id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0908.2231
Redouane Ali
Redouane Ali, Suksant Sae Lor, Miguel Rio
Two Algorithms for Network Size Estimation for Master/Slave Ad Hoc Networks
3 pages, 2 figures, submitted to ANTS'09 - Corrected typos and definitions
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes an adaptation of two network size estimation methods: random tour and gossip-based aggregation to suit master/slave mobile ad hoc networks. We show that it is feasible to accurately estimate the size of ad hoc networks when topology changes due to mobility using both methods. The algorithms were modified to account for the specific constraints of master/slave ad hoc networks and the results show that the proposed modifications perform better on these networks than the original protocols. Each of the two algorithms presents strengths and weaknesses and these are outlined in this paper.
[ { "version": "v1", "created": "Sun, 16 Aug 2009 17:29:30 GMT" }, { "version": "v2", "created": "Fri, 21 Aug 2009 20:56:59 GMT" }, { "version": "v3", "created": "Tue, 20 Oct 2009 18:01:05 GMT" } ]
2009-10-20T00:00:00
[ [ "Ali", "Redouane", "" ], [ "Lor", "Suksant Sae", "" ], [ "Rio", "Miguel", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.2237
Manu Basavaraju
Manu Basavaraju, L. Sunil Chandran
Acyclic Edge coloring of Planar Graphs
10 pages. 0 figures
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An $acyclic$ edge coloring of a graph is a proper edge coloring such that there are no bichromatic cycles. The \emph{acyclic chromatic index} of a graph is the minimum number k such that there is an acyclic edge coloring using k colors and is denoted by $a'(G)$. It was conjectured by Alon, Sudakov and Zaks (and much earlier by Fiamcik) that $a'(G)\le \Delta+2$, where $\Delta =\Delta(G)$ denotes the maximum degree of the graph. We prove that if $G$ is a planar graph with maximum degree $\Delta$, then $a'(G)\le \Delta + 12$.
[ { "version": "v1", "created": "Sun, 16 Aug 2009 13:16:15 GMT" } ]
2009-08-18T00:00:00
[ [ "Basavaraju", "Manu", "" ], [ "Chandran", "L. Sunil", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.2256
Viswanath Nagarajan
Nikhil Bansal, Nitish Korula, Viswanath Nagarajan and Aravind Srinivasan
On k-Column Sparse Packing Programs
19 pages, v3: additional details
null
10.1007/978-3-642-13036-6_28
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the class of packing integer programs (PIPs) that are column sparse, i.e. there is a specified upper bound k on the number of constraints that each variable appears in. We give an (ek+o(k))-approximation algorithm for k-column sparse PIPs, improving on recent results of $k^2\cdot 2^k$ and $O(k^2)$. We also show that the integrality gap of our linear programming relaxation is at least 2k-1; it is known that k-column sparse PIPs are $\Omega(k/ \log k)$-hard to approximate. We also extend our result (at the loss of a small constant factor) to the more general case of maximizing a submodular objective over k-column sparse packing constraints.
[ { "version": "v1", "created": "Sun, 16 Aug 2009 17:55:03 GMT" }, { "version": "v2", "created": "Wed, 30 Sep 2009 02:27:09 GMT" }, { "version": "v3", "created": "Sun, 14 Mar 2010 15:29:51 GMT" } ]
2015-05-13T00:00:00
[ [ "Bansal", "Nikhil", "" ], [ "Korula", "Nitish", "" ], [ "Nagarajan", "Viswanath", "" ], [ "Srinivasan", "Aravind", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.2277
Wiroonsak Santipach
Wiroonsak Santipach and Michael L. Honig
Optimization of Training and Feedback Overhead for Beamforming over Block Fading Channels
accepted for IEEE Trans. Info. Theory, 2010
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010
10.1109/TIT.2010.2081150
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We examine the capacity of beamforming over a single-user, multi-antenna link taking into account the overhead due to channel estimation and limited feedback of channel state information. Multi-input single-output (MISO) and multi-input multi-output (MIMO) channels are considered subject to block Rayleigh fading. Each coherence block contains $L$ symbols, and is spanned by $T$ training symbols, $B$ feedback bits, and the data symbols. The training symbols are used to obtain a Minimum Mean Squared Error estimate of the channel matrix. Given this estimate, the receiver selects a transmit beamforming vector from a codebook containing $2^B$ {\em i.i.d.} random vectors, and sends the corresponding $B$ bits back to the transmitter. We derive bounds on the beamforming capacity for MISO and MIMO channels and characterize the optimal (rate-maximizing) training and feedback overhead ($T$ and $B$) as $L$ and the number of transmit antennas $N_t$ both become large. The optimal $N_t$ is limited by the coherence time, and increases as $L/\log L$. For the MISO channel the optimal $T/L$ and $B/L$ (fractional overhead due to training and feedback) are asymptotically the same, and tend to zero at the rate $1/\log N_t$. For the MIMO channel the optimal feedback overhead $B/L$ tends to zero faster (as $1/\log^2 N_t$).
[ { "version": "v1", "created": "Mon, 17 Aug 2009 03:05:24 GMT" }, { "version": "v2", "created": "Thu, 26 Aug 2010 08:51:25 GMT" } ]
2010-11-22T00:00:00
[ [ "Santipach", "Wiroonsak", "" ], [ "Honig", "Michael L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2282
Seyed Abolfazl Motahari
Abolfazl Seyed Motahari, Shahab Oveis Gharan, Mohammad-Ali Maddah-Ali, and Amir Keyvan Khandani
Real Interference Alignment: Exploiting the Potential of Single Antenna Systems
Submitted to IEEE Transaction on Information Theory. The first version was uploaded on arxiv on 17 Aug 2009 with the following title: Forming Pseudo-MIMO by Embedding Infinite Rational Dimensions Along a Single Real Line: Removing Barriers in Achieving the DOFs of Single Antenna Systems
null
10.1109/TIT.2014.2329865
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, the available spatial Degrees-Of-Freedoms (DOF) in single antenna systems is exploited. A new coding scheme is proposed in which several data streams having fractional multiplexing gains are sent by transmitters and interfering streams are aligned at receivers. Viewed as a field over rational numbers, a received signal has infinite fractional DOFs, allowing simultaneous interference alignment of any finite number of signals at any finite number of receivers. The coding scheme is backed up by a recent result in the field of Diophantine approximation, which states that the convergence part of the Khintchine-Groshev theorem holds for points on non-degenerate manifolds. The proposed coding scheme is proved to be optimal for three communication channels, namely the Gaussian Interference Channel (GIC), the uplink channel in cellular systems, and the $X$ channel. It is proved that the total DOF of the $K$-user GIC is $\frac{K}{2}$ almost surely, i.e. each user enjoys half of its maximum DOF. Having $K$ cells and $M$ users within each cell in a cellular system, the total DOF of the uplink channel is proved to be $\frac{KM}{M+1}$. Finally, the total DOF of the $X$ channel with $K$ transmitters and $M$ receivers is shown to be $\frac{KM}{K+M-1}$.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 19:49:23 GMT" }, { "version": "v2", "created": "Tue, 24 Nov 2009 04:43:28 GMT" } ]
2016-11-18T00:00:00
[ [ "Motahari", "Abolfazl Seyed", "" ], [ "Gharan", "Shahab Oveis", "" ], [ "Maddah-Ali", "Mohammad-Ali", "" ], [ "Khandani", "Amir Keyvan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2295
Ezra N. Hoch
Danny Dolev, Ezra N. Hoch, Yoram Moses
An Optimal Self-Stabilizing Firing Squad
Shorter version to appear in SSS09
null
10.1007/978-3-642-05118-0_20
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Consider a fully connected network where up to $t$ processes may crash, and all processes start in an arbitrary memory state. The self-stabilizing firing squad problem consists of eventually guaranteeing simultaneous response to an external input. This is modeled by requiring that the non-crashed processes "fire" simultaneously if some correct process received an external "GO" input, and that they only fire as a response to some process receiving such an input. This paper presents FireAlg, the first self-stabilizing firing squad algorithm. The FireAlg algorithm is optimal in two respects: (a) Once the algorithm is in a safe state, it fires in response to a GO input as fast as any other algorithm does, and (b) Starting from an arbitrary state, it converges to a safe state as fast as any other algorithm does.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 07:39:06 GMT" } ]
2015-05-13T00:00:00
[ [ "Dolev", "Danny", "" ], [ "Hoch", "Ezra N.", "" ], [ "Moses", "Yoram", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0908.2328
Yara Omar
Yara Omar, Moustafa Youssef, Hesham El Gamal
ARQ Secrecy: From Theory to Practice
5 pages, invited to ITW'09
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Inspired by our earlier work on Automatic Repeat reQuest (ARQ) secrecy, we propose a simple, yet efficient, security overlay protocol to existing 802.11 networks. Our work targets networks secured by the Wired Equivalent Privacy (WEP) protocol because of its widespread use and vulnerability to a multitude of security threats. By exploiting the existing ARQ protocol in the 802.11 standard, our proposed opportunistic secrecy scheme is shown to defend against all known passive WEP attacks. Moreover, our implementation on the madwifi-ng driver is used to establish the achievability of a vanishing secrecy outage probability in several realistic scenarios.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 11:23:30 GMT" } ]
2009-08-18T00:00:00
[ [ "Omar", "Yara", "" ], [ "Youssef", "Moustafa", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2332
Gerard Henry Edmond Duchamp
G\'erard Henry Edmond Duchamp (LIPN), Laurent Poinsot (LIPN), Allan I. Solomon (LPTMC), Karol A. Penson (LPTMC), Pawel Blasiak (IFJ-PAN - Polish Academy of Sciences), Andrzej Horzela (IFJ-PAN - Polish Academy of Sciences)
Ladder Operators and Endomorphisms in Combinatorial Physics
null
DMTCS 12, 2 (2010) 1
null
null
math.CO cs.SC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Starting with the Heisenberg-Weyl algebra, fundamental to quantum physics, we first show how the ordering of the non-commuting operators intrinsic to that algebra gives rise to generalizations of the classical Stirling Numbers of Combinatorics. These may be expressed in terms of infinite, but {\em row-finite}, matrices, which may also be considered as endomorphisms of $\C[[x]]$. This leads us to consider endomorphisms in more general spaces, and these in turn may be expressed in terms of generalizations of the ladder-operators familiar in physics.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 11:40:06 GMT" }, { "version": "v2", "created": "Wed, 30 Dec 2009 20:11:35 GMT" } ]
2010-11-04T00:00:00
[ [ "Duchamp", "Gérard Henry Edmond", "", "LIPN" ], [ "Poinsot", "Laurent", "", "LIPN" ], [ "Solomon", "Allan I.", "", "LPTMC" ], [ "Penson", "Karol A.", "", "LPTMC" ], [ "Blasiak", "Pawel", "", "IFJ-PAN - Polish\n Academy of Sciences" ], [ "Horzela", "Andrzej", "", "IFJ-PAN - Polish Academy of Sciences" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0908.2363
Tsuyoshi Ito
Tsuyoshi Ito
Polynomial-Space Approximation of No-Signaling Provers
13 pages. v2: Introduction expanded, references added, some open problems stated, and typos corrected
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In two-prover one-round interactive proof systems, no-signaling provers are those who are allowed to use arbitrary strategies, not limited to local operations, as long as their strategies cannot be used for communication between them. Study of multi-prover interactive proof systems with no-signaling provers is motivated by study of those with provers sharing quantum states. The relation between them is that no-signaling strategies include all the strategies realizable by provers sharing arbitrary entangled quantum states, and more. This paper shows that two-prover one-round interactive proof systems with no-signaling provers only accept languages in PSPACE. Combined with the protocol for PSPACE by Ito, Kobayashi and Matsumoto (CCC 2009), this implies MIPns(2,1)=PSPACE, where MIPns(2,1) is the class of languages having a two-prover one-round interactive proof system with no-signaling provers. This is proved by constructing a fast parallel algorithm which approximates within an additive error the maximum value of a two-player one-round game achievable by cooperative no-signaling players. The algorithm uses the fast parallel algorithm for the mixed packing and covering problem by Young (FOCS 2001).
[ { "version": "v1", "created": "Mon, 17 Aug 2009 17:52:16 GMT" }, { "version": "v2", "created": "Tue, 20 Oct 2009 19:11:27 GMT" } ]
2009-10-20T00:00:00
[ [ "Ito", "Tsuyoshi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0908.2369
Sariel Har-Peled
Sariel Har-Peled
Being Fat and Friendly is Not Enough
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that there is no $(1+\eps)$-approximation algorithm for the problem of covering points in the plane by minimum number of fat triangles of similar size (with the minimum angle of the triangles being close to 45 degrees). Here, the available triangles are prespecified in advance. Since a constant factor approximation algorithm is known for this problem \cite{cv-iaags-07}, this settles the approximability of this problem. We also investigate some related problems, including cover by friendly fat shapes, and independent set of triangles in three dimensions.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 15:29:21 GMT" } ]
2009-08-18T00:00:00
[ [ "Har-Peled", "Sariel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.2397
Xiaojun Tang
Xiaojun Tang, Ruoheng Liu, Predrag Spasojevic, and H. Vincent Poor
Interference Assisted Secret Communication
submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2121450
WINLAB-09-0817
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless communication is susceptible to eavesdropping attacks because of its broadcast nature. This paper illustrates how interference can be used to counter eavesdropping and assist secrecy. In particular, a wire-tap channel with a helping interferer (WT-HI) is considered. Here, a transmitter sends a confidential message to its intended receiver in the presence of a passive eavesdropper and with the help of an independent interferer. The interferer, which does not know the confidential message, helps in ensuring the secrecy of the message by sending an independent signal. An achievable secrecy rate and several computable outer bounds on the secrecy capacity of the WT-HI are given for both discrete memoryless and Gaussian channels.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 17:07:36 GMT" } ]
2016-11-18T00:00:00
[ [ "Tang", "Xiaojun", "" ], [ "Liu", "Ruoheng", "" ], [ "Spasojevic", "Predrag", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2399
Andreas Witzel
Andreas Witzel, Krzysztof R. Apt, Jonathan A. Zvesper
Distributed iterated elimination of strictly dominated strategies
null
null
null
null
cs.GT cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We characterize epistemic consequences of truthful communication among rational agents in a game-theoretic setting. To this end we introduce normal-form games equipped with an interaction structure, which specifies which groups of players can communicate their preferences with each other. We then focus on a specific form of interaction, namely a distributed form of iterated elimination of strictly dominated strategies (IESDS), driven by communication among the agents. We study the outcome of IESDS after some (possibly all) messages about players' preferences have been sent. The main result of the paper provides an epistemic justification of this form of IESDS.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 17:20:50 GMT" }, { "version": "v2", "created": "Mon, 2 Nov 2009 16:01:37 GMT" }, { "version": "v3", "created": "Wed, 17 Aug 2011 22:55:11 GMT" } ]
2011-08-19T00:00:00
[ [ "Witzel", "Andreas", "" ], [ "Apt", "Krzysztof R.", "" ], [ "Zvesper", "Jonathan A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0908.2402
Babak Seyfe
Mahboobeh Sedighizad, Babak Seyfe, and Keivan Navaie
MR-BART: Multi-Rate Available Bandwidth Estimation in Real-Time
12 Pages (Two columns), 14 Figures, 4 Tables,
null
10.1016/j.jnca.2011.11.006
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose Multi-Rate Bandwidth Available in Real Time (MR-BART) to estimate the end-to-end Available Bandwidth (AB) of a network path. The proposed scheme is an extension of the Bandwidth Available in Real Time (BART) which employs multi-rate (MR) probe packet sequences with Kalman filtering. Comparing to BART, we show that the proposed method is more robust and converges faster than that of BART and achieves a more AB accurate estimation. Furthermore, we analyze the estimation error in MR-BART and obtain analytical formula and empirical expression for the AB estimation error based on the system parameters.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 17:43:50 GMT" } ]
2017-02-02T00:00:00
[ [ "Sedighizad", "Mahboobeh", "" ], [ "Seyfe", "Babak", "" ], [ "Navaie", "Keivan", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.2408
Makesh Pravin John Wilson
Makesh Pravin Wilson and Krishna Narayanan
Power Allocation Strategies and Lattice Based Coding schemes for Bi-directional relaying
5 pages, 4 figures and was presented at the International Symposium on Information Theory - ISIT 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a communication system where two transmitters wish to exchange information through a half-duplex relay in the middle. The channels between the transmitters and the relay have asymmetric channel gains. More specifically, the channels are assumed to be synchronized with complex inputs and complex fading coefficients with an average power constraint on the inputs to the channels. The noise at the receivers have the same power spectral density and are assumed to be white and Gaussian. We restrict our attention to transmission schemes where information from the two nodes are simultaneously sent to the relay during a medium access phase followed by a broadcast phase where the relay broadcasts information to both the nodes. An upper bound on the capacity for the two phase protocol under a sum power constraint on the transmit power from all the nodes is obtained as a solution to a convex optimization problem. We show that a scheme using channel inversion with lattice decoding can obtain a rate a small constant 0.09 bits from the upper bound at high signal-to-noise ratios. Numerical results show that the proposed scheme can perform very close to the upper bound.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 18:21:38 GMT" } ]
2009-08-18T00:00:00
[ [ "Wilson", "Makesh Pravin", "" ], [ "Narayanan", "Krishna", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2440
Greg Aloupis
Greg Aloupis, Sebastien Collette, Erik D. Demaine, Stefan Langerman, Vera Sacristan, Stefanie Wuhrer
Reconfiguration of 3D Crystalline Robots Using O(log n) Parallel Moves
21 pages, 10 figures
null
null
null
cs.CG cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the theoretical model of Crystalline robots, which have been introduced and prototyped by the robotics community. These robots consist of independently manipulable unit-square atoms that can extend/contract arms on each side and attach/detach from neighbors. These operations suffice to reconfigure between any two given (connected) shapes. The worst-case number of sequential moves required to transform one connected configuration to another is known to be Theta(n). However, in principle, atoms can all move simultaneously. We develop a parallel algorithm for reconfiguration that runs in only O(log n) parallel steps, although the total number of operations increases slightly to Theta(nlogn). The result is the first (theoretically) almost-instantaneous universally reconfigurable robot built from simple units.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 20:42:44 GMT" } ]
2009-08-19T00:00:00
[ [ "Aloupis", "Greg", "" ], [ "Collette", "Sebastien", "" ], [ "Demaine", "Erik D.", "" ], [ "Langerman", "Stefan", "" ], [ "Sacristan", "Vera", "" ], [ "Wuhrer", "Stefanie", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0908.2442
Greg Aloupis
Greg Aloupis, Jean Cardinal, Sebastien Collette, John Iacono, Stefan Langerman
Detecting all regular polygons in a point set
11 pages, 4 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we analyze the time complexity of finding regular polygons in a set of n points. We combine two different approaches to find regular polygons, depending on their number of edges. Our result depends on the parameter alpha, which has been used to bound the maximum number of isosceles triangles that can be formed by n points. This bound has been expressed as O(n^{2+2alpha+epsilon}), and the current best value for alpha is ~0.068. Our algorithm finds polygons with O(n^alpha) edges by sweeping a line through the set of points, while larger polygons are found by random sampling. We can find all regular polygons with high probability in O(n^{2+alpha+epsilon}) expected time for every positive epsilon. This compares well to the O(n^{2+2alpha+epsilon}) deterministic algorithm of Brass.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 21:01:45 GMT" } ]
2009-08-19T00:00:00
[ [ "Aloupis", "Greg", "" ], [ "Cardinal", "Jean", "" ], [ "Collette", "Sebastien", "" ], [ "Iacono", "John", "" ], [ "Langerman", "Stefan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.2462
Hyoungshick Kim
Ji Won Yoon, Hyoungshick Kim and Jun Ho Huh
Hybrid Spam Filtering for Mobile Communication
6 pages, 5 figures, 1 table
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spam messages are an increasing threat to mobile communication. Several mitigation techniques have been proposed, including white and black listing, challenge-response and content-based filtering. However, none are perfect and it makes sense to use a combination rather than just one. We propose an anti-spam framework based on the hybrid of content-based filtering and challenge-response. There is the trade-offs between accuracy of anti-spam classifiers and the communication overhead. Experimental results show how, depending on the proportion of spam messages, different filtering %%@ parameters should be set.
[ { "version": "v1", "created": "Mon, 17 Aug 2009 23:10:02 GMT" } ]
2009-08-19T00:00:00
[ [ "Yoon", "Ji Won", "" ], [ "Kim", "Hyoungshick", "" ], [ "Huh", "Jun Ho", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.2467
Joseph Koo
Joseph C. Koo, John Gill
Low-complexity non-uniform demand multicast network coding problems
8 pages, 3 figures, presented at 47th Allerton Conference on Communication Control and Computing, 2009. Includes more complete proof of Theorem 3
null
10.1109/ALLERTON.2009.5394805
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The non-uniform demand network coding problem is posed as a single-source and multiple-sink network transmission problem where the sinks may have heterogeneous demands. In contrast with multicast problems, non-uniform demand problems are concerned with the amounts of data received by each sink, rather than the specifics of the received data. In this work, we enumerate non-uniform network demand scenarios under which network coding solutions can be found in polynomial time. This is accomplished by relating the demand problem with the graph coloring problem, and then applying results from the strong perfect graph theorem to identify coloring problems which can be solved in polynomial time. This characterization of efficiently-solvable non-uniform demand problems is an important step in understanding such problems, as it allows us to better understand situations under which the NP-complete problem might be tractable.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 00:18:11 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2009 01:51:50 GMT" } ]
2010-01-27T00:00:00
[ [ "Koo", "Joseph C.", "" ], [ "Gill", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2468
Seiichiro Tani
Andris Ambainis, Kazuo Iwama, Masaki Nakanishi, Harumichi Nishimura, Rudy Raymond, Seiichiro Tani, Shigeru Yamashita
Average/Worst-Case Gap of Quantum Query Complexities by On-Set Size
19 pages
Computational Complexity, vol.25, Issue 4, pp.723--735, 2016 (entitled "Quantum Query Complexity of Almost All Functions with Fixed On-Set Size")
10.1007/s00037-016-0139-6
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers the query complexity of the functions in the family F_{N,M} of N-variable Boolean functions with onset size M, i.e., the number of inputs for which the function value is 1, where 1<= M <= 2^{N}/2 is assumed without loss of generality because of the symmetry of function values, 0 and 1. Our main results are as follows: (1) There is a super-linear gap between the average-case and worst-case quantum query complexities over F_{N,M} for a certain range of M. (2) There is no super-linear gap between the average-case and worst-case randomized query complexities over F_{N,M} for every M. (3) For every M bounded by a polynomial in N, any function in F_{N,M} has quantum query complexity Theta (sqrt{N}). (4) For every M=O(2^{cN}) with an arbitrary large constant c<1, any function in F_{N,M} has randomized query complexity Omega (N).
[ { "version": "v1", "created": "Tue, 18 Aug 2009 00:13:44 GMT" } ]
2020-06-24T00:00:00
[ [ "Ambainis", "Andris", "" ], [ "Iwama", "Kazuo", "" ], [ "Nakanishi", "Masaki", "" ], [ "Nishimura", "Harumichi", "" ], [ "Raymond", "Rudy", "" ], [ "Tani", "Seiichiro", "" ], [ "Yamashita", "Shigeru", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.2476
Yunlei Zhao
Andrew C. Yao, Moti Yung, Yunlei Zhao
Concurrent Knowledge-Extraction in the Public-Key Model
38 pages, 4 figures
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Knowledge extraction is a fundamental notion, modelling machine possession of values (witnesses) in a computational complexity sense. The notion provides an essential tool for cryptographic protocol design and analysis, enabling one to argue about the internal state of protocol players without ever looking at this supposedly secret state. However, when transactions are concurrent (e.g., over the Internet) with players possessing public-keys (as is common in cryptography), assuring that entities ``know'' what they claim to know, where adversaries may be well coordinated across different transactions, turns out to be much more subtle and in need of re-examination. Here, we investigate how to formally treat knowledge possession by parties (with registered public-keys) interacting over the Internet. Stated more technically, we look into the relative power of the notion of ``concurrent knowledge-extraction'' (CKE) in the concurrent zero-knowledge (CZK) bare public-key (BPK) model.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 01:43:21 GMT" } ]
2009-08-19T00:00:00
[ [ "Yao", "Andrew C.", "" ], [ "Yung", "Moti", "" ], [ "Zhao", "Yunlei", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.2493
Greg Aloupis
Greg Aloupis, Erik D. Demaine, Martin L. Demaine, Vida Dujmovic, John Iacono
Minimum feature size preserving decompositions
12 pages, 4 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimum feature size of a crossing-free straight line drawing is the minimum distance between a vertex and a non-incident edge. This quantity measures the resolution needed to display a figure or the tool size needed to mill the figure. The spread is the ratio of the diameter to the minimum feature size. While many algorithms (particularly in meshing) depend on the spread of the input, none explicitly consider finding a mesh whose spread is similar to the input. When a polygon is partitioned into smaller regions, such as triangles or quadrangles, the degradation is the ratio of original to final spread (the final spread is always greater). Here we present an algorithm to quadrangulate a simple n-gon, while achieving constant degradation. Note that although all faces have a quadrangular shape, the number of edges bounding each face may be larger. This method uses Theta(n) Steiner points and produces Theta(n) quadrangles. In fact to obtain constant degradation, Omega(n) Steiner points are required by any algorithm. We also show that, for some polygons, a constant factor cannot be achieved by any triangulation, even with an unbounded number of Steiner points. The specific lower bounds depend on whether Steiner vertices are used or not.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 06:10:19 GMT" } ]
2009-08-19T00:00:00
[ [ "Aloupis", "Greg", "" ], [ "Demaine", "Erik D.", "" ], [ "Demaine", "Martin L.", "" ], [ "Dujmovic", "Vida", "" ], [ "Iacono", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.2494
Bikash Kumar Dey
S. T. Aditya, Onkar Dabeer, Bikash Kumar Dey
A Channel Coding Perspective of Collaborative Filtering
32 pages, 1 figure, Submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2111190
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of collaborative filtering from a channel coding perspective. We model the underlying rating matrix as a finite alphabet matrix with block constant structure. The observations are obtained from this underlying matrix through a discrete memoryless channel with a noisy part representing noisy user behavior and an erasure part representing missing data. Moreover, the clusters over which the underlying matrix is constant are {\it unknown}. We establish a sharp threshold result for this model: if the largest cluster size is smaller than $C_1 \log(mn)$ (where the rating matrix is of size $m \times n$), then the underlying matrix cannot be recovered with any estimator, but if the smallest cluster size is larger than $C_2 \log(mn)$, then we show a polynomial time estimator with diminishing probability of error. In the case of uniform cluster size, not only the order of the threshold, but also the constant is identified.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 06:24:17 GMT" } ]
2016-11-17T00:00:00
[ [ "Aditya", "S. T.", "" ], [ "Dabeer", "Onkar", "" ], [ "Dey", "Bikash Kumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2496
Chengqing Li
Chengqing Li, Shujun Li, Kowk-Tung Lo and Kyandoghere Kyamakya
A Differential Cryptanalysis of Yen-Chen-Wu Multimedia Cryptography System (MCS)
22 pages, 5 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At ISCAS'2005, Yen et al. presented a new chaos-based cryptosystem for multimedia transmission named "Multimedia Cryptography System" (MCS). No cryptanalytic results have been reported so far. This paper presents a differential attack to break MCS, which requires only seven chosen plaintexts. The complexity of the attack is O(N), where $N$ is the size of plaintext. Experimental results are also given to show the real performance of the proposed attack.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 07:02:14 GMT" } ]
2009-08-19T00:00:00
[ [ "Li", "Chengqing", "" ], [ "Li", "Shujun", "" ], [ "Lo", "Kowk-Tung", "" ], [ "Kyamakya", "Kyandoghere", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.2505
Camilla Hollanti
Jyrki Lahtonen, Roope Vehkalahti, Hsiao-feng Lu, Camilla Hollanti, and Emanuele Viterbo
On the Decay of the Determinants of Multiuser MIMO Lattice Codes
5 pages, submitted to ITW 2010, Cairo, Egypt
null
null
null
cs.IT cs.DM math.IT math.RA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a recent work, Coronel et al. initiated the study of the relation between the diversity-multiplexing tradeoff (DMT) performance of a multiuser multiple-input multiple-output (MU-MIMO) lattice code and the rate of the decay of the determinants of the code matrix as a function of the size of the signal constellation. In this note, we state a simple general upper bound on the decay function and study the promising code proposed by Badr and Belfiore in close detail. We derive a lower bound to its decay function based on a classical theorem due to Liouville. The resulting bound is applicable also to other codes with constructions based on algebraic number theory. Further, we study an example sequence of small determinants within the Badr-Belfiore code and derive a tighter upper bound to its decay function. The upper bound has certain conjectural asymptotic uncertainties, whence we also list the exact bound for several finite data rates.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 07:45:28 GMT" } ]
2009-08-19T00:00:00
[ [ "Lahtonen", "Jyrki", "" ], [ "Vehkalahti", "Roope", "" ], [ "Lu", "Hsiao-feng", "" ], [ "Hollanti", "Camilla", "" ], [ "Viterbo", "Emanuele", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0908.2506
Bob Diertens
B. Diertens
Software Engineering with Process Algebra: Modelling Client / Server Architectures
null
null
null
PRG0908
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In previous work we described how the process algebra based language PSF can be used in software engineering, using the ToolBus, a coordination architecture also based on process algebra, as implementation model. We also described this software development process more formally by presenting the tools we use in this process in a CASE setting, leading to the PSF-ToolBus software engineering environment. In this article we summarize that work and describe a similar software development process for implementation of software systems using a client / server model and present this in a CASE setting as well.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 07:29:27 GMT" } ]
2009-08-19T00:00:00
[ [ "Diertens", "B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.2509
Mounita Saha
Mounita Saha, Dipanwita Roy Chowdhury
A Secure and Efficient Protocol for Group Key agreement in Heterogeneous Environment
9 pages, 3 figures, Conference paper in Secrypt 2009
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure group communication in heterogeneous environment is gaining popularity due to the advent of wireless and ubiquitous computing. Although a number of protocols for group key agreement have been proposed, most of them are not applicable in heterogeneous environment where a number of computationally limited nodes coexist with one or more computationally efficient nodes. Among the few existing protocols, where some fail to satisfy the key agreement properties, some are unable to handle the agreement for dynamic group. In this work, we propose a constant round group key agreement protocol for heterogeneous environment using polynomial interpolation. The protocol ensures both communication and computation efficiency by shifting the major computation load on powerful users, achieves true contributory key agreement property and dynamic handling of user join and leave. The security of the protocol has been analyzed under formal model. The comparison result shows considerable improvement in protocol efficiency compared to the existing ones.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 07:34:17 GMT" } ]
2009-08-19T00:00:00
[ [ "Saha", "Mounita", "" ], [ "Chowdhury", "Dipanwita Roy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.2529
Shunqing Zhang
Shunqing Zhang, Tianyu Wu, and Vincent K. N. Lau
A Low-Overhead Energy Detection Based Cooperative Sensing Protocol for Cognitive Radio Systems
11 pages, 8 figures, journal. To appear in IEEE Transactions on Wireless Communications
null
10.1109/TWC.2009.081106
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive radio and dynamic spectrum access represent a new paradigm shift in more effective use of limited radio spectrum. One core component behind dynamic spectrum access is the sensing of primary user activity in the shared spectrum. Conventional distributed sensing and centralized decision framework involving multiple sensor nodes is proposed to enhance the sensing performance. However, it is difficult to apply the conventional schemes in reality since the overhead in sensing measurement and sensing reporting as well as in sensing report combining limit the number of sensor nodes that can participate in distributive sensing. In this paper, we shall propose a novel, low overhead and low complexity energy detection based cooperative sensing framework for the cognitive radio systems which addresses the above two issues. The energy detection based cooperative sensing scheme greatly reduces the quiet period overhead (for sensing measurement) as well as sensing reporting overhead of the secondary systems and the power scheduling algorithm dynamically allocate the transmission power of the cooperative sensor nodes based on the channel statistics of the links to the BS as well as the quality of the sensing measurement. In order to obtain design insights, we also derive the asymptotic sensing performance of the proposed cooperative sensing framework based on the mobility model. We show that the false alarm and mis-detection performance of the proposed cooperative sensing framework improve as we increase the number of cooperative sensor nodes.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 09:36:54 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhang", "Shunqing", "" ], [ "Wu", "Tianyu", "" ], [ "Lau", "Vincent K. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2542
Anastasios Giovanidis
Anastasios Giovanidis and Slawomir Stanczak
Stability and Distributed Power Control in MANETs with Outages and Retransmissions
25 pages, 6 figures, 1 table, submitted to the IEEE Trans. on Communications
IEEE Transactions on Communications (Volume:59 , Issue: 6 ), pp. 1632 - 1643, June 2011
10.1109/TCOMM.2011.042111.090486
null
cs.NI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the current work the effects of hop-by-hop packet loss and retransmissions via ARQ protocols are investigated within a Mobile Ad-hoc NET-work (MANET). Errors occur due to outages and a success probability function is related to each link, which can be controlled by power and rate allocation. We first derive the expression for the network's capacity region, where the success function plays a critical role. Properties of the latter as well as the related maximum goodput function are presented and proved. A Network Utility Maximization problem (NUM) with stability constraints is further formulated which decomposes into (a) the input rate control problem and (b) the scheduling problem. Under certain assumptions problem (b) is relaxed to a weighted sum maximization problem with number of summants equal to the number of nodes. This further allows the formulation of a non-cooperative game where each node decides independently over its transmitting power through a chosen link. Use of supermodular game theory suggests a price based algorithm that converges to a power allocation satisfying the necessary optimality conditions of (b). Implementation issues are considered so that minimum information exchange between interfering nodes is required. Simulations illustrate that the suggested algorithm brings near optimal results.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 11:08:01 GMT" } ]
2013-12-03T00:00:00
[ [ "Giovanidis", "Anastasios", "" ], [ "Stanczak", "Slawomir", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0908.2578
Alain Gerard
Claudiu-Florinel Bisu (MPS), Jean-Yves K'Nevez (LMP), Philippe Darnis (LGM2B), Raynald Laheurte (LMP), Alain G\'erard (LMP)
New method to characterize a machining system: application in turning
null
Int. J. of Mat. Form. 2, 2 (2009) 93-105
10.1007/s12289-009-0395-y
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many studies simulates the machining process by using a single degree of freedom spring-mass sytem to model the tool stiffness, or the workpiece stiffness, or the unit tool-workpiece stiffness in modelings 2D. Others impose the tool action, or use more or less complex modelings of the efforts applied by the tool taking account the tool geometry. Thus, all these models remain two-dimensional or sometimes partially three-dimensional. This paper aims at developing an experimental method allowing to determine accurately the real three-dimensional behaviour of a machining system (machine tool, cutting tool, tool-holder and associated system of force metrology six-component dynamometer). In the work-space model of machining, a new experimental procedure is implemented to determine the machining system elastic behaviour. An experimental study of machining system is presented. We propose a machining system static characterization. A decomposition in two distinct blocks of the system "Workpiece-Tool-Machine" is realized. The block Tool and the block Workpiece are studied and characterized separately by matrix stiffness and displacement (three translations and three rotations). The Castigliano's theory allows us to calculate the total stiffness matrix and the total displacement matrix. A stiffness center point and a plan of tool tip static displacement are presented in agreement with the turning machining dynamic model and especially during the self induced vibration. These results are necessary to have a good three-dimensional machining system dynamic characterization.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 14:29:42 GMT" } ]
2009-08-19T00:00:00
[ [ "Bisu", "Claudiu-Florinel", "", "MPS" ], [ "K'Nevez", "Jean-Yves", "", "LMP" ], [ "Darnis", "Philippe", "", "LGM2B" ], [ "Laheurte", "Raynald", "", "LMP" ], [ "Gérard", "Alain", "", "LMP" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0908.2588
Davood Rafiei
Davood Rafiei, Haobin Li
Wild Card Queries for Searching Resources on the Web
11 pages
null
null
null
cs.DB cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a domain-independent framework for searching and retrieving facts and relationships within natural language text sources. In this framework, an extraction task over a text collection is expressed as a query that combines text fragments with wild cards, and the query result is a set of facts in the form of unary, binary and general $n$-ary tuples. A significance of our querying mechanism is that, despite being both simple and declarative, it can be applied to a wide range of extraction tasks. A problem in querying natural language text though is that a user-specified query may not retrieve enough exact matches. Unlike term queries which can be relaxed by removing some of the terms (as is done in search engines), removing terms from a wild card query without ruining its meaning is more challenging. Also, any query expansion has the potential to introduce false positives. In this paper, we address the problem of query expansion, and also analyze a few ranking alternatives to score the results and to remove false positives. We conduct experiments and report an evaluation of the effectiveness of our querying and scoring functions.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 15:17:19 GMT" } ]
2009-08-19T00:00:00
[ [ "Rafiei", "Davood", "" ], [ "Li", "Haobin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.2615
Wu Zhi-Xi
Zhi-Xi Wu and Petter Holme
Modeling scientific-citation patterns and other triangle-rich acyclic networks
4 pages, 4 figures
Phys.Rev.E 80, 037101 (2009).
10.1103/PhysRevE.80.037101
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a model of the evolution of the networks of scientific citations. The model takes an out-degree distribution (distribution of number of citations) and two parameters as input. The parameters capture the two main ingredients of the model, the aging of the relevance of papers and the formation of triangles when new papers cite old. We compare our model with three network structural quantities of an empirical citation network. We find that an unique point in parameter space optimizing the match between the real and model data for all quantities. The optimal parameter values suggest that the impact of scientific papers, at least in the empirical data set we model is proportional to the inverse of the number of papers since they were published.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 19:25:45 GMT" } ]
2009-09-15T00:00:00
[ [ "Wu", "Zhi-Xi", "" ], [ "Holme", "Petter", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0908.2644
Marvin Weinstein
Marvin Weinstein, David Horn
Dynamic quantum clustering: a method for visual exploration of structures in data
15 pages, 9 figures
Phys.Rev.E80:066117,2009
10.1103/PhysRevE.80.066117
SLAC-PUB-13759
physics.data-an cs.DS hep-ex physics.comp-ph stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A given set of data-points in some feature space may be associated with a Schrodinger equation whose potential is determined by the data. This is known to lead to good clustering solutions. Here we extend this approach into a full-fledged dynamical scheme using a time-dependent Schrodinger equation. Moreover, we approximate this Hamiltonian formalism by a truncated calculation within a set of Gaussian wave functions (coherent states) centered around the original points. This allows for analytic evaluation of the time evolution of all such states, opening up the possibility of exploration of relationships among data-points through observation of varying dynamical-distances among points and convergence of points into clusters. This formalism may be further supplemented by preprocessing, such as dimensional reduction through singular value decomposition or feature filtering.
[ { "version": "v1", "created": "Tue, 18 Aug 2009 21:40:03 GMT" } ]
2010-02-16T00:00:00
[ [ "Weinstein", "Marvin", "" ], [ "Horn", "David", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Physics", "code": "hep-ex", "description": "Description coming soon", "span": "(High Energy Physics - Experiment)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0908.2656
Pooyan Fazli
Scott Helmer, David Meger, Pooja Viswanathan, Sancho McCann, Matthew Dockrey, Pooyan Fazli, Tristram Southey, Marius Muja, Michael Joya, Jim Little, David Lowe, Alan Mackworth
Semantic Robot Vision Challenge: Current State and Future Directions
The IJCAI-09 Workshop on Competitions in Artificial Intelligence and Robotics, Pasadena, California, USA, July 11-17, 2009
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Semantic Robot Vision Competition provided an excellent opportunity for our research lab to integrate our many ideas under one umbrella, inspiring both collaboration and new research. The task, visual search for an unknown object, is relevant to both the vision and robotics communities. Moreover, since the interplay of robotics and vision is sometimes ignored, the competition provides a venue to integrate two communities. In this paper, we outline a number of modifications to the competition to both improve the state-of-the-art and increase participation.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 02:13:27 GMT" } ]
2009-08-20T00:00:00
[ [ "Helmer", "Scott", "" ], [ "Meger", "David", "" ], [ "Viswanathan", "Pooja", "" ], [ "McCann", "Sancho", "" ], [ "Dockrey", "Matthew", "" ], [ "Fazli", "Pooyan", "" ], [ "Southey", "Tristram", "" ], [ "Muja", "Marius", "" ], [ "Joya", "Michael", "" ], [ "Little", "Jim", "" ], [ "Lowe", "David", "" ], [ "Mackworth", "Alan", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0908.2661
Pooyan Fazli
Pooyan Fazli, Alan K. Mackworth
Human-Robot Teams in Entertainment and Other Everyday Scenarios
null
null
null
null
cs.MA cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new and relatively unexplored research direction in robotics systems is the coordination of humans and robots working as a team. In this paper, we focus upon problem domains and tasks in which multiple robots, humans and other agents are cooperating through coordination to satisfy a set of goals or to maximize utility. We are primarily interested in applications of human robot coordination in entertainment and other activities of daily life. We discuss the teamwork problem and propose an architecture to address this.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 02:29:28 GMT" } ]
2009-08-20T00:00:00
[ [ "Fazli", "Pooyan", "" ], [ "Mackworth", "Alan K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.2676
Arash Amini
Arash Amini and Farokh Marvasti
Deterministic Construction of Binary, Bipolar and Ternary Compressed Sensing Matrices
The paper is accepted for publication in IEEE Transaction on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we establish the connection between the Orthogonal Optical Codes (OOC) and binary compressed sensing matrices. We also introduce deterministic bipolar $m\times n$ RIP fulfilling $\pm 1$ matrices of order $k$ such that $m\leq\mathcal{O}\big(k (\log_2 n)^{\frac{\log_2 k}{\ln \log_2 k}}\big)$. The columns of these matrices are binary BCH code vectors where the zeros are replaced by -1. Since the RIP is established by means of coherence, the simple greedy algorithms such as Matching Pursuit are able to recover the sparse solution from the noiseless samples. Due to the cyclic property of the BCH codes, we show that the FFT algorithm can be employed in the reconstruction methods to considerably reduce the computational complexity. In addition, we combine the binary and bipolar matrices to form ternary sensing matrices ($\{0,1,-1\}$ elements) that satisfy the RIP condition.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 04:25:56 GMT" }, { "version": "v2", "created": "Sat, 2 Oct 2010 18:03:53 GMT" } ]
2015-03-13T00:00:00
[ [ "Amini", "Arash", "" ], [ "Marvasti", "Farokh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2681
Didier Sornette
A. Saichev and D. Sornette
Effects of Diversity and Procrastination in Priority Queuing Theory: the Different Power Law Regimes
32 pages, 10 figures
Physical Review E 81, 016108 (2009)
10.1103/PhysRevE.81.016108
null
physics.soc-ph cs.PF physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Empirical analysis show that, after the update of a browser, the publication of the vulnerability of a software, or the discovery of a cyber worm, the fraction of computers still using the older version, or being not yet patched, or exhibiting worm activity decays as power laws $\sim 1/t^{\alpha}$ with $0 < \alpha \leq 1$ over time scales of years. We present a simple model for this persistence phenomenon framed within the standard priority queuing theory, of a target task which has the lowest priority compared with all other tasks that flow on the computer of an individual. We identify a "time deficit" control parameter $\beta$ and a bifurcation to a regime where there is a non-zero probability for the target task to never be completed. The distribution of waiting time ${\cal T}$ till the completion of the target task has the power law tail $\sim 1/t^{1/2}$, resulting from a first-passage solution of an equivalent Wiener process. Taking into account a diversity of time deficit parameters in a population of individuals, the power law tail is changed into $1/t^\alpha$ with $\alpha\in(0.5,\infty)$, including the well-known case $1/t$. We also study the effect of "procrastination", defined as the situation in which the target task may be postponed or delayed even after the individual has solved all other pending tasks. This new regime provides an explanation for even slower apparent decay and longer persistence.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 07:00:12 GMT" } ]
2015-05-13T00:00:00
[ [ "Saichev", "A.", "" ], [ "Sornette", "D.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0908.2707
Edward Hirsch
Edward A. Hirsch and Dmitry Itsykson
On optimal heuristic randomized semidecision procedures, with application to proof complexity
11 pages, accepted to STACS 2010
null
null
null
cs.CC cs.LO
http://creativecommons.org/licenses/by/3.0/
The existence of a (p-)optimal propositional proof system is a major open question in (proof) complexity; many people conjecture that such systems do not exist. Krajicek and Pudlak (1989) show that this question is equivalent to the existence of an algorithm that is optimal on all propositional tautologies. Monroe (2009) recently gave a conjecture implying that such algorithm does not exist. We show that in the presence of errors such optimal algorithms do exist. The concept is motivated by the notion of heuristic algorithms. Namely, we allow the algorithm to claim a small number of false "theorems" (according to any samplable distribution on non-tautologies) and err with bounded probability on other inputs. Our result can also be viewed as the existence of an optimal proof system in a class of proof systems obtained by generalizing automatizable proof systems.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 09:18:25 GMT" }, { "version": "v2", "created": "Mon, 4 Jan 2010 20:14:38 GMT" }, { "version": "v3", "created": "Wed, 3 Feb 2010 12:25:24 GMT" } ]
2010-02-03T00:00:00
[ [ "Hirsch", "Edward A.", "" ], [ "Itsykson", "Dmitry", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0908.2721
Luca Muscariello
Giovanna Carofiglio and Luca Muscariello
On the impact of TCP and per-flow scheduling on Internet performance (extended version)
26 pages, 5 figures, shorter version submitted to INFOCOM 2010
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Internet performance is tightly related to the properties of TCP and UDP protocols, jointly responsible for the delivery of the great majority of Internet traffic. It is well understood how these protocols behave under FIFO queuing and what the network congestion effects. However, no comprehensive analysis is available when flow-aware mechanisms such as per-flow scheduling and dropping policies are deployed. Previous simulation and experimental results leave a number of unanswered questions. In the paper, we tackle this issue by modeling via a set of fluid non-linear ODEs the instantaneous throughput and the buffer occupancy of N long-lived TCP sources under three per-flow scheduling disciplines (Fair Queuing, Longest Queue First, Shortest Queue First) and with longest queue drop buffer management. We study the system evolution and analytically characterize the stationary regime: closed-form expressions are derived for the stationary throughput/sending rate and buffer occupancy which give thorough understanding of short/long-term fairness for TCP traffic. Similarly, we provide the characterization of the loss rate experienced by UDP flows in presence of TCP traffic.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 10:15:28 GMT" }, { "version": "v2", "created": "Fri, 23 Oct 2009 19:47:54 GMT" } ]
2009-10-23T00:00:00
[ [ "Carofiglio", "Giovanna", "" ], [ "Muscariello", "Luca", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.2741
Marcel Blattner
Marcel Blattner
B-Rank: A top N Recommendation Algorithm
6 pages, 1 figure
Proceedings of International Multi-Conference on Complexity, Informatics and Cybernetics, 2010, Volume 1, pp. 336-341
null
null
physics.data-an cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper B-Rank, an efficient ranking algorithm for recommender systems, is proposed. B-Rank is based on a random walk model on hypergraphs. Depending on the setup, B-Rank outperforms other state of the art algorithms in terms of precision, recall (19% - 50%), and inter list diversity (20% - 60%). B-Rank captures well the difference between popular and niche objects. The proposed algorithm produces very promising results for sparse and dense voting matrices. Furthermore, a recommendation list update algorithm is introduced,to cope with new votes. This technique significantly reduces computational complexity. The implementation of the algorithm is simple, since B-Rank needs no parameter tuning.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 12:53:33 GMT" }, { "version": "v2", "created": "Mon, 23 Nov 2009 10:19:55 GMT" }, { "version": "v3", "created": "Mon, 30 Apr 2012 11:00:21 GMT" } ]
2012-05-01T00:00:00
[ [ "Blattner", "Marcel", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.2744
Manish Gupta
Anshul Chaurasia, Sudhanshu Dwivedi, Prateek Jain and Manish K. Gupta
XTile: An Error-Correction Package for DNA Self-Assembly
5 pages, FNANO 2009 conference paper, The tool XTile is available for download and use at http://www.guptalab.org/xtile
Proceedings of 6th Annual Conference on Foundations of Nanoscience (FNANO 09): Self-Assembled Architectures and Devices, Salt Lake City, Utah, U.S.A., 20th-24th April 2009, pp. 225 - 229
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Self assembly is a process by which supramolecular species form spontaneously from their components. This process is ubiquitous throughout the life chemistry and is central to biological information processing. It has been predicted that in future self assembly will become an important engineering discipline by combining the fields of bio molecular computation, nano technology and medicine. However error control is a key challenge in realizing the potential of self assembly. Recently many authors have proposed several combinatorial error correction schemes to control errors which have a close analogy with the coding theory such as Winfree s proofreading scheme and its generalizations by Chen and Goel and compact scheme of Reif, Sahu and Yin. In this work, we present an error correction computational tool XTile that can be used to create input files to the Xgrow simulator of Winfree by providing the design logic of the tiles and it also allows the user to apply proofreading, snake and compact error correction schemes.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 13:02:57 GMT" } ]
2009-08-20T00:00:00
[ [ "Chaurasia", "Anshul", "" ], [ "Dwivedi", "Sudhanshu", "" ], [ "Jain", "Prateek", "" ], [ "Gupta", "Manish K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2782
J\'er\'emie Roland
Boris Altshuler, Hari Krovi and Jeremie Roland
Adiabatic quantum optimization fails for random instances of NP-complete problems
34 pages, 5 color figures. Significant changes compared to v1, including a new section about Anderson Localization
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Adiabatic quantum optimization has attracted a lot of attention because small scale simulations gave hope that it would allow to solve NP-complete problems efficiently. Later, negative results proved the existence of specifically designed hard instances where adiabatic optimization requires exponential time. In spite of this, there was still hope that this would not happen for random instances of NP-complete problems. This is an important issue since random instances are a good model for hard instances that can not be solved by current classical solvers, for which an efficient quantum algorithm would therefore be desirable. Here, we will show that because of a phenomenon similar to Anderson localization, an exponentially small eigenvalue gap appears in the spectrum of the adiabatic Hamiltonian for large random instances, very close to the end of the algorithm. This implies that unfortunately, adiabatic quantum optimization also fails for these instances by getting stuck in a local minimum, unless the computation is exponentially long.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 19:47:58 GMT" }, { "version": "v2", "created": "Tue, 1 Dec 2009 22:29:18 GMT" } ]
2009-12-02T00:00:00
[ [ "Altshuler", "Boris", "" ], [ "Krovi", "Hari", "" ], [ "Roland", "Jeremie", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.2793
Dexter Kozen
Dexter Kozen, Nicholas Ruozzi
Applications of Metric Coinduction
null
Logical Methods in Computer Science, Volume 5, Issue 3 (September 16, 2009) lmcs:1168
10.2168/LMCS-5(3:10)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Metric coinduction is a form of coinduction that can be used to establish properties of objects constructed as a limit of finite approximations. One can prove a coinduction step showing that some property is preserved by one step of the approximation process, then automatically infer by the coinduction principle that the property holds of the limit object. This can often be used to avoid complicated analytic arguments involving limits and convergence, replacing them with simpler algebraic arguments. This paper examines the application of this principle in a variety of areas, including infinite streams, Markov chains, Markov decision processes, and non-well-founded sets. These results point to the usefulness of coinduction as a general proof technique.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 17:59:03 GMT" }, { "version": "v2", "created": "Wed, 16 Sep 2009 15:14:20 GMT" } ]
2015-07-01T00:00:00
[ [ "Kozen", "Dexter", "" ], [ "Ruozzi", "Nicholas", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0908.2828
Phong Nguyen
Phong S. Nguyen, Henry D. Pfister, Krishna R. Narayanan
A Rate-Distortion Perspective on Multiple Decoding Attempts for Reed-Solomon Codes
10 pages, 3 figures, accepted to Allerton Conference on Communication Control and Computing, 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, a number of authors have proposed decoding schemes for Reed-Solomon (RS) codes based on multiple trials of a simple RS decoding algorithm. In this paper, we present a rate-distortion (R-D) approach to analyze these multiple-decoding algorithms for RS codes. This approach is first used to understand the asymptotic performance-versus-complexity trade-off of multiple error-and-erasure decoding of RS codes. By defining an appropriate distortion measure between an error pattern and an erasure pattern, the condition for a single error-and-erasure decoding to succeed reduces to a form where the distortion is compared to a fixed threshold. Finding the best set of erasure patterns for multiple decoding trials then turns out to be a covering problem which can be solved asymptotically by rate-distortion theory. Next, this approach is extended to analyze multiple algebraic soft-decision (ASD) decoding of RS codes. Both analytical and numerical computations of the R-D functions for the corresponding distortion measures are discussed. Simulation results show that proposed algorithms using this approach perform better than other algorithms with the same complexity.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 23:09:09 GMT" } ]
2009-08-21T00:00:00
[ [ "Nguyen", "Phong S.", "" ], [ "Pfister", "Henry D.", "" ], [ "Narayanan", "Krishna R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2834
Benjamin Birnbaum
Yossi Azar, Benjamin Birnbaum, Anna R. Karlin, C. Thach Nguyen
On Revenue Maximization in Second-Price Ad Auctions
Full version of ESA 2009 paper, 23 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most recent papers addressing the algorithmic problem of allocating advertisement space for keywords in sponsored search auctions assume that pricing is done via a first-price auction, which does not realistically model the Generalized Second Price (GSP) auction used in practice. Towards the goal of more realistically modeling these auctions, we introduce the Second-Price Ad Auctions problem, in which bidders' payments are determined by the GSP mechanism. We show that the complexity of the Second-Price Ad Auctions problem is quite different than that of the more studied First-Price Ad Auctions problem. First, unlike the first-price variant, for which small constant-factor approximations are known, it is NP-hard to approximate the Second-Price Ad Auctions problem to any non-trivial factor. Second, this discrepancy extends even to the 0-1 special case that we call the Second-Price Matching problem (2PM). In particular, offline 2PM is APX-hard, and for online 2PM there is no deterministic algorithm achieving a non-trivial competitive ratio and no randomized algorithm achieving a competitive ratio better than 2. This stands in contrast to the results for the analogous special case in the first-price model, the standard bipartite matching problem, which is solvable in polynomial time and which has deterministic and randomized online algorithms achieving better competitive ratios. On the positive side, we provide a 2-approximation for offline 2PM and a 5.083-competitive randomized algorithm for online 2PM. The latter result makes use of a new generalization of a classic result on the performance of the "Ranking" algorithm for online bipartite matching.
[ { "version": "v1", "created": "Wed, 19 Aug 2009 23:46:02 GMT" } ]
2009-08-21T00:00:00
[ [ "Azar", "Yossi", "" ], [ "Birnbaum", "Benjamin", "" ], [ "Karlin", "Anna R.", "" ], [ "Nguyen", "C. Thach", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.2847
Aditya Ramamoorthy
Aditya Ramamoorthy and Richard D. Wesel
The Single Source Two Terminal Network with Network Coding
4 pages, appeared at the Canadian Workshop on Information Theory (CWIT), 2005
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a communication network with a single source that has a set of messages and two terminals where each terminal is interested in an arbitrary subset of messages at the source. A tight capacity region for this problem is demonstrated. We show by a simple graph-theoretic procedure that any such problem can be solved by performing network coding on the subset of messages that are requested by both the terminals and that routing is sufficient for transferring the remaining messages.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 03:17:19 GMT" } ]
2009-08-21T00:00:00
[ [ "Ramamoorthy", "Aditya", "" ], [ "Wesel", "Richard D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2871
Bela Genge
Bela Genge, Piroska Haller, Iosif Ignat, Ovidiu Ratoi
Informal specification-based performance evaluation of security protocols
4th IEEE International Conference on Intelligent Computer Communication and Processing, Cluj-Napoca, Romania, pp. 193-200, Aug. 2008, ISBN 978-1-4244-2673-7
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a performance evaluation method for security protocols. Based on the informal specification, we construct a canonical model which includes, alongside protocol messages, cryptographic operations performed by participants in the process of message construction. Each cryptographic operation is assigned a cost modeled as a function of the size of processed message components. We model not only the size of regular message components but also the size of ciphertext produced by various cryptographic operations. We illustrate the applicability of our method by comparatively analyzing the performance of the original CCITT X.509 protocol and a slightly modified version of the same protocol.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 08:04:14 GMT" } ]
2009-08-21T00:00:00
[ [ "Genge", "Bela", "" ], [ "Haller", "Piroska", "" ], [ "Ignat", "Iosif", "" ], [ "Ratoi", "Ovidiu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.2905
Amitabh Saxena
Octavian Catrina and Amitabh Saxena and Sebastiaan J Hoogh
Secure Linear Programming Using Privacy-Preserving Simplex
The current version is withdrawn due to a error. An older version of the paper is available on this archive. Please contact the author(s) for an updated copy
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This version of the paper has been withdrawn due to an error. Please contact one of the authors for an updated copy.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 11:20:01 GMT" }, { "version": "v2", "created": "Wed, 26 Aug 2009 10:16:08 GMT" }, { "version": "v3", "created": "Mon, 18 Jan 2010 03:01:47 GMT" } ]
2010-01-18T00:00:00
[ [ "Catrina", "Octavian", "" ], [ "Saxena", "Amitabh", "" ], [ "Hoogh", "Sebastiaan J", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.2940
Hartmut Klauck
Hartmut Klauck
A Strong Direct Product Theorem for Disjointness
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A strong direct product theorem states that if we want to compute $k$ independent instances of a function, using less than $k$ times the resources needed for one instance, then the overall success probability will be exponentially small in $k$. We establish such a theorem for the randomized communication complexity of the Disjointness problem, i.e., with communication $const\cdot kn$ the success probability of solving $k$ instances of size $n$ can only be exponentially small in $k$. We show that this bound even holds for $AM$ communication protocols with limited ambiguity. This also implies a new lower bound for Disjointness in a restricted 3-player NOF protocol, and optimal communication-space tradeoffs for Boolean matrix product. Our main result follows from a solution to the dual of a linear programming problem, whose feasibility comes from a so-called Intersection Sampling Lemma that generalizes a result by Razborov.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 14:59:24 GMT" }, { "version": "v2", "created": "Fri, 6 Nov 2009 11:03:53 GMT" }, { "version": "v3", "created": "Fri, 9 Apr 2010 08:13:39 GMT" } ]
2010-04-12T00:00:00
[ [ "Klauck", "Hartmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.2941
Huang Huang
Huang Huang and Vincent K. N. Lau
Delay-Sensitive Distributed Power and Transmission Threshold Control for S-ALOHA Network with Finite State Markov Fading Channels
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the delay-sensitive power and transmission threshold control design in S-ALOHA network with FSMC fading channels. The random access system consists of an access point with K competing users, each has access to the local channel state information (CSI) and queue state information (QSI) as well as the common feedback (ACK/NAK/Collision) from the access point. We seek to derive the delay-optimal control policy (composed of threshold and power control). The optimization problem belongs to the memoryless policy K-agent infinite horizon decentralized Markov decision process (DEC-MDP), and finding the optimal policy is shown to be computationally intractable. To obtain a feasible and low complexity solution, we recast the optimization problem into two subproblems, namely the power control and the threshold control problem. For a given threshold control policy, the power control problem is decomposed into a reduced state MDP for single user so that the overall complexity is O(NJ), where N and J are the buffer size and the cardinality of the CSI states. For the threshold control problem, we exploit some special structure of the collision channel and common feedback information to derive a low complexity solution. The delay performance of the proposed design is shown to have substantial gain relative to conventional throughput optimal approaches for S-ALOHA.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 15:17:15 GMT" } ]
2009-08-21T00:00:00
[ [ "Huang", "Huang", "" ], [ "Lau", "Vincent K. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.2958
Que Thu Dung Nguyen
Que Thu Dung Nguyen
Design and Implementation of a Distributed Middleware for Parallel Execution of Legacy Enterprise Applications
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A typical enterprise uses a local area network of computers to perform its business. During the off-working hours, the computational capacities of these networked computers are underused or unused. In order to utilize this computational capacity an application has to be recoded to exploit concurrency inherent in a computation which is clearly not possible for legacy applications without any source code. This thesis presents the design an implementation of a distributed middleware which can automatically execute a legacy application on multiple networked computers by parallelizing it. This middleware runs multiple copies of the binary executable code in parallel on different hosts in the network. It wraps up the binary executable code of the legacy application in order to capture the kernel level data access system calls and perform them distributively over multiple computers in a safe and conflict free manner. The middleware also incorporates a dynamic scheduling technique to execute the target application in minimum time by scavenging the available CPU cycles of the hosts in the network. This dynamic scheduling also supports the CPU availability of the hosts to change over time and properly reschedule the replicas performing the computation to minimize the execution time. A prototype implementation of this middleware has been developed as a proof of concept of the design. This implementation has been evaluated with a few typical case studies and the test results confirm that the middleware works as expected.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 16:26:21 GMT" } ]
2009-08-21T00:00:00
[ [ "Nguyen", "Que Thu Dung", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0908.2984
Nihar Shah B
Nihar B. Shah, K.V. Rashmi, P. Vijay Kumar, Kannan Ramchandran
Explicit Codes Minimizing Repair Bandwidth for Distributed Storage
11 pages, 4 figures v2: corrected typos
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the setting of data storage across n nodes in a distributed manner. A data collector (DC) should be able to reconstruct the entire data by connecting to any k out of the n nodes and downloading all the data stored in them. When a node fails, it has to be regenerated back using the existing nodes. In a recent paper, Wu et al. have obtained an information theoretic lower bound for the repair bandwidth. Also, there has been additional interest in storing data in systematic form as no post processing is required when DC connects to k systematic nodes. Because of their preferred status there is a need to regenerate back any systematic node quickly and exactly. Replacement of a failed node by an exact replica is termed Exact Regeneration.In this paper, we consider the problem of minimizing the repair bandwidth for exact regeneration of the systematic nodes. The file to be stored is of size B and each node can store alpha = B/k units of data. A failed systematic node is regenerated by downloading beta units of data each from d existing nodes. We give a lower bound for the repair bandwidth for exact regeneration of the systematic nodes which matches with the bound given by Wu et al. For d >= 2k-1 we give an explicit code construction which minimizes the repair bandwidth when the existing k-1 systematic nodes participate in the regeneration. We show the existence and construction of codes that achieve the bound for d >= 2k-3. Here we also establish the necessity of interference alignment. We prove that the bound is not achievable for d <= 2k-4 when beta=1. We also give a coding scheme which can be used for any d and k, which is optimal for d >= 2k-1.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 19:30:53 GMT" }, { "version": "v2", "created": "Sat, 5 Sep 2009 12:12:16 GMT" } ]
2009-09-05T00:00:00
[ [ "Shah", "Nihar B.", "" ], [ "Rashmi", "K. V.", "" ], [ "Kumar", "P. Vijay", "" ], [ "Ramchandran", "Kannan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3022
Grenville Croll
John Hunt
An approach for the automated risk assessment of structural differences between spreadsheets (DiffXL)
10 Pages, Numerous Colour Diagrams & Screenshots
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 ISBN 978-1-905617-89-0
null
null
cs.HC cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper outlines an approach to manage and quantify the risks associated with changes made to spreadsheets. The methodology focuses on structural differences between spreadsheets and suggests a technique by which a risk analysis can be achieved in an automated environment. The paper offers an example that demonstrates how contiguous ranges of data can be mapped into a generic list of formulae, data and metadata. The example then shows that comparison of these generic lists can establish the structural differences between spreadsheets and quantify the level of risk that each change has introduced. Lastly the benefits, drawbacks and limitations of the technique are discussed in a commercial context.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 21:31:20 GMT" } ]
2009-08-24T00:00:00
[ [ "Hunt", "John", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0908.3025
David Corne
David Corne and Joshua Knowles
Techniques for Highly Multiobjective Optimisation: Some Nondominated Points are Better than Others
8 pages, 2 tables
in Hod Lipson (Ed.): Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007. ACM 2007, pp. 773--780, ISBN 978-1-59593-697-4
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The research area of evolutionary multiobjective optimization (EMO) is reaching better understandings of the properties and capabilities of EMO algorithms, and accumulating much evidence of their worth in practical scenarios. An urgent emerging issue is that the favoured EMO algorithms scale poorly when problems have many (e.g. five or more) objectives. One of the chief reasons for this is believed to be that, in many-objective EMO search, populations are likely to be largely composed of nondominated solutions. In turn, this means that the commonly-used algorithms cannot distinguish between these for selective purposes. However, there are methods that can be used validly to rank points in a nondominated set, and may therefore usefully underpin selection in EMO search. Here we discuss and compare several such methods. Our main finding is that simple variants of the often-overlooked Average Ranking strategy usually outperform other methods tested, covering problems with 5-20 objectives and differing amounts of inter-objective correlation.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 21:44:32 GMT" } ]
2009-08-24T00:00:00
[ [ "Corne", "David", "" ], [ "Knowles", "Joshua", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0908.3030
Richard J. Mathar
Richard J. Mathar
A Java Math.BigDecimal Implementation of Core Mathematical Functions
In version 4: removed bug in BigSurdVec.signum()
null
null
null
math.NA cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The mathematical functions log(x), exp(x), root[n]x, sin(x), cos(x), tan(x), arcsin(x), arctan(x), x^y, sinh(x), cosh(x), tanh(x) and Gamma(x) have been implemented for arguments x in the real domain in a native Java library on top of the multi-precision BigDecimal representation of floating point numbers. This supports scientific applications where more than the double precision accuracy of the library of the Standard Edition is desired. The full source code is made available under the LGPL v3.0.
[ { "version": "v1", "created": "Thu, 20 Aug 2009 22:28:03 GMT" }, { "version": "v2", "created": "Sun, 4 Mar 2012 17:11:43 GMT" }, { "version": "v3", "created": "Sun, 17 May 2015 18:24:39 GMT" }, { "version": "v4", "created": "Tue, 3 Mar 2020 13:53:49 GMT" } ]
2020-03-04T00:00:00
[ [ "Mathar", "Richard J.", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0908.3082
Bela Genge
Ovidiu Ratoi, Piroska Haller, Ioan Salomie, Bela Genge
Component based platform for multimedia applications
7th IEEE RoEduNet International Conference, Cluj-Napoca, Romania, Aug. 2008, pp. 40-43, ISBN 978-973-662-393-6
null
null
null
cs.MM cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a platform for distributed multimedia applications which simplifies the development process and at the same time ensures application portability, flexibility and performance. The platform is implemented using the Netscape Portable Runtime (NSPR) and the Cross-Platform Component Object Model (XPCOM).
[ { "version": "v1", "created": "Fri, 21 Aug 2009 09:46:07 GMT" } ]
2009-08-24T00:00:00
[ [ "Ratoi", "Ovidiu", "" ], [ "Haller", "Piroska", "" ], [ "Salomie", "Ioan", "" ], [ "Genge", "Bela", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.3083
Bela Genge
Bela Genge, Piroska Haller, Ovidiu Ratoi, Iosif Ignat
Term-based composition of security protocols
2008 IEEE International Conference on Automation, Quality and Testing, Robotics, Cluj-Napoca, Romania, May 2008, pp. 233-238, ISBN 978-1-4244-2576-1
null
10.1109/AQTR.2008.4588741
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the context of security protocol parallel composition, where messages belonging to different protocols can intersect each other, we introduce a new paradigm: term-based composition (i.e. the composition of message components also known as terms). First, we create a protocol specification model by extending the original strand spaces. Then, we provide a term composition algorithm based on which new terms can be constructed. To ensure that security properties are maintained, we introduce the concept of term connections to express the existing connections between terms and encryption contexts. We illustrate the proposed composition process by using two existing protocols.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 09:52:12 GMT" } ]
2016-11-18T00:00:00
[ [ "Genge", "Bela", "" ], [ "Haller", "Piroska", "" ], [ "Ratoi", "Ovidiu", "" ], [ "Ignat", "Iosif", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.3089
Maxim Kolosovskiy
Maxim A. Kolosovskiy (Altai State Technical University, Russia)
Data structure for representing a graph: combination of linked list and hash table
7 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this article we discuss a data structure, which combines advantages of two different ways for representing graphs: adjacency matrix and collection of adjacency lists. This data structure can fast add and search edges (advantages of adjacency matrix), use linear amount of memory, let to obtain adjacency list for certain vertex (advantages of collection of adjacency lists). Basic knowledge of linked lists and hash tables is required to understand this article. The article contains examples of implementation on Java.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 10:12:31 GMT" } ]
2009-08-24T00:00:00
[ [ "Kolosovskiy", "Maxim A.", "", "Altai State Technical University, Russia" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.3090
Bela Genge
Bela Genge, Piroska Haller
A Modeling Framework for Generating Security Protocol Specifications
10th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC'08), Workshop on Global Computing Models and Technologies, Timisoara, Romania, Sept. 2008, pp. 362-365, ISBN 978-0-7695-3523-4
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a modeling framework for generating security protocol specifications. The generated protocol specifications rely on the use of a sequential and a semantical component. The first component defines protocol properties such as preconditions, effects, message sequences and it is developed as a WSDL-S specification. The second component defines the semantic aspects corresponding to the messages included in the first component by the use of ontological constructions and it is developed as an OWL-based specification. Our approach was validated on 13 protocols from which we mention: the ISO9798 protocol, the CCITTX.509 data transfer protocol and the Kerberos symmetric key protocol.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 10:16:25 GMT" } ]
2009-08-24T00:00:00
[ [ "Genge", "Bela", "" ], [ "Haller", "Piroska", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.3091
Attila Egri-Nagy
Attila Egri-Nagy and Chrystopher L. Nehaniv
Computational Understanding and Manipulation of Symmetries
14 pages, 5 figures, v2 major revision of computational examples
null
null
null
cs.AI cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For natural and artificial systems with some symmetry structure, computational understanding and manipulation can be achieved without learning by exploiting the algebraic structure. Here we describe this algebraic coordinatization method and apply it to permutation puzzles. Coordinatization yields a structural understanding, not just solutions for the puzzles.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 10:37:52 GMT" }, { "version": "v2", "created": "Tue, 14 Oct 2014 05:09:35 GMT" } ]
2014-10-15T00:00:00
[ [ "Egri-Nagy", "Attila", "" ], [ "Nehaniv", "Chrystopher L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0908.3098
Oren Somekh
Oren Somekh, Osvaldo Simeone, H. Vincent Poor, Shlomo Shamai (Shitz)
Throughput of Cellular Uplink with Dynamic User Activity and Cooperative Base-Stations
To be presented at the IEEE Information Theory Workshop, Taormina, Sicily, Italy, October 2009
null
10.1109/ITW.2009.5351392
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The throughput of a linear cellular uplink with a random number of users, different power control schemes, and cooperative base stations is considered in the large system limit where the number of cells is large for non fading Gaussian channels. The analysis is facilitated by establishing an analogy between the cellular channel per-cell throughput with joint multi-cell processing (MCP), and the rate of a deterministic inter-symbol interference (ISI) channel with flat fading. It is shown that, under certain conditions, the dynamics of cellular systems (i.e., a random number of users coupled with a given power control scheme) can be interpreted, as far as the uplink throughput is concerned, as the flat fading process of the equivalent ISI channel. The results are used to demonstrate the benefits of MCP over the conventional single cell processing approach as a function of various system parameters in the presence of random user activity.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 11:10:17 GMT" } ]
2016-11-18T00:00:00
[ [ "Somekh", "Oren", "", "Shitz" ], [ "Simeone", "Osvaldo", "", "Shitz" ], [ "Poor", "H. Vincent", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3148
Subhash Kak
Subhash Kak
Another Look at Quantum Neural Computing
10 pages, 4 figures; Based on lecture given at Czech Technical University, Prague on June 25, 2009. This revision adds clarifying remarks and corrects typographical errors
null
null
null
cs.NE cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The term quantum neural computing indicates a unity in the functioning of the brain. It assumes that the neural structures perform classical processing and that the virtual particles associated with the dynamical states of the structures define the underlying quantum state. We revisit the concept and also summarize new arguments related to the learning modes of the brain in response to sensory input that may be aggregated in three types: associative, reorganizational, and quantum. The associative and reorganizational types are quite apparent based on experimental findings; it is much harder to establish that the brain as an entity exhibits quantum properties. We argue that the reorganizational behavior of the brain may be viewed as inner adjustment corresponding to its quantum behavior at the system level. Not only neural structures but their higher abstractions also may be seen as whole entities. We consider the dualities associated with the behavior of the brain and how these dualities are bridged.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 15:17:36 GMT" }, { "version": "v2", "created": "Thu, 14 Mar 2013 15:37:45 GMT" } ]
2013-03-15T00:00:00
[ [ "Kak", "Subhash", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.3162
Yuriy Pershin
Yuriy V. Pershin and Massimiliano Di Ventra
Practical approach to programmable analog circuits with memristors
null
IEEE Trans.Circuits Theor.57:1857-1964,2010
10.1109/TCSI.2009.2038539
null
physics.ins-det cond-mat.mes-hall cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We suggest an approach to use memristors (resistors with memory) in programmable analog circuits. Our idea consists in a circuit design in which low voltages are applied to memristors during their operation as analog circuit elements and high voltages are used to program the memristor's states. This way, as it was demonstrated in recent experiments, the state of memristors does not essentially change during analog mode operation. As an example of our approach, we have built several programmable analog circuits demonstrating memristor-based programming of threshold, gain and frequency.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 16:24:20 GMT" }, { "version": "v2", "created": "Sun, 17 Jan 2010 22:53:46 GMT" } ]
2014-11-20T00:00:00
[ [ "Pershin", "Yuriy V.", "" ], [ "Di Ventra", "Massimiliano", "" ] ]
[ { "class": "Physics", "code": "physics.ins-det", "description": "Instrumentation and Detectors for research in natural science, including optical, molecular, atomic, nuclear and particle physics instrumentation and the associated electronics, services, infrastructure and control equipment. ", "span": "(Instrumentation and Detectors)" }, { "class": "Physics", "code": "cond-mat.mes-hall", "description": "Semiconducting nanostructures: quantum dots, wires, and wells. Single electronics, spintronics, 2d electron gases, quantum Hall effect, nanotubes, graphene, plasmonic nanostructures", "span": "(Mesoscale and Nanoscale Physics)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.3166
Hsiao-feng Lu
Hsiao-feng (Francis) Lu, Jyrki Lahtonen, Roope Vehkalahti, Camilla Hollanti
Remarks on the Criteria of Constructing MIMO-MAC DMT Optimal Codes
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we investigate the criteria proposed by Coronel et al. for constructing MIMO MAC-DMT optimal codes over several classes of fading channels. We first give a counterexample showing their DMT result is not correct when the channel is frequency-selective. For the case of symmetric MIMO-MAC flat fading channels, their DMT result reduces to exactly the same as that derived by Tse et al., and we therefore focus on their criteria for constructing MAC-DMT optimal codes, especially when the number of receive antennas is sufficiently large. In such case, we show their criterion is equivalent to requiring the codes of any subset of users to satisfy a joint non-vanishing determinant criterion when the system operates in the antenna pooling regime. Finally an upper bound on the product of minimum eigenvalues of the difference matrices is provided, and is used to show any MIMO-MAC codes satisfying their criterion can possibly exist only when the target multiplexing gain is small.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 16:49:46 GMT" } ]
2009-08-24T00:00:00
[ [ "Hsiao-feng", "", "", "Francis" ], [ "Lu", "", "" ], [ "Lahtonen", "Jyrki", "" ], [ "Vehkalahti", "Roope", "" ], [ "Hollanti", "Camilla", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3170
Ferm\'in Moscoso del Prado PhD
Ferm\'in Moscoso del Prado Mart\'in
The thermodynamics of human reaction times
Submitted manuscript
null
null
null
q-bio.NC cond-mat.dis-nn cond-mat.stat-mech cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I present a new approach for the interpretation of reaction time (RT) data from behavioral experiments. From a physical perspective, the entropy of the RT distribution provides a model-free estimate of the amount of processing performed by the cognitive system. In this way, the focus is shifted from the conventional interpretation of individual RTs being either long or short, into their distribution being more or less complex in terms of entropy. The new approach enables the estimation of the cognitive processing load without reference to the informational content of the stimuli themselves, thus providing a more appropriate estimate of the cognitive impact of different sources of information that are carried by experimental stimuli or tasks. The paper introduces the formulation of the theory, followed by an empirical validation using a database of human RTs in lexical tasks (visual lexical decision and word naming). The results show that this new interpretation of RTs is more powerful than the traditional one. The method provides theoretical estimates of the processing loads elicited by individual stimuli. These loads sharply distinguish the responses from different tasks. In addition, it provides upper-bound estimates for the speed at which the system processes information. Finally, I argue that the theoretical proposal, and the associated empirical evidence, provide strong arguments for an adaptive system that systematically adjusts its operational processing speed to the particular demands of each stimulus. This finding is in contradiction with Hick's law, which posits a relatively constant processing speed within an experimental context.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 17:00:12 GMT" } ]
2009-08-24T00:00:00
[ [ "Martín", "Fermín Moscoso del Prado", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.3171
Xiaohu Shang
Xiaohu Shang, Biao Chen, H. Vincent Poor
On the Optimality of Beamforming for Multi-User MISO Interference Channels with Single-User Detection
5 pages, 1 figure, to appear at Globecom 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For a multi-user interference channel with multi-antenna transmitters and single-antenna receivers, by restricting each receiver to a single-user detector, computing the largest achievable rate region amounts to solving a family of non-convex optimization problems. Recognizing the intrinsic connection between the signal power at the intended receiver and the interference power at the unintended receiver, the original family of non-convex optimization problems is converted into a new family of convex optimization problems. It is shown that, for such interference channels with each receiver implementing single-user detection, transmitter beamforming can achieve all boundary points of the achievable rate region.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 17:07:16 GMT" } ]
2009-08-24T00:00:00
[ [ "Shang", "Xiaohu", "" ], [ "Chen", "Biao", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3177
Vincent Lariviere
Vincent Lariviere, Yves Gingras
The impact factor's Matthew effect: a natural experiment in bibliometrics
7 pages, 2 tables
null
null
null
physics.soc-ph cs.DL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Since the publication of Robert K. Merton's theory of cumulative advantage in science (Matthew Effect), several empirical studies have tried to measure its presence at the level of papers, individual researchers, institutions or countries. However, these studies seldom control for the intrinsic "quality" of papers or of researchers--"better" (however defined) papers or researchers could receive higher citation rates because they are indeed of better quality. Using an original method for controlling the intrinsic value of papers--identical duplicate papers published in different journals with different impact factors--this paper shows that the journal in which papers are published have a strong influence on their citation rates, as duplicate papers published in high impact journals obtain, on average, twice as much citations as their identical counterparts published in journals with lower impact factors. The intrinsic value of a paper is thus not the only reason a given paper gets cited or not; there is a specific Matthew effect attached to journals and this gives to paper published there an added value over and above their intrinsic quality.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 17:56:47 GMT" } ]
2009-08-24T00:00:00
[ [ "Lariviere", "Vincent", "" ], [ "Gingras", "Yves", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0908.3184
Krishna Lingashetty
Krishna Chaithanya Lingashetty
Location of Single Neuron Memories in a Hebbian Network
7 pages, 11 figures, Presented at the Conference on Theoretical and Applied Computer Science 2009(TACS'09), Stillwater, Oklahoma. Corrected results and formatting changes
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper reports the results of an experiment on the use of Kak's B-Matrix approach to spreading activity in a Hebbian neural network. Specifically, it concentrates on the memory retrieval from single neurons and compares the performance of the B-Matrix approach to that of the traditional approach.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 19:53:54 GMT" }, { "version": "v2", "created": "Thu, 19 Nov 2009 18:31:27 GMT" } ]
2009-11-19T00:00:00
[ [ "Lingashetty", "Krishna Chaithanya", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0908.3212
Ariel Caticha
Ariel Caticha
Quantifying Rational Belief
Presented at MaxEnt 2009, the 29th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering (July 5-10, 2009, Oxford, Mississippi, USA.) In version 2 one mistake and a few typos have been corrected
null
10.1063/1.3275647
null
physics.data-an cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Some criticisms that have been raised against the Cox approach to probability theory are addressed. Should we use a single real number to measure a degree of rational belief? Can beliefs be compared? Are the Cox axioms obvious? Are there counterexamples to Cox? Rather than justifying Cox's choice of axioms we follow a different path and derive the sum and product rules of probability theory as the unique (up to regraduations) consistent representations of the Boolean AND and OR operations.
[ { "version": "v1", "created": "Fri, 21 Aug 2009 22:42:38 GMT" }, { "version": "v2", "created": "Fri, 13 Nov 2009 23:13:53 GMT" } ]
2015-05-14T00:00:00
[ [ "Caticha", "Ariel", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.3222
Tetsuya Hattori
Kumiko Hattori, Tetsuya Hattori
Hydrodynamic limit of move-to-front rules and search cost probabilities
null
null
null
null
math.PR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study a hydrodynamic limit approach to move-to-front rules, namely, a scaling limit as the number of items tends to infinity, of the joint distribution of jump rate and position of items. As an application of the limit formula, we present asymptotic formulas on search cost probability distributions, applicable for general jump rate distributions.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 01:32:55 GMT" } ]
2009-08-26T00:00:00
[ [ "Hattori", "Kumiko", "" ], [ "Hattori", "Tetsuya", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.3231
Reinert Korsnes rko
Reinert Korsnes
Rapid self-organised initiation of ad hoc sensor networks close above the percolation threshold
13 pages, 7 figures, research paper
Physica A: Statistical Mechanics and its Applications, Volume 389, Issue 14, 15 July 2010, Pages 2841-2848
10.1016/j.physa.2010.03.005
null
cs.NI cond-mat.dis-nn cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work shows potentials for rapid self-organisation of sensor networks where nodes collaborate to relay messages to a common data collecting unit (sink node). The study problem is, in the sense of graph theory, to find a shortest path tree spanning a weighted graph. This is a well-studied problem where for example Dijkstra's algorithm provides a solution for non-negative edge weights. The present contribution shows by simulation examples that simple modifications of known distributed approaches here can provide significant improvements in performance. Phase transition phenomena, which are known to take place in networks close to percolation thresholds, may explain these observations. An initial method, which here serves as reference, assumes the sink node starts organisation of the network (tree) by transmitting a control message advertising its availability for its neighbours. These neighbours then advertise their current cost estimate for routing a message to the sink. A node which in this way receives a message implying an improved route to the sink, advertises its new finding and remembers which neighbouring node the message came from. This activity proceeds until there are no more improvements to advertise to neighbours. The result is a tree network for cost effective transmission of messages to the sink (root). This distributed approach has potential for simple improvements which are of interest when minimisation of storage and communication of network information are a concern. Fast organisation of the network takes place when the number $k$ of connections for each node ({\em degree}) is close above its critical value for global network percolation and at the same time there is a threshold for the nodes to decide to advertise network route updates.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 05:34:10 GMT" }, { "version": "v2", "created": "Tue, 8 Dec 2009 09:23:21 GMT" }, { "version": "v3", "created": "Wed, 19 May 2010 12:55:34 GMT" } ]
2010-05-20T00:00:00
[ [ "Korsnes", "Reinert", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0908.3233
Yavuz Oruc A.
A. Yavuz Oruc and Abdullah Atmaca
Asymptotically Optimal Assignments In Ordinal Evaluations of Proposals
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In ordinal evaluations of proposals in peer review systems, a set of proposals is assigned to a fixed set of referees so as to maximize the number of pairwise comparisons of proposals under certain referee capacity and proposal subject constraints. In this paper, the following two related problems are considered: (1) Assuming that each referee has a capacity to review k out of n proposals, 2 < k < n, determine the minimum number of referees needed to ensure that each pair of proposals is reviewed by at least one referee, (2) Find an assignment that meets the lower bound determined in (1). It is easy to see that one referee is both necessary and sufficient when k = n, and n(n-1)/2 referees are both necessary and sufficient when k = 2. We show that 6 referees are both necessary and sufficient when k = n/2. We further show that 11 referees are necessary and 12 are sufficient when k = n/3, and 18 referees are necessary and 20 referees are sufficient when k = n/4. A more general lower bound of n(n-1)/k(k-1) referees is also given for any k, 2 < k < n, and an assignment asymptotically matching this lower bound within a factor of 2 is presented. These results are not only theoretically interesting but they also provide practical methods for efficient assignments of proposals to referees.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 07:08:30 GMT" } ]
2009-08-25T00:00:00
[ [ "Oruc", "A. Yavuz", "" ], [ "Atmaca", "Abdullah", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.3234
Anoosheh Heidarzadeh
Anoosheh Heidarzadeh and Amir H. Banihashemi
Overlapped Chunked Network Coding
5 pages, 3 figures, submitted to ITW 2010, Cairo
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Network coding is known to improve the throughput and the resilience to losses in most network scenarios. In a practical network scenario, however, the accurate modeling of the traffic is often too complex and/or infeasible. The goal is thus to design codes that perform close to the capacity of any network (with arbitrary traffic) efficiently. In this context, random linear network codes are known to be capacity-achieving while requiring a decoding complexity quadratic in the message length. Chunked Codes (CC) were proposed by Maymounkov et al. to improve the computational efficiency of random codes by partitioning the message into a number of non-overlapping chunks. CC can also be capacity-achieving but have a lower encoding/decoding complexity at the expense of slower convergence to the capacity. In this paper, we propose and analyze a generalized version of CC called Overlapped Chunked Codes (OCC) in which chunks are allowed to overlap. Our theoretical analysis and simulation results show that compared to CC, OCC can achieve the capacity with a faster speed while maintaining almost the same advantage in computational efficiency.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 07:18:51 GMT" } ]
2009-08-25T00:00:00
[ [ "Heidarzadeh", "Anoosheh", "" ], [ "Banihashemi", "Amir H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3252
Jean-Fran\c{c}ois Giovannelli
R. Boubertakh, J.-F. Giovannelli, A. Herment, A. De Cesare
Non-quadratic convex regularized reconstruction of MR images from spiral acquisitions
null
Signal Processing, vol. 86, pp. 2479-2494, 2006
null
null
cs.CV cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Combining fast MR acquisition sequences and high resolution imaging is a major issue in dynamic imaging. Reducing the acquisition time can be achieved by using non-Cartesian and sparse acquisitions. The reconstruction of MR images from these measurements is generally carried out using gridding that interpolates the missing data to obtain a dense Cartesian k-space filling. The MR image is then reconstructed using a conventional Fast Fourier Transform. The estimation of the missing data unavoidably introduces artifacts in the image that remain difficult to quantify. A general reconstruction method is proposed to take into account these limitations. It can be applied to any sampling trajectory in k-space, Cartesian or not, and specifically takes into account the exact location of the measured data, without making any interpolation of the missing data in k-space. Information about the expected characteristics of the imaged object is introduced to preserve the spatial resolution and improve the signal to noise ratio in a regularization framework. The reconstructed image is obtained by minimizing a non-quadratic convex objective function. An original rewriting of this criterion is shown to strongly improve the reconstruction efficiency. Results on simulated data and on a real spiral acquisition are presented and discussed.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 14:03:03 GMT" } ]
2009-08-25T00:00:00
[ [ "Boubertakh", "R.", "" ], [ "Giovannelli", "J. -F.", "" ], [ "Herment", "A.", "" ], [ "De Cesare", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0908.3265
Nitin Salodkar
Nitin Salodkar and Abhay Karandikar
Rate Constrained Random Access over a Fading Channel
null
null
null
null
cs.GT cs.LG cs.NI
http://creativecommons.org/licenses/publicdomain/
In this paper, we consider uplink transmissions involving multiple users communicating with a base station over a fading channel. We assume that the base station does not coordinate the transmissions of the users and hence the users employ random access communication. The situation is modeled as a non-cooperative repeated game with incomplete information. Each user attempts to minimize its long term power consumption subject to a minimum rate requirement. We propose a two timescale stochastic gradient algorithm (TTSGA) for tuning the users' transmission probabilities. The algorithm includes a 'waterfilling threshold update mechanism' that ensures that the rate constraints are satisfied. We prove that under the algorithm, the users' transmission probabilities converge to a Nash equilibrium. Moreover, we also prove that the rate constraints are satisfied; this is also demonstrated using simulation studies.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 16:45:32 GMT" } ]
2009-08-25T00:00:00
[ [ "Salodkar", "Nitin", "" ], [ "Karandikar", "Abhay", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.3269
Nitin Salodkar
Nitin Salodkar and Abhay Karandikar and V.S. Borkar
A Stable On-line Algorithm for Energy Efficient Multi-user Scheduling
null
null
null
null
cs.NI cs.GT
http://creativecommons.org/licenses/publicdomain/
In this paper, we consider the problem of energy efficient uplink scheduling with delay constraint for a multi-user wireless system. We address this problem within the framework of constrained Markov decision processes (CMDPs) wherein one seeks to minimize one cost (average power) subject to a hard constraint on another (average delay). We do not assume the arrival and channel statistics to be known. To handle state space explosion and informational constraints, we split the problem into individual CMDPs for the users, coupled through their Lagrange multipliers; and a user selection problem at the base station. To address the issue of unknown channel and arrival statistics, we propose a reinforcement learning algorithm. The users use this learning algorithm to determine the rate at which they wish to transmit in a slot and communicate this to the base station. The base station then schedules the user with the highest rate in a slot. We analyze convergence, stability and optimality properties of the algorithm. We also demonstrate the efficacy of the algorithm through simulations within IEEE 802.16 system.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 17:32:45 GMT" } ]
2009-08-25T00:00:00
[ [ "Salodkar", "Nitin", "" ], [ "Karandikar", "Abhay", "" ], [ "Borkar", "V. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0908.3271
Serge Gorneff
Serge Gorneff
Mathematical Modeling of Aerodynamic Space -to - Surface Flight with Trajectory for Avoid Intercepting Process for Safety and Security Issues
null
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The research project has been made for mathematical modeling of aerospace system Space-to-Surface for avoid intercepting process by flight objects Surface-to-Air. The research has been completed and created mathematical models which used for research and statistical analysis. In mathematical modeling has been including a few models: Model of atmosphere, Model of speed of sound, Model of flight head in space, Model of flight in atmosphere, Models of navigation and guidance, Model and statistical analysis of approximation of aerodynamic characteristics. Modeling has been created for a Space-to-Surface system defined for an optimal trajectory in terminal phase. The modeling includes models for simulation atmosphere, aerodynamic flight and navigation by an infrared system. The modeling simulation includes statistical analysis of the modeling results.
[ { "version": "v1", "created": "Sat, 22 Aug 2009 18:33:18 GMT" } ]
2009-08-25T00:00:00
[ [ "Gorneff", "Serge", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0908.3280
Andri Mirzal M.Sc.
Andri Mirzal
On the Relationship between Trading Network and WWW Network: A Preferential Attachment Perspective
21 pages, 6 figures, submitted to International Journal of Business Intelligence and Data Mining
null
null
null
cs.IR cs.CE
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper describes the relationship between trading network and WWW network from preferential attachment mechanism perspective. This mechanism is known to be the underlying principle in the network evolution and has been incorporated to formulate two famous web pages ranking algorithms, PageRank and HITS. We point out the differences between trading network and WWW network in this mechanism, derive the formulation of HITS-based ranking algorithm for trading network as a direct consequence of the differences, and apply the same framework when deriving the formulation back to the HITS formulation that turns to become a technique to accelerate its convergences.
[ { "version": "v1", "created": "Sun, 23 Aug 2009 02:06:35 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2009 15:32:28 GMT" } ]
2009-09-29T00:00:00
[ [ "Mirzal", "Andri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0908.3315
Nelma Moreira
Marco Almeida, Nelma Moreira, and Rog\'erio Reis
Exact generation of acyclic deterministic finite automata
DCFS'08
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a canonical representation for trim acyclic deterministic finite automata (Adfa) with n states over an alphabet of k symbols. Using this normal form, we present a backtracking algorithm for the exact generation of Adfas. This algorithm is a non trivial adaptation of the algorithm for the exact generation of minimal acyclic deterministic finite automata, presented by Almeida et al.
[ { "version": "v1", "created": "Sun, 23 Aug 2009 16:59:49 GMT" } ]
2009-08-25T00:00:00
[ [ "Almeida", "Marco", "" ], [ "Moreira", "Nelma", "" ], [ "Reis", "Rogério", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0908.3317
Vinith Reddy Podduturi
Vinith Reddy, Srinivas Shakkottai, Alex Sprintson and Natarajan Gautam
Multipath Wireless Network Coding: A Population Game Perspective
9 pages and 4 figures
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider wireless networks in which multiple paths are available between each source and destination. We allow each source to split traffic among all of its available paths, and ask the question: how do we attain the lowest possible number of transmissions to support a given traffic matrix? Traffic bound in opposite directions over two wireless hops can utilize the ``reverse carpooling'' advantage of network coding in order to decrease the number of transmissions used. We call such coded hops as ``hyper-links''. With the reverse carpooling technique longer paths might be cheaper than shorter ones. However, there is a prisoners dilemma type situation among sources -- the network coding advantage is realized only if there is traffic in both directions of a shared path. We develop a two-level distributed control scheme that decouples user choices from each other by declaring a hyper-link capacity, allowing sources to split their traffic selfishly in a distributed fashion, and then changing the hyper-link capacity based on user actions. We show that such a controller is stable, and verify our analytical insights by simulation.
[ { "version": "v1", "created": "Sun, 23 Aug 2009 17:07:49 GMT" } ]
2009-08-25T00:00:00
[ [ "Reddy", "Vinith", "" ], [ "Shakkottai", "Srinivas", "" ], [ "Sprintson", "Alex", "" ], [ "Gautam", "Natarajan", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.3359
Jacek Turski
Jacek Turski
Geometric Analysis of the Conformal Camera for Intermediate-Level Vision and Perisaccadic Perception
Ver2 with figures
null
null
null
cs.CV cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A binocular system developed by the author in terms of projective Fourier transform (PFT) of the conformal camera, which numerically integrates the head, eyes, and visual cortex, is used to process visual information during saccadic eye movements. Although we make three saccades per second at the eyeball's maximum speed of 700 deg/sec, our visual system accounts for these incisive eye movements to produce a stable percept of the world. This visual constancy is maintained by neuronal receptive field shifts in various retinotopically organized cortical areas prior to saccade onset, giving the brain access to visual information from the saccade's target before the eyes' arrival. It integrates visual information acquisition across saccades. Our modeling utilizes basic properties of PFT. First, PFT is computable by FFT in complex logarithmic coordinates that approximate the retinotopy. Second, a translation in retinotopic (logarithmic) coordinates, modeled by the shift property of the Fourier transform, remaps the presaccadic scene into a postsaccadic reference frame. It also accounts for the perisaccadic mislocalization observed by human subjects in laboratory experiments. Because our modeling involves cross-disciplinary areas of conformal geometry, abstract and computational harmonic analysis, computational vision, and visual neuroscience, we include the corresponding background material and elucidate how these different areas interwove in our modeling of primate perception. In particular, we present the physiological and behavioral facts underlying the neural processes related to our modeling. We also emphasize the conformal camera's geometry and discuss how it is uniquely useful in the intermediate-level vision computational aspects of natural scene understanding.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 04:28:59 GMT" }, { "version": "v2", "created": "Sat, 29 Aug 2009 06:24:40 GMT" } ]
2009-08-29T00:00:00
[ [ "Turski", "Jacek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0908.3361
Gene Golovchinsky
Laurent Denoue, Scott Carter, John Adcock, Gene Golovchinsky, and Andreas Girgensohn
WebNC: efficient sharing of web applications
Presented at WWW 2009, Madrid, Spain
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WebNC is a system for efficiently sharing, retrieving and viewing web applications. Unlike existing screencasting and screensharing tools, WebNC is optimized to work with web pages where a lot of scrolling happens. WebNC uses a tile-based encoding to capture, transmit and deliver web applications, and relies only on dynamic HTML and JavaScript. The resulting webcasts require very little bandwidth and are viewable on any modern web browser including Firefox and Internet Explorer as well as browsers on the iPhone and Android platforms.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 05:34:57 GMT" } ]
2009-08-25T00:00:00
[ [ "Denoue", "Laurent", "" ], [ "Carter", "Scott", "" ], [ "Adcock", "John", "" ], [ "Golovchinsky", "Gene", "" ], [ "Girgensohn", "Andreas", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.3362
Willemien Visser
Willemien Visser (LTCI)
The Function of Gesture in an Architectural Design Meeting
null
About: Designing. Analysing design meetings, Janet McDonnell and Peter Lloyd (Ed.) (2009) 269-284
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This text presents a cognitive-psychology analysis of spontaneous, co-speech gestures in a face-to-face architectural design meeting (A1 in DTRS7). The long-term objective is to formulate specifications for remote collaborative-design systems, especially for supporting the use of different semiotic modalities (multi-modal interaction). According to their function for design, interaction, and collaboration, we distinguish different gesture families: representational (entity designating or specifying), organisational (management of discourse, interaction, or functional design actions), focalising, discourse and interaction modulating, and disambiguating gestures. Discussion and conclusion concern the following points. It is impossible to attribute fixed functions to particular gesture forms. "Designating" gestures may also have a design function. The gestures identified in A1 possess a certain generic character. The gestures identified are neither systematically irreplaceable, nor optional accessories to speech or drawing. We discuss the possibilities for gesture in computer-supported collaborative software systems. The paper closes on our contribution to gesture studies and cognitive design research.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 06:04:46 GMT" } ]
2009-08-25T00:00:00
[ [ "Visser", "Willemien", "", "LTCI" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.3380
Kunal Narayan Chaudhury
Kunal Narayan Chaudhury and Michael Unser
Construction of Hilbert Transform Pairs of Wavelet Bases and Gabor-like Transforms
36 pages, 8 figures
IEEE Transactions on Signal Processing, vol 7, no. 9, pp. 3411-3425, 2009
null
null
cs.IT cs.CV math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a novel method for constructing Hilbert transform (HT) pairs of wavelet bases based on a fundamental approximation-theoretic characterization of scaling functions--the B-spline factorization theorem. In particular, starting from well-localized scaling functions, we construct HT pairs of biorthogonal wavelet bases of L^2(R) by relating the corresponding wavelet filters via a discrete form of the continuous HT filter. As a concrete application of this methodology, we identify HT pairs of spline wavelets of a specific flavor, which are then combined to realize a family of complex wavelets that resemble the optimally-localized Gabor function for sufficiently large orders. Analytic wavelets, derived from the complexification of HT wavelet pairs, exhibit a one-sided spectrum. Based on the tensor-product of such analytic wavelets, and, in effect, by appropriately combining four separable biorthogonal wavelet bases of L^2(R^2), we then discuss a methodology for constructing 2D directional-selective complex wavelets. In particular, analogous to the HT correspondence between the components of the 1D counterpart, we relate the real and imaginary components of these complex wavelets using a multi-dimensional extension of the HT--the directional HT. Next, we construct a family of complex spline wavelets that resemble the directional Gabor functions proposed by Daugman. Finally, we present an efficient FFT-based filterbank algorithm for implementing the associated complex wavelet transform.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 15:27:09 GMT" } ]
2013-07-23T00:00:00
[ [ "Chaudhury", "Kunal Narayan", "" ], [ "Unser", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3383
Kunal Narayan Chaudhury
Kunal Narayan Chaudhury and Michael Unser
On the Shiftability of Dual-Tree Complex Wavelet Transforms
to appear in IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing, vol. 58(1), pp. 221 - 232, 2010
null
null
cs.IT cs.CV math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The dual-tree complex wavelet transform (DT-CWT) is known to exhibit better shift-invariance than the conventional discrete wavelet transform. We propose an amplitude-phase representation of the DT-CWT which, among other things, offers a direct explanation for the improvement in the shift-invariance. The representation is based on the shifting action of the group of fractional Hilbert transform (fHT) operators, which extends the notion of arbitrary phase-shifts from sinusoids to finite-energy signals (wavelets in particular). In particular, we characterize the shiftability of the DT-CWT in terms of the shifting property of the fHTs. At the heart of the representation are certain fundamental invariances of the fHT group, namely that of translation, dilation, and norm, which play a decisive role in establishing the key properties of the transform. It turns out that these fundamental invariances are exclusive to this group. Next, by introducing a generalization of the Bedrosian theorem for the fHT operator, we derive an explicitly understanding of the shifting action of the fHT for the particular family of wavelets obtained through the modulation of lowpass functions (e.g., the Shannon and Gabor wavelet). This, in effect, links the corresponding dual-tree transform with the framework of windowed-Fourier analysis. Finally, we extend these ideas to the multi-dimensional setting by introducing a directional extension of the fHT, the fractional directional Hilbert transform. In particular, we derive a signal representation involving the superposition of direction-selective wavelets with appropriate phase-shifts, which helps explain the improved shift-invariance of the transform along certain preferential directions.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 15:18:41 GMT" } ]
2013-07-23T00:00:00
[ [ "Chaudhury", "Kunal Narayan", "" ], [ "Unser", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3394
Jayanta Poray
Jayanta Poray, Christoph Schommer
A Cognitive Mind-map Framework to Foster Trust
5 pages, 4 Figures, Extended Version, presented at the 5th International Conference on Natural Computation, 2009
null
10.1109/ICNC.2009.614
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The explorative mind-map is a dynamic framework, that emerges automatically from the input, it gets. It is unlike a verificative modeling system where existing (human) thoughts are placed and connected together. In this regard, explorative mind-maps change their size continuously, being adaptive with connectionist cells inside; mind-maps process data input incrementally and offer lots of possibilities to interact with the user through an appropriate communication interface. With respect to a cognitive motivated situation like a conversation between partners, mind-maps become interesting as they are able to process stimulating signals whenever they occur. If these signals are close to an own understanding of the world, then the conversational partner becomes automatically more trustful than if the signals do not or less match the own knowledge scheme. In this (position) paper, we therefore motivate explorative mind-maps as a cognitive engine and propose these as a decision support engine to foster trust.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 10:32:01 GMT" }, { "version": "v2", "created": "Mon, 24 Aug 2009 21:17:58 GMT" } ]
2009-08-25T00:00:00
[ [ "Poray", "Jayanta", "" ], [ "Schommer", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.3430
Yu. I. Manin
Yuri I. Manin
Renormalization and Computation II: Time Cut-off and the Halting Problem
28 pages
null
null
null
math.QA cs.CC cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This is the second installment to the project initiated in [Ma3]. In the first Part, I argued that both philosophy and technique of the perturbative renormalization in quantum field theory could be meaningfully transplanted to the theory of computation, and sketched several contexts supporting this view. In this second part, I address some of the issues raised in [Ma3] and provide their development in three contexts: a categorification of the algorithmic computations; time cut--off and Anytime Algorithms; and finally, a Hopf algebra renormalization of the Halting Problem.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 13:03:38 GMT" } ]
2009-08-25T00:00:00
[ [ "Manin", "Yuri I.", "" ] ]
[ { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0908.3455
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Ion Pargaru, Florin Ionescu, Cristina Teodora Andreica
Algorithmic Aspects of Several Data Transfer Service Optimization Problems
Proceedings of the International Symposium on Sustainable Development in Conditions of Economic Instability, Satu Mare, 26-27 June, 2009
"Quality - Access to Success" Journal, vol. 10, special issue no. 101, pp. 30-32, 2009. (ISSN: 1582-2559)
null
null
cs.DS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optimized data transfer services are highly demanded nowadays, due to the large amounts of data which are frequently being produced and accessed. In this paper we consider several data transfer service optimization problems (optimal server location in path networks, optimal packet sequencing and minimum makespan packet scheduling), for which we provide novel algorithmic solutions.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 15:56:58 GMT" } ]
2009-08-25T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Pargaru", "Ion", "" ], [ "Ionescu", "Florin", "" ], [ "Andreica", "Cristina Teodora", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0908.3459
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Mihai Aristotel Ungureanu, Romulus Andreica, Angela Andreica
An Algorithmic Perspective on Some Network Design, Construction and Analysis Problems
Proceedings of the International Symposium on Sustainable Development in Conditions of Economic Instability, Satu Mare, 26-27 June, 2009
"Quality - Access to Success" Journal, vol. 10, special issue no. 101, pp. 20-22, 2009. (ISSN: 1582-2559)
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Efficient network design, construction and analysis are important topics, considering the highly dynamic environment in which data communication occurs nowadays. In this paper we address several problems concerning these topics from an algorithmic point of view.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 16:05:50 GMT" } ]
2009-08-25T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Ungureanu", "Mihai Aristotel", "" ], [ "Andreica", "Romulus", "" ], [ "Andreica", "Angela", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.3463
Davide Cescato
Davide Cescato and Helmut B\"olcskei
Interpolation-Based QR Decomposition in MIMO-OFDM Systems
The original submission to Appl. Comput. Harmon. Anal. in Aug. 2009 was withdrawn. The paper was split in two parts, which were submitted in Oct. 2009 to IEEE Trans. Inf. Theory and to IEEE Trans. Signal Proc., respectively
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detection algorithms for multiple-input multiple-output (MIMO) wireless systems based on orthogonal frequency-division multiplexing (OFDM) typically require the computation of a QR decomposition for each of the data-carrying OFDM tones. The resulting computational complexity will, in general, be significant, as the number of data-carrying tones ranges from 48 (as in the IEEE 802.11a/g standards) to 1728 (as in the IEEE 802.16e standard). Motivated by the fact that the channel matrices arising in MIMO-OFDM systems are highly oversampled polynomial matrices, we formulate interpolation-based QR decomposition algorithms. An in-depth complexity analysis, based on a metric relevant for very large scale integration (VLSI) implementations, shows that the proposed algorithms, for sufficiently high number of data-carrying tones and sufficiently small channel order, provably exhibit significantly smaller complexity than brute-force per-tone QR decomposition.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 17:09:06 GMT" }, { "version": "v2", "created": "Mon, 26 Oct 2009 09:08:56 GMT" }, { "version": "v3", "created": "Fri, 30 Oct 2009 09:19:45 GMT" } ]
2009-10-30T00:00:00
[ [ "Cescato", "Davide", "" ], [ "Bölcskei", "Helmut", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3491
Gus Gutoski
Gus Gutoski
Entangled games do not require much entanglement (withdrawn)
Withdrawn. I found a mistake in my proof. This one-page replacement note explains the problem in more detail. Sorry, everyone
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove an explicit upper bound on the amount of entanglement required by any strategy in a two-player cooperative game with classical questions and quantum answers. Specifically, we show that every strategy for a game with n-bit questions and n-qubit answers can be implemented exactly by players who share an entangled state of no more than 5n qubits--a bound which is optimal to within a factor of 5/2. Previously, no upper bound at all was known on the amount of entanglement required even to approximate such a strategy. It follows that the problem of computing the value of these games is in NP, whereas previously this problem was not known to be computable.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 20:23:26 GMT" }, { "version": "v2", "created": "Thu, 3 Sep 2009 03:40:43 GMT" } ]
2009-09-03T00:00:00
[ [ "Gutoski", "Gus", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.3497
James Fowler
James H. Fowler, Nicholas A. Christakis
Cooperative Behavior Cascades in Human Social Networks
null
null
10.1073/pnas.0913149107
null
physics.soc-ph cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Theoretical models suggest that social networks influence the evolution of cooperation, but to date there have been few experimental studies. Observational data suggest that a wide variety of behaviors may spread in human social networks, but subjects in such studies can choose to befriend people with similar behaviors, posing difficulty for causal inference. Here, we exploit a seminal set of laboratory experiments that originally showed that voluntary costly punishment can help sustain cooperation. In these experiments, subjects were randomly assigned to a sequence of different groups in order to play a series of single-shot public goods games with strangers; this feature allowed us to draw networks of interactions to explore how cooperative and uncooperative behavior spreads from person to person to person. We show that, in both an ordinary public goods game and in a public goods game with punishment, focal individuals are influenced by fellow group members' contribution behavior in future interactions with other individuals who were not a party to the initial interaction. Furthermore, this influence persists for multiple periods and spreads up to three degrees of separation (from person to person to person to person). The results suggest that each additional contribution a subject makes to the public good in the first period is tripled over the course of the experiment by other subjects who are directly or indirectly influenced to contribute more as a consequence. These are the first results to show experimentally that cooperative behavior cascades in human social networks.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 21:07:13 GMT" }, { "version": "v2", "created": "Tue, 15 Dec 2009 04:58:07 GMT" } ]
2011-07-26T00:00:00
[ [ "Fowler", "James H.", "" ], [ "Christakis", "Nicholas A.", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.3505
Christoph Durr
Philippe Baptiste, Marek Chrobak, Christoph Durr
Polynomial Time Algorithms for Minimum Energy Scheduling
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of power management policies is to reduce the amount of energy consumed by computer systems while maintaining satisfactory level of performance. One common method for saving energy is to simply suspend the system during the idle times. No energy is consumed in the suspend mode. However, the process of waking up the system itself requires a certain fixed amount of energy, and thus suspending the system is beneficial only if the idle time is long enough to compensate for this additional energy expenditure. In the specific problem studied in the paper, we have a set of jobs with release times and deadlines that need to be executed on a single processor. Preemptions are allowed. The processor requires energy L to be woken up and, when it is on, it uses one unit of energy per one unit of time. It has been an open problem whether a schedule minimizing the overall energy consumption can be computed in polynomial time. We solve this problem in positive, by providing an O(n^5)-time algorithm. In addition we provide an O(n^4)-time algorithm for computing the minimum energy schedule when all jobs have unit length.
[ { "version": "v1", "created": "Mon, 24 Aug 2009 21:44:45 GMT" }, { "version": "v2", "created": "Fri, 3 Sep 2010 12:28:21 GMT" } ]
2010-09-06T00:00:00
[ [ "Baptiste", "Philippe", "" ], [ "Chrobak", "Marek", "" ], [ "Durr", "Christoph", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.3512
Nan Ma
Nan Ma and Prakash Ishwar
The Infinite-message Limit of Two-terminal Interactive Source Coding
40 pages, 5 figures. Submitted to IEEE Transactions on Information Theory in Sep 2010 and revised in Mar 2012. This version (version 3) is the latest revised version. Version 1 was published in Allerton Conference 2009. Version 2 contains extensions to the rate-distortion theory and an achievable proof of the sum-rate R* in the second example
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A two-terminal interactive function computation problem with alternating messages is studied within the framework of distributed block source coding theory. For any finite number of messages, a single-letter characterization of the sum-rate-distortion function was established in previous works using standard information-theoretic techniques. This, however, does not provide a satisfactory characterization of the infinite-message limit, which is a new, unexplored dimension for asymptotic-analysis in distributed block source coding involving potentially an infinite number of infinitesimal-rate messages. In this paper, the infinite-message sum-rate-distortion function, viewed as a functional of the joint source pmf and the distortion levels, is characterized as the least element of a partially ordered family of functionals having certain convex-geometric properties. The new characterization does not involve evaluating the infinite-message limit of a finite-message sum-rate-distortion expression. This characterization leads to a family of lower bounds for the infinite-message sum-rate-distortion expression and a simple criterion to test the optimality of any achievable infinite-message sum-rate-distortion expression. For computing the amplewise Boolean AND function, the infinite-message minimum sum-rates are characterized in closed analytic form. These sum-rates are shown to be achievable using infinitely many infinitesimal-rate messages. The new convex-geometric characterization is used to develop an iterative algorithm for evaluating any finite-message sumrate-distortion function. It is also used to construct the first examples which demonstrate that for lossy source reproduction, two messages can strictly improve the one-message Wyner-Ziv rate-distortion function settling an unresolved question from a 1985 paper.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 01:54:37 GMT" }, { "version": "v2", "created": "Tue, 27 Oct 2009 20:07:52 GMT" }, { "version": "v3", "created": "Wed, 11 Jul 2012 13:38:36 GMT" }, { "version": "v4", "created": "Thu, 2 Aug 2012 22:37:05 GMT" } ]
2012-08-06T00:00:00
[ [ "Ma", "Nan", "" ], [ "Ishwar", "Prakash", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3519
Joel Goossens
Liliana Cucu-Grosjean, Jo\"el Goossens
Predictability of Fixed-Job Priority Schedulers on Heterogeneous Multiprocessor Real-Time Systems
null
null
null
null
cs.OS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The multiprocessor Fixed-Job Priority (FJP) scheduling of real-time systems is studied. An important property for the schedulability analysis, the predictability (regardless to the execution times), is studied for heterogeneous multiprocessor platforms. Our main contribution is to show that any FJP schedulers are predictable on unrelated platforms. A convenient consequence is the fact that any FJP schedulers are predictable on uniform multiprocessors.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 12:46:56 GMT" } ]
2009-08-26T00:00:00
[ [ "Cucu-Grosjean", "Liliana", "" ], [ "Goossens", "Joël", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0908.3523
Gene Golovchinsky
Gene Golovchinsky
Cognitive Dimensions Analysis of Interfaces for Information Seeking
Submitted to HCIR'09 http://cuaslis.org/hcir2009/
null
null
null
cs.HC cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cognitive Dimensions is a framework for analyzing human-computer interaction. It is used for meta-analysis, that is, for talking about characteristics of systems without getting bogged down in details of a particular implementation. In this paper, I discuss some of the dimensions of this theory and how they can be applied to analyze information seeking interfaces. The goal of this analysis is to introduce a useful vocabulary that practitioners and researchers can use to describe systems, and to guide interface design toward more usable and useful systems
[ { "version": "v1", "created": "Tue, 25 Aug 2009 01:37:59 GMT" } ]
2009-08-26T00:00:00
[ [ "Golovchinsky", "Gene", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.3539
Zoran Hadzi-Velkov
Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis
An Accurate Approximation to the Distribution of the Sum of Equally Correlated Nakagami-m Envelopes and its Application in Equal Gain Diversity Receivers
null
2009. ICC '09. IEEE International Conference on Communications, 14-18 June 2009 Page(s):1 - 5
10.1109/ICC.2009.5198714
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel and accurate approximation for the distribution of the sum of equally correlated Nakagami-m variates. Ascertaining on this result we study the performance of Equal Gain Combining (EGC) receivers, operating over equally correlating fading channels. Numerical results and simulations show the accuracy of the proposed approximation and the validity of the mathematical analysis.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 05:48:30 GMT" } ]
2009-08-26T00:00:00
[ [ "Hadzi-Velkov", "Zoran", "" ], [ "Zlatanov", "Nikola", "" ], [ "Karagiannidis", "George K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3541
Zoran Hadzi-Velkov
Nikola Zlatanov, Zoran Hadzi-Velkov, George K. Karagiannidis
Level Crossing Rate and Average Fade Duration of the Double Nakagami-m Random Process and Application in MIMO Keyhole Fading Channels
null
IEEE Communications Letters, Volume 12, Issue 11, November 2008 Page(s):822 - 824
10.1109/LCOMM.2008.081058
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present novel exact expressions and accurate closed-form approximations for the level crossing rate (LCR) and the average fade duration (AFD) of the double Nakagami-m random process. These results are then used to study the second order statistics of multiple input multiple output (MIMO) keyhole fading channels with space-time block coding. Numerical and computer simulation examples validate the accuracy of the presented mathematical analysis and show the tightness of the proposed approximations.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 05:59:03 GMT" } ]
2009-08-26T00:00:00
[ [ "Zlatanov", "Nikola", "" ], [ "Hadzi-Velkov", "Zoran", "" ], [ "Karagiannidis", "George K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3544
Zoran Hadzi-Velkov
Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis
On the Second Order Statistics of the Multihop Rayleigh Fading Channel
null
IEEE Transactions on Communications, Volume 57, Issue 6, June 2009 Page(s):1815 - 1823
10.1109/TCOMM.2009.06.070460
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Second order statistics provides a dynamic representation of a fading channel and plays an important role in the evaluation and design of the wireless communication systems. In this paper, we present a novel analytical framework for the evaluation of important second order statistical parameters, as the level crossing rate (LCR) and the average fade duration (AFD) of the amplify-and-forward multihop Rayleigh fading channel. More specifically, motivated by the fact that this channel is a cascaded one and can be modeled as the product of N fading amplitudes, we derive novel analytical expressions for the average LCR and the AFD of the product of N Rayleigh fading envelopes (or of the recently so-called N*Rayleigh channel). Furthermore, we derive simple and efficient closed-form approximations to the aforementioned parameters, using the multivariate Laplace approximation theorem. It is shown that our general results reduce to the corresponding ones of the specific dual-hop case, previously published. Numerical and computer simulation examples verify the accuracy of the presented mathematical analysis and show the tightness of the proposed approximations.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 06:06:03 GMT" } ]
2009-08-26T00:00:00
[ [ "Hadzi-Velkov", "Zoran", "" ], [ "Zlatanov", "Nikola", "" ], [ "Karagiannidis", "George K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3545
Pat Morin
Vida Dujmovic, Joachim Gudmundsson, Pat Morin, Thomas Wolle
Notes on large angle crossing graphs
null
Chicago Journal of Theoretical Computer Science, Article 2011-4
10.4086/cjtcs.2011.004
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph G is an a-angle crossing (aAC) graph if every pair of crossing edges in G intersect at an angle of at least a. The concept of right angle crossing (RAC) graphs (a=Pi/2) was recently introduced by Didimo et. al. It was shown that any RAC graph with n vertices has at most 4n-10 edges and that there are infinitely many values of n for which there exists a RAC graph with n vertices and 4n-10 edges. In this paper, we give upper and lower bounds for the number of edges in aAC graphs for all 0 < a < Pi/2.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 06:21:41 GMT" }, { "version": "v2", "created": "Mon, 29 Nov 2010 15:05:40 GMT" } ]
2013-03-12T00:00:00
[ [ "Dujmovic", "Vida", "" ], [ "Gudmundsson", "Joachim", "" ], [ "Morin", "Pat", "" ], [ "Wolle", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.3549
Zoran Hadzi-Velkov
Zoran Hadzi-Velkov, Nikola Zlatanov, George K. Karagiannidis
Level Crossing Rate and Average Fade Duration of the Multihop Rayleigh Fading Channel
null
2008. ICC '08. IEEE International Conference on Communications, 19-23 May 2008 Page(s):4451 - 4455
10.1109/ICC.2008.835
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel analytical framework for the evaluation of important second order statistical parameters, as the level crossing rate (LCR) and the average fade duration (AFD) of the amplify-and-forward multihop Rayleigh fading channel. More specifically, motivated by the fact that this channel is a cascaded one, which can be modelled as the product of N fading amplitudes, we derive novel analytical expressions for the average LCR and AFD of the product of N Rayleigh fading envelopes, or of the recently so-called N*Rayleigh channel. Furthermore, we derive simple and efficient closed-form approximations to the aforementioned parameters, using the multivariate Laplace approximation theorem. It is shown that our general results reduce to the specific dual-hop case, previously published. Numerical and computer simulation examples verify the accuracy of the presented mathematical analysis and show the tightness of the proposed approximations.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 07:20:07 GMT" } ]
2009-08-26T00:00:00
[ [ "Hadzi-Velkov", "Zoran", "" ], [ "Zlatanov", "Nikola", "" ], [ "Karagiannidis", "George K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]