id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0908.3551
Zoran Hadzi-Velkov
Zoran Hadzi-Velkov
Level Crossing Rate and Average Fade Duration of EGC Systems with Cochannel Interference in Rayleigh Fading
null
IEEE Transactions on Communications, Volume 55, Issue 11, Nov. 2007 Page(s):2104 - 2113
10.1109/TCOMM.2007.908519
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Both the first-order signal statistics (e.g. the outage probability) and the second-order signal statistics (e.g. the average level crossing rate, LCR, and the average fade duration, AFD) are important design criteria and performance measures for the wireless communication systems, including the equal gain combining (EGC) systems in presence of the cochannel interference (CCI). Although the analytical expressions for the outage probability of the coherent EGC systems exposed to CCI and various fading channels are already known, the respective ones for the average LCR and the AFD are not available in the literature. This paper presents such analytical expressions for the Rayleigh fading channel, which are obtained by utilizing a novel analytical approach that does not require the explicit expression for the joint PDF of the instantaneous output signal-to-interference ratio (SIR) and its time derivative. Applying the characteristic function method and the Beaulieu series, we determined the average LCR and the AFD at the output of an interference-limited EGC system with an arbitrary diversity order and an arbitrary number of cochannel interferers in forms of an infinite integral and an infinite series. For the dual diversity case, the respective expressions are derived in closed forms in terms of the gamma and the beta functions.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 07:27:04 GMT" } ]
2009-08-26T00:00:00
[ [ "Hadzi-Velkov", "Zoran", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3552
Zoran Hadzi-Velkov
Zoran Hadzi-Velkov
Level Crossing Rate and Average Fade Duration of Dual Selection Combining with Cochannel Interference and Nakagami Fading
null
IEEE Transactions on Wireless Communications, Volume 6, Issue 11, November 2007 Page(s):3870 - 3876
10.1109/TWC.2007.060206
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This letter provides closed-form expressions for the outage probability, the average level crossing rate (LCR) and the average fade duration (AFD) of a dual diversity selection combining (SC) system exposed to the combined influence of the cochannel interference (CCI) and the thermal noise (AWGN) in Nakagami fading channel. The branch selection is based on the desired signal power SC algorithm with all input signals assumed to be independent, while the powers of the desired signals in all diversity branches are mutually equal but distinct from the power of the interference signals. The analytical results reduce to known solutions in the cases of an interference-limited system in Rayleigh fading and an AWGN-limited system in Nakagami fading. The average LCR is determined by an original approach that does not require explicit knowledge of the joint PDF of the envelope and its time derivative, which also paves the way for similar analysis of other diversity systems.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 07:31:51 GMT" } ]
2009-08-26T00:00:00
[ [ "Hadzi-Velkov", "Zoran", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3562
Neri Merhav
Neri Merhav
Another Look at the Physics of Large Deviations With Application to Rate-Distortion Theory
10 pages, 2 figures, submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit and extend the physical interpretation recently given to a certain identity between large--deviations rate--functions (as well as applications of this identity to Information Theory), as an instance of thermal equilibrium between several physical systems that are brought into contact. Our new interpretation, of mechanical equilibrium between these systems, is shown to have several advantages relative to that of thermal equilibrium. This physical point of view also provides a trigger to the development of certain alternative representations of the rate--distortion function and channel capacity, which are new to the best knowledge of the author.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 08:35:16 GMT" } ]
2009-08-26T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3565
K R Guruprasad
K.R. Guruprasad and Debasish Ghose
Coverage Optimization using Generalized Voronoi Partition
16 pages
null
null
null
math.OC cs.SY math.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a generalization of the Voronoi partition is used for optimal deployment of autonomous agents carrying sensors with heterogeneous capabilities, to maximize the sensor coverage. The generalized centroidal Voronoi configuration, in which the agents are located at the centroids of the corresponding generalized Voronoi cells, is shown to be a local optimal configuration. Simulation results are presented to illustrate the presented deployment strategy.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 08:55:07 GMT" }, { "version": "v2", "created": "Mon, 20 Jun 2011 20:37:54 GMT" }, { "version": "v3", "created": "Wed, 12 Oct 2011 16:06:56 GMT" } ]
2011-10-13T00:00:00
[ [ "Guruprasad", "K. R.", "" ], [ "Ghose", "Debasish", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.DS", "description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations", "span": "(Dynamical Systems)" } ]
0908.3574
Christian Esteve Rothenberg
Christian Esteve Rothenberg, Carlos A. Macapuna, Fabio L. Verdi, Mauricio F. Magalhaes, Alexander Wiesmaier
In-packet Bloom filters: Design and networking applications
15 pages, 11 figures, preprint submitted to Elsevier COMNET Journal
null
null
null
cs.DS cs.IT cs.NI cs.PF math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Bloom filter (BF) is a well-known space-efficient data structure that answers set membership queries with some probability of false positives. In an attempt to solve many of the limitations of current inter-networking architectures, some recent proposals rely on including small BFs in packet headers for routing, security, accountability or other purposes that move application states into the packets themselves. In this paper, we consider the design of such in-packet Bloom filters (iBF). Our main contributions are exploring the design space and the evaluation of a series of extensions (1) to increase the practicality and performance of iBFs, (2) to enable false-negative-free element deletion, and (3) to provide security enhancements. In addition to the theoretical estimates, extensive simulations of the multiple design parameters and implementation alternatives validate the usefulness of the extensions, providing for enhanced and novel iBF networking applications.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 09:10:51 GMT" }, { "version": "v2", "created": "Wed, 20 Jan 2010 00:35:00 GMT" } ]
2010-01-20T00:00:00
[ [ "Rothenberg", "Christian Esteve", "" ], [ "Macapuna", "Carlos A.", "" ], [ "Verdi", "Fabio L.", "" ], [ "Magalhaes", "Mauricio F.", "" ], [ "Wiesmaier", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3587
R Doomun
Siti Rahayu S., Robiah Y., Shahrin S., Faizal M. A., Mohd Zaki M, Irda R
Tracing Technique for Blaster Attack
8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Volume 4, No. 1, August 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in different OSI layers based on fingerprint of Blaster attack on victim logs, attacker logs and IDS alert log. The researchers intended to do a preliminary investigation upon this particular attack so that it can be used for further research in alert correlation and computer forensic investigation.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 10:32:52 GMT" } ]
2009-08-26T00:00:00
[ [ "S.", "Siti Rahayu", "" ], [ "Y.", "Robiah", "" ], [ "S.", "Shahrin", "" ], [ "A.", "Faizal M.", "" ], [ "M", "Mohd Zaki", "" ], [ "R", "Irda", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.3610
Thimo Rohlf
Thimo Rohlf and Christopher R. Winkler
Emergent Network Structure, evolvable Robustness and non-linear Effects of Point Mutations in an Artificial Genome Model
null
Advances in Complex Systems, Vol. 12, pp. 293 - 310 (2009)
null
null
q-bio.MN cond-mat.dis-nn cs.NE q-bio.GN q-bio.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Genetic regulation is a key component in development, but a clear understanding of the structure and dynamics of genetic networks is not yet at hand. In this paper we investigate these properties within an artificial genome model originally introduced by Reil (1999). We analyze statistical properties of randomly generated genomes both on the sequence- and network level, and show that this model correctly predicts the frequency of genes in genomes as found in experimental data. Using an evolutionary algorithm based on stabilizing selection for a phenotype, we show that dynamical robustness against single base mutations, as well as against random changes in initial states of regulatory dynamics that mimic stochastic fluctuations in environmental conditions, can emerge in parallel. Point mutations at the sequence level have strongly non-linear effects on network wiring, including as well structurally neutral mutations and simultaneous rewiring of multiple connections, which occasionally lead to strong reorganization of the attractor landscape and metastability of evolutionary dynamics. Evolved genomes exhibit characteristic patterns on both sequence and network level.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 12:44:43 GMT" } ]
2009-08-26T00:00:00
[ [ "Rohlf", "Thimo", "" ], [ "Winkler", "Christopher R.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.MN", "description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks", "span": "(Molecular Networks)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Quantitative Biology", "code": "q-bio.SC", "description": "Assembly and control of subcellular structures (channels, organelles, cytoskeletons, capsules, etc.); molecular motors, transport, subcellular localization; mitosis and meiosis", "span": "(Subcellular Processes)" } ]
0908.3633
Aparna Das
Aparna Das, Claire Mathieu, Daniel Ricketts
Maximizing profit using recommender systems
null
null
null
null
cs.CY cs.AI cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditional recommendation systems make recommendations based solely on the customer's past purchases, product ratings and demographic data without considering the profitability the items being recommended. In this work we study the question of how a vendor can directly incorporate the profitability of items into its recommender so as to maximize its expected profit while still providing accurate recommendations. Our approach uses the output of any traditional recommender system and adjust them according to item profitabilities. Our approach is parameterized so the vendor can control how much the recommendation incorporating profits can deviate from the traditional recommendation. We study our approach under two settings and show that it achieves approximately 22% more profit than traditional recommendations.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 15:30:34 GMT" } ]
2009-08-27T00:00:00
[ [ "Das", "Aparna", "" ], [ "Mathieu", "Claire", "" ], [ "Ricketts", "Daniel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0908.3634
Dominique Duval
Dominique Duval (LJK), C\'esar Dominguez
A parameterization process as a categorical construction
null
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The parameterization process used in the symbolic computation systems Kenzo and EAT is studied here as a general construction in a categorical framework. This parameterization process starts from a given specification and builds a parameterized specification by transforming some operations into parameterized operations, which depend on one additional variable called the parameter. Given a model of the parameterized specification, each interpretation of the parameter, called an argument, provides a model of the given specification. Moreover, under some relevant terminality assumption, this correspondence between the arguments and the models of the given specification is a bijection. It is proved in this paper that the parameterization process is provided by a free functor and the subsequent parameter passing process by a natural transformation. Various categorical notions are used, mainly adjoint functors, pushouts and lax colimits.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 15:31:18 GMT" } ]
2009-08-26T00:00:00
[ [ "Duval", "Dominique", "", "LJK" ], [ "Dominguez", "César", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0908.3650
Keiko Nakata Dr
Keiko Nakata
Lazy mixin modules and disciplined effects
null
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Programming languages are expected to support programmer's effort to structure program code. The ML module system, object systems and mixins are good examples of language constructs promoting modular programming. Among the three, mixins can be thought of as a generalization of the two others in the sense that mixins can incorporate features of ML modules and objects with a set of primitive operators with clean semantics. Much work has been devoted to build mixin-based module systems for practical programming languages. In respect of the operational semantics, previous work notably investigated mixin calculi in call-by-name and call-by-value evaluation settings. In this paper we examine a mixin calculus in a call-by-need, or lazy, evaluation setting. We demonstrate how lazy mixins can be interesting in practice with a series of examples, and formalize the operational semantics by adapting Ancona and Zucca's concise formalization of call-by-name mixins. We then extend the semantics with constraints to control the evaluation order of components of mixins in several ways. The main motivation for considering the constraints is to produce side effects in a more explicit order than in a purely lazy, demand-driven setting. We explore the design space of possibly interesting constraints and consider two examples in detail.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 17:20:47 GMT" } ]
2009-08-26T00:00:00
[ [ "Nakata", "Keiko", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0908.3652
Mugurel Ionut Andreica
Mugurel Ionut Andreica, Eliana-Dina Tirsa, Cristina Teodora Andreica, Romulus Andreica, Mihai Aristotel Ungureanu
Optimal Geometric Partitions, Covers and K-Centers
Extended version of the conference paper
Proc. of the 9th WSEAS Intl. Conf. on Mathematics and Computers in Business and Economics (MCBE), pp. 173-178, Bucharest, Romania, 24-26 June, 2008. (ISBN: 978-960-6766-76-3 / ISSN: 1790-5109)
null
null
cs.DS cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present some new, practical, geometric optimization techniques for computing polygon partitions, 1D and 2D point, interval, square and rectangle covers, as well as 1D and 2D interval and rectangle K-centers. All the techniques we present have immediate applications to several cost optimization and facility location problems which are quite common in practice. The main technique employed is dynamic programming, but we also make use of efficient data structures and fast greedy algorithms.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 17:47:50 GMT" } ]
2009-08-26T00:00:00
[ [ "Andreica", "Mugurel Ionut", "" ], [ "Tirsa", "Eliana-Dina", "" ], [ "Andreica", "Cristina Teodora", "" ], [ "Andreica", "Romulus", "" ], [ "Ungureanu", "Mihai Aristotel", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.3653
Priya Ranjan
Harry W. Bullen IV and Priya Ranjan
Chaotic Transitions in Wall Following Robots
null
null
null
null
nlin.CD cs.RO nlin.AO
http://creativecommons.org/licenses/publicdomain/
In this paper we examine how simple agents similar to Braitenberg vehicles can exhibit chaotic movement patterns. The agents are wall following robots as described by Steve Mesburger and Alfred Hubler in their paper "Chaos in Wall Following Robots". These agents uses a simple forward facing distance sensor, with a limited field of view "phi" for navigation. An agent drives forward at a constant velocity and uses the sensor to turn right when it is too close to an object and left when it is too far away. For a flat wall the agent stays a fixed distance from the wall and travels along it, regardless of the sensor's capabilities. But, if the wall represents a periodic function, the agent drives on a periodic path when the sensor has a narrow field of view. The agent's trajectory transitions to chaos when the sensor's field of view is increased. Numerical experiments were performed with square, triangle, and sawtooth waves for the wall, to find this pattern. The bifurcations of the agents were analyzed, finding both border collision and period doubling bifurcations. Detailed experimental results will be reported separately.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 18:03:22 GMT" } ]
2009-08-26T00:00:00
[ [ "Bullen", "Harry W.", "IV" ], [ "Ranjan", "Priya", "" ] ]
[ { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0908.3666
Ramon Van Handel
Ramon van Handel
On the minimal penalty for Markov order estimation
29 pages
Probab. Th. Rel. Fields 150 (2011), pp. 709-738
10.1007/s00440-010-0290-y
null
math.PR cs.IT math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that large-scale typicality of Markov sample paths implies that the likelihood ratio statistic satisfies a law of iterated logarithm uniformly to the same scale. As a consequence, the penalized likelihood Markov order estimator is strongly consistent for penalties growing as slowly as log log n when an upper bound is imposed on the order which may grow as rapidly as log n. Our method of proof, using techniques from empirical process theory, does not rely on the explicit expression for the maximum likelihood estimator in the Markov case and could therefore be applicable in other settings.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 19:34:10 GMT" } ]
2011-08-31T00:00:00
[ [ "van Handel", "Ramon", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0908.3670
Jinwoo Shin
Devavrat Shah, Jinwoo Shin
Randomized Scheduling Algorithm for Queueing Networks
null
null
null
null
cs.IT cs.NI math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There has recently been considerable interest in design of low-complexity, myopic, distributed and stable scheduling policies for constrained queueing network models that arise in the context of emerging communication networks. Here, we consider two representative models. One, a model for the collection of wireless nodes communicating through a shared medium, that represents randomly varying number of packets in the queues at the nodes of networks. Two, a buffered circuit switched network model for an optical core of future Internet, to capture the randomness in calls or flows present in the network. The maximum weight scheduling policy proposed by Tassiulas and Ephremide in 1992 leads to a myopic and stable policy for the packet-level wireless network model. But computationally it is very expensive (NP-hard) and centralized. It is not applicable to the buffered circuit switched network due to the requirement of non-premption of the calls in the service. As the main contribution of this paper, we present a stable scheduling algorithm for both of these models. The algorithm is myopic, distributed and performs few logical operations at each node per unit time.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 19:44:58 GMT" }, { "version": "v2", "created": "Sun, 4 Apr 2010 18:26:21 GMT" } ]
2010-04-06T00:00:00
[ [ "Shah", "Devavrat", "" ], [ "Shin", "Jinwoo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0908.3689
Renuka Kandregula
Renuka Kandregula
A DHT Based Measure of Randomness
15 pages, 8 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new discrete Hilbert transform (DHT) based measure of randomness for discrete sequences. The measure has been used to test three different classes of sequences with satisfactory results.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 21:16:39 GMT" } ]
2009-08-27T00:00:00
[ [ "Kandregula", "Renuka", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0908.3702
Hong Ju Park
Hong Ju Park and Ender Ayanoglu
Bit-Interleaved Coded Multiple Beamforming with Constellation Precoding
submitted to conference
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present the diversity order analysis of bit-interleaved coded multiple beamforming (BICMB) combined with the constellation precoding scheme. Multiple beamforming is realized by singular value decomposition of the channel matrix which is assumed to be perfectly known to the transmitter as well as the receiver. Previously, BICMB is known to have a diversity order bound related with the product of the code rate and the number of parallel subchannels, losing the full diversity order in some cases. In this paper, we show that BICMB combined with the constellation precoder and maximum likelihood detection achieves the full diversity order. We also provide simulation results that match the analysis.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 23:07:47 GMT" } ]
2009-08-27T00:00:00
[ [ "Park", "Hong Ju", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3706
Somak Raychaudhury
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhury, Xin Yao, Markus Harva
Uncovering delayed patterns in noisy and irregularly sampled time series: an astronomy application
36 pages, 10 figures, 16 tables, accepted for publication in Pattern Recognition. This is a shortened version of the article: interested readers are urged to refer to the published version
null
null
null
astro-ph.CO astro-ph.IM cs.LG cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of estimating the time delay between two signals representing delayed, irregularly sampled and noisy versions of the same underlying pattern. We propose and demonstrate an evolutionary algorithm for the (hyper)parameter estimation of a kernel-based technique in the context of an astronomical problem, namely estimating the time delay between two gravitationally lensed signals from a distant quasar. Mixed types (integer and real) are used to represent variables within the evolutionary algorithm. We test the algorithm on several artificial data sets, and also on real astronomical observations of quasar Q0957+561. By carrying out a statistical analysis of the results we present a detailed comparison of our method with the most popular methods for time delay estimation in astrophysics. Our method yields more accurate and more stable time delay estimates: for Q0957+561, we obtain 419.6 days for the time delay between images A and B. Our methodology can be readily applied to current state-of-the-art optical monitoring data in astronomy, but can also be applied in other disciplines involving similar time series data.
[ { "version": "v1", "created": "Tue, 25 Aug 2009 23:21:39 GMT" } ]
2009-08-27T00:00:00
[ [ "Cuevas-Tello", "Juan C.", "" ], [ "Tino", "Peter", "" ], [ "Raychaudhury", "Somak", "" ], [ "Yao", "Xin", "" ], [ "Harva", "Markus", "" ] ]
[ { "class": "Physics", "code": "astro-ph.CO", "description": "Phenomenology of early universe, cosmic microwave background, cosmological parameters, primordial element abundances, extragalactic distance scale, large-scale structure of the universe. Groups, superclusters, voids, intergalactic medium. Particle astrophysics: dark energy, dark matter, baryogenesis, leptogenesis, inflationary models, reheating, monopoles, WIMPs, cosmic strings, primordial black holes, cosmological gravitational radiation", "span": "(Cosmology and Nongalactic Astrophysics)" }, { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0908.3710
Moustafa Youssef
Aly El Gamal, Moustafa Youssef, and Hesham El Gamal
Randomization for Security in Half-Duplex Two-Way Gaussian Channels
null
Globecom 2009
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper develops a new physical layer framework for secure two-way wireless communication in the presence of a passive eavesdropper, i.e., Eve. Our approach achieves perfect information theoretic secrecy via a novel randomized scheduling and power allocation scheme. The key idea is to allow Alice and Bob to send symbols at random time instants. While Alice will be able to determine the symbols transmitted by Bob, Eve will suffer from ambiguity regarding the source of any particular symbol. This desirable ambiguity is enhanced, in our approach, by randomizing the transmit power level. Our theoretical analysis, in a 2-D geometry, reveals the ability of the proposed approach to achieve relatively high secure data rates under mild conditions on the spatial location of Eve. These theoretical claims are then validated by experimental results using IEEE 802.15.4-enabled sensor boards in different configurations, motivated by the spatial characteristics of Wireless Body Area Networks (WBAN).
[ { "version": "v1", "created": "Wed, 26 Aug 2009 00:41:13 GMT" } ]
2009-08-27T00:00:00
[ [ "Gamal", "Aly El", "" ], [ "Youssef", "Moustafa", "" ], [ "Gamal", "Hesham El", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3715
Moustafa Youssef
Moustafa Youssef, Adel Youssef, and Mohamed Younis
Overlapping Multi-hop Clustering for Wireless Sensor Networks
null
IEEE TPDS 2009
10.1109/TPDS.2009.32
WINC-TR-1001
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clustering is a standard approach for achieving efficient and scalable performance in wireless sensor networks. Traditionally, clustering algorithms aim at generating a number of disjoint clusters that satisfy some criteria. In this paper, we formulate a novel clustering problem that aims at generating overlapping multi-hop clusters. Overlapping clusters are useful in many sensor network applications, including inter-cluster routing, node localization, and time synchronization protocols. We also propose a randomized, distributed multi-hop clustering algorithm (KOCA) for solving the overlapping clustering problem. KOCA aims at generating connected overlapping clusters that cover the entire sensor network with a specific average overlapping degree. Through analysis and simulation experiments we show how to select the different values of the parameters to achieve the clustering process objectives. Moreover, the results show that KOCA produces approximately equal-sized clusters, which allows distributing the load evenly over different clusters. In addition, KOCA is scalable; the clustering formation terminates in a constant time regardless of the network size.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 01:43:15 GMT" } ]
2013-04-09T00:00:00
[ [ "Youssef", "Moustafa", "" ], [ "Youssef", "Adel", "" ], [ "Younis", "Mohamed", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.3716
Sariel Har-Peled
Sariel Har-Peled
Carnival of Samplings: Nets, Approximations, Relative and Sensitive
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We survey several results known on sampling in computational geometry.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 01:44:49 GMT" } ]
2009-08-27T00:00:00
[ [ "Har-Peled", "Sariel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.3731
Edlyn Teske
Jennifer Balakrishnan, Juliana Belding, Sarah Chisholm, Kirsten Eisentraeger, Katherine Stange, Edlyn Teske
Pairings on hyperelliptic curves
v2: with corrections and improvements in sections 4 and 5
Fields Institute Communications 60 (2011) 87-120
null
null
math.NT cs.CR math.AG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We assemble and reorganize the recent work in the area of hyperelliptic pairings: We survey the research on constructing hyperelliptic curves suitable for pairing-based cryptography. We also showcase the hyperelliptic pairings proposed to date, and develop a unifying framework. We discuss the techniques used to optimize the pairing computation on hyperelliptic curves, and present many directions for further research.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 06:28:35 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2009 04:13:02 GMT" } ]
2014-12-30T00:00:00
[ [ "Balakrishnan", "Jennifer", "" ], [ "Belding", "Juliana", "" ], [ "Chisholm", "Sarah", "" ], [ "Eisentraeger", "Kirsten", "" ], [ "Stange", "Katherine", "" ], [ "Teske", "Edlyn", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.AG", "description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology", "span": "(Algebraic Geometry)" } ]
0908.3737
Dominique Duval
Cesar Dominguez, Dominique Duval (LJK)
Diagrammatic logic applied to a parameterization process
null
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper provides an abstract definition of some kinds of logics, called diagrammatic logics, together with a definition of morphisms and of 2-morphisms between diagrammatic logics. The definition of the 2-category of diagrammatic logics rely on category theory, mainly on adjunction, categories of fractions and limit sketches. This framework is applied to the formalization of a parameterization process. This process, which consists in adding a formal parameter to some operations in a given specification, is presented as a morphism of logics. Then the parameter passing process, for recovering a model of the given specification from a model of the parameterized specification and an actual parameter, is seen as a 2-morphism of logics.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 06:50:00 GMT" } ]
2009-08-27T00:00:00
[ [ "Dominguez", "Cesar", "", "LJK" ], [ "Duval", "Dominique", "", "LJK" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0908.3740
Ian Post
Ashish Goel and Ian Post
An Oblivious O(1)-Approximation for Single Source Buy-at-Bulk
22 pages, 1 figure To appear in the proceedings of the 50th annual IEEE Symposium on Foundations of Computer Science (FOCS 2009)
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the single-source (or single-sink) buy-at-bulk problem with an unknown concave cost function. We want to route a set of demands along a graph to or from a designated root node, and the cost of routing x units of flow along an edge is proportional to some concave, non-decreasing function f such that f(0) = 0. We present a polynomial time algorithm that finds a distribution over trees such that the expected cost of a tree for any f is within an O(1)-factor of the optimum cost for that f. The previous best simultaneous approximation for this problem, even ignoring computation time, was O(log |D|), where D is the multi-set of demand nodes. We design a simple algorithmic framework using the ellipsoid method that finds an O(1)-approximation if one exists, and then construct a separation oracle using a novel adaptation of the Guha, Meyerson, and Munagala algorithm for the single-sink buy-at-bulk problem that proves an O(1) approximation is possible for all f. The number of trees in the support of the distribution constructed by our algorithm is at most 1+log |D|.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 07:20:01 GMT" } ]
2009-08-27T00:00:00
[ [ "Goel", "Ashish", "" ], [ "Post", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.3784
Alexandr Kazda
Jarkko Kari, Alexandr Kazda, Paula Steinby
On Continuous Weighted Finite Automata
41 pages, 9 figures
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the continuity of the \omega-functions and real functions defined by weighted finite automata (WFA). We concentrate on the case of average preserving WFA. We show that every continuous \omega-function definable by some WFA can be defined by an average preserving WFA and then characterize minimal average preserving WFA whose \omega-function or \omega-function and real function are continuous. We obtain several algorithmic reductions for WFA-related decision problems. In particular, we show that deciding whether the \omega-function and real function of an average preserving WFA are both continuous is computationally equivalent to deciding stability of a set of matrices. We also present a method for constructing WFA that compute continuous real functions.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 18:07:50 GMT" } ]
2009-08-27T00:00:00
[ [ "Kari", "Jarkko", "" ], [ "Kazda", "Alexandr", "" ], [ "Steinby", "Paula", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0908.3850
Yusuke Watanabe
Yusuke Watanabe, Kenji Fukumizu
New graph polynomials from the Bethe approximation of the Ising partition function
To appear in Combinatorics, Probability & Computing. Revised from the first version, 28 pages
null
null
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce two graph polynomials and discuss their properties. One is a polynomial of two variables whose investigation is motivated by the performance analysis of the Bethe approximation of the Ising partition function. The other is a polynomial of one variable that is obtained by the specialization of the first one. It is shown that these polynomials satisfy deletion-contraction relations and are new examples of the V-function, which was introduced by Tutte (1947, Proc. Cambridge Philos. Soc. 43, 26-40). For these polynomials, we discuss the interpretations of special values and then obtain the bound on the number of sub-coregraphs, i.e., spanning subgraphs with no vertices of degree one. It is proved that the polynomial of one variable is equal to the monomer-dimer partition function with weights parameterized by that variable. The properties of the coefficients and the possible region of zeros are also discussed for this polynomial.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 15:36:59 GMT" }, { "version": "v2", "created": "Fri, 4 Jun 2010 02:27:15 GMT" } ]
2010-06-07T00:00:00
[ [ "Watanabe", "Yusuke", "" ], [ "Fukumizu", "Kenji", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.3855
Kunal Narayan Chaudhury Dr.
Kunal Narayan Chaudhury and Michael Unser
Gabor wavelet analysis and the fractional Hilbert transform
7 pages, 1 figure
SPIE Proceedings: Wavelets XIII 2009
null
null
cs.IT cs.CV math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose an amplitude-phase representation of the dual-tree complex wavelet transform (DT-CWT) which provides an intuitive interpretation of the associated complex wavelet coefficients. The representation, in particular, is based on the shifting action of the group of fractional Hilbert transforms (fHT) which allow us to extend the notion of arbitrary phase-shifts beyond pure sinusoids. We explicitly characterize this shifting action for a particular family of Gabor-like wavelets which, in effect, links the corresponding dual-tree transform with the framework of windowed-Fourier analysis. We then extend these ideas to the bivariate DT-CWT based on certain directional extensions of the fHT. In particular, we derive a signal representation involving the superposition of direction-selective wavelets affected with appropriate phase-shifts.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 16:24:08 GMT" } ]
2010-03-11T00:00:00
[ [ "Chaudhury", "Kunal Narayan", "" ], [ "Unser", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3861
Kunal Narayan Chaudhury Dr.
Kunal Narayan Chaudhury, Arrate Munoz Barrutia and Michael Unser
Fast adaptive elliptical filtering using box splines
9 pages, 1 figure
Proceedings IEEE International Conference on Image Processing, 2008
10.1109/ICIP.2008.4711872
null
cs.IT cs.CV math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We demonstrate that it is possible to filter an image with an elliptic window of varying size, elongation and orientation with a fixed computational cost per pixel. Our method involves the application of a suitable global pre-integrator followed by a pointwise-adaptive localization mesh. We present the basic theory for the 1D case using a B-spline formalism and then appropriately extend it to 2D using radially-uniform box splines. The size and ellipticity of these radially-uniform box splines is adaptively controlled. Moreover, they converge to Gaussians as the order increases. Finally, we present a fast and practical directional filtering algorithm that has the capability of adapting to the local image features.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 16:44:42 GMT" }, { "version": "v2", "created": "Thu, 27 Aug 2009 12:53:35 GMT" } ]
2016-11-15T00:00:00
[ [ "Chaudhury", "Kunal Narayan", "" ], [ "Barrutia", "Arrate Munoz", "" ], [ "Unser", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3886
Jonathan Yedidia Dr.
Stark C. Draper, Lingjia Liu, Andreas F. Molisch, Jonathan S. Yedidia
Cooperative Routing for Wireless Networks using Mutual-Information Accumulation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cooperation between the nodes of wireless multihop networks can increase communication reliability, reduce energy consumption, and decrease latency. The possible improvements are even greater when nodes perform mutual information accumulation using rateless codes. In this paper, we investigate routing problems in such networks. Given a network, a source, and a destination, our objective is to minimize end-to-end transmission delay under energy and bandwidth constraints. We provide an algorithm that determines which nodes should participate in forwarding the message and what resources (time, energy, bandwidth) should be allocated to each. Our approach factors into two sub-problems, each of which can be solved efficiently. For any transmission order we show that solving for the optimum resource allocation can be formulated as a linear programming problem. We then show that the transmission order can be improved systematically by swapping nodes based on the solution of the linear program. Solving a sequence of linear programs leads to a locally optimal solution in a very efficient manner. In comparison to the proposed cooperative routing solution, it is observed that conventional shortest path multihop routing typically incurs additional delays and energy expenditures on the order of 70%. Our first algorithm is centralized, assuming that routing computations can be done at a central processor with full access to channel state information for the entire system. We also design two distributed routing algorithms that require only local channel state information. We provide simulations showing that for the same networks the distributed algorithms find routes that are only about two to five percent less efficient than the centralized algorithm.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 19:36:36 GMT" } ]
2009-08-27T00:00:00
[ [ "Draper", "Stark C.", "" ], [ "Liu", "Lingjia", "" ], [ "Molisch", "Andreas F.", "" ], [ "Yedidia", "Jonathan S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3889
Manuel Tiglio
Frank Herrmann, John Silberholz, Matias Bellone, Gustavo Guerberoff, Manuel Tiglio
Integrating Post-Newtonian Equations on Graphics Processing Units
Added one reference
Class.Quant.Grav.27:032001,2010
10.1088/0264-9381/27/3/032001
null
gr-qc astro-ph.CO astro-ph.EP astro-ph.GA astro-ph.HE astro-ph.IM astro-ph.SR cs.DC cs.GR cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We report on early results of a numerical and statistical study of binary black hole inspirals. The two black holes are evolved using post-Newtonian approximations starting with initially randomly distributed spin vectors. We characterize certain aspects of the distribution shortly before merger. In particular we note the uniform distribution of black hole spin vector dot products shortly before merger and a high correlation between the initial and final black hole spin vector dot products in the equal-mass, maximally spinning case. These simulations were performed on Graphics Processing Units, and we demonstrate a speed-up of a factor 50 over a more conventional CPU implementation.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 20:00:38 GMT" }, { "version": "v2", "created": "Thu, 27 Aug 2009 17:39:59 GMT" } ]
2016-09-08T00:00:00
[ [ "Herrmann", "Frank", "" ], [ "Silberholz", "John", "" ], [ "Bellone", "Matias", "" ], [ "Guerberoff", "Gustavo", "" ], [ "Tiglio", "Manuel", "" ] ]
[ { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Physics", "code": "astro-ph.CO", "description": "Phenomenology of early universe, cosmic microwave background, cosmological parameters, primordial element abundances, extragalactic distance scale, large-scale structure of the universe. Groups, superclusters, voids, intergalactic medium. Particle astrophysics: dark energy, dark matter, baryogenesis, leptogenesis, inflationary models, reheating, monopoles, WIMPs, cosmic strings, primordial black holes, cosmological gravitational radiation", "span": "(Cosmology and Nongalactic Astrophysics)" }, { "class": "Physics", "code": "astro-ph.EP", "description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system", "span": "(Earth and Planetary Astrophysics)" }, { "class": "Physics", "code": "astro-ph.GA", "description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents", "span": "(Astrophysics of Galaxies)" }, { "class": "Physics", "code": "astro-ph.HE", "description": "Cosmic ray production, acceleration, propagation, detection. Gamma ray astronomy and bursts, X-rays, charged particles, supernovae and other explosive phenomena, stellar remnants and accretion systems, jets, microquasars, neutron stars, pulsars, black holes", "span": "(High Energy Astrophysical Phenomena)" }, { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Physics", "code": "astro-ph.SR", "description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems", "span": "(Solar and Stellar Astrophysics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0908.3902
Harm Hollestelle
Harm Hollestelle
On the Expressiveness of Line Drawings
10 pages
null
null
null
cs.OH cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Can expressiveness of a drawing be traced with a computer? In this study a neural network (perceptron) and a support vector machine are used to classify line drawings. To do this the line drawings are attributed values according to a kinematic model and a diffusion model for the lines they consist of. The values for both models are related to looking times. Extreme values according to these models, that is both extremely short and extremely long looking times, are interpreted as indicating expressiveness. The results strongly indicate that expressiveness in this sense can be detected, at least with a neural network.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 20:34:50 GMT" } ]
2009-08-28T00:00:00
[ [ "Hollestelle", "Harm", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0908.3911
Minghui Jiang
Minghui Jiang and Pedro J. Tejada
Spreading grid cells
null
Minghui Jiang, Vincent Pilaud, and Pedro J. Tejada. On a dispersion problem in grid labeling. In Proceedings of the 22nd Canadian Conference on Computational Geometry (CCCG 2010), pages 75-78
null
null
cs.CG cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $S$ be a set of $n^2$ symbols. Let $A$ be an $n\times n$ square grid with each cell labeled by a distinct symbol in $S$. Let $B$ be another $n\times n$ square grid, also with each cell labeled by a distinct symbol in $S$. Then each symbol in $S$ labels two cells, one in $A$ and one in $B$. Define the \emph{combined distance} between two symbols in $S$ as the distance between the two cells in $A$ plus the distance between the two cells in $B$ that are labeled by the two symbols. Bel\'en Palop asked the following question at the open problems session of CCCG 2009: How to arrange the symbols in the two grids such that the minimum combined distance between any two symbols is maximized? In this paper, we give a partial answer to Bel\'en Palop's question. Define $c_p(n) = \max_{A,B}\min_{s,t \in S} \{\dist_p(A,s,t) + \dist_p(B,s,t) \}$, where $A$ and $B$ range over all pairs of $n\times n$ square grids labeled by the same set $S$ of $n^2$ distinct symbols, and where $\dist_p(A,s,t)$ and $\dist_p(B,s,t)$ are the $L_p$ distances between the cells in $A$ and in $B$, respectively, that are labeled by the two symbols $s$ and $t$. We present asymptotically optimal bounds $c_p(n) = \Theta(\sqrt{n})$ for all $p=1,2,...,\infty$. The bounds also hold for generalizations to $d$-dimensional grids for any constant $d \ge 2$. Our proof yields a simple linear-time constant-factor approximation algorithm for maximizing the minimum combined distance between any two symbols in two grids.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 15:59:23 GMT" } ]
2010-08-24T00:00:00
[ [ "Jiang", "Minghui", "" ], [ "Tejada", "Pedro J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.3916
David Eppstein
David Eppstein
Graph-Theoretic Solutions to Computational Geometry Problems
16 pages, 7 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many problems in computational geometry are not stated in graph-theoretic terms, but can be solved efficiently by constructing an auxiliary graph and performing a graph-theoretic algorithm on it. Often, the efficiency of the algorithm depends on the special properties of the graph constructed in this way. We survey the art gallery problem, partition into rectangles, minimum-diameter clustering, rectilinear cartogram construction, mesh stripification, angle optimization in tilings, and metric embedding from this perspective.
[ { "version": "v1", "created": "Wed, 26 Aug 2009 23:28:23 GMT" } ]
2009-08-28T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.3929
Stephen Smith
Stephen L. Smith, Shaunak D. Bopardikar, and Francesco Bullo
A Dynamic Boundary Guarding Problem with Translating Targets
Extended version of paper for the joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference
null
10.1109/CDC.2009.5400538
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a problem in which a service vehicle seeks to guard a deadline (boundary) from dynamically arriving mobile targets. The environment is a rectangle and the deadline is one of its edges. Targets arrive continuously over time on the edge opposite the deadline, and move towards the deadline at a fixed speed. The goal for the vehicle is to maximize the fraction of targets that are captured before reaching the deadline. We consider two cases; when the service vehicle is faster than the targets, and; when the service vehicle is slower than the targets. In the first case we develop a novel vehicle policy based on computing longest paths in a directed acyclic graph. We give a lower bound on the capture fraction of the policy and show that the policy is optimal when the distance between the target arrival edge and deadline becomes very large. We present numerical results which suggest near optimal performance away from this limiting regime. In the second case, when the targets are slower than the vehicle, we propose a policy based on servicing fractions of the translational minimum Hamiltonian path. In the limit of low target speed and high arrival rate, the capture fraction of this policy is within a small constant factor of the optimal.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 02:26:40 GMT" } ]
2016-11-17T00:00:00
[ [ "Smith", "Stephen L.", "" ], [ "Bopardikar", "Shaunak D.", "" ], [ "Bullo", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0908.3930
Michael Sirivianos
Michael Sirivianos, Xiaowei Yang, Kyungbaek Kim
SocialFilter: Collaborative Spam Mitigation using Social Networks
10 pages
null
null
null
cs.CR cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Spam mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times, and it is often proprietary. The second approach is not widely adopted, partly due to the lack of guarantees regarding the trustworthiness of nodes that comprise the system. Our proposal, SocialFilter, aims to achieve the trustworthiness of centralized security services and the wide coverage, responsiveness and inexpensiveness of large-scale collaborative spam mitigation. We propose a large-scale distributed system that enables clients with no email classification functionality to query the network on the behavior of a host. A SocialFilter node builds trust for its peers by auditing their behavioral reports and by leveraging the social network of SocialFilter administrators. The node combines the confidence its peers have in their own reports and the trust it places on its peers to derive the likelihood that a host is spamming. The simulation-based evaluation of our approach indicates its potential under a real-world deployment: during a simulated spam campaign, SocialFilternodes characterized 92% of spam bot connections with confidence greater than 50%, while yielding no false positives
[ { "version": "v1", "created": "Thu, 27 Aug 2009 02:34:11 GMT" } ]
2009-08-28T00:00:00
[ [ "Sirivianos", "Michael", "" ], [ "Yang", "Xiaowei", "" ], [ "Kim", "Kyungbaek", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0908.3954
Alexandre Goldsztejn
Alexandre Goldsztejn (LINA)
On the Exponentiation of Interval Matrices
null
null
null
null
cs.NA cs.CC math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The numerical computation of the exponentiation of a real matrix has been intensively studied. The main objective of a good numerical method is to deal with round-off errors and computational cost. The situation is more complicated when dealing with interval matrices exponentiation: Indeed, the main problem will now be the dependency loss of the different occurrences of the variables due to interval evaluation, which may lead to so wide enclosures that they are useless. In this paper, the problem of computing a sharp enclosure of the interval matrix exponential is proved to be NP-hard. Then the scaling and squaring method is adapted to interval matrices and shown to drastically reduce the dependency loss w.r.t. the interval evaluation of the Taylor series.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 08:49:57 GMT" } ]
2009-08-28T00:00:00
[ [ "Goldsztejn", "Alexandre", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0908.3957
Jerome Darmont
Hadj Mahboubi (ERIC), J\'er\^ome Darmont (ERIC)
Enhancing XML Data Warehouse Query Performance by Fragmentation
null
24th Annual ACM Symposium on Applied Computing (SAC 09), Hawaii : United States (2009)
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
XML data warehouses form an interesting basis for decision-support applications that exploit heterogeneous data from multiple sources. However, XML-native database systems currently suffer from limited performances in terms of manageable data volume and response time for complex analytical queries. Fragmenting and distributing XML data warehouses (e.g., on data grids) allow to address both these issues. In this paper, we work on XML warehouse fragmentation. In relational data warehouses, several studies recommend the use of derived horizontal fragmentation. Hence, we propose to adapt it to the XML context. We particularly focus on the initial horizontal fragmentation of dimensions' XML documents and exploit two alternative algorithms. We experimentally validate our proposal and compare these alternatives with respect to a unified XML warehouse model we advocate for.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 09:12:08 GMT" } ]
2009-08-28T00:00:00
[ [ "Mahboubi", "Hadj", "", "ERIC" ], [ "Darmont", "Jérôme", "", "ERIC" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0908.3981
Alexander Mozeika
Alexander Mozeika, David Saad and Jack Raymond
Computing with Noise - Phase Transitions in Boolean Formulas
10 pages, 2 figures
null
10.1103/PhysRevLett.103.248701
null
cond-mat.dis-nn cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Computing circuits composed of noisy logical gates and their ability to represent arbitrary Boolean functions with a given level of error are investigated within a statistical mechanics setting. Bounds on their performance, derived in the information theory literature for specific gates, are straightforwardly retrieved, generalized and identified as the corresponding typical-case phase transitions. This framework paves the way for obtaining new results on error-rates, function-depth and sensitivity, and their dependence on the gate-type and noise model used.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 11:03:32 GMT" } ]
2015-05-14T00:00:00
[ [ "Mozeika", "Alexander", "" ], [ "Saad", "David", "" ], [ "Raymond", "Jack", "" ] ]
[ { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.3982
Yasutada Oohama
Yasutada Oohama
Distributed Source Coding for Correlated Memoryless Gaussian Sources
23 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a distributed source coding problem of $L$ correlated Gaussian observations $Y_i, i=1,2,...,L$. We assume that the random vector $Y^{L}={}^{\rm t} (Y_1,Y_2,$ $...,Y_L)$ is an observation of the Gaussian random vector $X^K={}^{\rm t}(X_1,X_2,...,X_K)$, having the form $Y^L=AX^K+N^L ,$ where $A$ is a $L\times K$ matrix and $N^L={}^{\rm t}(N_1,N_2,...,N_L)$ is a vector of $L$ independent Gaussian random variables also independent of $X^K$. The estimation error on $X^K$ is measured by the distortion covariance matrix. The rate distortion region is defined by a set of all rate vectors for which the estimation error is upper bounded by an arbitrary prescribed covariance matrix in the meaning of positive semi definite. In this paper we derive explicit outer and inner bounds of the rate distortion region. This result provides a useful tool to study the direct and indirect source coding problems on this Gaussian distributed source coding system, which remain open in general.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 11:21:21 GMT" }, { "version": "v2", "created": "Wed, 16 Sep 2009 10:38:28 GMT" }, { "version": "v3", "created": "Fri, 13 Nov 2009 11:05:55 GMT" }, { "version": "v4", "created": "Wed, 13 Jan 2010 10:26:41 GMT" } ]
2010-01-13T00:00:00
[ [ "Oohama", "Yasutada", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.3994
Samuel Mimram
Samuel Mimram (PPS)
The Structure of First-Order Causality
null
Logic in Computer Science, Los Angeles : United States (2009)
10.1109/LICS.2009.19
null
cs.LO math.CT math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Game semantics describe the interactive behavior of proofs by interpreting formulas as games on which proofs induce strategies. Such a semantics is introduced here for capturing dependencies induced by quantifications in first-order propositional logic. One of the main difficulties that has to be faced during the elaboration of this kind of semantics is to characterize definable strategies, that is strategies which actually behave like a proof. This is usually done by restricting the model to strategies satisfying subtle combinatorial conditions, whose preservation under composition is often difficult to show. Here, we present an original methodology to achieve this task, which requires to combine advanced tools from game semantics, rewriting theory and categorical algebra. We introduce a diagrammatic presentation of the monoidal category of definable strategies of our model, by the means of generators and relations: those strategies can be generated from a finite set of atomic strategies and the equality between strategies admits a finite axiomatization, this equational structure corresponding to a polarized variation of the notion of bialgebra. This work thus bridges algebra and denotational semantics in order to reveal the structure of dependencies induced by first-order quantifiers, and lays the foundations for a mechanized analysis of causality in programming languages.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 12:08:34 GMT" } ]
2009-08-28T00:00:00
[ [ "Mimram", "Samuel", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0908.3999
Ping Zhu
Ping Zhu
An improved axiomatic definition of information granulation
10 pages
null
null
null
cs.AI
http://creativecommons.org/licenses/by/3.0/
To capture the uncertainty of information or knowledge in information systems, various information granulations, also known as knowledge granulations, have been proposed. Recently, several axiomatic definitions of information granulation have been introduced. In this paper, we try to improve these axiomatic definitions and give a universal construction of information granulation by relating information granulations with a class of functions of multiple variables. We show that the improved axiomatic definition has some concrete information granulations in the literature as instances.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 12:30:49 GMT" } ]
2009-08-28T00:00:00
[ [ "Zhu", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.4005
Emmanuel Nataf
Emmanuel Nataf (INRIA Lorraine - LORIA), Olivier Festor (INRIA Lorraine - LORIA)
jYang : A YANG parser in java
null
null
null
null
cs.PL cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The NETCONF configuration protocol of the IETF Network Work- ing Group provides mechanisms to manipulate the configuration of network devices. YANG is the language currently under consideration within the IETF to specify the data models to be used in NETCONF . This report describes the design and development of a syntax and semantics parser for YANG in java.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 13:02:23 GMT" } ]
2016-11-25T00:00:00
[ [ "Nataf", "Emmanuel", "", "INRIA Lorraine - LORIA" ], [ "Festor", "Olivier", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.4013
Norbert B\'atfai
Norbert B\'atfai
Recombinations of Busy Beaver Machines
15 pages, 11 figures; added new recombinated M_PP(4097) machines
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Many programmers belive that Turing-based machines cannot think. We also believe in this, however it is interesting to note that the most sophisticated machines are not programmed by human beings. We have only discovered them. In this paper, using well-known Busy Beaver and Placid Platypus machines, we generate further very similar, but not exactly the same machines. We have found a recombinated BB_5 machine which can make 70.740.809 steps before halting.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 13:59:27 GMT" }, { "version": "v2", "created": "Fri, 28 Aug 2009 10:23:50 GMT" }, { "version": "v3", "created": "Mon, 7 Sep 2009 10:51:42 GMT" } ]
2009-09-07T00:00:00
[ [ "Bátfai", "Norbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.4016
Vadim E. Levit
Vadim E. Levit and David Tankus
On Relating Edges in Graphs without Cycles of Length 4
6 pages, 1 figure
null
null
null
cs.DM cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An edge xy is relating in the graph G if there is an independent set S, containing neither x nor y, such that S_{x} and S_{y} are both maximal independent sets in G. It is an NP-complete problem to decide whether an edge is relating (Brown, Nowakowski, Zverovich, 2007). We show that the problem remains NP-complete even for graphs without cycles of length 4 and 5. On the other hand, for graphs without cycles of length 4 and 6, the problem can be solved in polynomial time.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 14:11:47 GMT" } ]
2009-08-28T00:00:00
[ [ "Levit", "Vadim E.", "" ], [ "Tankus", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.4041
Alireza Bagheri
Alireza Bagheri and Mohammadreza Razzazi
Complexity of Planar Embeddability of Trees inside Simple Polygons
null
null
null
null
cs.CG cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Geometric embedding of graphs in a point set in the plane is a well known problem. In this paper, the complexity of a variant of this problem, where the point set is bounded by a simple polygon, is considered. Given a point set in the plane bounded by a simple polygon and a free tree, we show that deciding whether there is a planar straight-line embedding of the tree on the point set inside the simple polygon is NP-complete. This implies that the straight-line constrained point-set embedding of trees is also NP-complete, which was posed as an open problem in [8].
[ { "version": "v1", "created": "Thu, 27 Aug 2009 16:35:26 GMT" } ]
2009-08-28T00:00:00
[ [ "Bagheri", "Alireza", "" ], [ "Razzazi", "Mohammadreza", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0908.4051
Aslan Tchamkerten
Venkat Chandar, Aslan Tchamkerten, Gregory W. Wornell
Training-Based Schemes are Suboptimal for High Rate Asynchronous Communication
To appear in the proceedings of the 2009 IEEE Information Theory Workshop (Taormina)
null
10.1109/ITW.2009.5351435
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider asynchronous point-to-point communication. Building on a recently developed model, we show that training based schemes, i.e., communication strategies that separate synchronization from information transmission, perform suboptimally at high rate.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 19:44:59 GMT" } ]
2016-11-17T00:00:00
[ [ "Chandar", "Venkat", "" ], [ "Tchamkerten", "Aslan", "" ], [ "Wornell", "Gregory W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.4061
Hayim Shaul
Micha Sharir, Hayim Shaul
Semi-algebraic Range Reporting and Emptiness Searching with Applications
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a typical range emptiness searching (resp., reporting) problem, we are given a set $P$ of $n$ points in $\reals^d$, and wish to preprocess it into a data structure that supports efficient range emptiness (resp., reporting) queries, in which we specify a range $\sigma$, which, in general, is a semi-algebraic set in $\reals^d$ of constant description complexity, and wish to determine whether $P\cap\sigma=\emptyset$, or to report all the points in $P\cap\sigma$. Range emptiness searching and reporting arise in many applications, and have been treated by Matou\v{s}ek \cite{Ma:rph} in the special case where the ranges are halfspaces bounded by hyperplanes. As shown in \cite{Ma:rph}, the two problems are closely related, and have solutions (for the case of halfspaces) with similar performance bounds. In this paper we extend the analysis to general semi-algebraic ranges, and show how to adapt Matou\v{s}ek's technique, without the need to {\em linearize} the ranges into a higher-dimensional space. This yields more efficient solutions to several useful problems, and we demonstrate the new technique in four applications.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 18:44:56 GMT" }, { "version": "v2", "created": "Mon, 31 Aug 2009 19:07:04 GMT" } ]
2009-08-31T00:00:00
[ [ "Sharir", "Micha", "" ], [ "Shaul", "Hayim", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0908.4062
R Doomun
Sushma Kejgir, and Manesh Kokare
Optimization of Bit Plane Combination for Efficient Digital Image Watermarking
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & No. 2, August 2009, USA
null
ISSN 1947 5500
cs.CR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In view of the frequent multimedia data transfer authentication and protection of images has gained importance in todays world. In this paper we propose a new watermarking technique, based on bit plane, which enhances robustness and capacity of the watermark, as well as maintains transparency of the watermark and fidelity of the image. In the proposed technique, higher strength bit plane of digital signature watermark is embedded in to a significant bit plane of the original image. The combination of bit planes (image and watermark) selection is an important issue. Therefore, a mechanism is developed for appropriate bit plane selection. Ten different attacks are selected to test different alternatives. These attacks are given different weightings as appropriate to user requirement. A weighted correlation coefficient for retrieved watermark is estimated for each of the alternatives. Based on these estimated values optimal bit plane combination is identified for a given user requirement. The proposed method is found to be useful for authentication and to prove legal ownership. We observed better results by our proposed method in comparison with the previously reported work on pseudorandom watermark embedded in least significant bit (LSB) plane.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 18:52:26 GMT" } ]
2009-08-28T00:00:00
[ [ "Kejgir", "Sushma", "" ], [ "Kokare", "Manesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0908.4073
Jinwoo Shin
Kyomin Jung, Devavrat Shah, Jinwoo Shin
Distributed Averaging via Lifted Markov Chains
null
null
null
null
cs.IT cs.DC math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by applications of distributed linear estimation, distributed control and distributed optimization, we consider the question of designing linear iterative algorithms for computing the average of numbers in a network. Specifically, our interest is in designing such an algorithm with the fastest rate of convergence given the topological constraints of the network. As the main result of this paper, we design an algorithm with the fastest possible rate of convergence using a non-reversible Markov chain on the given network graph. We construct such a Markov chain by transforming the standard Markov chain, which is obtained using the Metropolis-Hastings method. We call this novel transformation pseudo-lifting. We apply our method to graphs with geometry, or graphs with doubling dimension. Specifically, the convergence time of our algorithm (equivalently, the mixing time of our Markov chain) is proportional to the diameter of the network graph and hence optimal. As a byproduct, our result provides the fastest mixing Markov chain given the network topological constraints, and should naturally find their applications in the context of distributed optimization, estimation and control.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 19:17:19 GMT" } ]
2009-08-28T00:00:00
[ [ "Jung", "Kyomin", "" ], [ "Shah", "Devavrat", "" ], [ "Shin", "Jinwoo", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0908.4074
R Doomun
Priti Maheswary and Namita Srivastava
Retrieval of Remote Sensing Images Using Colour and Texture Attribute
5 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & No. 2, August 2009, USA
null
ISSN 1947 5500
cs.IR cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grouping images into semantically meaningful categories using low-level visual feature is a challenging and important problem in content-based image retrieval. The groupings can be used to build effective indices for an image database. Digital image analysis techniques are being used widely in remote sensing assuming that each terrain surface category is characterized with spectral signature observed by remote sensors. Even with the remote sensing images of IRS data, integration of spatial information is expected to assist and to improve the image analysis of remote sensing data. In this paper we present a satellite image retrieval based on a mixture of old fashioned ideas and state of the art learning tools. We have developed a methodology to classify remote sensing images using HSV color features and Haar wavelet texture features and then grouping them on the basis of particular threshold value. The experimental results indicate that the use of color and texture feature extraction is very useful for image retrieval.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 19:21:11 GMT" } ]
2009-08-28T00:00:00
[ [ "Maheswary", "Priti", "" ], [ "Srivastava", "Namita", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0908.4094
Arya Mazumdar
Alexander Barg and Arya Mazumdar
Codes in Permutations and Error Correction for Rank Modulation
Some typos corrected from the published journal version
IEEE Transactions on Information Theory, Vol. 56, Issue 7, July 2010, pp. 3158 - 3165
10.1109/TIT.2010.2048455
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Codes for rank modulation have been recently proposed as a means of protecting flash memory devices from errors. We study basic coding theoretic problems for such codes, representing them as subsets of the set of permutations of $n$ elements equipped with the Kendall tau distance. We derive several lower and upper bounds on the size of codes. These bounds enable us to establish the exact scaling of the size of optimal codes for large values of $n$. We also show the existence of codes whose size is within a constant factor of the sphere packing bound for any fixed number of errors.
[ { "version": "v1", "created": "Thu, 27 Aug 2009 20:28:16 GMT" }, { "version": "v2", "created": "Thu, 8 Oct 2009 03:16:28 GMT" }, { "version": "v3", "created": "Fri, 22 Oct 2010 22:33:52 GMT" } ]
2010-12-10T00:00:00
[ [ "Barg", "Alexander", "" ], [ "Mazumdar", "Arya", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.4116
Nikos Triandopoulos
Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos
Efficient Authenticated Data Structures for Graph Connectivity and Geometric Search Problems
Full version of related paper appearing in CT-RSA 2003
null
null
null
cs.CR cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Authenticated data structures provide cryptographic proofs that their answers are as accurate as the author intended, even if the data structure is being controlled by a remote untrusted host. We present efficient techniques for authenticating data structures that represent graphs and collections of geometric objects. We introduce the path hash accumulator, a new primitive based on cryptographic hashing for efficiently authenticating various properties of structured data represented as paths, including any decomposable query over sequences of elements. We show how to employ our primitive to authenticate queries about properties of paths in graphs and search queries on multi-catalogs. This allows the design of new, efficient authenticated data structures for fundamental problems on networks, such as path and connectivity queries over graphs, and complex queries on two-dimensional geometric objects, such as intersection and containment queries.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 00:18:06 GMT" } ]
2009-08-31T00:00:00
[ [ "Goodrich", "Michael T.", "" ], [ "Tamassia", "Roberto", "" ], [ "Triandopoulos", "Nikos", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0908.4144
Ping Li
Ping Li
ABC-LogitBoost for Multi-class Classification
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop abc-logitboost, based on the prior work on abc-boost and robust logitboost. Our extensive experiments on a variety of datasets demonstrate the considerable improvement of abc-logitboost over logitboost and abc-mart.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 07:09:19 GMT" } ]
2009-08-31T00:00:00
[ [ "Li", "Ping", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0908.4188
R Doomun
Suman Saha
Consideration Points Detecting Cross-Site Scripting
8 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CR cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web application (WA) expands its usages to provide more and more services and it has become one of the most essential communication channels between service providers and the users. To augment the users experience many web applications are using client side scripting languages such as JavaScript but this growing of JavaScript is increasing serious security vulnerabilities in web application too, such as cross site scripting (XSS). In this paper, I survey all the techniques those have been used to detect XSS and arrange a number of analyses to evaluate performances of those methodologies. This paper points major difficulties to detect XSS. I do not implement any solution of this vulnerability problem because my focus is for reviewing this issue. But, I believe that this assessment will be cooperative for further research on this concern as this treatise figure out everything on this transcendent security problem.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 11:01:27 GMT" } ]
2009-08-31T00:00:00
[ [ "Saha", "Suman", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0908.4208
Nassar Ksairi
Nassar Ksairi, Philippe Ciblat, Pascal Bianchi and Walid Hachem
Performance Analysis over Slow Fading Channels of a Half-Duplex Single-Relay Protocol: Decode or Quantize and Forward
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, a new static relaying protocol is introduced for half duplex single-relay networks, and its performance is studied in the context of communications over slow fading wireless channels. The proposed protocol is based on a Decode or Quantize and Forward (DoQF) approach. In slow fading scenarios, two performance metrics are relevant and complementary, namely the outage probability gain and the Diversity-Multiplexing Tradeoff (DMT). First, we analyze the behavior of the outage probability P_o associated with the proposed protocol as the SNR tends to infinity. In this case, we prove that SNR^2 P_o converges to a constant. We refer to this constant as the outage gain and we derive its closed-form expression for a general class of wireless channels that includes the Rayleigh and the Rice channels as particular cases. We furthermore prove that the DoQF protocol has the best achievable outage gain in the wide class of half-duplex static relaying protocols. A method for minimizing the outage gain with respect to the power distribution between the source and the relay, and with respect to the durations of the slots is also provided. Next, we focus on Rayleigh distributed fading channels to derive the DMT associated with the proposed DoQF protocol. Our results show that the DMT of DoQF achieves the 2 by 1 MISO upper-bound for multiplexing gains r < 0.25.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 13:38:33 GMT" } ]
2009-08-31T00:00:00
[ [ "Ksairi", "Nassar", "" ], [ "Ciblat", "Philippe", "" ], [ "Bianchi", "Pascal", "" ], [ "Hachem", "Walid", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.4211
Zhenning Kong
Zhenning Kong, Edmund M. Yeh and Emina Soljanin
Coding Improves the Throughput-Delay Trade-off in Mobile Wireless Networks
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the throughput-delay performance tradeoff in large-scale wireless ad hoc networks. It has been shown that the per source-destination pair throughput can be improved from Theta(1/sqrt(n log n)) to Theta(1) if nodes are allowed to move and a 2-hop relay scheme is employed. The price paid for such an improvement on throughput is large delay. Indeed, the delay scaling of the 2-hop relay scheme is Theta(n log n) under the random walk mobility model. In this paper, we employ coding techniques to improve the throughput-delay trade-off for mobile wireless networks. For the random walk mobility model, we improve the delay from Theta(n log n) to Theta(n) by employing Reed-Solomon codes. Our approach maintains the diversity gained by mobility while decreasing the delay.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 13:40:45 GMT" } ]
2009-08-31T00:00:00
[ [ "Kong", "Zhenning", "" ], [ "Yeh", "Edmund M.", "" ], [ "Soljanin", "Emina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.4256
R Doomun
Hamdi Salah, Soudani Adel, and Tourki Rached
Experimental Performances Analysis of Load Balancing Algorithms in IEEE 802.11
6 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2., August 2009, USA
null
ISSN 1947 5500
cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In IEEE 802.11, load balancing algorithms (LBA) consider only the associated stations to balance the load of the available access points (APs). However, although the APs are balanced, it causes a bad situation if the AP has a lower signal length (SNR) less than the neighbor APs. So, balance the load and associate one mobile station to an access point without care about the signal to noise ratio (SNR) of the AP cause possibly an unforeseen QoS, such as the bit rate, the end to end delay, the packet loss. In this way, we study an improvement load balancing algorithm with SNR integration at the selection policy.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 18:32:22 GMT" } ]
2009-08-31T00:00:00
[ [ "Salah", "Hamdi", "" ], [ "Adel", "Soudani", "" ], [ "Rached", "Tourki", "" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0908.4265
Muhammad Salman Asif
M. Salman Asif, William Mantzel and Justin Romberg
Channel Protection: Random Coding Meets Sparse Channels
To appear in the proceedings of the 2009 IEEE Information Theory Workshop (Taormina)
null
10.1109/ITW.2009.5351495
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multipath interference is an ubiquitous phenomenon in modern communication systems. The conventional way to compensate for this effect is to equalize the channel by estimating its impulse response by transmitting a set of training symbols. The primary drawback to this type of approach is that it can be unreliable if the channel is changing rapidly. In this paper, we show that randomly encoding the signal can protect it against channel uncertainty when the channel is sparse. Before transmission, the signal is mapped into a slightly longer codeword using a random matrix. From the received signal, we are able to simultaneously estimate the channel and recover the transmitted signal. We discuss two schemes for the recovery. Both of them exploit the sparsity of the underlying channel. We show that if the channel impulse response is sufficiently sparse, the transmitted signal can be recovered reliably.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 19:36:46 GMT" }, { "version": "v2", "created": "Fri, 28 Aug 2009 21:34:51 GMT" } ]
2016-11-18T00:00:00
[ [ "Asif", "M. Salman", "" ], [ "Mantzel", "William", "" ], [ "Romberg", "Justin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0908.4288
Jacob G. Foster
Jacob G. Foster, David V. Foster, Peter Grassberger, Maya Paczuski
Edge direction and the structure of networks
13 pages, 6 figures, 3 tables
Proceedings of the National Academy of Sciences of the United States of America 2010, Vol. 107, No. 24
10.1073/pnas.0912671107
null
physics.soc-ph cond-mat.dis-nn cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Directed networks are ubiquitous and are necessary to represent complex systems with asymmetric interactions---from food webs to the World Wide Web. Despite the importance of edge direction for detecting local and community structure, it has been disregarded in studying a basic type of global diversity in networks: the tendency of nodes with similar numbers of edges to connect. This tendency, called assortativity, affects crucial structural and dynamic properties of real-world networks, such as error tolerance or epidemic spreading. Here we demonstrate that edge direction has profound effects on assortativity. We define a set of four directed assortativity measures and assign statistical significance by comparison to randomized networks. We apply these measures to three network classes---online/social networks, food webs, and word-adjacency networks. Our measures (i) reveal patterns common to each class, (ii) separate networks that have been previously classified together, and (iii) expose limitations of several existing theoretical models. We reject the standard classification of directed networks as purely assortative or disassortative. Many display a class-specific mixture, likely reflecting functional or historical constraints, contingencies, and forces guiding the system's evolution.
[ { "version": "v1", "created": "Sat, 29 Aug 2009 00:25:26 GMT" }, { "version": "v2", "created": "Mon, 8 Nov 2010 04:14:37 GMT" } ]
2010-11-09T00:00:00
[ [ "Foster", "Jacob G.", "" ], [ "Foster", "David V.", "" ], [ "Grassberger", "Peter", "" ], [ "Paczuski", "Maya", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.4290
Khaled Khalil
Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M. Salem
Bridging the Gap between Crisis Response Operations and Systems
6 pages, 1 figure, 2 tables, accepted at The 9th International Conference on Artificial Intelligence and Digital Communications
null
null
null
cs.CY cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There exist huge problems in the current practice of crisis response operations. Response problems are projected as a combination of failure in communication, failure in technology, failure in methodology, failure of management, and finally failure of observation. In this paper we compare eight crisis response systems namely: DrillSim [2, 13], DEFACTO [12, 17], ALADDIN [1, 6], RoboCup Rescue [11, 15], FireGrid [3, 8, 18], WIPER [16], D-AESOP [4], and PLAN C [14]. Comparison results will disclose the cause of failure of current crisis response operations (the response gap). Based on comparison results; we provide recommendations for bridging this gap between response operations and systems.
[ { "version": "v1", "created": "Fri, 28 Aug 2009 20:58:45 GMT" } ]
2009-09-01T00:00:00
[ [ "Khalil", "Khaled M.", "" ], [ "Abdel-Aziz", "M.", "" ], [ "Nazmy", "Taymour T.", "" ], [ "Salem", "Abdel-Badeeh M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0908.4309
Li Yan
Francis Chin, Marek Chrobak, Li Yan
Algorithms for Placing Monitors in a Flow Network
13 pages, 5 figures. Preliminary version appeared in AAIM 2009
null
null
null
cs.DS cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Flow Edge-Monitor Problem, we are given an undirected graph G=(V,E), an integer k > 0 and some unknown circulation \psi on G. We want to find a set of k edges in G, so that if we place k monitors on those edges to measure the flow along them, the total number of edges for which the flow can be uniquely determined is maximized. In this paper, we first show that the Flow Edge-Monitor Problem is NP-hard, and then we give two approximation algorithms: a 3-approximation algorithm with running time O((m+n)^2) and a 2-approximation algorithm with running time O((m+n)^3), where n = |V| and m=|E|.
[ { "version": "v1", "created": "Sat, 29 Aug 2009 01:45:44 GMT" } ]
2009-09-01T00:00:00
[ [ "Chin", "Francis", "" ], [ "Chrobak", "Marek", "" ], [ "Yan", "Li", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0908.4310
Beatriz Susana Marron
Beatriz Marron
Co-occurrence Matrix and Fractal Dimension for Image Segmentation
This paper has been withdrawn by the author
null
null
null
stat.AP cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most important tasks in image processing problem and machine vision is object recognition, and the success of many proposed methods relies on a suitable choice of algorithm for the segmentation of an image. This paper focuses on how to apply texture operators based on the concept of fractal dimension and cooccurence matrix, to the problem of object recognition and a new method based on fractal dimension is introduced. Several images, in which the result of the segmentation can be shown, are used to illustrate the use of each method and a comparative study of each operator is made.
[ { "version": "v1", "created": "Sat, 29 Aug 2009 01:48:16 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2011 11:53:23 GMT" } ]
2011-12-07T00:00:00
[ [ "Marron", "Beatriz", "" ] ]
[ { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0908.4325
Bela Genge
Bela Genge, Iosif Ignat and Piroska Haller
Automated Composition of Security Protocols
2009 IEEE International Conference on Intelligent Communication and Processing (ICCP 2009), Cluj-Napoca, Romania, pp. 251-258 (ISBN 978-1-4244-5007-7)
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Determining if two protocols can be securely composed requires analyzing not only their additive properties but also their destructive properties. In this paper we propose a new composition method for constructing protocols based on existing ones found in the literature that can be fully automatized. The additive properties of the composed protocols are ensured by the composition of protocol preconditions and effects, denoting, respectively, the conditions that must hold for protocols to be executed and the conditions that hold after executing the protocols. The non-destructive property of the final composed protocol is verified by analyzing the independence of the involved protocols, a method proposed by the authors in their previous work. The fully automatized property is ensured by constructing a rich protocol model that contains explicit description of protocol preconditions, effects, generated terms and exchanged messages. The proposed method is validated by composing 17 protocol pairs and by verifying the correctness of the composed protocols with an existing tool.
[ { "version": "v1", "created": "Sat, 29 Aug 2009 07:13:36 GMT" } ]
2009-09-01T00:00:00
[ [ "Genge", "Bela", "" ], [ "Ignat", "Iosif", "" ], [ "Haller", "Piroska", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0908.4353
R Doomun
Azeez Nureni Ayofe, Azeez Raheem Ajetola
Exploration of the Gap Between Computer Science Curriculum and Industrial I.T Skills Requirements
10 pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.GL cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper sets out to examine the skills gaps between the industrial application of Information Technology and university academic programmes (curriculum). It looks at some of the causes, and considers the probable solutions for bridging the gap between them and suggests the possibilities of exploring a new role for our universities and employers of labor. It also highlights strategies to abolish the misalignment between university and industry. The main concept is to blend the academic rigidity with the industrial relevance.
[ { "version": "v1", "created": "Sat, 29 Aug 2009 18:33:55 GMT" } ]
2009-09-01T00:00:00
[ [ "Ayofe", "Azeez Nureni", "" ], [ "Ajetola", "Azeez Raheem", "" ] ]
[ { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0908.4373
Adrian Paul Flitney
Charles D. Hill, Adrian P. Flitney, and Nicolas C. Menicucci
A competitive game whose maximal Nash-equilibrium payoff requires quantum resources for its achievement
8 pages, revtex4
Phys. Lett. A 374 (2010) 3619-3624
10.1016/j.physleta.2010.07.010
null
quant-ph cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While it is known that shared quantum entanglement can offer improved solutions to a number of purely cooperative tasks for groups of remote agents, controversy remains regarding the legitimacy of quantum games in a competitive setting--in particular, whether they offer any advantage beyond what is achievable using classical resources. We construct a competitive game between four players based on the minority game where the maximal Nash-equilibrium payoff when played with the appropriate quantum resource is greater than that obtainable by classical means, assuming a local hidden variable model. The game is constructed in a manner analogous to a Bell inequality. This result is important in confirming the legitimacy of quantum games.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 19:31:33 GMT" }, { "version": "v2", "created": "Mon, 14 Sep 2009 02:44:52 GMT" } ]
2015-05-14T00:00:00
[ [ "Hill", "Charles D.", "" ], [ "Flitney", "Adrian P.", "" ], [ "Menicucci", "Nicolas C.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0908.4374
R Doomun
Ratnesh Kumar Jain, Dr. Suresh Jain, Dr. R. S. Kasana
Visualization of Mined Pattern and Its Human Aspects
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.HC cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Researchers got success in mining the Web usage data effectively and efficiently. But representation of the mined patterns is often not in a form suitable for direct human consumption. Hence mechanisms and tools that can represent mined patterns in easily understandable format are utilized. Different techniques are used for pattern analysis, one of them is visualization. Visualization can provide valuable assistance for data analysis and decision making tasks. In the data visualization process, technical representations of web pages are replaced by user attractive text interpretations. Experiments with the real world problems showed that the visualization can significantly increase the quality and usefulness of web log mining results. However, how decision makers perceive and interact with a visual representation can strongly influence their understanding of the data as well as the usefulness of the visual presentation. Human factors therefore contribute significantly to the visualization process and should play an important role in the design and evaluation of visualization tools. This electronic document is a live template. The various components of your paper, title, text, heads, etc., are already defined on the style sheet, as illustrated by the portions given in this document.
[ { "version": "v1", "created": "Sun, 30 Aug 2009 05:30:40 GMT" } ]
2009-09-01T00:00:00
[ [ "Jain", "Ratnesh Kumar", "" ], [ "Jain", "Dr. Suresh", "" ], [ "Kasana", "Dr. R. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0908.4386
R Doomun
Reza Gharoie Ahangar, Mohammad Farajpoor Ahangar
Handwritten Farsi Character Recognition using Artificial Neural Network
4 pages IEEE format, International Journal Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Neural Networks are being used for character recognition from last many years but most of the work was confined to English character recognition. Till date, a very little work has been reported for Handwritten Farsi Character recognition. In this paper, we have made an attempt to recognize handwritten Farsi characters by using a multilayer perceptron with one hidden layer. The error backpropagation algorithm has been used to train the MLP network. In addition, an analysis has been carried out to determine the number of hidden nodes to achieve high performance of backpropagation network in the recognition of handwritten Farsi characters. The system has been trained using several different forms of handwriting provided by both male and female participants of different age groups. Finally, this rigorous training results an automatic HCR system using MLP network. In this work, the experiments were carried out on two hundred fifty samples of five writers. The results showed that the MLP networks trained by the error backpropagation algorithm are superior in recognition accuracy and memory usage. The result indicates that the backpropagation network provides good recognition accuracy of more than 80% of handwritten Farsi characters.
[ { "version": "v1", "created": "Sun, 30 Aug 2009 11:55:48 GMT" } ]
2009-09-01T00:00:00
[ [ "Ahangar", "Reza Gharoie", "" ], [ "Ahangar", "Mohammad Farajpoor", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0908.4413
Laurent Romary
Patrice Lopez (IDSL), Laurent Romary (IDSL, INRIA Saclay - Ile de France)
Multiple Retrieval Models and Regression Models for Prior Art Search
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents the system called PATATRAS (PATent and Article Tracking, Retrieval and AnalysiS) realized for the IP track of CLEF 2009. Our approach presents three main characteristics: 1. The usage of multiple retrieval models (KL, Okapi) and term index definitions (lemma, phrase, concept) for the three languages considered in the present track (English, French, German) producing ten different sets of ranked results. 2. The merging of the different results based on multiple regression models using an additional validation set created from the patent collection. 3. The exploitation of patent metadata and of the citation structures for creating restricted initial working sets of patents and for producing a final re-ranking regression model. As we exploit specific metadata of the patent documents and the citation relations only at the creation of initial working sets and during the final post ranking step, our architecture remains generic and easy to extend.
[ { "version": "v1", "created": "Sun, 30 Aug 2009 18:50:19 GMT" } ]
2009-09-01T00:00:00
[ [ "Lopez", "Patrice", "", "IDSL" ], [ "Romary", "Laurent", "", "IDSL, INRIA Saclay - Ile de\n France" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0908.4419
Salah A. Aly
Salah A. Aly, Hager S. Darwish, Moustafa Youssef, Mahmoud Zidan
Distributed Flooding-based Storage Algorithms for Large-scale Sensor Networks
null
null
null
null
cs.IT cs.NI math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we propose distributed flooding-based storage algorithms for large-scale wireless sensor networks. Assume a wireless sensor network with $n$ nodes that have limited power, memory, and bandwidth. Each node is capable of both sensing and storing data. Such sensor nodes might disappear from the network due to failures or battery depletion. Hence it is desired to design efficient schemes to collect data from these $n$ nodes. We propose two distributed storage algorithms (DSA's) that utilize network flooding to solve this problem. In the first algorithm, DSA-I, we assume that every node utilizes network flooding to disseminate its data throughout the network using a mixing time of approximately O(n). We show that this algorithm is efficient in terms of the encoding and decoding operations. In the second algorithm, DSA-II, we assume that the total number of nodes is not known to every sensor; hence dissemination of the data does not depend on $n$. The encoding operations in this case take $O(C\mu^2)$, where $\mu$ is the mean degree of the network graph and $C$ is a system parameter. We evaluate the performance of the proposed algorithms through analysis and simulation, and show that their performance matches the derived theoretical results.
[ { "version": "v1", "created": "Sun, 30 Aug 2009 20:16:54 GMT" } ]
2009-09-01T00:00:00
[ [ "Aly", "Salah A.", "" ], [ "Darwish", "Hager S.", "" ], [ "Youssef", "Moustafa", "" ], [ "Zidan", "Mahmoud", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.4420
Grenville Croll
Grenville J. Croll
Spreadsheets and the Financial Collapse
17 Pages
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 145-161 ISBN 978-1-905617-89-0
null
null
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We briefly review the well-known risks, weaknesses and limitations of spreadsheets and then introduce some more. We review and slightly extend our previous work on the importance and criticality of spreadsheets in the City of London, introducing the notions of ubiquity, centrality, legality and contagion. We identify the sector of the financial market that we believed in 2005 to be highly dependant on the use of spreadsheets and relate this to its recent catastrophic financial performance. We outline the role of spreadsheets in the collapse of the Jamaican banking system in the late 1990's and then review the UK financial regulator's knowledge of the risks of spreadsheets in the contemporary financial system. We summarise the available evidence and suggest that there is a link between the use of spreadsheets and the recent collapse of the global financial system. We provide governments and regulating authorities with some simple recommendations to reduce the risks of continued overdependence on unreliable spreadsheets. We conclude with three fundamental lessons from a century of human error research.
[ { "version": "v1", "created": "Sun, 30 Aug 2009 20:05:44 GMT" } ]
2009-09-01T00:00:00
[ [ "Croll", "Grenville J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0908.4427
Matthew Knepley
Matthew G. Knepley, Dmitry A. Karpeev
Mesh Algorithms for PDE with Sieve I: Mesh Distribution
36 pages, 22 figures
Scientific Programming, 17(3), 215-230, 2009
10.3233/SPR-2009-0249
null
cs.CE cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We have developed a new programming framework, called Sieve, to support parallel numerical PDE algorithms operating over distributed meshes. We have also developed a reference implementation of Sieve in C++ as a library of generic algorithms operating on distributed containers conforming to the Sieve interface. Sieve makes instances of the incidence relation, or \emph{arrows}, the conceptual first-class objects represented in the containers. Further, generic algorithms acting on this arrow container are systematically used to provide natural geometric operations on the topology and also, through duality, on the data. Finally, coverings and duality are used to encode not only individual meshes, but all types of hierarchies underlying PDE data structures, including multigrid and mesh partitions. In order to demonstrate the usefulness of the framework, we show how the mesh partition data can be represented and manipulated using the same fundamental mechanisms used to represent meshes. We present the complete description of an algorithm to encode a mesh partition and then distribute a mesh, which is independent of the mesh dimension, element shape, or embedding. Moreover, data associated with the mesh can be similarly distributed with exactly the same algorithm. The use of a high level of abstraction within the Sieve leads to several benefits in terms of code reuse, simplicity, and extensibility. We discuss these benefits and compare our approach to other existing mesh libraries.
[ { "version": "v1", "created": "Sun, 30 Aug 2009 21:53:01 GMT" } ]
2010-09-02T00:00:00
[ [ "Knepley", "Matthew G.", "" ], [ "Karpeev", "Dmitry A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0908.4431
Prabhulla Chandran Pillai
B Prabhulla Chandran Pillai
An OLAC Extension for Dravidian Languages
4 Pages, 2 figures
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
OLAC was founded in 2000 for creating online databases of language resources. This paper intends to review the bottom-up distributed character of the project and proposes an extension of the architecture for Dravidian languages. An ontological structure is considered for effective natural language processing (NLP) and its advantages over statistical methods are reviewed
[ { "version": "v1", "created": "Sun, 30 Aug 2009 23:20:41 GMT" } ]
2009-09-01T00:00:00
[ [ "Pillai", "B Prabhulla Chandran", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0908.4445
Liang-Liang Xie
Xiugang Wu and Liang-Liang Xie
Asymptotic Equipartition Property of Output when Rate is above Capacity
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The output distribution, when rate is above capacity, is investigated. It is shown that there is an asymptotic equipartition property (AEP) of the typical output sequences, independently of the specific codebook used, as long as the codebook is typical according to the standard random codebook generation. This equipartition of the typical output sequences is caused by the mixup of input sequences when there are too many of them, namely, when the rate is above capacity. This discovery sheds some light on the optimal design of the compress-and-forward relay schemes.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 01:46:01 GMT" } ]
2009-09-01T00:00:00
[ [ "Wu", "Xiugang", "" ], [ "Xie", "Liang-Liang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.4453
Shengyu Zhang
Rahul Jain, Hartmut Klauck, Shengyu Zhang
Depth-Independent Lower bounds on the Communication Complexity of Read-Once Boolean Formulas
5 pages
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show lower bounds of $\Omega(\sqrt{n})$ and $\Omega(n^{1/4})$ on the randomized and quantum communication complexity, respectively, of all $n$-variable read-once Boolean formulas. Our results complement the recent lower bound of $\Omega(n/8^d)$ by Leonardos and Saks and $\Omega(n/2^{\Omega(d\log d)})$ by Jayram, Kopparty and Raghavendra for randomized communication complexity of read-once Boolean formulas with depth $d$. We obtain our result by "embedding" either the Disjointness problem or its complement in any given read-once Boolean formula.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 03:40:57 GMT" } ]
2009-09-01T00:00:00
[ [ "Jain", "Rahul", "" ], [ "Klauck", "Hartmut", "" ], [ "Zhang", "Shengyu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0908.4457
Bruno Bauwens
Bruno Bauwens
Additivity of on-line decision complexity is violated by a linear term in the length of a binary string
10 pages
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that there are infinitely many binary strings z, such that the sum of the on-line decision complexity of predicting the even bits of z given the previous uneven bits, and the decision complexity of predicting the uneven bits given the previous event bits, exceeds the Kolmogorov complexity of z by a linear term in the length of z.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 19:53:07 GMT" } ]
2009-09-01T00:00:00
[ [ "Bauwens", "Bruno", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0908.4464
Damien Chablat
Fr\'ed\'eric Boyer (IRCCyN), Damien Chablat (IRCCyN), Philippe Lemoine (IRCCyN), Philippe Wenger (IRCCyN)
The eel-like robot
null
ASME Design Engineering Technical Conferences, San Diego : United States (2009)
null
null
cs.RO physics.class-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The aim of this project is to design, study and build an "eel-like robot" prototype able to swim in three dimensions. The study is based on the analysis of eel swimming and results in the realization of a prototype with 12 vertebrae, a skin and a head with two fins. To reach these objectives, a multidisciplinary group of teams and laboratories has been formed in the framework of two French projects.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 06:27:46 GMT" }, { "version": "v2", "created": "Wed, 2 Sep 2009 07:03:06 GMT" } ]
2009-09-02T00:00:00
[ [ "Boyer", "Frédéric", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Lemoine", "Philippe", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0908.4491
Dominique Duval
C\'esar Dominguez, Dominique Duval (LJK)
A parameterization process, functorially
null
null
null
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The parameterization process used in the symbolic computation systems Kenzo and EAT is studied here as a general construction in a categorical framework. This parameterization process starts from a given specification and builds a parameterized specification by adding a parameter as a new variable to some operations. Given a model of the parameterized specification, each interpretation of the parameter, called an argument, provides a model of the given specification. Moreover, under some relevant terminality assumption, this correspondence between the arguments and the models of the given specification is a bijection. It is proved in this paper that the parameterization process is provided by a functor and the subsequent parameter passing process by a natural transformation. Various categorical notions are used, mainly adjoint functors, pushouts and lax colimits.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 09:45:53 GMT" } ]
2009-09-01T00:00:00
[ [ "Dominguez", "César", "", "LJK" ], [ "Duval", "Dominique", "", "LJK" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.CT", "description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra", "span": "(Category Theory)" } ]
0908.4494
Joel Ratsaby
Joel Ratsaby
Learning, complexity and information density
null
null
null
null
cs.IT cs.CC math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
What is the relationship between the complexity of a learner and the randomness of his mistakes? This question was posed in \cite{rat0903} who showed that the more complex the learner the higher the possibility that his mistakes deviate from a true random sequence. In the current paper we report on an empirical investigation of this problem. We investigate two characteristics of randomness, the stochastic and algorithmic complexity of the binary sequence of mistakes. A learner with a Markov model of order $k$ is trained on a finite binary sequence produced by a Markov source of order $k^{*}$ and is tested on a different random sequence. As a measure of learner's complexity we define a quantity called the \emph{sysRatio}, denoted by $\rho$, which is the ratio between the compressed and uncompressed lengths of the binary string whose $i^{th}$ bit represents the maximum \emph{a posteriori} decision made at state $i$ of the learner's model. The quantity $\rho$ is a measure of information density. The main result of the paper shows that this ratio is crucial in answering the above posed question. The result indicates that there is a critical threshold $\rho^{*}$ such that when $\rho\leq\rho^{*}$ the sequence of mistakes possesses the following features: (1)\emph{}low divergence $\Delta$ from a random sequence, (2) low variance in algorithmic complexity. When $\rho>\rho^{*}$, the characteristics of the mistake sequence changes sharply towards a\emph{}high\emph{$\Delta$} and high variance in algorithmic complexity.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 10:05:53 GMT" } ]
2009-09-01T00:00:00
[ [ "Ratsaby", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0908.4499
Yann Strozecki
Yann Strozecki
Monadic second-order model-checking on decomposable matroids
32 pages, journal paper. Revision: the last part has been removed and the writing improved
null
null
null
cs.DM cs.DS cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A notion of branch-width, which generalizes the one known for graphs, can be defined for matroids. We first give a proof of the polynomial time model-checking of monadic second-order formulas on representable matroids of bounded branch-width, by reduction to monadic second-order formulas on trees. This proof is much simpler than the one previously known. We also provide a link between our logical approach and a grammar that allows to build matroids of bounded branch-width. Finally, we introduce a new class of non-necessarily representable matroids, described by a grammar and on which monadic second-order formulas can be checked in linear time.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 11:00:44 GMT" }, { "version": "v2", "created": "Sat, 29 Jan 2011 23:43:14 GMT" } ]
2015-03-13T00:00:00
[ [ "Strozecki", "Yann", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0908.4580
Emanuele Viola
Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola
A Computational View of Market Efficiency
null
null
null
null
cs.CE cs.CC q-fin.TR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose to study market efficiency from a computational viewpoint. Borrowing from theoretical computer science, we define a market to be \emph{efficient with respect to resources $S$} (e.g., time, memory) if no strategy using resources $S$ can make a profit. As a first step, we consider memory-$m$ strategies whose action at time $t$ depends only on the $m$ previous observations at times $t-m,...,t-1$. We introduce and study a simple model of market evolution, where strategies impact the market by their decision to buy or sell. We show that the effect of optimal strategies using memory $m$ can lead to "market conditions" that were not present initially, such as (1) market bubbles and (2) the possibility for a strategy using memory $m' > m$ to make a bigger profit than was initially possible. We suggest ours as a framework to rationalize the technological arms race of quantitative trading firms.
[ { "version": "v1", "created": "Mon, 31 Aug 2009 16:57:35 GMT" } ]
2009-09-01T00:00:00
[ [ "Hasanhodzic", "Jasmina", "" ], [ "Lo", "Andrew W.", "" ], [ "Viola", "Emanuele", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Quantitative Finance", "code": "q-fin.TR", "description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making", "span": "(Trading and Market Microstructure)" } ]
0909.0067
Juan L. Varona
L. D. Abreu, \'O. Ciaurri and J. L. Varona
Bilinear biorthogonal expansions and the Dunkl kernel on the real line
16 pages
Expo. Math. 30 (2012), 32-48
null
null
math.FA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study an extension of the classical Paley-Wiener space structure, which is based on bilinear expansions of integral kernels into biorthogonal sequences of functions. The structure includes both sampling expansions and Fourier-Neumann type series as special cases, and it also provides a bilinear expansion for the Dunkl kernel (in the rank 1 case) which is a Dunkl analogue of Gegenbauer's expansion of the plane wave and the corresponding sampling expansions. In fact, we show how to derive sampling and Fourier-Neumann type expansions from the results related to the bilinear expansion for the Dunkl kernel.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 01:33:42 GMT" }, { "version": "v2", "created": "Mon, 5 Nov 2012 01:16:18 GMT" }, { "version": "v3", "created": "Tue, 6 Nov 2012 01:47:14 GMT" } ]
2012-11-07T00:00:00
[ [ "Abreu", "L. D.", "" ], [ "Ciaurri", "Ó.", "" ], [ "Varona", "J. L.", "" ] ]
[ { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0074
R Doomun
Philip Olu Jegede
Predictors Of Java Programming Self Efficacy Among Engineering Students In A Nigerian University
7 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study examined the relationship between Java programming self-efficacy and programming background of engineering students in a Nigerian University. One hundred and ninety two final year engineering students randomly selected from six engineering departments of the university participated in the study. Two research instruments: Programming Background Questionnaire and Java Programming Self-Efficacy Scale were used in collecting relevant information from the subjects. The resulting data were analyzed using Pearson product correlation and Multiple regression analysis. Findings revealed that Java Programming self-efficacy has no significant relationship with each of the computing and programming background factors. It was additionally obtained that the number of programming courses offered and programming courses weighed scores were the only predictors of Java self-efficacy.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 02:43:54 GMT" } ]
2009-09-02T00:00:00
[ [ "Jegede", "Philip Olu", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0909.0093
R Doomun
Mohammad A. Mikki
Energy Efficient Location Aided Routing Protocol for Wireless MANETs
9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes forming a temporary network without using any centralized access point, infrastructure, or centralized administration. In this paper we introduce an Energy Efficient Location Aided Routing (EELAR) Protocol for MANETs that is based on the Location Aided Routing (LAR). EELAR makes significant reduction in the energy consumption of the mobile nodes batteries by limiting the area of discovering a new route to a smaller zone. Thus, control packets overhead is significantly reduced. In EELAR a reference wireless base station is used and the network's circular area centered at the base station is divided into six equal sub-areas. At route discovery instead of flooding control packets to the whole network area, they are flooded to only the sub-area of the destination mobile node. The base station stores locations of the mobile nodes in a position table. To show the efficiency of the proposed protocol we present simulations using NS-2. Simulation results show that EELAR protocol makes an improvement in control packet overhead and delivery ratio compared to AODV, LAR, and DSR protocols.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 05:32:29 GMT" } ]
2009-09-02T00:00:00
[ [ "Mikki", "Mohammad A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.0095
Rakesh Mohanty
Rakesh Mohanty and N. S. Narayanaswamy
Online Algorithms for Self-Organizing Sequential Search - A Survey
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The main objective of this survey is to present the important theoretical and experimental results contributed till date in the area of online algorithms for the self organizing sequential search problem, also popularly known as the List Update Problem(LUP) in a chronological way. The survey includes competitiveness results of deterministic and randomized online algorithms and complexity results of optimal off line algorithms for the list update problem. We also present the results associated with list update with look ahead, list update with locality of reference and other variants of the list update problem. We investigate research issues, explore scope of future work associated with each issue so that future researchers can find it useful to work on.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 05:46:32 GMT" }, { "version": "v2", "created": "Wed, 2 Sep 2009 03:48:38 GMT" } ]
2009-09-02T00:00:00
[ [ "Mohanty", "Rakesh", "" ], [ "Narayanaswamy", "N. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.0097
R Doomun
Kamanashis Biswas, S. A. M. Harun
Constraint Minimum Vertex Cover in K Partite Graph, Approximation Algorithm and Complexity Analysis
5 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Generally, a graph G, an independent set is a subset S of vertices in G such that no two vertices in S are adjacent (connected by an edge) and a vertex cover is a subset S of vertices such that each edge of G has at least one of its endpoints in S. Again, the minimum vertex cover problem is to find a vertex cover with the smallest number of vertices. This study shows that the constrained minimum vertex cover problem in k-partite graph (MIN CVCK) is NP-Complete which is an important property of k partite graph. Many combinatorial problems on general graphs are NP-complete, but when restricted to k partite graph with at most k vertices then many of these problems can be solved in polynomial time. This paper also illustrates an approximation algorithm for MIN CVCK and analyzes its complexity. In future work section, we specified a number of dimensions which may be interesting for the researchers such as developing algorithm for maximum matching and polynomial algorithm for constructing k-partite graph from general graph.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 06:10:44 GMT" } ]
2009-09-02T00:00:00
[ [ "Biswas", "Kamanashis", "" ], [ "Harun", "S. A. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.0099
R Doomun
Kamanashis Biswas, Md. Ashraful Islam
Hardware Virtualization Support In INTEL, AMD And IBM Power Processors
6 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
At present, the mostly used and developed mechanism is hardware virtualization which provides a common platform to run multiple operating systems and applications in independent partitions. More precisely, it is all about resource virtualization as the term hardware virtualization is emphasized. In this paper, the aim is to find out the advantages and limitations of current virtualization techniques, analyze their cost and performance and also depict which forthcoming hardware virtualization techniques will able to provide efficient solutions for multiprocessor operating systems. This is done by making a methodical literature survey and statistical analysis of the benchmark reports provided by SPEC (Standard Performance Evaluation Corporation) and TPC (Transaction processing Performance Council). Finally, this paper presents the current aspects of hardware virtualization which will help the IT managers of the large organizations to take effective decision while choosing server with virtualization support. Again, the future works described in section 4 of this paper focuses on some real world challenges such as abstraction of multiple servers, language level virtualization, pre-virtualization etc. which may be point of great interest for the researchers.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 06:15:22 GMT" } ]
2009-09-02T00:00:00
[ [ "Biswas", "Kamanashis", "" ], [ "Islam", "Md. Ashraful", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0909.0105
Zachary Chance
Zachary Chance and David J. Love
Concatenated Coding for the AWGN Channel with Noisy Feedback
Accepted to IEEE Trans. on Information Theory, January 2011
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of open-loop coding can be easily extended to a closed-loop concatenated code if the channel has access to feedback. This can be done by introducing a feedback transmission scheme as an inner code. In this paper, this process is investigated for the case when a linear feedback scheme is implemented as an inner code and, in particular, over an additive white Gaussian noise (AWGN) channel with noisy feedback. To begin, we look to derive an optimal linear feedback scheme by optimizing over the received signal-to-noise ratio. From this optimization, an asymptotically optimal linear feedback scheme is produced and compared to other well-known schemes. Then, the linear feedback scheme is implemented as an inner code to a concatenated code over the AWGN channel with noisy feedback. This code shows improvements not only in error exponent bounds, but also in bit-error-rate and frame-error-rate. It is also shown that the if the concatenated code has total blocklength L and the inner code has blocklength, N, the inner code blocklength should scale as N = O(C/R), where C is the capacity of the channel and R is the rate of the concatenated code. Simulations with low density parity check (LDPC) and turbo codes are provided to display practical applications and their error rate benefits.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 14:47:57 GMT" }, { "version": "v2", "created": "Thu, 3 Sep 2009 18:02:42 GMT" }, { "version": "v3", "created": "Fri, 20 Nov 2009 21:08:34 GMT" }, { "version": "v4", "created": "Thu, 17 Jun 2010 19:13:38 GMT" }, { "version": "v5", "created": "Mon, 21 Feb 2011 21:48:58 GMT" } ]
2011-02-23T00:00:00
[ [ "Chance", "Zachary", "" ], [ "Love", "David J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0108
Damien Chablat
S\'ebastien Briot (IRCCyN), Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN)
On the optimal design of parallel robots taking into account their deformations and natural frequencies
null
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper discusses the utility of using simple stiffness and vibrations models, based on the Jacobian matrix of a manipulator and only the rigidity of the actuators, whenever its geometry is optimised. In many works, these simplified models are used to propose optimal design of robots. However, the elasticity of the drive system is often negligible in comparison with the elasticity of the elements, especially in applications where high dynamic performances are needed. Therefore, the use of such a simplified model may lead to the creation of robots with long legs, which will be submitted to large bending and twisting deformations. This paper presents an example of manipulator for which it is preferable to use a complete stiffness or vibration model to obtain the most suitable design and shows that the use of simplified models can lead to mechanisms with poorer rigidity.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 06:46:58 GMT" } ]
2009-09-02T00:00:00
[ [ "Briot", "Sébastien", "", "IRCCyN" ], [ "Pashkevich", "Anatoly", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0909.0109
Sanjiang Li
Sanjiang Li
On the Internal Topological Structure of Plane Regions
A short version appeared in KR-10. Several results have been rephrased and omitted proofs are given here. (Sanjiang Li. A Layered Graph Representation for Complex Regions, in Proceedings of the 12th International Conference on the Principles of Knowledge Representation and Reasoning (KR-10), pages 581-583, Toronto, Canada, May 9-13, 2010)
null
null
null
cs.AI cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The study of topological information of spatial objects has for a long time been a focus of research in disciplines like computational geometry, spatial reasoning, cognitive science, and robotics. While the majority of these researches emphasised the topological relations between spatial objects, this work studies the internal topological structure of bounded plane regions, which could consist of multiple pieces and/or have holes and islands to any finite level. The insufficiency of simple regions (regions homeomorphic to closed disks) to cope with the variety and complexity of spatial entities and phenomena has been widely acknowledged. Another significant drawback of simple regions is that they are not closed under set operations union, intersection, and difference. This paper considers bounded semi-algebraic regions, which are closed under set operations and can closely approximate most plane regions arising in practice.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 06:48:16 GMT" }, { "version": "v2", "created": "Fri, 22 Jan 2010 23:49:24 GMT" }, { "version": "v3", "created": "Thu, 2 Dec 2010 19:32:03 GMT" }, { "version": "v4", "created": "Thu, 9 Dec 2010 02:04:36 GMT" }, { "version": "v5", "created": "Fri, 18 Oct 2013 04:50:14 GMT" } ]
2015-03-13T00:00:00
[ [ "Li", "Sanjiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.0118
R Doomun
R. Sivaraman, R. Prabakaran, S. Sujatha
Dynamic Multimedia Content Retrieval System in Distributed Environment
4 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.MM cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
WiCoM enables remote management of web resources. Our application Mobile reporter is aimed at Journalist, who will be able to capture the events in real-time using their mobile phones and update their web server on the latest event. WiCoM has been developed using J2ME technology on the client side and PHP on the server side. The communication between the client and the server is established through GPRS. Mobile reporter will be able to upload, edit and remove both textual as well as multimedia contents in the server.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 08:19:18 GMT" } ]
2009-09-02T00:00:00
[ [ "Sivaraman", "R.", "" ], [ "Prabakaran", "R.", "" ], [ "Sujatha", "S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.0122
Sanjiang Li
Sanjiang Li, Anthony G. Cohn
Reasoning with Topological and Directional Spatial Information
null
Computational Intelligence, 2012, 28(4):579-616
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Current research on qualitative spatial representation and reasoning mainly focuses on one single aspect of space. In real world applications, however, multiple spatial aspects are often involved simultaneously. This paper investigates problems arising in reasoning with combined topological and directional information. We use the RCC8 algebra and the Rectangle Algebra (RA) for expressing topological and directional information respectively. We give examples to show that the bipath-consistency algorithm BIPATH is incomplete for solving even basic RCC8 and RA constraints. If topological constraints are taken from some maximal tractable subclasses of RCC8, and directional constraints are taken from a subalgebra, termed DIR49, of RA, then we show that BIPATH is able to separate topological constraints from directional ones. This means, given a set of hybrid topological and directional constraints from the above subclasses of RCC8 and RA, we can transfer the joint satisfaction problem in polynomial time to two independent satisfaction problems in RCC8 and RA. For general RA constraints, we give a method to compute solutions that satisfy all topological constraints and approximately satisfy each RA constraint to any prescribed precision.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 08:31:22 GMT" } ]
2013-10-21T00:00:00
[ [ "Li", "Sanjiang", "" ], [ "Cohn", "Anthony G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.0138
Sanjiang Li
Xiaotong Zhang, Weiming Liu, Sanjiang Li, Mingsheng Ying
Reasoning about Cardinal Directions between Extended Objects
null
Artificial Intelligence, Volume 174, Issues 12-13, August 2010, Pages 951-983
10.1016/j.artint.2010.05.006
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Direction relations between extended spatial objects are important commonsense knowledge. Recently, Goyal and Egenhofer proposed a formal model, known as Cardinal Direction Calculus (CDC), for representing direction relations between connected plane regions. CDC is perhaps the most expressive qualitative calculus for directional information, and has attracted increasing interest from areas such as artificial intelligence, geographical information science, and image retrieval. Given a network of CDC constraints, the consistency problem is deciding if the network is realizable by connected regions in the real plane. This paper provides a cubic algorithm for checking consistency of basic CDC constraint networks, and proves that reasoning with CDC is in general an NP-Complete problem. For a consistent network of basic CDC constraints, our algorithm also returns a 'canonical' solution in cubic time. This cubic algorithm is also adapted to cope with cardinal directions between possibly disconnected regions, in which case currently the best algorithm is of time complexity O(n^5).
[ { "version": "v1", "created": "Tue, 1 Sep 2009 09:58:22 GMT" } ]
2010-07-01T00:00:00
[ [ "Zhang", "Xiaotong", "" ], [ "Liu", "Weiming", "" ], [ "Li", "Sanjiang", "" ], [ "Ying", "Mingsheng", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.0171
Jacob Vosmaer
Mai Gehrke and Jacob Vosmaer
Canonical extension and canonicity via DCPO presentations
17 pages. Definition 5 was revised slightly, without changing any of the results
Theoretical Computer Science 412(25), pp. 2714-2723, 2011
10.1016/j.tcs.2010.12.032
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The canonical extension of a lattice is in an essential way a two-sided completion. Domain theory, on the contrary, is primarily concerned with one-sided completeness. In this paper, we show two things. Firstly, that the canonical extension of a lattice can be given an asymmetric description in two stages: a free co-directed meet completion, followed by a completion by \emph{selected} directed joins. Secondly, we show that the general techniques for dcpo presentations of dcpo algebras used in the second stage of the construction immediately give us the well-known canonicity result for bounded lattices with operators.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 12:49:20 GMT" }, { "version": "v2", "created": "Tue, 14 Sep 2010 14:17:38 GMT" } ]
2012-02-16T00:00:00
[ [ "Gehrke", "Mai", "" ], [ "Vosmaer", "Jacob", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.0173
Robert Shour
Robert Shour
A theory of intelligence: networked problem solving in animal societies
83 pages; v 2-8 correct proofreading errors
null
null
null
cs.AI nlin.AO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A society's single emergent, increasing intelligence arises partly from the thermodynamic advantages of networking the innate intelligence of different individuals, and partly from the accumulation of solved problems. Economic growth is proportional to the square of the network entropy of a society's population times the network entropy of the number of the society's solved problems.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 14:52:50 GMT" }, { "version": "v2", "created": "Tue, 1 Sep 2009 20:19:13 GMT" }, { "version": "v3", "created": "Wed, 9 Sep 2009 20:42:05 GMT" }, { "version": "v4", "created": "Mon, 14 Sep 2009 17:25:26 GMT" }, { "version": "v5", "created": "Mon, 5 Oct 2009 15:25:22 GMT" }, { "version": "v6", "created": "Wed, 4 May 2011 18:05:36 GMT" }, { "version": "v7", "created": "Fri, 3 Jun 2011 17:26:28 GMT" }, { "version": "v8", "created": "Tue, 11 Sep 2012 21:19:14 GMT" } ]
2012-09-13T00:00:00
[ [ "Shour", "Robert", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Physics", "code": "nlin.AO", "description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning", "span": "(Adaptation and Self-Organizing Systems)" } ]
0909.0174
Stylianos Basagiannis
Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
State Space Reduction with Message Inspection in Security Protocol Model Checking
15 pages, 8 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Model checking is a widespread automatic formal analysis that has been successful in discovering flaws in security protocols. However existing possibilities for state space explosion still hinder analyses of complex protocols and protocol configurations. Message Inspection, is a technique that delimits the branching of the state space due to the intruder model without excluding possible attacks. In a preliminary simulation, the intruder model tags the eavesdropped messages with specific metadata that enable validation of feasibility of possible attack actions. The Message Inspection algorithm then decides based on these metadata, which attacks will certainly fail according to known security principles. Thus, it is a priori known that i.e. an encryption scheme attack cannot succeed if the intruder does not posses the right key in his knowledge. The simulation terminates with a report of the attack actions that can be safely removed, resulting in a model with a reduced state space.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 13:03:09 GMT" } ]
2009-09-02T00:00:00
[ [ "Basagiannis", "Stylianos", "" ], [ "Katsaros", "Panagiotis", "" ], [ "Pombortsis", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.0206
Somantika Datta
Somantika Datta, Stephen Howard, Douglas Cochran
Geometry of the Welch Bounds
changes from previous version include: correction of typos, additional references added, new Example 3.3
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A geometric perspective involving Grammian and frame operators is used to derive the entire family of Welch bounds. This perspective unifies a number of observations that have been made regarding tightness of the bounds and their connections to symmetric k-tensors, tight frames, homogeneous polynomials, and t-designs. In particular. a connection has been drawn between sampling of homogeneous polynomials and frames of symmetric k-tensors. It is also shown that tightness of the bounds requires tight frames. The lack of tight frames in symmetric k-tensors in many cases, however, leads to consideration of sets that come as close as possible to attaining the bounds. The geometric derivation is then extended in the setting of generalized or continuous frames. The Welch bounds for finite sets and countably infinite sets become special cases of this general setting.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 15:30:31 GMT" }, { "version": "v2", "created": "Wed, 30 May 2012 01:13:11 GMT" } ]
2012-05-31T00:00:00
[ [ "Datta", "Somantika", "" ], [ "Howard", "Stephen", "" ], [ "Cochran", "Douglas", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0236
Reynald Lercier
Clement Dunand and Reynald Lercier
Normal Elliptic Bases and Torus-Based Cryptography
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider representations of algebraic tori $T_n(F_q)$ over finite fields. We make use of normal elliptic bases to show that, for infinitely many squarefree integers $n$ and infinitely many values of $q$, we can encode $m$ torus elements, to a small fixed overhead and to $m$ $\phi(n)$-tuples of $F_q$ elements, in quasi-linear time in $\log q$. This improves upon previously known algorithms, which all have a quasi-quadratic complexity. As a result, the cost of the encoding phase is now negligible in Diffie-Hellman cryptographic schemes.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 18:44:27 GMT" } ]
2009-09-02T00:00:00
[ [ "Dunand", "Clement", "" ], [ "Lercier", "Reynald", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.0237
Vassilis Kostakos
Vassilis Kostakos
Is the crowd's wisdom biased? A quantitative asessment of three online communities
17 pages, 6 tagles
Computational Science and Engineering, p. 251-255, 2009
10.1109/CSE.2009.491
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a study of user voting on three websites: Imdb, Amazon and BookCrossings. It reports on an expert evaluation of the voting mechanisms of each website and a quantitative data analysis of users' aggregate voting behavior. The results suggest that voting follows different patterns across the websites, with higher barrier to vote introducing a more of one-off voters and attracting mostly experts. The results also show that that one-off voters tend to vote on popular items, while experts mostly vote for obscure, low-rated items. The study concludes with design suggestions to address the "wisdom of the crowd" bias.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 18:31:17 GMT" }, { "version": "v2", "created": "Thu, 3 Sep 2009 13:46:03 GMT" }, { "version": "v3", "created": "Wed, 16 Sep 2009 13:40:23 GMT" }, { "version": "v4", "created": "Tue, 6 Oct 2009 08:43:33 GMT" }, { "version": "v5", "created": "Sun, 8 Nov 2009 01:54:35 GMT" } ]
2013-06-06T00:00:00
[ [ "Kostakos", "Vassilis", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.0245
R Doomun
Sourabh Rungta, Kshitij Verma, Neeta Tripathi, Anupam Shukla
Enhanced Mode Selection Algorithm for H.264 encoder for Application in Low Computational power devices
7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423 http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The intent of the H.264 AVC project was to create a standard capable of providing good video quality at substantially lower bit rates than previous standards without increasing the complexity of design so much that it would be impractical or excessively expensive to implement. An additional goal was to provide enough flexibility to allow the standard to be applied to a wide variety of applications. To achieve better coding efficiency, H.264 AVC uses several techniques such as inter mode and intra mode prediction with variable size motion compensation, which adopts Rate Distortion Optimization (RDO). This increases the computational complexity of the encoder especially for devices with lower processing capabilities such as mobile and other handheld devices. In this paper, we propose an algorithm to reduce the number of mode and sub mode evaluations in inter mode prediction. Experimental results show that this fast intra mode selection algorithm can lessen about 75 percent encoding time with little loss of bit rate and visual quality.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 18:57:06 GMT" } ]
2009-09-02T00:00:00
[ [ "Rungta", "Sourabh", "" ], [ "Verma", "Kshitij", "" ], [ "Tripathi", "Neeta", "" ], [ "Shukla", "Anupam", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0909.0247
R Doomun
Abu Shamim Mohammad Arif, Asif Mahamud, Rashedul Islam
An Enhanced Static Data Compression Scheme Of Bengali Short Message
7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423 http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper concerns a modified approach of compressing Short Bengali Text Message for small devices. The prime objective of this research technique is to establish a low complexity compression scheme suitable for small devices having small memory and relatively lower processing speed. The basic aim is not to compress text of any size up to its maximum level without having any constraint on space and time, rather than the main target is to compress short messages up to an optimal level which needs minimum space, consume less time and the processor requirement is lower. We have implemented Character Masking, Dictionary Matching, Associative rule of data mining and Hyphenation algorithm for syllable based compression in hierarchical steps to achieve low complexity lossless compression of text message for any mobile devices. The scheme to choose the diagrams are performed on the basis of extensive statistical model and the static Huffman coding is done through the same context.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 19:54:57 GMT" }, { "version": "v2", "created": "Tue, 8 Sep 2009 02:47:43 GMT" } ]
2009-09-08T00:00:00
[ [ "Arif", "Abu Shamim Mohammad", "" ], [ "Mahamud", "Asif", "" ], [ "Islam", "Rashedul", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0251
Kazi Huq
Kazi Mohammed Saidul Huq, Miguel Bergano, Atilio Gameiro, Md. Taslim Arefin
Channel Equalization in Digital Transmission
not published
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Channel equalization is the process of reducing amplitude, frequency and phase distortion in a radio channel with the intent of improving transmission performance. Different types of equalizers, their applications and some practical example is given. Especially, in the digital communication scenario how equalization works is shown. This paper presents a vivid description on channel equalization in digital transmission system.
[ { "version": "v1", "created": "Tue, 1 Sep 2009 19:26:44 GMT" }, { "version": "v2", "created": "Fri, 30 Apr 2010 19:44:27 GMT" } ]
2020-01-21T00:00:00
[ [ "Huq", "Kazi Mohammed Saidul", "" ], [ "Bergano", "Miguel", "" ], [ "Gameiro", "Atilio", "" ], [ "Arefin", "Md. Taslim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]