|
3 pages, 2 figures, submitted to ANTS'09 - Corrected typos and
definitions
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes an adaptation of two network size estimation methods:
random tour and gossip-based aggregation to suit master/slave mobile ad hoc
networks. We show that it is feasible to accurately estimate the size of ad hoc
networks when topology changes due to mobility using both methods. The
algorithms were modified to account for the specific constraints of
master/slave ad hoc networks and the results show that the proposed
modifications perform better on these networks than the original protocols.
Each of the two algorithms presents strengths and weaknesses and these are
outlined in this paper.
|
[
{
"version": "v1",
"created": "Sun, 16 Aug 2009 17:29:30 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Aug 2009 20:56:59 GMT"
},
{
"version": "v3",
"created": "Tue, 20 Oct 2009 18:01:05 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Ali",
"Redouane",
""
],
[
"Lor",
"Suksant Sae",
""
],
[
"Rio",
"Miguel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.2237
|
Manu Basavaraju
|
Manu Basavaraju, L. Sunil Chandran
|
Acyclic Edge coloring of Planar Graphs
|
10 pages. 0 figures
| null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An $acyclic$ edge coloring of a graph is a proper edge coloring such that
there are no bichromatic cycles. The \emph{acyclic chromatic index} of a graph
is the minimum number k such that there is an acyclic edge coloring using k
colors and is denoted by $a'(G)$. It was conjectured by Alon, Sudakov and Zaks
(and much earlier by Fiamcik) that $a'(G)\le \Delta+2$, where $\Delta
=\Delta(G)$ denotes the maximum degree of the graph. We prove that if $G$ is a
planar graph with maximum degree $\Delta$, then $a'(G)\le \Delta + 12$.
|
[
{
"version": "v1",
"created": "Sun, 16 Aug 2009 13:16:15 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Basavaraju",
"Manu",
""
],
[
"Chandran",
"L. Sunil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.2256
|
Viswanath Nagarajan
|
Nikhil Bansal, Nitish Korula, Viswanath Nagarajan and Aravind
Srinivasan
|
On k-Column Sparse Packing Programs
|
19 pages, v3: additional details
| null |
10.1007/978-3-642-13036-6_28
| null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the class of packing integer programs (PIPs) that are column
sparse, i.e. there is a specified upper bound k on the number of constraints
that each variable appears in. We give an (ek+o(k))-approximation algorithm for
k-column sparse PIPs, improving on recent results of $k^2\cdot 2^k$ and
$O(k^2)$. We also show that the integrality gap of our linear programming
relaxation is at least 2k-1; it is known that k-column sparse PIPs are
$\Omega(k/ \log k)$-hard to approximate. We also extend our result (at the loss
of a small constant factor) to the more general case of maximizing a submodular
objective over k-column sparse packing constraints.
|
[
{
"version": "v1",
"created": "Sun, 16 Aug 2009 17:55:03 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Sep 2009 02:27:09 GMT"
},
{
"version": "v3",
"created": "Sun, 14 Mar 2010 15:29:51 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Bansal",
"Nikhil",
""
],
[
"Korula",
"Nitish",
""
],
[
"Nagarajan",
"Viswanath",
""
],
[
"Srinivasan",
"Aravind",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.2277
|
Wiroonsak Santipach
|
Wiroonsak Santipach and Michael L. Honig
|
Optimization of Training and Feedback Overhead for Beamforming over
Block Fading Channels
|
accepted for IEEE Trans. Info. Theory, 2010
|
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER
2010
|
10.1109/TIT.2010.2081150
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We examine the capacity of beamforming over a single-user, multi-antenna link
taking into account the overhead due to channel estimation and limited feedback
of channel state information. Multi-input single-output (MISO) and multi-input
multi-output (MIMO) channels are considered subject to block Rayleigh fading.
Each coherence block contains $L$ symbols, and is spanned by $T$ training
symbols, $B$ feedback bits, and the data symbols. The training symbols are used
to obtain a Minimum Mean Squared Error estimate of the channel matrix. Given
this estimate, the receiver selects a transmit beamforming vector from a
codebook containing $2^B$ {\em i.i.d.} random vectors, and sends the
corresponding $B$ bits back to the transmitter. We derive bounds on the
beamforming capacity for MISO and MIMO channels and characterize the optimal
(rate-maximizing) training and feedback overhead ($T$ and $B$) as $L$ and the
number of transmit antennas $N_t$ both become large. The optimal $N_t$ is
limited by the coherence time, and increases as $L/\log L$. For the MISO
channel the optimal $T/L$ and $B/L$ (fractional overhead due to training and
feedback) are asymptotically the same, and tend to zero at the rate $1/\log
N_t$. For the MIMO channel the optimal feedback overhead $B/L$ tends to zero
faster (as $1/\log^2 N_t$).
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 03:05:24 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Aug 2010 08:51:25 GMT"
}
] | 2010-11-22T00:00:00 |
[
[
"Santipach",
"Wiroonsak",
""
],
[
"Honig",
"Michael L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2282
|
Seyed Abolfazl Motahari
|
Abolfazl Seyed Motahari, Shahab Oveis Gharan, Mohammad-Ali Maddah-Ali,
and Amir Keyvan Khandani
|
Real Interference Alignment: Exploiting the Potential of Single Antenna
Systems
|
Submitted to IEEE Transaction on Information Theory. The first
version was uploaded on arxiv on 17 Aug 2009 with the following title:
Forming Pseudo-MIMO by Embedding Infinite Rational Dimensions Along a Single
Real Line: Removing Barriers in Achieving the DOFs of Single Antenna Systems
| null |
10.1109/TIT.2014.2329865
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, the available spatial Degrees-Of-Freedoms (DOF) in single
antenna systems is exploited. A new coding scheme is proposed in which several
data streams having fractional multiplexing gains are sent by transmitters and
interfering streams are aligned at receivers. Viewed as a field over rational
numbers, a received signal has infinite fractional DOFs, allowing simultaneous
interference alignment of any finite number of signals at any finite number of
receivers. The coding scheme is backed up by a recent result in the field of
Diophantine approximation, which states that the convergence part of the
Khintchine-Groshev theorem holds for points on non-degenerate manifolds. The
proposed coding scheme is proved to be optimal for three communication
channels, namely the Gaussian Interference Channel (GIC), the uplink channel in
cellular systems, and the $X$ channel. It is proved that the total DOF of the
$K$-user GIC is $\frac{K}{2}$ almost surely, i.e. each user enjoys half of its
maximum DOF. Having $K$ cells and $M$ users within each cell in a cellular
system, the total DOF of the uplink channel is proved to be $\frac{KM}{M+1}$.
Finally, the total DOF of the $X$ channel with $K$ transmitters and $M$
receivers is shown to be $\frac{KM}{K+M-1}$.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 19:49:23 GMT"
},
{
"version": "v2",
"created": "Tue, 24 Nov 2009 04:43:28 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Motahari",
"Abolfazl Seyed",
""
],
[
"Gharan",
"Shahab Oveis",
""
],
[
"Maddah-Ali",
"Mohammad-Ali",
""
],
[
"Khandani",
"Amir Keyvan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2295
|
Ezra N. Hoch
|
Danny Dolev, Ezra N. Hoch, Yoram Moses
|
An Optimal Self-Stabilizing Firing Squad
|
Shorter version to appear in SSS09
| null |
10.1007/978-3-642-05118-0_20
| null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Consider a fully connected network where up to $t$ processes may crash, and
all processes start in an arbitrary memory state. The self-stabilizing firing
squad problem consists of eventually guaranteeing simultaneous response to an
external input. This is modeled by requiring that the non-crashed processes
"fire" simultaneously if some correct process received an external "GO" input,
and that they only fire as a response to some process receiving such an input.
This paper presents FireAlg, the first self-stabilizing firing squad algorithm.
The FireAlg algorithm is optimal in two respects: (a) Once the algorithm is
in a safe state, it fires in response to a GO input as fast as any other
algorithm does, and (b) Starting from an arbitrary state, it converges to a
safe state as fast as any other algorithm does.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 07:39:06 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Dolev",
"Danny",
""
],
[
"Hoch",
"Ezra N.",
""
],
[
"Moses",
"Yoram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0908.2328
|
Yara Omar
|
Yara Omar, Moustafa Youssef, Hesham El Gamal
|
ARQ Secrecy: From Theory to Practice
|
5 pages, invited to ITW'09
| null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Inspired by our earlier work on Automatic Repeat reQuest (ARQ) secrecy, we
propose a simple, yet efficient, security overlay protocol to existing 802.11
networks. Our work targets networks secured by the Wired Equivalent Privacy
(WEP) protocol because of its widespread use and vulnerability to a multitude
of security threats. By exploiting the existing ARQ protocol in the 802.11
standard, our proposed opportunistic secrecy scheme is shown to defend against
all known passive WEP attacks. Moreover, our implementation on the madwifi-ng
driver is used to establish the achievability of a vanishing secrecy outage
probability in several realistic scenarios.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 11:23:30 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Omar",
"Yara",
""
],
[
"Youssef",
"Moustafa",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2332
|
Gerard Henry Edmond Duchamp
|
G\'erard Henry Edmond Duchamp (LIPN), Laurent Poinsot (LIPN), Allan I.
Solomon (LPTMC), Karol A. Penson (LPTMC), Pawel Blasiak (IFJ-PAN - Polish
Academy of Sciences), Andrzej Horzela (IFJ-PAN - Polish Academy of Sciences)
|
Ladder Operators and Endomorphisms in Combinatorial Physics
| null |
DMTCS 12, 2 (2010) 1
| null | null |
math.CO cs.SC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Starting with the Heisenberg-Weyl algebra, fundamental to quantum physics, we
first show how the ordering of the non-commuting operators intrinsic to that
algebra gives rise to generalizations of the classical Stirling Numbers of
Combinatorics. These may be expressed in terms of infinite, but {\em
row-finite}, matrices, which may also be considered as endomorphisms of
$\C[[x]]$. This leads us to consider endomorphisms in more general spaces, and
these in turn may be expressed in terms of generalizations of the
ladder-operators familiar in physics.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 11:40:06 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Dec 2009 20:11:35 GMT"
}
] | 2010-11-04T00:00:00 |
[
[
"Duchamp",
"Gérard Henry Edmond",
"",
"LIPN"
],
[
"Poinsot",
"Laurent",
"",
"LIPN"
],
[
"Solomon",
"Allan I.",
"",
"LPTMC"
],
[
"Penson",
"Karol A.",
"",
"LPTMC"
],
[
"Blasiak",
"Pawel",
"",
"IFJ-PAN - Polish\n Academy of Sciences"
],
[
"Horzela",
"Andrzej",
"",
"IFJ-PAN - Polish Academy of Sciences"
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0908.2363
|
Tsuyoshi Ito
|
Tsuyoshi Ito
|
Polynomial-Space Approximation of No-Signaling Provers
|
13 pages. v2: Introduction expanded, references added, some open
problems stated, and typos corrected
| null | null | null |
cs.CC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In two-prover one-round interactive proof systems, no-signaling provers are
those who are allowed to use arbitrary strategies, not limited to local
operations, as long as their strategies cannot be used for communication
between them. Study of multi-prover interactive proof systems with no-signaling
provers is motivated by study of those with provers sharing quantum states. The
relation between them is that no-signaling strategies include all the
strategies realizable by provers sharing arbitrary entangled quantum states,
and more.
This paper shows that two-prover one-round interactive proof systems with
no-signaling provers only accept languages in PSPACE. Combined with the
protocol for PSPACE by Ito, Kobayashi and Matsumoto (CCC 2009), this implies
MIPns(2,1)=PSPACE, where MIPns(2,1) is the class of languages having a
two-prover one-round interactive proof system with no-signaling provers. This
is proved by constructing a fast parallel algorithm which approximates within
an additive error the maximum value of a two-player one-round game achievable
by cooperative no-signaling players. The algorithm uses the fast parallel
algorithm for the mixed packing and covering problem by Young (FOCS 2001).
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 17:52:16 GMT"
},
{
"version": "v2",
"created": "Tue, 20 Oct 2009 19:11:27 GMT"
}
] | 2009-10-20T00:00:00 |
[
[
"Ito",
"Tsuyoshi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0908.2369
|
Sariel Har-Peled
|
Sariel Har-Peled
|
Being Fat and Friendly is Not Enough
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that there is no $(1+\eps)$-approximation algorithm for the problem
of covering points in the plane by minimum number of fat triangles of similar
size (with the minimum angle of the triangles being close to 45 degrees). Here,
the available triangles are prespecified in advance. Since a constant factor
approximation algorithm is known for this problem \cite{cv-iaags-07}, this
settles the approximability of this problem.
We also investigate some related problems, including cover by friendly fat
shapes, and independent set of triangles in three dimensions.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 15:29:21 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Har-Peled",
"Sariel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.2397
|
Xiaojun Tang
|
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, and H. Vincent Poor
|
Interference Assisted Secret Communication
|
submitted to IEEE Transactions on Information Theory
| null |
10.1109/TIT.2011.2121450
|
WINLAB-09-0817
|
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless communication is susceptible to eavesdropping attacks because of its
broadcast nature. This paper illustrates how interference can be used to
counter eavesdropping and assist secrecy. In particular, a wire-tap channel
with a helping interferer (WT-HI) is considered. Here, a transmitter sends a
confidential message to its intended receiver in the presence of a passive
eavesdropper and with the help of an independent interferer. The interferer,
which does not know the confidential message, helps in ensuring the secrecy of
the message by sending an independent signal. An achievable secrecy rate and
several computable outer bounds on the secrecy capacity of the WT-HI are given
for both discrete memoryless and Gaussian channels.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 17:07:36 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Tang",
"Xiaojun",
""
],
[
"Liu",
"Ruoheng",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2399
|
Andreas Witzel
|
Andreas Witzel, Krzysztof R. Apt, Jonathan A. Zvesper
|
Distributed iterated elimination of strictly dominated strategies
| null | null | null | null |
cs.GT cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We characterize epistemic consequences of truthful communication among
rational agents in a game-theoretic setting. To this end we introduce
normal-form games equipped with an interaction structure, which specifies which
groups of players can communicate their preferences with each other. We then
focus on a specific form of interaction, namely a distributed form of iterated
elimination of strictly dominated strategies (IESDS), driven by communication
among the agents. We study the outcome of IESDS after some (possibly all)
messages about players' preferences have been sent. The main result of the
paper provides an epistemic justification of this form of IESDS.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 17:20:50 GMT"
},
{
"version": "v2",
"created": "Mon, 2 Nov 2009 16:01:37 GMT"
},
{
"version": "v3",
"created": "Wed, 17 Aug 2011 22:55:11 GMT"
}
] | 2011-08-19T00:00:00 |
[
[
"Witzel",
"Andreas",
""
],
[
"Apt",
"Krzysztof R.",
""
],
[
"Zvesper",
"Jonathan A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0908.2402
|
Babak Seyfe
|
Mahboobeh Sedighizad, Babak Seyfe, and Keivan Navaie
|
MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time
|
12 Pages (Two columns), 14 Figures, 4 Tables,
| null |
10.1016/j.jnca.2011.11.006
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose Multi-Rate Bandwidth Available in Real Time
(MR-BART) to estimate the end-to-end Available Bandwidth (AB) of a network
path. The proposed scheme is an extension of the Bandwidth Available in Real
Time (BART) which employs multi-rate (MR) probe packet sequences with Kalman
filtering. Comparing to BART, we show that the proposed method is more robust
and converges faster than that of BART and achieves a more AB accurate
estimation. Furthermore, we analyze the estimation error in MR-BART and obtain
analytical formula and empirical expression for the AB estimation error based
on the system parameters.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 17:43:50 GMT"
}
] | 2017-02-02T00:00:00 |
[
[
"Sedighizad",
"Mahboobeh",
""
],
[
"Seyfe",
"Babak",
""
],
[
"Navaie",
"Keivan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.2408
|
Makesh Pravin John Wilson
|
Makesh Pravin Wilson and Krishna Narayanan
|
Power Allocation Strategies and Lattice Based Coding schemes for
Bi-directional relaying
|
5 pages, 4 figures and was presented at the International Symposium
on Information Theory - ISIT 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a communication system where two transmitters wish to exchange
information through a half-duplex relay in the middle. The channels between the
transmitters and the relay have asymmetric channel gains. More specifically,
the channels are assumed to be synchronized with complex inputs and complex
fading coefficients with an average power constraint on the inputs to the
channels. The noise at the receivers have the same power spectral density and
are assumed to be white and Gaussian. We restrict our attention to transmission
schemes where information from the two nodes are simultaneously sent to the
relay during a medium access phase followed by a broadcast phase where the
relay broadcasts information to both the nodes. An upper bound on the capacity
for the two phase protocol under a sum power constraint on the transmit power
from all the nodes is obtained as a solution to a convex optimization problem.
We show that a scheme using channel inversion with lattice decoding can obtain
a rate a small constant 0.09 bits from the upper bound at high signal-to-noise
ratios. Numerical results show that the proposed scheme can perform very close
to the upper bound.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 18:21:38 GMT"
}
] | 2009-08-18T00:00:00 |
[
[
"Wilson",
"Makesh Pravin",
""
],
[
"Narayanan",
"Krishna",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2440
|
Greg Aloupis
|
Greg Aloupis, Sebastien Collette, Erik D. Demaine, Stefan Langerman,
Vera Sacristan, Stefanie Wuhrer
|
Reconfiguration of 3D Crystalline Robots Using O(log n) Parallel Moves
|
21 pages, 10 figures
| null | null | null |
cs.CG cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the theoretical model of Crystalline robots, which have been
introduced and prototyped by the robotics community. These robots consist of
independently manipulable unit-square atoms that can extend/contract arms on
each side and attach/detach from neighbors. These operations suffice to
reconfigure between any two given (connected) shapes. The worst-case number of
sequential moves required to transform one connected configuration to another
is known to be Theta(n). However, in principle, atoms can all move
simultaneously. We develop a parallel algorithm for reconfiguration that runs
in only O(log n) parallel steps, although the total number of operations
increases slightly to Theta(nlogn). The result is the first (theoretically)
almost-instantaneous universally reconfigurable robot built from simple units.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 20:42:44 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Aloupis",
"Greg",
""
],
[
"Collette",
"Sebastien",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Langerman",
"Stefan",
""
],
[
"Sacristan",
"Vera",
""
],
[
"Wuhrer",
"Stefanie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0908.2442
|
Greg Aloupis
|
Greg Aloupis, Jean Cardinal, Sebastien Collette, John Iacono, Stefan
Langerman
|
Detecting all regular polygons in a point set
|
11 pages, 4 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we analyze the time complexity of finding regular polygons in
a set of n points. We combine two different approaches to find regular
polygons, depending on their number of edges. Our result depends on the
parameter alpha, which has been used to bound the maximum number of isosceles
triangles that can be formed by n points. This bound has been expressed as
O(n^{2+2alpha+epsilon}), and the current best value for alpha is ~0.068.
Our algorithm finds polygons with O(n^alpha) edges by sweeping a line through
the set of points, while larger polygons are found by random sampling. We can
find all regular polygons with high probability in O(n^{2+alpha+epsilon})
expected time for every positive epsilon. This compares well to the
O(n^{2+2alpha+epsilon}) deterministic algorithm of Brass.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 21:01:45 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Aloupis",
"Greg",
""
],
[
"Cardinal",
"Jean",
""
],
[
"Collette",
"Sebastien",
""
],
[
"Iacono",
"John",
""
],
[
"Langerman",
"Stefan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.2462
|
Hyoungshick Kim
|
Ji Won Yoon, Hyoungshick Kim and Jun Ho Huh
|
Hybrid Spam Filtering for Mobile Communication
|
6 pages, 5 figures, 1 table
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spam messages are an increasing threat to mobile communication. Several
mitigation techniques have been proposed, including white and black listing,
challenge-response and content-based filtering. However, none are perfect and
it makes sense to use a combination rather than just one. We propose an
anti-spam framework based on the hybrid of content-based filtering and
challenge-response. There is the trade-offs between accuracy of anti-spam
classifiers and the communication overhead. Experimental results show how,
depending on the proportion of spam messages, different filtering %%@
parameters should be set.
|
[
{
"version": "v1",
"created": "Mon, 17 Aug 2009 23:10:02 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Yoon",
"Ji Won",
""
],
[
"Kim",
"Hyoungshick",
""
],
[
"Huh",
"Jun Ho",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.2467
|
Joseph Koo
|
Joseph C. Koo, John Gill
|
Low-complexity non-uniform demand multicast network coding problems
|
8 pages, 3 figures, presented at 47th Allerton Conference on
Communication Control and Computing, 2009. Includes more complete proof of
Theorem 3
| null |
10.1109/ALLERTON.2009.5394805
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The non-uniform demand network coding problem is posed as a single-source and
multiple-sink network transmission problem where the sinks may have
heterogeneous demands. In contrast with multicast problems, non-uniform demand
problems are concerned with the amounts of data received by each sink, rather
than the specifics of the received data. In this work, we enumerate non-uniform
network demand scenarios under which network coding solutions can be found in
polynomial time. This is accomplished by relating the demand problem with the
graph coloring problem, and then applying results from the strong perfect graph
theorem to identify coloring problems which can be solved in polynomial time.
This characterization of efficiently-solvable non-uniform demand problems is an
important step in understanding such problems, as it allows us to better
understand situations under which the NP-complete problem might be tractable.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 00:18:11 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 01:51:50 GMT"
}
] | 2010-01-27T00:00:00 |
[
[
"Koo",
"Joseph C.",
""
],
[
"Gill",
"John",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2468
|
Seiichiro Tani
|
Andris Ambainis, Kazuo Iwama, Masaki Nakanishi, Harumichi Nishimura,
Rudy Raymond, Seiichiro Tani, Shigeru Yamashita
|
Average/Worst-Case Gap of Quantum Query Complexities by On-Set Size
|
19 pages
|
Computational Complexity, vol.25, Issue 4, pp.723--735, 2016
(entitled "Quantum Query Complexity of Almost All Functions with Fixed On-Set
Size")
|
10.1007/s00037-016-0139-6
| null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers the query complexity of the functions in the family
F_{N,M} of N-variable Boolean functions with onset size M, i.e., the number of
inputs for which the function value is 1, where 1<= M <= 2^{N}/2 is assumed
without loss of generality because of the symmetry of function values, 0 and 1.
Our main results are as follows: (1) There is a super-linear gap between the
average-case and worst-case quantum query complexities over F_{N,M} for a
certain range of M. (2) There is no super-linear gap between the average-case
and worst-case randomized query complexities over F_{N,M} for every M. (3) For
every M bounded by a polynomial in N, any function in F_{N,M} has quantum query
complexity Theta (sqrt{N}). (4) For every M=O(2^{cN}) with an arbitrary large
constant c<1, any function in F_{N,M} has randomized query complexity Omega
(N).
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 00:13:44 GMT"
}
] | 2020-06-24T00:00:00 |
[
[
"Ambainis",
"Andris",
""
],
[
"Iwama",
"Kazuo",
""
],
[
"Nakanishi",
"Masaki",
""
],
[
"Nishimura",
"Harumichi",
""
],
[
"Raymond",
"Rudy",
""
],
[
"Tani",
"Seiichiro",
""
],
[
"Yamashita",
"Shigeru",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.2476
|
Yunlei Zhao
|
Andrew C. Yao, Moti Yung, Yunlei Zhao
|
Concurrent Knowledge-Extraction in the Public-Key Model
|
38 pages, 4 figures
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Knowledge extraction is a fundamental notion, modelling machine possession of
values (witnesses) in a computational complexity sense. The notion provides an
essential tool for cryptographic protocol design and analysis, enabling one to
argue about the internal state of protocol players without ever looking at this
supposedly secret state. However, when transactions are concurrent (e.g., over
the Internet) with players possessing public-keys (as is common in
cryptography), assuring that entities ``know'' what they claim to know, where
adversaries may be well coordinated across different transactions, turns out to
be much more subtle and in need of re-examination. Here, we investigate how to
formally treat knowledge possession by parties (with registered public-keys)
interacting over the Internet. Stated more technically, we look into the
relative power of the notion of ``concurrent knowledge-extraction'' (CKE) in
the concurrent zero-knowledge (CZK) bare public-key (BPK) model.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 01:43:21 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Yao",
"Andrew C.",
""
],
[
"Yung",
"Moti",
""
],
[
"Zhao",
"Yunlei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.2493
|
Greg Aloupis
|
Greg Aloupis, Erik D. Demaine, Martin L. Demaine, Vida Dujmovic, John
Iacono
|
Minimum feature size preserving decompositions
|
12 pages, 4 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The minimum feature size of a crossing-free straight line drawing is the
minimum distance between a vertex and a non-incident edge. This quantity
measures the resolution needed to display a figure or the tool size needed to
mill the figure. The spread is the ratio of the diameter to the minimum feature
size. While many algorithms (particularly in meshing) depend on the spread of
the input, none explicitly consider finding a mesh whose spread is similar to
the input. When a polygon is partitioned into smaller regions, such as
triangles or quadrangles, the degradation is the ratio of original to final
spread (the final spread is always greater).
Here we present an algorithm to quadrangulate a simple n-gon, while achieving
constant degradation. Note that although all faces have a quadrangular shape,
the number of edges bounding each face may be larger. This method uses Theta(n)
Steiner points and produces Theta(n) quadrangles. In fact to obtain constant
degradation, Omega(n) Steiner points are required by any algorithm.
We also show that, for some polygons, a constant factor cannot be achieved by
any triangulation, even with an unbounded number of Steiner points. The
specific lower bounds depend on whether Steiner vertices are used or not.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 06:10:19 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Aloupis",
"Greg",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Demaine",
"Martin L.",
""
],
[
"Dujmovic",
"Vida",
""
],
[
"Iacono",
"John",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.2494
|
Bikash Kumar Dey
|
S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey
|
A Channel Coding Perspective of Collaborative Filtering
|
32 pages, 1 figure, Submitted to IEEE Transactions on Information
Theory
| null |
10.1109/TIT.2011.2111190
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of collaborative filtering from a channel coding
perspective. We model the underlying rating matrix as a finite alphabet matrix
with block constant structure. The observations are obtained from this
underlying matrix through a discrete memoryless channel with a noisy part
representing noisy user behavior and an erasure part representing missing data.
Moreover, the clusters over which the underlying matrix is constant are {\it
unknown}. We establish a sharp threshold result for this model: if the largest
cluster size is smaller than $C_1 \log(mn)$ (where the rating matrix is of size
$m \times n$), then the underlying matrix cannot be recovered with any
estimator, but if the smallest cluster size is larger than $C_2 \log(mn)$, then
we show a polynomial time estimator with diminishing probability of error. In
the case of uniform cluster size, not only the order of the threshold, but also
the constant is identified.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 06:24:17 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Aditya",
"S. T.",
""
],
[
"Dabeer",
"Onkar",
""
],
[
"Dey",
"Bikash Kumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2496
|
Chengqing Li
|
Chengqing Li, Shujun Li, Kowk-Tung Lo and Kyandoghere Kyamakya
|
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography
System (MCS)
|
22 pages, 5 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for
multimedia transmission named "Multimedia Cryptography System" (MCS). No
cryptanalytic results have been reported so far. This paper presents a
differential attack to break MCS, which requires only seven chosen plaintexts.
The complexity of the attack is O(N), where $N$ is the size of plaintext.
Experimental results are also given to show the real performance of the
proposed attack.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 07:02:14 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Li",
"Chengqing",
""
],
[
"Li",
"Shujun",
""
],
[
"Lo",
"Kowk-Tung",
""
],
[
"Kyamakya",
"Kyandoghere",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.2505
|
Camilla Hollanti
|
Jyrki Lahtonen, Roope Vehkalahti, Hsiao-feng Lu, Camilla Hollanti, and
Emanuele Viterbo
|
On the Decay of the Determinants of Multiuser MIMO Lattice Codes
|
5 pages, submitted to ITW 2010, Cairo, Egypt
| null | null | null |
cs.IT cs.DM math.IT math.RA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a recent work, Coronel et al. initiated the study of the relation between
the diversity-multiplexing tradeoff (DMT) performance of a multiuser
multiple-input multiple-output (MU-MIMO) lattice code and the rate of the decay
of the determinants of the code matrix as a function of the size of the signal
constellation. In this note, we state a simple general upper bound on the decay
function and study the promising code proposed by Badr and Belfiore in close
detail. We derive a lower bound to its decay function based on a classical
theorem due to Liouville. The resulting bound is applicable also to other codes
with constructions based on algebraic number theory. Further, we study an
example sequence of small determinants within the Badr-Belfiore code and derive
a tighter upper bound to its decay function. The upper bound has certain
conjectural asymptotic uncertainties, whence we also list the exact bound for
several finite data rates.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 07:45:28 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Lahtonen",
"Jyrki",
""
],
[
"Vehkalahti",
"Roope",
""
],
[
"Lu",
"Hsiao-feng",
""
],
[
"Hollanti",
"Camilla",
""
],
[
"Viterbo",
"Emanuele",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0908.2506
|
Bob Diertens
|
B. Diertens
|
Software Engineering with Process Algebra: Modelling Client / Server
Architectures
| null | null | null |
PRG0908
|
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In previous work we described how the process algebra based language PSF can
be used in software engineering, using the ToolBus, a coordination architecture
also based on process algebra, as implementation model. We also described this
software development process more formally by presenting the tools we use in
this process in a CASE setting, leading to the PSF-ToolBus software engineering
environment. In this article we summarize that work and describe a similar
software development process for implementation of software systems using a
client / server model and present this in a CASE setting as well.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 07:29:27 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Diertens",
"B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.2509
|
Mounita Saha
|
Mounita Saha, Dipanwita Roy Chowdhury
|
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous
Environment
|
9 pages, 3 figures, Conference paper in Secrypt 2009
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secure group communication in heterogeneous environment is gaining popularity
due to the advent of wireless and ubiquitous computing. Although a number of
protocols for group key agreement have been proposed, most of them are not
applicable in heterogeneous environment where a number of computationally
limited nodes coexist with one or more computationally efficient nodes. Among
the few existing protocols, where some fail to satisfy the key agreement
properties, some are unable to handle the agreement for dynamic group. In this
work, we propose a constant round group key agreement protocol for
heterogeneous environment using polynomial interpolation. The protocol ensures
both communication and computation efficiency by shifting the major computation
load on powerful users, achieves true contributory key agreement property and
dynamic handling of user join and leave. The security of the protocol has been
analyzed under formal model. The comparison result shows considerable
improvement in protocol efficiency compared to the existing ones.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 07:34:17 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Saha",
"Mounita",
""
],
[
"Chowdhury",
"Dipanwita Roy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.2529
|
Shunqing Zhang
|
Shunqing Zhang, Tianyu Wu, and Vincent K. N. Lau
|
A Low-Overhead Energy Detection Based Cooperative Sensing Protocol for
Cognitive Radio Systems
|
11 pages, 8 figures, journal. To appear in IEEE Transactions on
Wireless Communications
| null |
10.1109/TWC.2009.081106
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cognitive radio and dynamic spectrum access represent a new paradigm shift in
more effective use of limited radio spectrum. One core component behind dynamic
spectrum access is the sensing of primary user activity in the shared spectrum.
Conventional distributed sensing and centralized decision framework involving
multiple sensor nodes is proposed to enhance the sensing performance. However,
it is difficult to apply the conventional schemes in reality since the overhead
in sensing measurement and sensing reporting as well as in sensing report
combining limit the number of sensor nodes that can participate in distributive
sensing. In this paper, we shall propose a novel, low overhead and low
complexity energy detection based cooperative sensing framework for the
cognitive radio systems which addresses the above two issues. The energy
detection based cooperative sensing scheme greatly reduces the quiet period
overhead (for sensing measurement) as well as sensing reporting overhead of the
secondary systems and the power scheduling algorithm dynamically allocate the
transmission power of the cooperative sensor nodes based on the channel
statistics of the links to the BS as well as the quality of the sensing
measurement. In order to obtain design insights, we also derive the asymptotic
sensing performance of the proposed cooperative sensing framework based on the
mobility model. We show that the false alarm and mis-detection performance of
the proposed cooperative sensing framework improve as we increase the number of
cooperative sensor nodes.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 09:36:54 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Zhang",
"Shunqing",
""
],
[
"Wu",
"Tianyu",
""
],
[
"Lau",
"Vincent K. N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2542
|
Anastasios Giovanidis
|
Anastasios Giovanidis and Slawomir Stanczak
|
Stability and Distributed Power Control in MANETs with Outages and
Retransmissions
|
25 pages, 6 figures, 1 table, submitted to the IEEE Trans. on
Communications
|
IEEE Transactions on Communications (Volume:59 , Issue: 6 ), pp.
1632 - 1643, June 2011
|
10.1109/TCOMM.2011.042111.090486
| null |
cs.NI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the current work the effects of hop-by-hop packet loss and retransmissions
via ARQ protocols are investigated within a Mobile Ad-hoc NET-work (MANET).
Errors occur due to outages and a success probability function is related to
each link, which can be controlled by power and rate allocation. We first
derive the expression for the network's capacity region, where the success
function plays a critical role. Properties of the latter as well as the related
maximum goodput function are presented and proved. A Network Utility
Maximization problem (NUM) with stability constraints is further formulated
which decomposes into (a) the input rate control problem and (b) the scheduling
problem. Under certain assumptions problem (b) is relaxed to a weighted sum
maximization problem with number of summants equal to the number of nodes. This
further allows the formulation of a non-cooperative game where each node
decides independently over its transmitting power through a chosen link. Use of
supermodular game theory suggests a price based algorithm that converges to a
power allocation satisfying the necessary optimality conditions of (b).
Implementation issues are considered so that minimum information exchange
between interfering nodes is required. Simulations illustrate that the
suggested algorithm brings near optimal results.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 11:08:01 GMT"
}
] | 2013-12-03T00:00:00 |
[
[
"Giovanidis",
"Anastasios",
""
],
[
"Stanczak",
"Slawomir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0908.2578
|
Alain Gerard
|
Claudiu-Florinel Bisu (MPS), Jean-Yves K'Nevez (LMP), Philippe Darnis
(LGM2B), Raynald Laheurte (LMP), Alain G\'erard (LMP)
|
New method to characterize a machining system: application in turning
| null |
Int. J. of Mat. Form. 2, 2 (2009) 93-105
|
10.1007/s12289-009-0395-y
| null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many studies simulates the machining process by using a single degree of
freedom spring-mass sytem to model the tool stiffness, or the workpiece
stiffness, or the unit tool-workpiece stiffness in modelings 2D. Others impose
the tool action, or use more or less complex modelings of the efforts applied
by the tool taking account the tool geometry. Thus, all these models remain
two-dimensional or sometimes partially three-dimensional. This paper aims at
developing an experimental method allowing to determine accurately the real
three-dimensional behaviour of a machining system (machine tool, cutting tool,
tool-holder and associated system of force metrology six-component
dynamometer). In the work-space model of machining, a new experimental
procedure is implemented to determine the machining system elastic behaviour.
An experimental study of machining system is presented. We propose a machining
system static characterization. A decomposition in two distinct blocks of the
system "Workpiece-Tool-Machine" is realized. The block Tool and the block
Workpiece are studied and characterized separately by matrix stiffness and
displacement (three translations and three rotations). The Castigliano's theory
allows us to calculate the total stiffness matrix and the total displacement
matrix. A stiffness center point and a plan of tool tip static displacement are
presented in agreement with the turning machining dynamic model and especially
during the self induced vibration. These results are necessary to have a good
three-dimensional machining system dynamic characterization.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 14:29:42 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Bisu",
"Claudiu-Florinel",
"",
"MPS"
],
[
"K'Nevez",
"Jean-Yves",
"",
"LMP"
],
[
"Darnis",
"Philippe",
"",
"LGM2B"
],
[
"Laheurte",
"Raynald",
"",
"LMP"
],
[
"Gérard",
"Alain",
"",
"LMP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0908.2588
|
Davood Rafiei
|
Davood Rafiei, Haobin Li
|
Wild Card Queries for Searching Resources on the Web
|
11 pages
| null | null | null |
cs.DB cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a domain-independent framework for searching and retrieving facts
and relationships within natural language text sources. In this framework, an
extraction task over a text collection is expressed as a query that combines
text fragments with wild cards, and the query result is a set of facts in the
form of unary, binary and general $n$-ary tuples. A significance of our
querying mechanism is that, despite being both simple and declarative, it can
be applied to a wide range of extraction tasks. A problem in querying natural
language text though is that a user-specified query may not retrieve enough
exact matches. Unlike term queries which can be relaxed by removing some of the
terms (as is done in search engines), removing terms from a wild card query
without ruining its meaning is more challenging. Also, any query expansion has
the potential to introduce false positives. In this paper, we address the
problem of query expansion, and also analyze a few ranking alternatives to
score the results and to remove false positives. We conduct experiments and
report an evaluation of the effectiveness of our querying and scoring
functions.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 15:17:19 GMT"
}
] | 2009-08-19T00:00:00 |
[
[
"Rafiei",
"Davood",
""
],
[
"Li",
"Haobin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.2615
|
Wu Zhi-Xi
|
Zhi-Xi Wu and Petter Holme
|
Modeling scientific-citation patterns and other triangle-rich acyclic
networks
|
4 pages, 4 figures
|
Phys.Rev.E 80, 037101 (2009).
|
10.1103/PhysRevE.80.037101
| null |
physics.soc-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a model of the evolution of the networks of scientific citations.
The model takes an out-degree distribution (distribution of number of
citations) and two parameters as input. The parameters capture the two main
ingredients of the model, the aging of the relevance of papers and the
formation of triangles when new papers cite old. We compare our model with
three network structural quantities of an empirical citation network. We find
that an unique point in parameter space optimizing the match between the real
and model data for all quantities. The optimal parameter values suggest that
the impact of scientific papers, at least in the empirical data set we model is
proportional to the inverse of the number of papers since they were published.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 19:25:45 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Wu",
"Zhi-Xi",
""
],
[
"Holme",
"Petter",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0908.2644
|
Marvin Weinstein
|
Marvin Weinstein, David Horn
|
Dynamic quantum clustering: a method for visual exploration of
structures in data
|
15 pages, 9 figures
|
Phys.Rev.E80:066117,2009
|
10.1103/PhysRevE.80.066117
|
SLAC-PUB-13759
|
physics.data-an cs.DS hep-ex physics.comp-ph stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A given set of data-points in some feature space may be associated with a
Schrodinger equation whose potential is determined by the data. This is known
to lead to good clustering solutions. Here we extend this approach into a
full-fledged dynamical scheme using a time-dependent Schrodinger equation.
Moreover, we approximate this Hamiltonian formalism by a truncated calculation
within a set of Gaussian wave functions (coherent states) centered around the
original points. This allows for analytic evaluation of the time evolution of
all such states, opening up the possibility of exploration of relationships
among data-points through observation of varying dynamical-distances among
points and convergence of points into clusters. This formalism may be further
supplemented by preprocessing, such as dimensional reduction through singular
value decomposition or feature filtering.
|
[
{
"version": "v1",
"created": "Tue, 18 Aug 2009 21:40:03 GMT"
}
] | 2010-02-16T00:00:00 |
[
[
"Weinstein",
"Marvin",
""
],
[
"Horn",
"David",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Physics",
"code": "hep-ex",
"description": "Description coming soon",
"span": "(High Energy Physics - Experiment)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0908.2656
|
Pooyan Fazli
|
Scott Helmer, David Meger, Pooja Viswanathan, Sancho McCann, Matthew
Dockrey, Pooyan Fazli, Tristram Southey, Marius Muja, Michael Joya, Jim
Little, David Lowe, Alan Mackworth
|
Semantic Robot Vision Challenge: Current State and Future Directions
|
The IJCAI-09 Workshop on Competitions in Artificial Intelligence and
Robotics, Pasadena, California, USA, July 11-17, 2009
| null | null | null |
cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Semantic Robot Vision Competition provided an excellent opportunity for
our research lab to integrate our many ideas under one umbrella, inspiring both
collaboration and new research. The task, visual search for an unknown object,
is relevant to both the vision and robotics communities. Moreover, since the
interplay of robotics and vision is sometimes ignored, the competition provides
a venue to integrate two communities. In this paper, we outline a number of
modifications to the competition to both improve the state-of-the-art and
increase participation.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 02:13:27 GMT"
}
] | 2009-08-20T00:00:00 |
[
[
"Helmer",
"Scott",
""
],
[
"Meger",
"David",
""
],
[
"Viswanathan",
"Pooja",
""
],
[
"McCann",
"Sancho",
""
],
[
"Dockrey",
"Matthew",
""
],
[
"Fazli",
"Pooyan",
""
],
[
"Southey",
"Tristram",
""
],
[
"Muja",
"Marius",
""
],
[
"Joya",
"Michael",
""
],
[
"Little",
"Jim",
""
],
[
"Lowe",
"David",
""
],
[
"Mackworth",
"Alan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0908.2661
|
Pooyan Fazli
|
Pooyan Fazli, Alan K. Mackworth
|
Human-Robot Teams in Entertainment and Other Everyday Scenarios
| null | null | null | null |
cs.MA cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new and relatively unexplored research direction in robotics systems is the
coordination of humans and robots working as a team. In this paper, we focus
upon problem domains and tasks in which multiple robots, humans and other
agents are cooperating through coordination to satisfy a set of goals or to
maximize utility. We are primarily interested in applications of human robot
coordination in entertainment and other activities of daily life. We discuss
the teamwork problem and propose an architecture to address this.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 02:29:28 GMT"
}
] | 2009-08-20T00:00:00 |
[
[
"Fazli",
"Pooyan",
""
],
[
"Mackworth",
"Alan K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.2676
|
Arash Amini
|
Arash Amini and Farokh Marvasti
|
Deterministic Construction of Binary, Bipolar and Ternary Compressed
Sensing Matrices
|
The paper is accepted for publication in IEEE Transaction on
Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we establish the connection between the Orthogonal Optical
Codes (OOC) and binary compressed sensing matrices. We also introduce
deterministic bipolar $m\times n$ RIP fulfilling $\pm 1$ matrices of order $k$
such that $m\leq\mathcal{O}\big(k (\log_2 n)^{\frac{\log_2 k}{\ln \log_2
k}}\big)$. The columns of these matrices are binary BCH code vectors where the
zeros are replaced by -1. Since the RIP is established by means of coherence,
the simple greedy algorithms such as Matching Pursuit are able to recover the
sparse solution from the noiseless samples. Due to the cyclic property of the
BCH codes, we show that the FFT algorithm can be employed in the reconstruction
methods to considerably reduce the computational complexity. In addition, we
combine the binary and bipolar matrices to form ternary sensing matrices
($\{0,1,-1\}$ elements) that satisfy the RIP condition.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 04:25:56 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Oct 2010 18:03:53 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Amini",
"Arash",
""
],
[
"Marvasti",
"Farokh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2681
|
Didier Sornette
|
A. Saichev and D. Sornette
|
Effects of Diversity and Procrastination in Priority Queuing Theory: the
Different Power Law Regimes
|
32 pages, 10 figures
|
Physical Review E 81, 016108 (2009)
|
10.1103/PhysRevE.81.016108
| null |
physics.soc-ph cs.PF physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Empirical analysis show that, after the update of a browser, the publication
of the vulnerability of a software, or the discovery of a cyber worm, the
fraction of computers still using the older version, or being not yet patched,
or exhibiting worm activity decays as power laws $\sim 1/t^{\alpha}$ with $0 <
\alpha \leq 1$ over time scales of years. We present a simple model for this
persistence phenomenon framed within the standard priority queuing theory, of a
target task which has the lowest priority compared with all other tasks that
flow on the computer of an individual. We identify a "time deficit" control
parameter $\beta$ and a bifurcation to a regime where there is a non-zero
probability for the target task to never be completed. The distribution of
waiting time ${\cal T}$ till the completion of the target task has the power
law tail $\sim 1/t^{1/2}$, resulting from a first-passage solution of an
equivalent Wiener process. Taking into account a diversity of time deficit
parameters in a population of individuals, the power law tail is changed into
$1/t^\alpha$ with $\alpha\in(0.5,\infty)$, including the well-known case $1/t$.
We also study the effect of "procrastination", defined as the situation in
which the target task may be postponed or delayed even after the individual has
solved all other pending tasks. This new regime provides an explanation for
even slower apparent decay and longer persistence.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 07:00:12 GMT"
}
] | 2015-05-13T00:00:00 |
[
[
"Saichev",
"A.",
""
],
[
"Sornette",
"D.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0908.2707
|
Edward Hirsch
|
Edward A. Hirsch and Dmitry Itsykson
|
On optimal heuristic randomized semidecision procedures, with
application to proof complexity
|
11 pages, accepted to STACS 2010
| null | null | null |
cs.CC cs.LO
|
http://creativecommons.org/licenses/by/3.0/
|
The existence of a (p-)optimal propositional proof system is a major open
question in (proof) complexity; many people conjecture that such systems do not
exist. Krajicek and Pudlak (1989) show that this question is equivalent to the
existence of an algorithm that is optimal on all propositional tautologies.
Monroe (2009) recently gave a conjecture implying that such algorithm does not
exist.
We show that in the presence of errors such optimal algorithms do exist. The
concept is motivated by the notion of heuristic algorithms. Namely, we allow
the algorithm to claim a small number of false "theorems" (according to any
samplable distribution on non-tautologies) and err with bounded probability on
other inputs.
Our result can also be viewed as the existence of an optimal proof system in
a class of proof systems obtained by generalizing automatizable proof systems.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 09:18:25 GMT"
},
{
"version": "v2",
"created": "Mon, 4 Jan 2010 20:14:38 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Feb 2010 12:25:24 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Hirsch",
"Edward A.",
""
],
[
"Itsykson",
"Dmitry",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0908.2721
|
Luca Muscariello
|
Giovanna Carofiglio and Luca Muscariello
|
On the impact of TCP and per-flow scheduling on Internet performance
(extended version)
|
26 pages, 5 figures, shorter version submitted to INFOCOM 2010
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Internet performance is tightly related to the properties of TCP and UDP
protocols, jointly responsible for the delivery of the great majority of
Internet traffic. It is well understood how these protocols behave under FIFO
queuing and what the network congestion effects. However, no comprehensive
analysis is available when flow-aware mechanisms such as per-flow scheduling
and dropping policies are deployed. Previous simulation and experimental
results leave a number of unanswered questions. In the paper, we tackle this
issue by modeling via a set of fluid non-linear ODEs the instantaneous
throughput and the buffer occupancy of N long-lived TCP sources under three
per-flow scheduling disciplines (Fair Queuing, Longest Queue First, Shortest
Queue First) and with longest queue drop buffer management. We study the system
evolution and analytically characterize the stationary regime: closed-form
expressions are derived for the stationary throughput/sending rate and buffer
occupancy which give thorough understanding of short/long-term fairness for TCP
traffic. Similarly, we provide the characterization of the loss rate
experienced by UDP flows in presence of TCP traffic.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 10:15:28 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Oct 2009 19:47:54 GMT"
}
] | 2009-10-23T00:00:00 |
[
[
"Carofiglio",
"Giovanna",
""
],
[
"Muscariello",
"Luca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.2741
|
Marcel Blattner
|
Marcel Blattner
|
B-Rank: A top N Recommendation Algorithm
|
6 pages, 1 figure
|
Proceedings of International Multi-Conference on Complexity,
Informatics and Cybernetics, 2010, Volume 1, pp. 336-341
| null | null |
physics.data-an cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper B-Rank, an efficient ranking algorithm for recommender systems,
is proposed. B-Rank is based on a random walk model on hypergraphs. Depending
on the setup, B-Rank outperforms other state of the art algorithms in terms of
precision, recall (19% - 50%), and inter list diversity (20% - 60%). B-Rank
captures well the difference between popular and niche objects. The proposed
algorithm produces very promising results for sparse and dense voting matrices.
Furthermore, a recommendation list update algorithm is introduced,to cope with
new votes. This technique significantly reduces computational complexity. The
implementation of the algorithm is simple, since B-Rank needs no parameter
tuning.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 12:53:33 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 10:19:55 GMT"
},
{
"version": "v3",
"created": "Mon, 30 Apr 2012 11:00:21 GMT"
}
] | 2012-05-01T00:00:00 |
[
[
"Blattner",
"Marcel",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.2744
|
Manish Gupta
|
Anshul Chaurasia, Sudhanshu Dwivedi, Prateek Jain and Manish K. Gupta
|
XTile: An Error-Correction Package for DNA Self-Assembly
|
5 pages, FNANO 2009 conference paper, The tool XTile is available for
download and use at http://www.guptalab.org/xtile
|
Proceedings of 6th Annual Conference on Foundations of Nanoscience
(FNANO 09): Self-Assembled Architectures and Devices, Salt Lake City, Utah,
U.S.A., 20th-24th April 2009, pp. 225 - 229
| null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Self assembly is a process by which supramolecular species form spontaneously
from their components. This process is ubiquitous throughout the life chemistry
and is central to biological information processing. It has been predicted that
in future self assembly will become an important engineering discipline by
combining the fields of bio molecular computation, nano technology and
medicine. However error control is a key challenge in realizing the potential
of self assembly. Recently many authors have proposed several combinatorial
error correction schemes to control errors which have a close analogy with the
coding theory such as Winfree s proofreading scheme and its generalizations by
Chen and Goel and compact scheme of Reif, Sahu and Yin. In this work, we
present an error correction computational tool XTile that can be used to create
input files to the Xgrow simulator of Winfree by providing the design logic of
the tiles and it also allows the user to apply proofreading, snake and compact
error correction schemes.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 13:02:57 GMT"
}
] | 2009-08-20T00:00:00 |
[
[
"Chaurasia",
"Anshul",
""
],
[
"Dwivedi",
"Sudhanshu",
""
],
[
"Jain",
"Prateek",
""
],
[
"Gupta",
"Manish K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2782
|
J\'er\'emie Roland
|
Boris Altshuler, Hari Krovi and Jeremie Roland
|
Adiabatic quantum optimization fails for random instances of NP-complete
problems
|
34 pages, 5 color figures. Significant changes compared to v1,
including a new section about Anderson Localization
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Adiabatic quantum optimization has attracted a lot of attention because small
scale simulations gave hope that it would allow to solve NP-complete problems
efficiently. Later, negative results proved the existence of specifically
designed hard instances where adiabatic optimization requires exponential time.
In spite of this, there was still hope that this would not happen for random
instances of NP-complete problems. This is an important issue since random
instances are a good model for hard instances that can not be solved by current
classical solvers, for which an efficient quantum algorithm would therefore be
desirable. Here, we will show that because of a phenomenon similar to Anderson
localization, an exponentially small eigenvalue gap appears in the spectrum of
the adiabatic Hamiltonian for large random instances, very close to the end of
the algorithm. This implies that unfortunately, adiabatic quantum optimization
also fails for these instances by getting stuck in a local minimum, unless the
computation is exponentially long.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 19:47:58 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Dec 2009 22:29:18 GMT"
}
] | 2009-12-02T00:00:00 |
[
[
"Altshuler",
"Boris",
""
],
[
"Krovi",
"Hari",
""
],
[
"Roland",
"Jeremie",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.2793
|
Dexter Kozen
|
Dexter Kozen, Nicholas Ruozzi
|
Applications of Metric Coinduction
| null |
Logical Methods in Computer Science, Volume 5, Issue 3 (September
16, 2009) lmcs:1168
|
10.2168/LMCS-5(3:10)2009
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Metric coinduction is a form of coinduction that can be used to establish
properties of objects constructed as a limit of finite approximations. One can
prove a coinduction step showing that some property is preserved by one step of
the approximation process, then automatically infer by the coinduction
principle that the property holds of the limit object. This can often be used
to avoid complicated analytic arguments involving limits and convergence,
replacing them with simpler algebraic arguments. This paper examines the
application of this principle in a variety of areas, including infinite
streams, Markov chains, Markov decision processes, and non-well-founded sets.
These results point to the usefulness of coinduction as a general proof
technique.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 17:59:03 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Sep 2009 15:14:20 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Kozen",
"Dexter",
""
],
[
"Ruozzi",
"Nicholas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0908.2828
|
Phong Nguyen
|
Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan
|
A Rate-Distortion Perspective on Multiple Decoding Attempts for
Reed-Solomon Codes
|
10 pages, 3 figures, accepted to Allerton Conference on Communication
Control and Computing, 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, a number of authors have proposed decoding schemes for Reed-Solomon
(RS) codes based on multiple trials of a simple RS decoding algorithm. In this
paper, we present a rate-distortion (R-D) approach to analyze these
multiple-decoding algorithms for RS codes. This approach is first used to
understand the asymptotic performance-versus-complexity trade-off of multiple
error-and-erasure decoding of RS codes. By defining an appropriate distortion
measure between an error pattern and an erasure pattern, the condition for a
single error-and-erasure decoding to succeed reduces to a form where the
distortion is compared to a fixed threshold. Finding the best set of erasure
patterns for multiple decoding trials then turns out to be a covering problem
which can be solved asymptotically by rate-distortion theory. Next, this
approach is extended to analyze multiple algebraic soft-decision (ASD) decoding
of RS codes. Both analytical and numerical computations of the R-D functions
for the corresponding distortion measures are discussed. Simulation results
show that proposed algorithms using this approach perform better than other
algorithms with the same complexity.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 23:09:09 GMT"
}
] | 2009-08-21T00:00:00 |
[
[
"Nguyen",
"Phong S.",
""
],
[
"Pfister",
"Henry D.",
""
],
[
"Narayanan",
"Krishna R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2834
|
Benjamin Birnbaum
|
Yossi Azar, Benjamin Birnbaum, Anna R. Karlin, C. Thach Nguyen
|
On Revenue Maximization in Second-Price Ad Auctions
|
Full version of ESA 2009 paper, 23 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most recent papers addressing the algorithmic problem of allocating
advertisement space for keywords in sponsored search auctions assume that
pricing is done via a first-price auction, which does not realistically model
the Generalized Second Price (GSP) auction used in practice. Towards the goal
of more realistically modeling these auctions, we introduce the Second-Price Ad
Auctions problem, in which bidders' payments are determined by the GSP
mechanism. We show that the complexity of the Second-Price Ad Auctions problem
is quite different than that of the more studied First-Price Ad Auctions
problem. First, unlike the first-price variant, for which small constant-factor
approximations are known, it is NP-hard to approximate the Second-Price Ad
Auctions problem to any non-trivial factor. Second, this discrepancy extends
even to the 0-1 special case that we call the Second-Price Matching problem
(2PM). In particular, offline 2PM is APX-hard, and for online 2PM there is no
deterministic algorithm achieving a non-trivial competitive ratio and no
randomized algorithm achieving a competitive ratio better than 2. This stands
in contrast to the results for the analogous special case in the first-price
model, the standard bipartite matching problem, which is solvable in polynomial
time and which has deterministic and randomized online algorithms achieving
better competitive ratios. On the positive side, we provide a 2-approximation
for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM.
The latter result makes use of a new generalization of a classic result on the
performance of the "Ranking" algorithm for online bipartite matching.
|
[
{
"version": "v1",
"created": "Wed, 19 Aug 2009 23:46:02 GMT"
}
] | 2009-08-21T00:00:00 |
[
[
"Azar",
"Yossi",
""
],
[
"Birnbaum",
"Benjamin",
""
],
[
"Karlin",
"Anna R.",
""
],
[
"Nguyen",
"C. Thach",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.2847
|
Aditya Ramamoorthy
|
Aditya Ramamoorthy and Richard D. Wesel
|
The Single Source Two Terminal Network with Network Coding
|
4 pages, appeared at the Canadian Workshop on Information Theory
(CWIT), 2005
| null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a communication network with a single source that has a set of
messages and two terminals where each terminal is interested in an arbitrary
subset of messages at the source. A tight capacity region for this problem is
demonstrated. We show by a simple graph-theoretic procedure that any such
problem can be solved by performing network coding on the subset of messages
that are requested by both the terminals and that routing is sufficient for
transferring the remaining messages.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 03:17:19 GMT"
}
] | 2009-08-21T00:00:00 |
[
[
"Ramamoorthy",
"Aditya",
""
],
[
"Wesel",
"Richard D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2871
|
Bela Genge
|
Bela Genge, Piroska Haller, Iosif Ignat, Ovidiu Ratoi
|
Informal specification-based performance evaluation of security
protocols
|
4th IEEE International Conference on Intelligent Computer
Communication and Processing, Cluj-Napoca, Romania, pp. 193-200, Aug. 2008,
ISBN 978-1-4244-2673-7
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a performance evaluation method for security protocols. Based on
the informal specification, we construct a canonical model which includes,
alongside protocol messages, cryptographic operations performed by participants
in the process of message construction. Each cryptographic operation is
assigned a cost modeled as a function of the size of processed message
components. We model not only the size of regular message components but also
the size of ciphertext produced by various cryptographic operations. We
illustrate the applicability of our method by comparatively analyzing the
performance of the original CCITT X.509 protocol and a slightly modified
version of the same protocol.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 08:04:14 GMT"
}
] | 2009-08-21T00:00:00 |
[
[
"Genge",
"Bela",
""
],
[
"Haller",
"Piroska",
""
],
[
"Ignat",
"Iosif",
""
],
[
"Ratoi",
"Ovidiu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.2905
|
Amitabh Saxena
|
Octavian Catrina and Amitabh Saxena and Sebastiaan J Hoogh
|
Secure Linear Programming Using Privacy-Preserving Simplex
|
The current version is withdrawn due to a error. An older version of
the paper is available on this archive. Please contact the author(s) for an
updated copy
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This version of the paper has been withdrawn due to an error. Please contact
one of the authors for an updated copy.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 11:20:01 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Aug 2009 10:16:08 GMT"
},
{
"version": "v3",
"created": "Mon, 18 Jan 2010 03:01:47 GMT"
}
] | 2010-01-18T00:00:00 |
[
[
"Catrina",
"Octavian",
""
],
[
"Saxena",
"Amitabh",
""
],
[
"Hoogh",
"Sebastiaan J",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.2940
|
Hartmut Klauck
|
Hartmut Klauck
|
A Strong Direct Product Theorem for Disjointness
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A strong direct product theorem states that if we want to compute $k$
independent instances of a function, using less than $k$ times the resources
needed for one instance, then the overall success probability will be
exponentially small in $k$. We establish such a theorem for the randomized
communication complexity of the Disjointness problem, i.e., with communication
$const\cdot kn$ the success probability of solving $k$ instances of size $n$
can only be exponentially small in $k$. We show that this bound even holds for
$AM$ communication protocols with limited ambiguity. This also implies a new
lower bound for Disjointness in a restricted 3-player NOF protocol, and optimal
communication-space tradeoffs for Boolean matrix product. Our main result
follows from a solution to the dual of a linear programming problem, whose
feasibility comes from a so-called Intersection Sampling Lemma that generalizes
a result by Razborov.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 14:59:24 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Nov 2009 11:03:53 GMT"
},
{
"version": "v3",
"created": "Fri, 9 Apr 2010 08:13:39 GMT"
}
] | 2010-04-12T00:00:00 |
[
[
"Klauck",
"Hartmut",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.2941
|
Huang Huang
|
Huang Huang and Vincent K. N. Lau
|
Delay-Sensitive Distributed Power and Transmission Threshold Control for
S-ALOHA Network with Finite State Markov Fading Channels
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider the delay-sensitive power and transmission
threshold control design in S-ALOHA network with FSMC fading channels. The
random access system consists of an access point with K competing users, each
has access to the local channel state information (CSI) and queue state
information (QSI) as well as the common feedback (ACK/NAK/Collision) from the
access point. We seek to derive the delay-optimal control policy (composed of
threshold and power control). The optimization problem belongs to the
memoryless policy K-agent infinite horizon decentralized Markov decision
process (DEC-MDP), and finding the optimal policy is shown to be
computationally intractable. To obtain a feasible and low complexity solution,
we recast the optimization problem into two subproblems, namely the power
control and the threshold control problem. For a given threshold control
policy, the power control problem is decomposed into a reduced state MDP for
single user so that the overall complexity is O(NJ), where N and J are the
buffer size and the cardinality of the CSI states. For the threshold control
problem, we exploit some special structure of the collision channel and common
feedback information to derive a low complexity solution. The delay performance
of the proposed design is shown to have substantial gain relative to
conventional throughput optimal approaches for S-ALOHA.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 15:17:15 GMT"
}
] | 2009-08-21T00:00:00 |
[
[
"Huang",
"Huang",
""
],
[
"Lau",
"Vincent K. N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.2958
|
Que Thu Dung Nguyen
|
Que Thu Dung Nguyen
|
Design and Implementation of a Distributed Middleware for Parallel
Execution of Legacy Enterprise Applications
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A typical enterprise uses a local area network of computers to perform its
business. During the off-working hours, the computational capacities of these
networked computers are underused or unused. In order to utilize this
computational capacity an application has to be recoded to exploit concurrency
inherent in a computation which is clearly not possible for legacy applications
without any source code. This thesis presents the design an implementation of a
distributed middleware which can automatically execute a legacy application on
multiple networked computers by parallelizing it. This middleware runs multiple
copies of the binary executable code in parallel on different hosts in the
network. It wraps up the binary executable code of the legacy application in
order to capture the kernel level data access system calls and perform them
distributively over multiple computers in a safe and conflict free manner. The
middleware also incorporates a dynamic scheduling technique to execute the
target application in minimum time by scavenging the available CPU cycles of
the hosts in the network. This dynamic scheduling also supports the CPU
availability of the hosts to change over time and properly reschedule the
replicas performing the computation to minimize the execution time. A prototype
implementation of this middleware has been developed as a proof of concept of
the design. This implementation has been evaluated with a few typical case
studies and the test results confirm that the middleware works as expected.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 16:26:21 GMT"
}
] | 2009-08-21T00:00:00 |
[
[
"Nguyen",
"Que Thu Dung",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0908.2984
|
Nihar Shah B
|
Nihar B. Shah, K.V. Rashmi, P. Vijay Kumar, Kannan Ramchandran
|
Explicit Codes Minimizing Repair Bandwidth for Distributed Storage
|
11 pages, 4 figures v2: corrected typos
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the setting of data storage across n nodes in a distributed
manner. A data collector (DC) should be able to reconstruct the entire data by
connecting to any k out of the n nodes and downloading all the data stored in
them. When a node fails, it has to be regenerated back using the existing
nodes. In a recent paper, Wu et al. have obtained an information theoretic
lower bound for the repair bandwidth. Also, there has been additional interest
in storing data in systematic form as no post processing is required when DC
connects to k systematic nodes. Because of their preferred status there is a
need to regenerate back any systematic node quickly and exactly. Replacement of
a failed node by an exact replica is termed Exact Regeneration.In this paper,
we consider the problem of minimizing the repair bandwidth for exact
regeneration of the systematic nodes. The file to be stored is of size B and
each node can store alpha = B/k units of data. A failed systematic node is
regenerated by downloading beta units of data each from d existing nodes. We
give a lower bound for the repair bandwidth for exact regeneration of the
systematic nodes which matches with the bound given by Wu et al. For d >= 2k-1
we give an explicit code construction which minimizes the repair bandwidth when
the existing k-1 systematic nodes participate in the regeneration. We show the
existence and construction of codes that achieve the bound for d >= 2k-3. Here
we also establish the necessity of interference alignment. We prove that the
bound is not achievable for d <= 2k-4 when beta=1. We also give a coding scheme
which can be used for any d and k, which is optimal for d >= 2k-1.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 19:30:53 GMT"
},
{
"version": "v2",
"created": "Sat, 5 Sep 2009 12:12:16 GMT"
}
] | 2009-09-05T00:00:00 |
[
[
"Shah",
"Nihar B.",
""
],
[
"Rashmi",
"K. V.",
""
],
[
"Kumar",
"P. Vijay",
""
],
[
"Ramchandran",
"Kannan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3022
|
Grenville Croll
|
John Hunt
|
An approach for the automated risk assessment of structural differences
between spreadsheets (DiffXL)
|
10 Pages, Numerous Colour Diagrams & Screenshots
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 ISBN
978-1-905617-89-0
| null | null |
cs.HC cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper outlines an approach to manage and quantify the risks associated
with changes made to spreadsheets. The methodology focuses on structural
differences between spreadsheets and suggests a technique by which a risk
analysis can be achieved in an automated environment. The paper offers an
example that demonstrates how contiguous ranges of data can be mapped into a
generic list of formulae, data and metadata. The example then shows that
comparison of these generic lists can establish the structural differences
between spreadsheets and quantify the level of risk that each change has
introduced. Lastly the benefits, drawbacks and limitations of the technique are
discussed in a commercial context.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 21:31:20 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Hunt",
"John",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0908.3025
|
David Corne
|
David Corne and Joshua Knowles
|
Techniques for Highly Multiobjective Optimisation: Some Nondominated
Points are Better than Others
|
8 pages, 2 tables
|
in Hod Lipson (Ed.): Genetic and Evolutionary Computation
Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007.
ACM 2007, pp. 773--780, ISBN 978-1-59593-697-4
| null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The research area of evolutionary multiobjective optimization (EMO) is
reaching better understandings of the properties and capabilities of EMO
algorithms, and accumulating much evidence of their worth in practical
scenarios. An urgent emerging issue is that the favoured EMO algorithms scale
poorly when problems have many (e.g. five or more) objectives. One of the chief
reasons for this is believed to be that, in many-objective EMO search,
populations are likely to be largely composed of nondominated solutions. In
turn, this means that the commonly-used algorithms cannot distinguish between
these for selective purposes. However, there are methods that can be used
validly to rank points in a nondominated set, and may therefore usefully
underpin selection in EMO search. Here we discuss and compare several such
methods. Our main finding is that simple variants of the often-overlooked
Average Ranking strategy usually outperform other methods tested, covering
problems with 5-20 objectives and differing amounts of inter-objective
correlation.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 21:44:32 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Corne",
"David",
""
],
[
"Knowles",
"Joshua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0908.3030
|
Richard J. Mathar
|
Richard J. Mathar
|
A Java Math.BigDecimal Implementation of Core Mathematical Functions
|
In version 4: removed bug in BigSurdVec.signum()
| null | null | null |
math.NA cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The mathematical functions log(x), exp(x), root[n]x, sin(x), cos(x), tan(x),
arcsin(x), arctan(x), x^y, sinh(x), cosh(x), tanh(x) and Gamma(x) have been
implemented for arguments x in the real domain in a native Java library on top
of the multi-precision BigDecimal representation of floating point numbers.
This supports scientific applications where more than the double precision
accuracy of the library of the Standard Edition is desired. The full source
code is made available under the LGPL v3.0.
|
[
{
"version": "v1",
"created": "Thu, 20 Aug 2009 22:28:03 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Mar 2012 17:11:43 GMT"
},
{
"version": "v3",
"created": "Sun, 17 May 2015 18:24:39 GMT"
},
{
"version": "v4",
"created": "Tue, 3 Mar 2020 13:53:49 GMT"
}
] | 2020-03-04T00:00:00 |
[
[
"Mathar",
"Richard J.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0908.3082
|
Bela Genge
|
Ovidiu Ratoi, Piroska Haller, Ioan Salomie, Bela Genge
|
Component based platform for multimedia applications
|
7th IEEE RoEduNet International Conference, Cluj-Napoca, Romania,
Aug. 2008, pp. 40-43, ISBN 978-973-662-393-6
| null | null | null |
cs.MM cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a platform for distributed multimedia applications which
simplifies the development process and at the same time ensures application
portability, flexibility and performance. The platform is implemented using the
Netscape Portable Runtime (NSPR) and the Cross-Platform Component Object Model
(XPCOM).
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 09:46:07 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Ratoi",
"Ovidiu",
""
],
[
"Haller",
"Piroska",
""
],
[
"Salomie",
"Ioan",
""
],
[
"Genge",
"Bela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.3083
|
Bela Genge
|
Bela Genge, Piroska Haller, Ovidiu Ratoi, Iosif Ignat
|
Term-based composition of security protocols
|
2008 IEEE International Conference on Automation, Quality and
Testing, Robotics, Cluj-Napoca, Romania, May 2008, pp. 233-238, ISBN
978-1-4244-2576-1
| null |
10.1109/AQTR.2008.4588741
| null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the context of security protocol parallel composition, where messages
belonging to different protocols can intersect each other, we introduce a new
paradigm: term-based composition (i.e. the composition of message components
also known as terms). First, we create a protocol specification model by
extending the original strand spaces. Then, we provide a term composition
algorithm based on which new terms can be constructed. To ensure that security
properties are maintained, we introduce the concept of term connections to
express the existing connections between terms and encryption contexts. We
illustrate the proposed composition process by using two existing protocols.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 09:52:12 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Genge",
"Bela",
""
],
[
"Haller",
"Piroska",
""
],
[
"Ratoi",
"Ovidiu",
""
],
[
"Ignat",
"Iosif",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.3089
|
Maxim Kolosovskiy
|
Maxim A. Kolosovskiy (Altai State Technical University, Russia)
|
Data structure for representing a graph: combination of linked list and
hash table
|
7 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this article we discuss a data structure, which combines advantages of two
different ways for representing graphs: adjacency matrix and collection of
adjacency lists. This data structure can fast add and search edges (advantages
of adjacency matrix), use linear amount of memory, let to obtain adjacency list
for certain vertex (advantages of collection of adjacency lists). Basic
knowledge of linked lists and hash tables is required to understand this
article. The article contains examples of implementation on Java.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 10:12:31 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Kolosovskiy",
"Maxim A.",
"",
"Altai State Technical University, Russia"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.3090
|
Bela Genge
|
Bela Genge, Piroska Haller
|
A Modeling Framework for Generating Security Protocol Specifications
|
10th International Symposium on Symbolic and Numeric Algorithms for
Scientific Computing (SYNASC'08), Workshop on Global Computing Models and
Technologies, Timisoara, Romania, Sept. 2008, pp. 362-365, ISBN
978-0-7695-3523-4
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a modeling framework for generating security protocol
specifications. The generated protocol specifications rely on the use of a
sequential and a semantical component. The first component defines protocol
properties such as preconditions, effects, message sequences and it is
developed as a WSDL-S specification. The second component defines the semantic
aspects corresponding to the messages included in the first component by the
use of ontological constructions and it is developed as an OWL-based
specification. Our approach was validated on 13 protocols from which we
mention: the ISO9798 protocol, the CCITTX.509 data transfer protocol and the
Kerberos symmetric key protocol.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 10:16:25 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Genge",
"Bela",
""
],
[
"Haller",
"Piroska",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.3091
|
Attila Egri-Nagy
|
Attila Egri-Nagy and Chrystopher L. Nehaniv
|
Computational Understanding and Manipulation of Symmetries
|
14 pages, 5 figures, v2 major revision of computational examples
| null | null | null |
cs.AI cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For natural and artificial systems with some symmetry structure,
computational understanding and manipulation can be achieved without learning
by exploiting the algebraic structure. Here we describe this algebraic
coordinatization method and apply it to permutation puzzles. Coordinatization
yields a structural understanding, not just solutions for the puzzles.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 10:37:52 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Oct 2014 05:09:35 GMT"
}
] | 2014-10-15T00:00:00 |
[
[
"Egri-Nagy",
"Attila",
""
],
[
"Nehaniv",
"Chrystopher L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0908.3098
|
Oren Somekh
|
Oren Somekh, Osvaldo Simeone, H. Vincent Poor, Shlomo Shamai (Shitz)
|
Throughput of Cellular Uplink with Dynamic User Activity and Cooperative
Base-Stations
|
To be presented at the IEEE Information Theory Workshop, Taormina,
Sicily, Italy, October 2009
| null |
10.1109/ITW.2009.5351392
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The throughput of a linear cellular uplink with a random number of users,
different power control schemes, and cooperative base stations is considered in
the large system limit where the number of cells is large for non fading
Gaussian channels. The analysis is facilitated by establishing an analogy
between the cellular channel per-cell throughput with joint multi-cell
processing (MCP), and the rate of a deterministic inter-symbol interference
(ISI) channel with flat fading. It is shown that, under certain conditions, the
dynamics of cellular systems (i.e., a random number of users coupled with a
given power control scheme) can be interpreted, as far as the uplink throughput
is concerned, as the flat fading process of the equivalent ISI channel. The
results are used to demonstrate the benefits of MCP over the conventional
single cell processing approach as a function of various system parameters in
the presence of random user activity.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 11:10:17 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Somekh",
"Oren",
"",
"Shitz"
],
[
"Simeone",
"Osvaldo",
"",
"Shitz"
],
[
"Poor",
"H. Vincent",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3148
|
Subhash Kak
|
Subhash Kak
|
Another Look at Quantum Neural Computing
|
10 pages, 4 figures; Based on lecture given at Czech Technical
University, Prague on June 25, 2009. This revision adds clarifying remarks
and corrects typographical errors
| null | null | null |
cs.NE cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The term quantum neural computing indicates a unity in the functioning of the
brain. It assumes that the neural structures perform classical processing and
that the virtual particles associated with the dynamical states of the
structures define the underlying quantum state. We revisit the concept and also
summarize new arguments related to the learning modes of the brain in response
to sensory input that may be aggregated in three types: associative,
reorganizational, and quantum. The associative and reorganizational types are
quite apparent based on experimental findings; it is much harder to establish
that the brain as an entity exhibits quantum properties. We argue that the
reorganizational behavior of the brain may be viewed as inner adjustment
corresponding to its quantum behavior at the system level. Not only neural
structures but their higher abstractions also may be seen as whole entities. We
consider the dualities associated with the behavior of the brain and how these
dualities are bridged.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 15:17:36 GMT"
},
{
"version": "v2",
"created": "Thu, 14 Mar 2013 15:37:45 GMT"
}
] | 2013-03-15T00:00:00 |
[
[
"Kak",
"Subhash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.3162
|
Yuriy Pershin
|
Yuriy V. Pershin and Massimiliano Di Ventra
|
Practical approach to programmable analog circuits with memristors
| null |
IEEE Trans.Circuits Theor.57:1857-1964,2010
|
10.1109/TCSI.2009.2038539
| null |
physics.ins-det cond-mat.mes-hall cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We suggest an approach to use memristors (resistors with memory) in
programmable analog circuits. Our idea consists in a circuit design in which
low voltages are applied to memristors during their operation as analog circuit
elements and high voltages are used to program the memristor's states. This
way, as it was demonstrated in recent experiments, the state of memristors does
not essentially change during analog mode operation. As an example of our
approach, we have built several programmable analog circuits demonstrating
memristor-based programming of threshold, gain and frequency.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 16:24:20 GMT"
},
{
"version": "v2",
"created": "Sun, 17 Jan 2010 22:53:46 GMT"
}
] | 2014-11-20T00:00:00 |
[
[
"Pershin",
"Yuriy V.",
""
],
[
"Di Ventra",
"Massimiliano",
""
]
] |
[
{
"class": "Physics",
"code": "physics.ins-det",
"description": "Instrumentation and Detectors for research in natural science, including optical, molecular, atomic, nuclear and particle physics instrumentation and the associated electronics, services, infrastructure and control equipment. ",
"span": "(Instrumentation and Detectors)"
},
{
"class": "Physics",
"code": "cond-mat.mes-hall",
"description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures",
"span": "(Mesoscale and Nanoscale Physics)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.3166
|
Hsiao-feng Lu
|
Hsiao-feng (Francis) Lu, Jyrki Lahtonen, Roope Vehkalahti, Camilla
Hollanti
|
Remarks on the Criteria of Constructing MIMO-MAC DMT Optimal Codes
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we investigate the criteria proposed by Coronel et al. for
constructing MIMO MAC-DMT optimal codes over several classes of fading
channels. We first give a counterexample showing their DMT result is not
correct when the channel is frequency-selective. For the case of symmetric
MIMO-MAC flat fading channels, their DMT result reduces to exactly the same as
that derived by Tse et al., and we therefore focus on their criteria for
constructing MAC-DMT optimal codes, especially when the number of receive
antennas is sufficiently large. In such case, we show their criterion is
equivalent to requiring the codes of any subset of users to satisfy a joint
non-vanishing determinant criterion when the system operates in the antenna
pooling regime. Finally an upper bound on the product of minimum eigenvalues of
the difference matrices is provided, and is used to show any MIMO-MAC codes
satisfying their criterion can possibly exist only when the target multiplexing
gain is small.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 16:49:46 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Hsiao-feng",
"",
"",
"Francis"
],
[
"Lu",
"",
""
],
[
"Lahtonen",
"Jyrki",
""
],
[
"Vehkalahti",
"Roope",
""
],
[
"Hollanti",
"Camilla",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3170
|
Ferm\'in Moscoso del Prado PhD
|
Ferm\'in Moscoso del Prado Mart\'in
|
The thermodynamics of human reaction times
|
Submitted manuscript
| null | null | null |
q-bio.NC cond-mat.dis-nn cond-mat.stat-mech cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
I present a new approach for the interpretation of reaction time (RT) data
from behavioral experiments. From a physical perspective, the entropy of the RT
distribution provides a model-free estimate of the amount of processing
performed by the cognitive system. In this way, the focus is shifted from the
conventional interpretation of individual RTs being either long or short, into
their distribution being more or less complex in terms of entropy. The new
approach enables the estimation of the cognitive processing load without
reference to the informational content of the stimuli themselves, thus
providing a more appropriate estimate of the cognitive impact of different
sources of information that are carried by experimental stimuli or tasks. The
paper introduces the formulation of the theory, followed by an empirical
validation using a database of human RTs in lexical tasks (visual lexical
decision and word naming). The results show that this new interpretation of RTs
is more powerful than the traditional one. The method provides theoretical
estimates of the processing loads elicited by individual stimuli. These loads
sharply distinguish the responses from different tasks. In addition, it
provides upper-bound estimates for the speed at which the system processes
information. Finally, I argue that the theoretical proposal, and the associated
empirical evidence, provide strong arguments for an adaptive system that
systematically adjusts its operational processing speed to the particular
demands of each stimulus. This finding is in contradiction with Hick's law,
which posits a relatively constant processing speed within an experimental
context.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 17:00:12 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Martín",
"Fermín Moscoso del Prado",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.3171
|
Xiaohu Shang
|
Xiaohu Shang, Biao Chen, H. Vincent Poor
|
On the Optimality of Beamforming for Multi-User MISO Interference
Channels with Single-User Detection
|
5 pages, 1 figure, to appear at Globecom 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For a multi-user interference channel with multi-antenna transmitters and
single-antenna receivers, by restricting each receiver to a single-user
detector, computing the largest achievable rate region amounts to solving a
family of non-convex optimization problems. Recognizing the intrinsic
connection between the signal power at the intended receiver and the
interference power at the unintended receiver, the original family of
non-convex optimization problems is converted into a new family of convex
optimization problems. It is shown that, for such interference channels with
each receiver implementing single-user detection, transmitter beamforming can
achieve all boundary points of the achievable rate region.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 17:07:16 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Shang",
"Xiaohu",
""
],
[
"Chen",
"Biao",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3177
|
Vincent Lariviere
|
Vincent Lariviere, Yves Gingras
|
The impact factor's Matthew effect: a natural experiment in
bibliometrics
|
7 pages, 2 tables
| null | null | null |
physics.soc-ph cs.DL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Since the publication of Robert K. Merton's theory of cumulative advantage in
science (Matthew Effect), several empirical studies have tried to measure its
presence at the level of papers, individual researchers, institutions or
countries. However, these studies seldom control for the intrinsic "quality" of
papers or of researchers--"better" (however defined) papers or researchers
could receive higher citation rates because they are indeed of better quality.
Using an original method for controlling the intrinsic value of
papers--identical duplicate papers published in different journals with
different impact factors--this paper shows that the journal in which papers are
published have a strong influence on their citation rates, as duplicate papers
published in high impact journals obtain, on average, twice as much citations
as their identical counterparts published in journals with lower impact
factors. The intrinsic value of a paper is thus not the only reason a given
paper gets cited or not; there is a specific Matthew effect attached to
journals and this gives to paper published there an added value over and above
their intrinsic quality.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 17:56:47 GMT"
}
] | 2009-08-24T00:00:00 |
[
[
"Lariviere",
"Vincent",
""
],
[
"Gingras",
"Yves",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0908.3184
|
Krishna Lingashetty
|
Krishna Chaithanya Lingashetty
|
Location of Single Neuron Memories in a Hebbian Network
|
7 pages, 11 figures, Presented at the Conference on Theoretical and
Applied Computer Science 2009(TACS'09), Stillwater, Oklahoma. Corrected
results and formatting changes
| null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper reports the results of an experiment on the use of Kak's B-Matrix
approach to spreading activity in a Hebbian neural network. Specifically, it
concentrates on the memory retrieval from single neurons and compares the
performance of the B-Matrix approach to that of the traditional approach.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 19:53:54 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Nov 2009 18:31:27 GMT"
}
] | 2009-11-19T00:00:00 |
[
[
"Lingashetty",
"Krishna Chaithanya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0908.3212
|
Ariel Caticha
|
Ariel Caticha
|
Quantifying Rational Belief
|
Presented at MaxEnt 2009, the 29th International Workshop on Bayesian
Inference and Maximum Entropy Methods in Science and Engineering (July 5-10,
2009, Oxford, Mississippi, USA.) In version 2 one mistake and a few typos
have been corrected
| null |
10.1063/1.3275647
| null |
physics.data-an cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Some criticisms that have been raised against the Cox approach to probability
theory are addressed. Should we use a single real number to measure a degree of
rational belief? Can beliefs be compared? Are the Cox axioms obvious? Are there
counterexamples to Cox? Rather than justifying Cox's choice of axioms we follow
a different path and derive the sum and product rules of probability theory as
the unique (up to regraduations) consistent representations of the Boolean AND
and OR operations.
|
[
{
"version": "v1",
"created": "Fri, 21 Aug 2009 22:42:38 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2009 23:13:53 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Caticha",
"Ariel",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.3222
|
Tetsuya Hattori
|
Kumiko Hattori, Tetsuya Hattori
|
Hydrodynamic limit of move-to-front rules and search cost probabilities
| null | null | null | null |
math.PR cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study a hydrodynamic limit approach to move-to-front rules, namely, a
scaling limit as the number of items tends to infinity, of the joint
distribution of jump rate and position of items. As an application of the limit
formula, we present asymptotic formulas on search cost probability
distributions, applicable for general jump rate distributions.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 01:32:55 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Hattori",
"Kumiko",
""
],
[
"Hattori",
"Tetsuya",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.3231
|
Reinert Korsnes rko
|
Reinert Korsnes
|
Rapid self-organised initiation of ad hoc sensor networks close above
the percolation threshold
|
13 pages, 7 figures, research paper
|
Physica A: Statistical Mechanics and its Applications, Volume 389,
Issue 14, 15 July 2010, Pages 2841-2848
|
10.1016/j.physa.2010.03.005
| null |
cs.NI cond-mat.dis-nn cond-mat.stat-mech
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work shows potentials for rapid self-organisation of sensor networks
where nodes collaborate to relay messages to a common data collecting unit
(sink node). The study problem is, in the sense of graph theory, to find a
shortest path tree spanning a weighted graph. This is a well-studied problem
where for example Dijkstra's algorithm provides a solution for non-negative
edge weights. The present contribution shows by simulation examples that simple
modifications of known distributed approaches here can provide significant
improvements in performance. Phase transition phenomena, which are known to
take place in networks close to percolation thresholds, may explain these
observations. An initial method, which here serves as reference, assumes the
sink node starts organisation of the network (tree) by transmitting a control
message advertising its availability for its neighbours. These neighbours then
advertise their current cost estimate for routing a message to the sink. A node
which in this way receives a message implying an improved route to the sink,
advertises its new finding and remembers which neighbouring node the message
came from. This activity proceeds until there are no more improvements to
advertise to neighbours. The result is a tree network for cost effective
transmission of messages to the sink (root). This distributed approach has
potential for simple improvements which are of interest when minimisation of
storage and communication of network information are a concern. Fast
organisation of the network takes place when the number $k$ of connections for
each node ({\em degree}) is close above its critical value for global network
percolation and at the same time there is a threshold for the nodes to decide
to advertise network route updates.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 05:34:10 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Dec 2009 09:23:21 GMT"
},
{
"version": "v3",
"created": "Wed, 19 May 2010 12:55:34 GMT"
}
] | 2010-05-20T00:00:00 |
[
[
"Korsnes",
"Reinert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0908.3233
|
Yavuz Oruc A.
|
A. Yavuz Oruc and Abdullah Atmaca
|
Asymptotically Optimal Assignments In Ordinal Evaluations of Proposals
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In ordinal evaluations of proposals in peer review systems, a set of
proposals is assigned to a fixed set of referees so as to maximize the number
of pairwise comparisons of proposals under certain referee capacity and
proposal subject constraints. In this paper, the following two related problems
are considered: (1) Assuming that each referee has a capacity to review k out
of n proposals, 2 < k < n, determine the minimum number of referees needed to
ensure that each pair of proposals is reviewed by at least one referee, (2)
Find an assignment that meets the lower bound determined in (1). It is easy to
see that one referee is both necessary and sufficient when k = n, and n(n-1)/2
referees are both necessary and sufficient when k = 2. We show that 6 referees
are both necessary and sufficient when k = n/2. We further show that 11
referees are necessary and 12 are sufficient when k = n/3, and 18 referees are
necessary and 20 referees are sufficient when k = n/4. A more general lower
bound of n(n-1)/k(k-1) referees is also given for any k, 2 < k < n, and an
assignment asymptotically matching this lower bound within a factor of 2 is
presented. These results are not only theoretically interesting but they also
provide practical methods for efficient assignments of proposals to referees.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 07:08:30 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Oruc",
"A. Yavuz",
""
],
[
"Atmaca",
"Abdullah",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.3234
|
Anoosheh Heidarzadeh
|
Anoosheh Heidarzadeh and Amir H. Banihashemi
|
Overlapped Chunked Network Coding
|
5 pages, 3 figures, submitted to ITW 2010, Cairo
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Network coding is known to improve the throughput and the resilience to
losses in most network scenarios. In a practical network scenario, however, the
accurate modeling of the traffic is often too complex and/or infeasible. The
goal is thus to design codes that perform close to the capacity of any network
(with arbitrary traffic) efficiently. In this context, random linear network
codes are known to be capacity-achieving while requiring a decoding complexity
quadratic in the message length. Chunked Codes (CC) were proposed by Maymounkov
et al. to improve the computational efficiency of random codes by partitioning
the message into a number of non-overlapping chunks. CC can also be
capacity-achieving but have a lower encoding/decoding complexity at the expense
of slower convergence to the capacity. In this paper, we propose and analyze a
generalized version of CC called Overlapped Chunked Codes (OCC) in which chunks
are allowed to overlap. Our theoretical analysis and simulation results show
that compared to CC, OCC can achieve the capacity with a faster speed while
maintaining almost the same advantage in computational efficiency.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 07:18:51 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Heidarzadeh",
"Anoosheh",
""
],
[
"Banihashemi",
"Amir H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3252
|
Jean-Fran\c{c}ois Giovannelli
|
R. Boubertakh, J.-F. Giovannelli, A. Herment, A. De Cesare
|
Non-quadratic convex regularized reconstruction of MR images from spiral
acquisitions
| null |
Signal Processing, vol. 86, pp. 2479-2494, 2006
| null | null |
cs.CV cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Combining fast MR acquisition sequences and high resolution imaging is a
major issue in dynamic imaging. Reducing the acquisition time can be achieved
by using non-Cartesian and sparse acquisitions. The reconstruction of MR images
from these measurements is generally carried out using gridding that
interpolates the missing data to obtain a dense Cartesian k-space filling. The
MR image is then reconstructed using a conventional Fast Fourier Transform. The
estimation of the missing data unavoidably introduces artifacts in the image
that remain difficult to quantify.
A general reconstruction method is proposed to take into account these
limitations. It can be applied to any sampling trajectory in k-space, Cartesian
or not, and specifically takes into account the exact location of the measured
data, without making any interpolation of the missing data in k-space.
Information about the expected characteristics of the imaged object is
introduced to preserve the spatial resolution and improve the signal to noise
ratio in a regularization framework. The reconstructed image is obtained by
minimizing a non-quadratic convex objective function. An original rewriting of
this criterion is shown to strongly improve the reconstruction efficiency.
Results on simulated data and on a real spiral acquisition are presented and
discussed.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 14:03:03 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Boubertakh",
"R.",
""
],
[
"Giovannelli",
"J. -F.",
""
],
[
"Herment",
"A.",
""
],
[
"De Cesare",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0908.3265
|
Nitin Salodkar
|
Nitin Salodkar and Abhay Karandikar
|
Rate Constrained Random Access over a Fading Channel
| null | null | null | null |
cs.GT cs.LG cs.NI
|
http://creativecommons.org/licenses/publicdomain/
|
In this paper, we consider uplink transmissions involving multiple users
communicating with a base station over a fading channel. We assume that the
base station does not coordinate the transmissions of the users and hence the
users employ random access communication. The situation is modeled as a
non-cooperative repeated game with incomplete information. Each user attempts
to minimize its long term power consumption subject to a minimum rate
requirement. We propose a two timescale stochastic gradient algorithm (TTSGA)
for tuning the users' transmission probabilities. The algorithm includes a
'waterfilling threshold update mechanism' that ensures that the rate
constraints are satisfied. We prove that under the algorithm, the users'
transmission probabilities converge to a Nash equilibrium. Moreover, we also
prove that the rate constraints are satisfied; this is also demonstrated using
simulation studies.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 16:45:32 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Salodkar",
"Nitin",
""
],
[
"Karandikar",
"Abhay",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.3269
|
Nitin Salodkar
|
Nitin Salodkar and Abhay Karandikar and V.S. Borkar
|
A Stable On-line Algorithm for Energy Efficient Multi-user Scheduling
| null | null | null | null |
cs.NI cs.GT
|
http://creativecommons.org/licenses/publicdomain/
|
In this paper, we consider the problem of energy efficient uplink scheduling
with delay constraint for a multi-user wireless system. We address this problem
within the framework of constrained Markov decision processes (CMDPs) wherein
one seeks to minimize one cost (average power) subject to a hard constraint on
another (average delay). We do not assume the arrival and channel statistics to
be known. To handle state space explosion and informational constraints, we
split the problem into individual CMDPs for the users, coupled through their
Lagrange multipliers; and a user selection problem at the base station. To
address the issue of unknown channel and arrival statistics, we propose a
reinforcement learning algorithm. The users use this learning algorithm to
determine the rate at which they wish to transmit in a slot and communicate
this to the base station. The base station then schedules the user with the
highest rate in a slot. We analyze convergence, stability and optimality
properties of the algorithm. We also demonstrate the efficacy of the algorithm
through simulations within IEEE 802.16 system.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 17:32:45 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Salodkar",
"Nitin",
""
],
[
"Karandikar",
"Abhay",
""
],
[
"Borkar",
"V. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0908.3271
|
Serge Gorneff
|
Serge Gorneff
|
Mathematical Modeling of Aerodynamic Space -to - Surface Flight with
Trajectory for Avoid Intercepting Process for Safety and Security Issues
| null | null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The research project has been made for mathematical modeling of aerospace
system Space-to-Surface for avoid intercepting process by flight objects
Surface-to-Air. The research has been completed and created mathematical models
which used for research and statistical analysis. In mathematical modeling has
been including a few models: Model of atmosphere, Model of speed of sound,
Model of flight head in space, Model of flight in atmosphere, Models of
navigation and guidance, Model and statistical analysis of approximation of
aerodynamic characteristics. Modeling has been created for a Space-to-Surface
system defined for an optimal trajectory in terminal phase. The modeling
includes models for simulation atmosphere, aerodynamic flight and navigation by
an infrared system. The modeling simulation includes statistical analysis of
the modeling results.
|
[
{
"version": "v1",
"created": "Sat, 22 Aug 2009 18:33:18 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Gorneff",
"Serge",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0908.3280
|
Andri Mirzal M.Sc.
|
Andri Mirzal
|
On the Relationship between Trading Network and WWW Network: A
Preferential Attachment Perspective
|
21 pages, 6 figures, submitted to International Journal of Business
Intelligence and Data Mining
| null | null | null |
cs.IR cs.CE
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper describes the relationship between trading network and WWW network
from preferential attachment mechanism perspective. This mechanism is known to
be the underlying principle in the network evolution and has been incorporated
to formulate two famous web pages ranking algorithms, PageRank and HITS. We
point out the differences between trading network and WWW network in this
mechanism, derive the formulation of HITS-based ranking algorithm for trading
network as a direct consequence of the differences, and apply the same
framework when deriving the formulation back to the HITS formulation that turns
to become a technique to accelerate its convergences.
|
[
{
"version": "v1",
"created": "Sun, 23 Aug 2009 02:06:35 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 2009 15:32:28 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Mirzal",
"Andri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0908.3315
|
Nelma Moreira
|
Marco Almeida, Nelma Moreira, and Rog\'erio Reis
|
Exact generation of acyclic deterministic finite automata
|
DCFS'08
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a canonical representation for trim acyclic deterministic finite
automata (Adfa) with n states over an alphabet of k symbols. Using this normal
form, we present a backtracking algorithm for the exact generation of Adfas.
This algorithm is a non trivial adaptation of the algorithm for the exact
generation of minimal acyclic deterministic finite automata, presented by
Almeida et al.
|
[
{
"version": "v1",
"created": "Sun, 23 Aug 2009 16:59:49 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Almeida",
"Marco",
""
],
[
"Moreira",
"Nelma",
""
],
[
"Reis",
"Rogério",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0908.3317
|
Vinith Reddy Podduturi
|
Vinith Reddy, Srinivas Shakkottai, Alex Sprintson and Natarajan Gautam
|
Multipath Wireless Network Coding: A Population Game Perspective
|
9 pages and 4 figures
| null | null | null |
cs.GT cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider wireless networks in which multiple paths are available between
each source and destination. We allow each source to split traffic among all of
its available paths, and ask the question: how do we attain the lowest possible
number of transmissions to support a given traffic matrix? Traffic bound in
opposite directions over two wireless hops can utilize the ``reverse
carpooling'' advantage of network coding in order to decrease the number of
transmissions used. We call such coded hops as ``hyper-links''. With the
reverse carpooling technique longer paths might be cheaper than shorter ones.
However, there is a prisoners dilemma type situation among sources -- the
network coding advantage is realized only if there is traffic in both
directions of a shared path. We develop a two-level distributed control scheme
that decouples user choices from each other by declaring a hyper-link capacity,
allowing sources to split their traffic selfishly in a distributed fashion, and
then changing the hyper-link capacity based on user actions. We show that such
a controller is stable, and verify our analytical insights by simulation.
|
[
{
"version": "v1",
"created": "Sun, 23 Aug 2009 17:07:49 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Reddy",
"Vinith",
""
],
[
"Shakkottai",
"Srinivas",
""
],
[
"Sprintson",
"Alex",
""
],
[
"Gautam",
"Natarajan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.3359
|
Jacek Turski
|
Jacek Turski
|
Geometric Analysis of the Conformal Camera for Intermediate-Level Vision
and Perisaccadic Perception
|
Ver2 with figures
| null | null | null |
cs.CV cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A binocular system developed by the author in terms of projective Fourier
transform (PFT) of the conformal camera, which numerically integrates the head,
eyes, and visual cortex, is used to process visual information during saccadic
eye movements. Although we make three saccades per second at the eyeball's
maximum speed of 700 deg/sec, our visual system accounts for these incisive eye
movements to produce a stable percept of the world. This visual constancy is
maintained by neuronal receptive field shifts in various retinotopically
organized cortical areas prior to saccade onset, giving the brain access to
visual information from the saccade's target before the eyes' arrival. It
integrates visual information acquisition across saccades. Our modeling
utilizes basic properties of PFT. First, PFT is computable by FFT in complex
logarithmic coordinates that approximate the retinotopy. Second, a translation
in retinotopic (logarithmic) coordinates, modeled by the shift property of the
Fourier transform, remaps the presaccadic scene into a postsaccadic reference
frame. It also accounts for the perisaccadic mislocalization observed by human
subjects in laboratory experiments. Because our modeling involves
cross-disciplinary areas of conformal geometry, abstract and computational
harmonic analysis, computational vision, and visual neuroscience, we include
the corresponding background material and elucidate how these different areas
interwove in our modeling of primate perception. In particular, we present the
physiological and behavioral facts underlying the neural processes related to
our modeling. We also emphasize the conformal camera's geometry and discuss how
it is uniquely useful in the intermediate-level vision computational aspects of
natural scene understanding.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 04:28:59 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Aug 2009 06:24:40 GMT"
}
] | 2009-08-29T00:00:00 |
[
[
"Turski",
"Jacek",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0908.3361
|
Gene Golovchinsky
|
Laurent Denoue, Scott Carter, John Adcock, Gene Golovchinsky, and
Andreas Girgensohn
|
WebNC: efficient sharing of web applications
|
Presented at WWW 2009, Madrid, Spain
| null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
WebNC is a system for efficiently sharing, retrieving and viewing web
applications. Unlike existing screencasting and screensharing tools, WebNC is
optimized to work with web pages where a lot of scrolling happens. WebNC uses a
tile-based encoding to capture, transmit and deliver web applications, and
relies only on dynamic HTML and JavaScript. The resulting webcasts require very
little bandwidth and are viewable on any modern web browser including Firefox
and Internet Explorer as well as browsers on the iPhone and Android platforms.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 05:34:57 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Denoue",
"Laurent",
""
],
[
"Carter",
"Scott",
""
],
[
"Adcock",
"John",
""
],
[
"Golovchinsky",
"Gene",
""
],
[
"Girgensohn",
"Andreas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.3362
|
Willemien Visser
|
Willemien Visser (LTCI)
|
The Function of Gesture in an Architectural Design Meeting
| null |
About: Designing. Analysing design meetings, Janet McDonnell and
Peter Lloyd (Ed.) (2009) 269-284
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This text presents a cognitive-psychology analysis of spontaneous, co-speech
gestures in a face-to-face architectural design meeting (A1 in DTRS7). The
long-term objective is to formulate specifications for remote
collaborative-design systems, especially for supporting the use of different
semiotic modalities (multi-modal interaction). According to their function for
design, interaction, and collaboration, we distinguish different gesture
families: representational (entity designating or specifying), organisational
(management of discourse, interaction, or functional design actions),
focalising, discourse and interaction modulating, and disambiguating gestures.
Discussion and conclusion concern the following points. It is impossible to
attribute fixed functions to particular gesture forms. "Designating" gestures
may also have a design function. The gestures identified in A1 possess a
certain generic character. The gestures identified are neither systematically
irreplaceable, nor optional accessories to speech or drawing. We discuss the
possibilities for gesture in computer-supported collaborative software systems.
The paper closes on our contribution to gesture studies and cognitive design
research.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 06:04:46 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Visser",
"Willemien",
"",
"LTCI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.3380
|
Kunal Narayan Chaudhury
|
Kunal Narayan Chaudhury and Michael Unser
|
Construction of Hilbert Transform Pairs of Wavelet Bases and Gabor-like
Transforms
|
36 pages, 8 figures
|
IEEE Transactions on Signal Processing, vol 7, no. 9, pp.
3411-3425, 2009
| null | null |
cs.IT cs.CV math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a novel method for constructing Hilbert transform (HT) pairs of
wavelet bases based on a fundamental approximation-theoretic characterization
of scaling functions--the B-spline factorization theorem. In particular,
starting from well-localized scaling functions, we construct HT pairs of
biorthogonal wavelet bases of L^2(R) by relating the corresponding wavelet
filters via a discrete form of the continuous HT filter. As a concrete
application of this methodology, we identify HT pairs of spline wavelets of a
specific flavor, which are then combined to realize a family of complex
wavelets that resemble the optimally-localized Gabor function for sufficiently
large orders.
Analytic wavelets, derived from the complexification of HT wavelet pairs,
exhibit a one-sided spectrum. Based on the tensor-product of such analytic
wavelets, and, in effect, by appropriately combining four separable
biorthogonal wavelet bases of L^2(R^2), we then discuss a methodology for
constructing 2D directional-selective complex wavelets. In particular,
analogous to the HT correspondence between the components of the 1D
counterpart, we relate the real and imaginary components of these complex
wavelets using a multi-dimensional extension of the HT--the directional HT.
Next, we construct a family of complex spline wavelets that resemble the
directional Gabor functions proposed by Daugman. Finally, we present an
efficient FFT-based filterbank algorithm for implementing the associated
complex wavelet transform.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 15:27:09 GMT"
}
] | 2013-07-23T00:00:00 |
[
[
"Chaudhury",
"Kunal Narayan",
""
],
[
"Unser",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3383
|
Kunal Narayan Chaudhury
|
Kunal Narayan Chaudhury and Michael Unser
|
On the Shiftability of Dual-Tree Complex Wavelet Transforms
|
to appear in IEEE Transactions on Signal Processing
|
IEEE Transactions on Signal Processing, vol. 58(1), pp. 221 - 232,
2010
| null | null |
cs.IT cs.CV math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The dual-tree complex wavelet transform (DT-CWT) is known to exhibit better
shift-invariance than the conventional discrete wavelet transform. We propose
an amplitude-phase representation of the DT-CWT which, among other things,
offers a direct explanation for the improvement in the shift-invariance. The
representation is based on the shifting action of the group of fractional
Hilbert transform (fHT) operators, which extends the notion of arbitrary
phase-shifts from sinusoids to finite-energy signals (wavelets in particular).
In particular, we characterize the shiftability of the DT-CWT in terms of the
shifting property of the fHTs. At the heart of the representation are certain
fundamental invariances of the fHT group, namely that of translation, dilation,
and norm, which play a decisive role in establishing the key properties of the
transform. It turns out that these fundamental invariances are exclusive to
this group.
Next, by introducing a generalization of the Bedrosian theorem for the fHT
operator, we derive an explicitly understanding of the shifting action of the
fHT for the particular family of wavelets obtained through the modulation of
lowpass functions (e.g., the Shannon and Gabor wavelet). This, in effect, links
the corresponding dual-tree transform with the framework of windowed-Fourier
analysis. Finally, we extend these ideas to the multi-dimensional setting by
introducing a directional extension of the fHT, the fractional directional
Hilbert transform. In particular, we derive a signal representation involving
the superposition of direction-selective wavelets with appropriate
phase-shifts, which helps explain the improved shift-invariance of the
transform along certain preferential directions.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 15:18:41 GMT"
}
] | 2013-07-23T00:00:00 |
[
[
"Chaudhury",
"Kunal Narayan",
""
],
[
"Unser",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3394
|
Jayanta Poray
|
Jayanta Poray, Christoph Schommer
|
A Cognitive Mind-map Framework to Foster Trust
|
5 pages, 4 Figures, Extended Version, presented at the 5th
International Conference on Natural Computation, 2009
| null |
10.1109/ICNC.2009.614
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The explorative mind-map is a dynamic framework, that emerges automatically
from the input, it gets. It is unlike a verificative modeling system where
existing (human) thoughts are placed and connected together. In this regard,
explorative mind-maps change their size continuously, being adaptive with
connectionist cells inside; mind-maps process data input incrementally and
offer lots of possibilities to interact with the user through an appropriate
communication interface. With respect to a cognitive motivated situation like a
conversation between partners, mind-maps become interesting as they are able to
process stimulating signals whenever they occur. If these signals are close to
an own understanding of the world, then the conversational partner becomes
automatically more trustful than if the signals do not or less match the own
knowledge scheme. In this (position) paper, we therefore motivate explorative
mind-maps as a cognitive engine and propose these as a decision support engine
to foster trust.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 10:32:01 GMT"
},
{
"version": "v2",
"created": "Mon, 24 Aug 2009 21:17:58 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Poray",
"Jayanta",
""
],
[
"Schommer",
"Christoph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.3430
|
Yu. I. Manin
|
Yuri I. Manin
|
Renormalization and Computation II: Time Cut-off and the Halting Problem
|
28 pages
| null | null | null |
math.QA cs.CC cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This is the second installment to the project initiated in [Ma3]. In the
first Part, I argued that both philosophy and technique of the perturbative
renormalization in quantum field theory could be meaningfully transplanted to
the theory of computation, and sketched several contexts supporting this view.
In this second part, I address some of the issues raised in [Ma3] and provide
their development in three contexts: a categorification of the algorithmic
computations; time cut--off and Anytime Algorithms; and finally, a Hopf algebra
renormalization of the Halting Problem.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 13:03:38 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Manin",
"Yuri I.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0908.3455
|
Mugurel Ionut Andreica
|
Mugurel Ionut Andreica, Ion Pargaru, Florin Ionescu, Cristina Teodora
Andreica
|
Algorithmic Aspects of Several Data Transfer Service Optimization
Problems
|
Proceedings of the International Symposium on Sustainable Development
in Conditions of Economic Instability, Satu Mare, 26-27 June, 2009
|
"Quality - Access to Success" Journal, vol. 10, special issue no.
101, pp. 30-32, 2009. (ISSN: 1582-2559)
| null | null |
cs.DS cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Optimized data transfer services are highly demanded nowadays, due to the
large amounts of data which are frequently being produced and accessed. In this
paper we consider several data transfer service optimization problems (optimal
server location in path networks, optimal packet sequencing and minimum
makespan packet scheduling), for which we provide novel algorithmic solutions.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 15:56:58 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Pargaru",
"Ion",
""
],
[
"Ionescu",
"Florin",
""
],
[
"Andreica",
"Cristina Teodora",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0908.3459
|
Mugurel Ionut Andreica
|
Mugurel Ionut Andreica, Mihai Aristotel Ungureanu, Romulus Andreica,
Angela Andreica
|
An Algorithmic Perspective on Some Network Design, Construction and
Analysis Problems
|
Proceedings of the International Symposium on Sustainable Development
in Conditions of Economic Instability, Satu Mare, 26-27 June, 2009
|
"Quality - Access to Success" Journal, vol. 10, special issue no.
101, pp. 20-22, 2009. (ISSN: 1582-2559)
| null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Efficient network design, construction and analysis are important topics,
considering the highly dynamic environment in which data communication occurs
nowadays. In this paper we address several problems concerning these topics
from an algorithmic point of view.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 16:05:50 GMT"
}
] | 2009-08-25T00:00:00 |
[
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Ungureanu",
"Mihai Aristotel",
""
],
[
"Andreica",
"Romulus",
""
],
[
"Andreica",
"Angela",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.3463
|
Davide Cescato
|
Davide Cescato and Helmut B\"olcskei
|
Interpolation-Based QR Decomposition in MIMO-OFDM Systems
|
The original submission to Appl. Comput. Harmon. Anal. in Aug. 2009
was withdrawn. The paper was split in two parts, which were submitted in Oct.
2009 to IEEE Trans. Inf. Theory and to IEEE Trans. Signal Proc., respectively
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detection algorithms for multiple-input multiple-output (MIMO) wireless
systems based on orthogonal frequency-division multiplexing (OFDM) typically
require the computation of a QR decomposition for each of the data-carrying
OFDM tones. The resulting computational complexity will, in general, be
significant, as the number of data-carrying tones ranges from 48 (as in the
IEEE 802.11a/g standards) to 1728 (as in the IEEE 802.16e standard). Motivated
by the fact that the channel matrices arising in MIMO-OFDM systems are highly
oversampled polynomial matrices, we formulate interpolation-based QR
decomposition algorithms. An in-depth complexity analysis, based on a metric
relevant for very large scale integration (VLSI) implementations, shows that
the proposed algorithms, for sufficiently high number of data-carrying tones
and sufficiently small channel order, provably exhibit significantly smaller
complexity than brute-force per-tone QR decomposition.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 17:09:06 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Oct 2009 09:08:56 GMT"
},
{
"version": "v3",
"created": "Fri, 30 Oct 2009 09:19:45 GMT"
}
] | 2009-10-30T00:00:00 |
[
[
"Cescato",
"Davide",
""
],
[
"Bölcskei",
"Helmut",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3491
|
Gus Gutoski
|
Gus Gutoski
|
Entangled games do not require much entanglement (withdrawn)
|
Withdrawn. I found a mistake in my proof. This one-page replacement
note explains the problem in more detail. Sorry, everyone
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove an explicit upper bound on the amount of entanglement required by
any strategy in a two-player cooperative game with classical questions and
quantum answers. Specifically, we show that every strategy for a game with
n-bit questions and n-qubit answers can be implemented exactly by players who
share an entangled state of no more than 5n qubits--a bound which is optimal to
within a factor of 5/2. Previously, no upper bound at all was known on the
amount of entanglement required even to approximate such a strategy. It follows
that the problem of computing the value of these games is in NP, whereas
previously this problem was not known to be computable.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 20:23:26 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Sep 2009 03:40:43 GMT"
}
] | 2009-09-03T00:00:00 |
[
[
"Gutoski",
"Gus",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.3497
|
James Fowler
|
James H. Fowler, Nicholas A. Christakis
|
Cooperative Behavior Cascades in Human Social Networks
| null | null |
10.1073/pnas.0913149107
| null |
physics.soc-ph cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Theoretical models suggest that social networks influence the evolution of
cooperation, but to date there have been few experimental studies.
Observational data suggest that a wide variety of behaviors may spread in human
social networks, but subjects in such studies can choose to befriend people
with similar behaviors, posing difficulty for causal inference. Here, we
exploit a seminal set of laboratory experiments that originally showed that
voluntary costly punishment can help sustain cooperation. In these experiments,
subjects were randomly assigned to a sequence of different groups in order to
play a series of single-shot public goods games with strangers; this feature
allowed us to draw networks of interactions to explore how cooperative and
uncooperative behavior spreads from person to person to person. We show that,
in both an ordinary public goods game and in a public goods game with
punishment, focal individuals are influenced by fellow group members'
contribution behavior in future interactions with other individuals who were
not a party to the initial interaction. Furthermore, this influence persists
for multiple periods and spreads up to three degrees of separation (from person
to person to person to person). The results suggest that each additional
contribution a subject makes to the public good in the first period is tripled
over the course of the experiment by other subjects who are directly or
indirectly influenced to contribute more as a consequence. These are the first
results to show experimentally that cooperative behavior cascades in human
social networks.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 21:07:13 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Dec 2009 04:58:07 GMT"
}
] | 2011-07-26T00:00:00 |
[
[
"Fowler",
"James H.",
""
],
[
"Christakis",
"Nicholas A.",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.3505
|
Christoph Durr
|
Philippe Baptiste, Marek Chrobak, Christoph Durr
|
Polynomial Time Algorithms for Minimum Energy Scheduling
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of power management policies is to reduce the amount of energy
consumed by computer systems while maintaining satisfactory level of
performance. One common method for saving energy is to simply suspend the
system during the idle times. No energy is consumed in the suspend mode.
However, the process of waking up the system itself requires a certain fixed
amount of energy, and thus suspending the system is beneficial only if the idle
time is long enough to compensate for this additional energy expenditure. In
the specific problem studied in the paper, we have a set of jobs with release
times and deadlines that need to be executed on a single processor. Preemptions
are allowed. The processor requires energy L to be woken up and, when it is on,
it uses one unit of energy per one unit of time. It has been an open problem
whether a schedule minimizing the overall energy consumption can be computed in
polynomial time. We solve this problem in positive, by providing an O(n^5)-time
algorithm. In addition we provide an O(n^4)-time algorithm for computing the
minimum energy schedule when all jobs have unit length.
|
[
{
"version": "v1",
"created": "Mon, 24 Aug 2009 21:44:45 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Sep 2010 12:28:21 GMT"
}
] | 2010-09-06T00:00:00 |
[
[
"Baptiste",
"Philippe",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Durr",
"Christoph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.3512
|
Nan Ma
|
Nan Ma and Prakash Ishwar
|
The Infinite-message Limit of Two-terminal Interactive Source Coding
|
40 pages, 5 figures. Submitted to IEEE Transactions on Information
Theory in Sep 2010 and revised in Mar 2012. This version (version 3) is the
latest revised version. Version 1 was published in Allerton Conference 2009.
Version 2 contains extensions to the rate-distortion theory and an achievable
proof of the sum-rate R* in the second example
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A two-terminal interactive function computation problem with alternating
messages is studied within the framework of distributed block source coding
theory. For any finite number of messages, a single-letter characterization of
the sum-rate-distortion function was established in previous works using
standard information-theoretic techniques. This, however, does not provide a
satisfactory characterization of the infinite-message limit, which is a new,
unexplored dimension for asymptotic-analysis in distributed block source coding
involving potentially an infinite number of infinitesimal-rate messages. In
this paper, the infinite-message sum-rate-distortion function, viewed as a
functional of the joint source pmf and the distortion levels, is characterized
as the least element of a partially ordered family of functionals having
certain convex-geometric properties. The new characterization does not involve
evaluating the infinite-message limit of a finite-message sum-rate-distortion
expression. This characterization leads to a family of lower bounds for the
infinite-message sum-rate-distortion expression and a simple criterion to test
the optimality of any achievable infinite-message sum-rate-distortion
expression. For computing the amplewise Boolean AND function, the
infinite-message minimum sum-rates are characterized in closed analytic form.
These sum-rates are shown to be achievable using infinitely many
infinitesimal-rate messages. The new convex-geometric characterization is used
to develop an iterative algorithm for evaluating any finite-message
sumrate-distortion function. It is also used to construct the first examples
which demonstrate that for lossy source reproduction, two messages can strictly
improve the one-message Wyner-Ziv rate-distortion function settling an
unresolved question from a 1985 paper.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 01:54:37 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Oct 2009 20:07:52 GMT"
},
{
"version": "v3",
"created": "Wed, 11 Jul 2012 13:38:36 GMT"
},
{
"version": "v4",
"created": "Thu, 2 Aug 2012 22:37:05 GMT"
}
] | 2012-08-06T00:00:00 |
[
[
"Ma",
"Nan",
""
],
[
"Ishwar",
"Prakash",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3519
|
Joel Goossens
|
Liliana Cucu-Grosjean, Jo\"el Goossens
|
Predictability of Fixed-Job Priority Schedulers on Heterogeneous
Multiprocessor Real-Time Systems
| null | null | null | null |
cs.OS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The multiprocessor Fixed-Job Priority (FJP) scheduling of real-time systems
is studied. An important property for the schedulability analysis, the
predictability (regardless to the execution times), is studied for
heterogeneous multiprocessor platforms. Our main contribution is to show that
any FJP schedulers are predictable on unrelated platforms. A convenient
consequence is the fact that any FJP schedulers are predictable on uniform
multiprocessors.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 12:46:56 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Cucu-Grosjean",
"Liliana",
""
],
[
"Goossens",
"Joël",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0908.3523
|
Gene Golovchinsky
|
Gene Golovchinsky
|
Cognitive Dimensions Analysis of Interfaces for Information Seeking
|
Submitted to HCIR'09 http://cuaslis.org/hcir2009/
| null | null | null |
cs.HC cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cognitive Dimensions is a framework for analyzing human-computer interaction.
It is used for meta-analysis, that is, for talking about characteristics of
systems without getting bogged down in details of a particular implementation.
In this paper, I discuss some of the dimensions of this theory and how they can
be applied to analyze information seeking interfaces. The goal of this analysis
is to introduce a useful vocabulary that practitioners and researchers can use
to describe systems, and to guide interface design toward more usable and
useful systems
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 01:37:59 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Golovchinsky",
"Gene",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.3539
|
Zoran Hadzi-Velkov
|
Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis
|
An Accurate Approximation to the Distribution of the Sum of Equally
Correlated Nakagami-m Envelopes and its Application in Equal Gain Diversity
Receivers
| null |
2009. ICC '09. IEEE International Conference on Communications,
14-18 June 2009 Page(s):1 - 5
|
10.1109/ICC.2009.5198714
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel and accurate approximation for the distribution of the sum
of equally correlated Nakagami-m variates. Ascertaining on this result we study
the performance of Equal Gain Combining (EGC) receivers, operating over equally
correlating fading channels. Numerical results and simulations show the
accuracy of the proposed approximation and the validity of the mathematical
analysis.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 05:48:30 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Hadzi-Velkov",
"Zoran",
""
],
[
"Zlatanov",
"Nikola",
""
],
[
"Karagiannidis",
"George K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3541
|
Zoran Hadzi-Velkov
|
Nikola Zlatanov, Zoran Hadzi-Velkov, George K. Karagiannidis
|
Level Crossing Rate and Average Fade Duration of the Double Nakagami-m
Random Process and Application in MIMO Keyhole Fading Channels
| null |
IEEE Communications Letters, Volume 12, Issue 11, November 2008
Page(s):822 - 824
|
10.1109/LCOMM.2008.081058
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present novel exact expressions and accurate closed-form approximations
for the level crossing rate (LCR) and the average fade duration (AFD) of the
double Nakagami-m random process. These results are then used to study the
second order statistics of multiple input multiple output (MIMO) keyhole fading
channels with space-time block coding. Numerical and computer simulation
examples validate the accuracy of the presented mathematical analysis and show
the tightness of the proposed approximations.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 05:59:03 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Zlatanov",
"Nikola",
""
],
[
"Hadzi-Velkov",
"Zoran",
""
],
[
"Karagiannidis",
"George K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3544
|
Zoran Hadzi-Velkov
|
Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis
|
On the Second Order Statistics of the Multihop Rayleigh Fading Channel
| null |
IEEE Transactions on Communications, Volume 57, Issue 6, June 2009
Page(s):1815 - 1823
|
10.1109/TCOMM.2009.06.070460
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Second order statistics provides a dynamic representation of a fading channel
and plays an important role in the evaluation and design of the wireless
communication systems. In this paper, we present a novel analytical framework
for the evaluation of important second order statistical parameters, as the
level crossing rate (LCR) and the average fade duration (AFD) of the
amplify-and-forward multihop Rayleigh fading channel. More specifically,
motivated by the fact that this channel is a cascaded one and can be modeled as
the product of N fading amplitudes, we derive novel analytical expressions for
the average LCR and the AFD of the product of N Rayleigh fading envelopes (or
of the recently so-called N*Rayleigh channel). Furthermore, we derive simple
and efficient closed-form approximations to the aforementioned parameters,
using the multivariate Laplace approximation theorem. It is shown that our
general results reduce to the corresponding ones of the specific dual-hop case,
previously published. Numerical and computer simulation examples verify the
accuracy of the presented mathematical analysis and show the tightness of the
proposed approximations.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 06:06:03 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Hadzi-Velkov",
"Zoran",
""
],
[
"Zlatanov",
"Nikola",
""
],
[
"Karagiannidis",
"George K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3545
|
Pat Morin
|
Vida Dujmovic, Joachim Gudmundsson, Pat Morin, Thomas Wolle
|
Notes on large angle crossing graphs
| null |
Chicago Journal of Theoretical Computer Science, Article 2011-4
|
10.4086/cjtcs.2011.004
| null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph G is an a-angle crossing (aAC) graph if every pair of crossing edges
in G intersect at an angle of at least a. The concept of right angle crossing
(RAC) graphs (a=Pi/2) was recently introduced by Didimo et. al. It was shown
that any RAC graph with n vertices has at most 4n-10 edges and that there are
infinitely many values of n for which there exists a RAC graph with n vertices
and 4n-10 edges. In this paper, we give upper and lower bounds for the number
of edges in aAC graphs for all 0 < a < Pi/2.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 06:21:41 GMT"
},
{
"version": "v2",
"created": "Mon, 29 Nov 2010 15:05:40 GMT"
}
] | 2013-03-12T00:00:00 |
[
[
"Dujmovic",
"Vida",
""
],
[
"Gudmundsson",
"Joachim",
""
],
[
"Morin",
"Pat",
""
],
[
"Wolle",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.3549
|
Zoran Hadzi-Velkov
|
Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis
|
Level Crossing Rate and Average Fade Duration of the Multihop Rayleigh
Fading Channel
| null |
2008. ICC '08. IEEE International Conference on Communications,
19-23 May 2008 Page(s):4451 - 4455
|
10.1109/ICC.2008.835
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel analytical framework for the evaluation of important
second order statistical parameters, as the level crossing rate (LCR) and the
average fade duration (AFD) of the amplify-and-forward multihop Rayleigh fading
channel. More specifically, motivated by the fact that this channel is a
cascaded one, which can be modelled as the product of N fading amplitudes, we
derive novel analytical expressions for the average LCR and AFD of the product
of N Rayleigh fading envelopes, or of the recently so-called N*Rayleigh
channel. Furthermore, we derive simple and efficient closed-form approximations
to the aforementioned parameters, using the multivariate Laplace approximation
theorem. It is shown that our general results reduce to the specific dual-hop
case, previously published. Numerical and computer simulation examples verify
the accuracy of the presented mathematical analysis and show the tightness of
the proposed approximations.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 07:20:07 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Hadzi-Velkov",
"Zoran",
""
],
[
"Zlatanov",
"Nikola",
""
],
[
"Karagiannidis",
"George K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.