id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0908.3551
|
Zoran Hadzi-Velkov
|
Zoran Hadzi-Velkov
|
Level Crossing Rate and Average Fade Duration of EGC Systems with
Cochannel Interference in Rayleigh Fading
| null |
IEEE Transactions on Communications, Volume 55, Issue 11, Nov.
2007 Page(s):2104 - 2113
|
10.1109/TCOMM.2007.908519
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Both the first-order signal statistics (e.g. the outage probability) and the
second-order signal statistics (e.g. the average level crossing rate, LCR, and
the average fade duration, AFD) are important design criteria and performance
measures for the wireless communication systems, including the equal gain
combining (EGC) systems in presence of the cochannel interference (CCI).
Although the analytical expressions for the outage probability of the coherent
EGC systems exposed to CCI and various fading channels are already known, the
respective ones for the average LCR and the AFD are not available in the
literature. This paper presents such analytical expressions for the Rayleigh
fading channel, which are obtained by utilizing a novel analytical approach
that does not require the explicit expression for the joint PDF of the
instantaneous output signal-to-interference ratio (SIR) and its time
derivative. Applying the characteristic function method and the Beaulieu
series, we determined the average LCR and the AFD at the output of an
interference-limited EGC system with an arbitrary diversity order and an
arbitrary number of cochannel interferers in forms of an infinite integral and
an infinite series. For the dual diversity case, the respective expressions are
derived in closed forms in terms of the gamma and the beta functions.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 07:27:04 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Hadzi-Velkov",
"Zoran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3552
|
Zoran Hadzi-Velkov
|
Zoran Hadzi-Velkov
|
Level Crossing Rate and Average Fade Duration of Dual Selection
Combining with Cochannel Interference and Nakagami Fading
| null |
IEEE Transactions on Wireless Communications, Volume 6, Issue 11,
November 2007 Page(s):3870 - 3876
|
10.1109/TWC.2007.060206
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This letter provides closed-form expressions for the outage probability, the
average level crossing rate (LCR) and the average fade duration (AFD) of a dual
diversity selection combining (SC) system exposed to the combined influence of
the cochannel interference (CCI) and the thermal noise (AWGN) in Nakagami
fading channel. The branch selection is based on the desired signal power SC
algorithm with all input signals assumed to be independent, while the powers of
the desired signals in all diversity branches are mutually equal but distinct
from the power of the interference signals. The analytical results reduce to
known solutions in the cases of an interference-limited system in Rayleigh
fading and an AWGN-limited system in Nakagami fading. The average LCR is
determined by an original approach that does not require explicit knowledge of
the joint PDF of the envelope and its time derivative, which also paves the way
for similar analysis of other diversity systems.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 07:31:51 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Hadzi-Velkov",
"Zoran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3562
|
Neri Merhav
|
Neri Merhav
|
Another Look at the Physics of Large Deviations With Application to
Rate-Distortion Theory
|
10 pages, 2 figures, submitted to IEEE Trans. on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We revisit and extend the physical interpretation recently given to a certain
identity between large--deviations rate--functions (as well as applications of
this identity to Information Theory), as an instance of thermal equilibrium
between several physical systems that are brought into contact. Our new
interpretation, of mechanical equilibrium between these systems, is shown to
have several advantages relative to that of thermal equilibrium. This physical
point of view also provides a trigger to the development of certain alternative
representations of the rate--distortion function and channel capacity, which
are new to the best knowledge of the author.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 08:35:16 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Merhav",
"Neri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3565
|
K R Guruprasad
|
K.R. Guruprasad and Debasish Ghose
|
Coverage Optimization using Generalized Voronoi Partition
|
16 pages
| null | null | null |
math.OC cs.SY math.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a generalization of the Voronoi partition is used for optimal
deployment of autonomous agents carrying sensors with heterogeneous
capabilities, to maximize the sensor coverage. The generalized centroidal
Voronoi configuration, in which the agents are located at the centroids of the
corresponding generalized Voronoi cells, is shown to be a local optimal
configuration. Simulation results are presented to illustrate the presented
deployment strategy.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 08:55:07 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Jun 2011 20:37:54 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Oct 2011 16:06:56 GMT"
}
] | 2011-10-13T00:00:00 |
[
[
"Guruprasad",
"K. R.",
""
],
[
"Ghose",
"Debasish",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.DS",
"description": "Dynamics of differential equations and flows, mechanics, classical few-body problems, iterations, complex dynamics, delayed differential equations",
"span": "(Dynamical Systems)"
}
] |
0908.3574
|
Christian Esteve Rothenberg
|
Christian Esteve Rothenberg, Carlos A. Macapuna, Fabio L. Verdi,
Mauricio F. Magalhaes, Alexander Wiesmaier
|
In-packet Bloom filters: Design and networking applications
|
15 pages, 11 figures, preprint submitted to Elsevier COMNET Journal
| null | null | null |
cs.DS cs.IT cs.NI cs.PF math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Bloom filter (BF) is a well-known space-efficient data structure that
answers set membership queries with some probability of false positives. In an
attempt to solve many of the limitations of current inter-networking
architectures, some recent proposals rely on including small BFs in packet
headers for routing, security, accountability or other purposes that move
application states into the packets themselves. In this paper, we consider the
design of such in-packet Bloom filters (iBF). Our main contributions are
exploring the design space and the evaluation of a series of extensions (1) to
increase the practicality and performance of iBFs, (2) to enable
false-negative-free element deletion, and (3) to provide security enhancements.
In addition to the theoretical estimates, extensive simulations of the multiple
design parameters and implementation alternatives validate the usefulness of
the extensions, providing for enhanced and novel iBF networking applications.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 09:10:51 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jan 2010 00:35:00 GMT"
}
] | 2010-01-20T00:00:00 |
[
[
"Rothenberg",
"Christian Esteve",
""
],
[
"Macapuna",
"Carlos A.",
""
],
[
"Verdi",
"Fabio L.",
""
],
[
"Magalhaes",
"Mauricio F.",
""
],
[
"Wiesmaier",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3587
|
R Doomun
|
Siti Rahayu S., Robiah Y., Shahrin S., Faizal M. A., Mohd Zaki M, Irda
R
|
Tracing Technique for Blaster Attack
|
8 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Volume 4, No. 1, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Blaster worm of 2003 is still persistent, the infection appears to have
successfully transitioned to new hosts as the original systems are cleaned or
shut off, suggesting that the Blaster worm, and other similar worms, will
remain significant Internet threats for many years after their initial release.
This paper is to propose technique on tracing the Blaster attack from various
logs in different OSI layers based on fingerprint of Blaster attack on victim
logs, attacker logs and IDS alert log. The researchers intended to do a
preliminary investigation upon this particular attack so that it can be used
for further research in alert correlation and computer forensic investigation.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 10:32:52 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"S.",
"Siti Rahayu",
""
],
[
"Y.",
"Robiah",
""
],
[
"S.",
"Shahrin",
""
],
[
"A.",
"Faizal M.",
""
],
[
"M",
"Mohd Zaki",
""
],
[
"R",
"Irda",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.3610
|
Thimo Rohlf
|
Thimo Rohlf and Christopher R. Winkler
|
Emergent Network Structure, evolvable Robustness and non-linear Effects
of Point Mutations in an Artificial Genome Model
| null |
Advances in Complex Systems, Vol. 12, pp. 293 - 310 (2009)
| null | null |
q-bio.MN cond-mat.dis-nn cs.NE q-bio.GN q-bio.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Genetic regulation is a key component in development, but a clear
understanding of the structure and dynamics of genetic networks is not yet at
hand. In this paper we investigate these properties within an artificial genome
model originally introduced by Reil (1999). We analyze statistical properties
of randomly generated genomes both on the sequence- and network level, and show
that this model correctly predicts the frequency of genes in genomes as found
in experimental data. Using an evolutionary algorithm based on stabilizing
selection for a phenotype, we show that dynamical robustness against single
base mutations, as well as against random changes in initial states of
regulatory dynamics that mimic stochastic fluctuations in environmental
conditions, can emerge in parallel. Point mutations at the sequence level have
strongly non-linear effects on network wiring, including as well structurally
neutral mutations and simultaneous rewiring of multiple connections, which
occasionally lead to strong reorganization of the attractor landscape and
metastability of evolutionary dynamics. Evolved genomes exhibit characteristic
patterns on both sequence and network level.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 12:44:43 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Rohlf",
"Thimo",
""
],
[
"Winkler",
"Christopher R.",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.MN",
"description": "Gene regulation, signal transduction, proteomics, metabolomics, gene and enzymatic networks",
"span": "(Molecular Networks)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.SC",
"description": "Assembly and control of subcellular structures (channels, organelles, cytoskeletons, capsules, etc.); molecular motors, transport, subcellular localization; mitosis and meiosis",
"span": "(Subcellular Processes)"
}
] |
0908.3633
|
Aparna Das
|
Aparna Das, Claire Mathieu, Daniel Ricketts
|
Maximizing profit using recommender systems
| null | null | null | null |
cs.CY cs.AI cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Traditional recommendation systems make recommendations based solely on the
customer's past purchases, product ratings and demographic data without
considering the profitability the items being recommended. In this work we
study the question of how a vendor can directly incorporate the profitability
of items into its recommender so as to maximize its expected profit while still
providing accurate recommendations. Our approach uses the output of any
traditional recommender system and adjust them according to item
profitabilities. Our approach is parameterized so the vendor can control how
much the recommendation incorporating profits can deviate from the traditional
recommendation. We study our approach under two settings and show that it
achieves approximately 22% more profit than traditional recommendations.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 15:30:34 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Das",
"Aparna",
""
],
[
"Mathieu",
"Claire",
""
],
[
"Ricketts",
"Daniel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0908.3634
|
Dominique Duval
|
Dominique Duval (LJK), C\'esar Dominguez
|
A parameterization process as a categorical construction
| null | null | null | null |
cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The parameterization process used in the symbolic computation systems Kenzo
and EAT is studied here as a general construction in a categorical framework.
This parameterization process starts from a given specification and builds a
parameterized specification by transforming some operations into parameterized
operations, which depend on one additional variable called the parameter. Given
a model of the parameterized specification, each interpretation of the
parameter, called an argument, provides a model of the given specification.
Moreover, under some relevant terminality assumption, this correspondence
between the arguments and the models of the given specification is a bijection.
It is proved in this paper that the parameterization process is provided by a
free functor and the subsequent parameter passing process by a natural
transformation. Various categorical notions are used, mainly adjoint functors,
pushouts and lax colimits.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 15:31:18 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Duval",
"Dominique",
"",
"LJK"
],
[
"Dominguez",
"César",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0908.3650
|
Keiko Nakata Dr
|
Keiko Nakata
|
Lazy mixin modules and disciplined effects
| null | null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Programming languages are expected to support programmer's effort to
structure program code. The ML module system, object systems and mixins are
good examples of language constructs promoting modular programming. Among the
three, mixins can be thought of as a generalization of the two others in the
sense that mixins can incorporate features of ML modules and objects with a set
of primitive operators with clean semantics. Much work has been devoted to
build mixin-based module systems for practical programming languages. In
respect of the operational semantics, previous work notably investigated mixin
calculi in call-by-name and call-by-value evaluation settings. In this paper we
examine a mixin calculus in a call-by-need, or lazy, evaluation setting. We
demonstrate how lazy mixins can be interesting in practice with a series of
examples, and formalize the operational semantics by adapting Ancona and
Zucca's concise formalization of call-by-name mixins. We then extend the
semantics with constraints to control the evaluation order of components of
mixins in several ways. The main motivation for considering the constraints is
to produce side effects in a more explicit order than in a purely lazy,
demand-driven setting. We explore the design space of possibly interesting
constraints and consider two examples in detail.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 17:20:47 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Nakata",
"Keiko",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0908.3652
|
Mugurel Ionut Andreica
|
Mugurel Ionut Andreica, Eliana-Dina Tirsa, Cristina Teodora Andreica,
Romulus Andreica, Mihai Aristotel Ungureanu
|
Optimal Geometric Partitions, Covers and K-Centers
|
Extended version of the conference paper
|
Proc. of the 9th WSEAS Intl. Conf. on Mathematics and Computers in
Business and Economics (MCBE), pp. 173-178, Bucharest, Romania, 24-26 June,
2008. (ISBN: 978-960-6766-76-3 / ISSN: 1790-5109)
| null | null |
cs.DS cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present some new, practical, geometric optimization
techniques for computing polygon partitions, 1D and 2D point, interval, square
and rectangle covers, as well as 1D and 2D interval and rectangle K-centers.
All the techniques we present have immediate applications to several cost
optimization and facility location problems which are quite common in practice.
The main technique employed is dynamic programming, but we also make use of
efficient data structures and fast greedy algorithms.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 17:47:50 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Andreica",
"Mugurel Ionut",
""
],
[
"Tirsa",
"Eliana-Dina",
""
],
[
"Andreica",
"Cristina Teodora",
""
],
[
"Andreica",
"Romulus",
""
],
[
"Ungureanu",
"Mihai Aristotel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.3653
|
Priya Ranjan
|
Harry W. Bullen IV and Priya Ranjan
|
Chaotic Transitions in Wall Following Robots
| null | null | null | null |
nlin.CD cs.RO nlin.AO
|
http://creativecommons.org/licenses/publicdomain/
|
In this paper we examine how simple agents similar to Braitenberg vehicles
can exhibit chaotic movement patterns. The agents are wall following robots as
described by Steve Mesburger and Alfred Hubler in their paper "Chaos in Wall
Following Robots". These agents uses a simple forward facing distance sensor,
with a limited field of view "phi" for navigation. An agent drives forward at a
constant velocity and uses the sensor to turn right when it is too close to an
object and left when it is too far away.
For a flat wall the agent stays a fixed distance from the wall and travels
along it, regardless of the sensor's capabilities. But, if the wall represents
a periodic function, the agent drives on a periodic path when the sensor has a
narrow field of view. The agent's trajectory transitions to chaos when the
sensor's field of view is increased. Numerical experiments were performed with
square, triangle, and sawtooth waves for the wall, to find this pattern. The
bifurcations of the agents were analyzed, finding both border collision and
period doubling bifurcations. Detailed experimental results will be reported
separately.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 18:03:22 GMT"
}
] | 2009-08-26T00:00:00 |
[
[
"Bullen",
"Harry W.",
"IV"
],
[
"Ranjan",
"Priya",
""
]
] |
[
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0908.3666
|
Ramon Van Handel
|
Ramon van Handel
|
On the minimal penalty for Markov order estimation
|
29 pages
|
Probab. Th. Rel. Fields 150 (2011), pp. 709-738
|
10.1007/s00440-010-0290-y
| null |
math.PR cs.IT math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that large-scale typicality of Markov sample paths implies that the
likelihood ratio statistic satisfies a law of iterated logarithm uniformly to
the same scale. As a consequence, the penalized likelihood Markov order
estimator is strongly consistent for penalties growing as slowly as log log n
when an upper bound is imposed on the order which may grow as rapidly as log n.
Our method of proof, using techniques from empirical process theory, does not
rely on the explicit expression for the maximum likelihood estimator in the
Markov case and could therefore be applicable in other settings.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 19:34:10 GMT"
}
] | 2011-08-31T00:00:00 |
[
[
"van Handel",
"Ramon",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0908.3670
|
Jinwoo Shin
|
Devavrat Shah, Jinwoo Shin
|
Randomized Scheduling Algorithm for Queueing Networks
| null | null | null | null |
cs.IT cs.NI math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There has recently been considerable interest in design of low-complexity,
myopic, distributed and stable scheduling policies for constrained queueing
network models that arise in the context of emerging communication networks.
Here, we consider two representative models. One, a model for the collection of
wireless nodes communicating through a shared medium, that represents randomly
varying number of packets in the queues at the nodes of networks. Two, a
buffered circuit switched network model for an optical core of future Internet,
to capture the randomness in calls or flows present in the network. The maximum
weight scheduling policy proposed by Tassiulas and Ephremide in 1992 leads to a
myopic and stable policy for the packet-level wireless network model. But
computationally it is very expensive (NP-hard) and centralized. It is not
applicable to the buffered circuit switched network due to the requirement of
non-premption of the calls in the service. As the main contribution of this
paper, we present a stable scheduling algorithm for both of these models. The
algorithm is myopic, distributed and performs few logical operations at each
node per unit time.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 19:44:58 GMT"
},
{
"version": "v2",
"created": "Sun, 4 Apr 2010 18:26:21 GMT"
}
] | 2010-04-06T00:00:00 |
[
[
"Shah",
"Devavrat",
""
],
[
"Shin",
"Jinwoo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0908.3689
|
Renuka Kandregula
|
Renuka Kandregula
|
A DHT Based Measure of Randomness
|
15 pages, 8 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new discrete Hilbert transform (DHT) based measure of
randomness for discrete sequences. The measure has been used to test three
different classes of sequences with satisfactory results.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 21:16:39 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Kandregula",
"Renuka",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0908.3702
|
Hong Ju Park
|
Hong Ju Park and Ender Ayanoglu
|
Bit-Interleaved Coded Multiple Beamforming with Constellation Precoding
|
submitted to conference
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present the diversity order analysis of bit-interleaved
coded multiple beamforming (BICMB) combined with the constellation precoding
scheme. Multiple beamforming is realized by singular value decomposition of the
channel matrix which is assumed to be perfectly known to the transmitter as
well as the receiver. Previously, BICMB is known to have a diversity order
bound related with the product of the code rate and the number of parallel
subchannels, losing the full diversity order in some cases. In this paper, we
show that BICMB combined with the constellation precoder and maximum likelihood
detection achieves the full diversity order. We also provide simulation results
that match the analysis.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 23:07:47 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Park",
"Hong Ju",
""
],
[
"Ayanoglu",
"Ender",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3706
|
Somak Raychaudhury
|
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhury, Xin Yao, Markus
Harva
|
Uncovering delayed patterns in noisy and irregularly sampled time
series: an astronomy application
|
36 pages, 10 figures, 16 tables, accepted for publication in Pattern
Recognition. This is a shortened version of the article: interested readers
are urged to refer to the published version
| null | null | null |
astro-ph.CO astro-ph.IM cs.LG cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of estimating the time delay between two signals
representing delayed, irregularly sampled and noisy versions of the same
underlying pattern. We propose and demonstrate an evolutionary algorithm for
the (hyper)parameter estimation of a kernel-based technique in the context of
an astronomical problem, namely estimating the time delay between two
gravitationally lensed signals from a distant quasar. Mixed types (integer and
real) are used to represent variables within the evolutionary algorithm. We
test the algorithm on several artificial data sets, and also on real
astronomical observations of quasar Q0957+561. By carrying out a statistical
analysis of the results we present a detailed comparison of our method with the
most popular methods for time delay estimation in astrophysics. Our method
yields more accurate and more stable time delay estimates: for Q0957+561, we
obtain 419.6 days for the time delay between images A and B. Our methodology
can be readily applied to current state-of-the-art optical monitoring data in
astronomy, but can also be applied in other disciplines involving similar time
series data.
|
[
{
"version": "v1",
"created": "Tue, 25 Aug 2009 23:21:39 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Cuevas-Tello",
"Juan C.",
""
],
[
"Tino",
"Peter",
""
],
[
"Raychaudhury",
"Somak",
""
],
[
"Yao",
"Xin",
""
],
[
"Harva",
"Markus",
""
]
] |
[
{
"class": "Physics",
"code": "astro-ph.CO",
"description": "Phenomenology of early universe, cosmic microwave background, cosmological parameters, primordial element abundances, extragalactic distance scale, large-scale structure of the universe. Groups, superclusters, voids, intergalactic medium. Particle astrophysics: dark energy, dark matter, baryogenesis, leptogenesis, inflationary models, reheating, monopoles, WIMPs, cosmic strings, primordial black holes, cosmological gravitational radiation",
"span": "(Cosmology and Nongalactic Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0908.3710
|
Moustafa Youssef
|
Aly El Gamal, Moustafa Youssef, and Hesham El Gamal
|
Randomization for Security in Half-Duplex Two-Way Gaussian Channels
| null |
Globecom 2009
| null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper develops a new physical layer framework for secure two-way
wireless communication in the presence of a passive eavesdropper, i.e., Eve.
Our approach achieves perfect information theoretic secrecy via a novel
randomized scheduling and power allocation scheme. The key idea is to allow
Alice and Bob to send symbols at random time instants. While Alice will be able
to determine the symbols transmitted by Bob, Eve will suffer from ambiguity
regarding the source of any particular symbol. This desirable ambiguity is
enhanced, in our approach, by randomizing the transmit power level. Our
theoretical analysis, in a 2-D geometry, reveals the ability of the proposed
approach to achieve relatively high secure data rates under mild conditions on
the spatial location of Eve. These theoretical claims are then validated by
experimental results using IEEE 802.15.4-enabled sensor boards in different
configurations, motivated by the spatial characteristics of Wireless Body Area
Networks (WBAN).
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 00:41:13 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Gamal",
"Aly El",
""
],
[
"Youssef",
"Moustafa",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3715
|
Moustafa Youssef
|
Moustafa Youssef, Adel Youssef, and Mohamed Younis
|
Overlapping Multi-hop Clustering for Wireless Sensor Networks
| null |
IEEE TPDS 2009
|
10.1109/TPDS.2009.32
|
WINC-TR-1001
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Clustering is a standard approach for achieving efficient and scalable
performance in wireless sensor networks. Traditionally, clustering algorithms
aim at generating a number of disjoint clusters that satisfy some criteria. In
this paper, we formulate a novel clustering problem that aims at generating
overlapping multi-hop clusters. Overlapping clusters are useful in many sensor
network applications, including inter-cluster routing, node localization, and
time synchronization protocols. We also propose a randomized, distributed
multi-hop clustering algorithm (KOCA) for solving the overlapping clustering
problem. KOCA aims at generating connected overlapping clusters that cover the
entire sensor network with a specific average overlapping degree. Through
analysis and simulation experiments we show how to select the different values
of the parameters to achieve the clustering process objectives. Moreover, the
results show that KOCA produces approximately equal-sized clusters, which
allows distributing the load evenly over different clusters. In addition, KOCA
is scalable; the clustering formation terminates in a constant time regardless
of the network size.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 01:43:15 GMT"
}
] | 2013-04-09T00:00:00 |
[
[
"Youssef",
"Moustafa",
""
],
[
"Youssef",
"Adel",
""
],
[
"Younis",
"Mohamed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.3716
|
Sariel Har-Peled
|
Sariel Har-Peled
|
Carnival of Samplings: Nets, Approximations, Relative and Sensitive
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We survey several results known on sampling in computational geometry.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 01:44:49 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Har-Peled",
"Sariel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.3731
|
Edlyn Teske
|
Jennifer Balakrishnan, Juliana Belding, Sarah Chisholm, Kirsten
Eisentraeger, Katherine Stange, Edlyn Teske
|
Pairings on hyperelliptic curves
|
v2: with corrections and improvements in sections 4 and 5
|
Fields Institute Communications 60 (2011) 87-120
| null | null |
math.NT cs.CR math.AG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We assemble and reorganize the recent work in the area of hyperelliptic
pairings: We survey the research on constructing hyperelliptic curves suitable
for pairing-based cryptography. We also showcase the hyperelliptic pairings
proposed to date, and develop a unifying framework. We discuss the techniques
used to optimize the pairing computation on hyperelliptic curves, and present
many directions for further research.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 06:28:35 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Sep 2009 04:13:02 GMT"
}
] | 2014-12-30T00:00:00 |
[
[
"Balakrishnan",
"Jennifer",
""
],
[
"Belding",
"Juliana",
""
],
[
"Chisholm",
"Sarah",
""
],
[
"Eisentraeger",
"Kirsten",
""
],
[
"Stange",
"Katherine",
""
],
[
"Teske",
"Edlyn",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AG",
"description": "Algebraic varieties, stacks, sheaves, schemes, moduli spaces, complex geometry, quantum cohomology",
"span": "(Algebraic Geometry)"
}
] |
0908.3737
|
Dominique Duval
|
Cesar Dominguez, Dominique Duval (LJK)
|
Diagrammatic logic applied to a parameterization process
| null | null | null | null |
cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper provides an abstract definition of some kinds of logics, called
diagrammatic logics, together with a definition of morphisms and of 2-morphisms
between diagrammatic logics. The definition of the 2-category of diagrammatic
logics rely on category theory, mainly on adjunction, categories of fractions
and limit sketches. This framework is applied to the formalization of a
parameterization process. This process, which consists in adding a formal
parameter to some operations in a given specification, is presented as a
morphism of logics. Then the parameter passing process, for recovering a model
of the given specification from a model of the parameterized specification and
an actual parameter, is seen as a 2-morphism of logics.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 06:50:00 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Dominguez",
"Cesar",
"",
"LJK"
],
[
"Duval",
"Dominique",
"",
"LJK"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0908.3740
|
Ian Post
|
Ashish Goel and Ian Post
|
An Oblivious O(1)-Approximation for Single Source Buy-at-Bulk
|
22 pages, 1 figure To appear in the proceedings of the 50th annual
IEEE Symposium on Foundations of Computer Science (FOCS 2009)
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the single-source (or single-sink) buy-at-bulk problem with an
unknown concave cost function. We want to route a set of demands along a graph
to or from a designated root node, and the cost of routing x units of flow
along an edge is proportional to some concave, non-decreasing function f such
that f(0) = 0. We present a polynomial time algorithm that finds a distribution
over trees such that the expected cost of a tree for any f is within an
O(1)-factor of the optimum cost for that f. The previous best simultaneous
approximation for this problem, even ignoring computation time, was O(log |D|),
where D is the multi-set of demand nodes.
We design a simple algorithmic framework using the ellipsoid method that
finds an O(1)-approximation if one exists, and then construct a separation
oracle using a novel adaptation of the Guha, Meyerson, and Munagala algorithm
for the single-sink buy-at-bulk problem that proves an O(1) approximation is
possible for all f. The number of trees in the support of the distribution
constructed by our algorithm is at most 1+log |D|.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 07:20:01 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Goel",
"Ashish",
""
],
[
"Post",
"Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.3784
|
Alexandr Kazda
|
Jarkko Kari, Alexandr Kazda, Paula Steinby
|
On Continuous Weighted Finite Automata
|
41 pages, 9 figures
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the continuity of the \omega-functions and real functions
defined by weighted finite automata (WFA). We concentrate on the case of
average preserving WFA. We show that every continuous \omega-function definable
by some WFA can be defined by an average preserving WFA and then characterize
minimal average preserving WFA whose \omega-function or \omega-function and
real function are continuous.
We obtain several algorithmic reductions for WFA-related decision problems.
In particular, we show that deciding whether the \omega-function and real
function of an average preserving WFA are both continuous is computationally
equivalent to deciding stability of a set of matrices.
We also present a method for constructing WFA that compute continuous real
functions.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 18:07:50 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Kari",
"Jarkko",
""
],
[
"Kazda",
"Alexandr",
""
],
[
"Steinby",
"Paula",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0908.3850
|
Yusuke Watanabe
|
Yusuke Watanabe, Kenji Fukumizu
|
New graph polynomials from the Bethe approximation of the Ising
partition function
|
To appear in Combinatorics, Probability & Computing. Revised from the
first version, 28 pages
| null | null | null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce two graph polynomials and discuss their properties. One is a
polynomial of two variables whose investigation is motivated by the performance
analysis of the Bethe approximation of the Ising partition function. The other
is a polynomial of one variable that is obtained by the specialization of the
first one. It is shown that these polynomials satisfy deletion-contraction
relations and are new examples of the V-function, which was introduced by Tutte
(1947, Proc. Cambridge Philos. Soc. 43, 26-40). For these polynomials, we
discuss the interpretations of special values and then obtain the bound on the
number of sub-coregraphs, i.e., spanning subgraphs with no vertices of degree
one. It is proved that the polynomial of one variable is equal to the
monomer-dimer partition function with weights parameterized by that variable.
The properties of the coefficients and the possible region of zeros are also
discussed for this polynomial.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 15:36:59 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jun 2010 02:27:15 GMT"
}
] | 2010-06-07T00:00:00 |
[
[
"Watanabe",
"Yusuke",
""
],
[
"Fukumizu",
"Kenji",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.3855
|
Kunal Narayan Chaudhury Dr.
|
Kunal Narayan Chaudhury and Michael Unser
|
Gabor wavelet analysis and the fractional Hilbert transform
|
7 pages, 1 figure
|
SPIE Proceedings: Wavelets XIII 2009
| null | null |
cs.IT cs.CV math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose an amplitude-phase representation of the dual-tree complex wavelet
transform (DT-CWT) which provides an intuitive interpretation of the associated
complex wavelet coefficients. The representation, in particular, is based on
the shifting action of the group of fractional Hilbert transforms (fHT) which
allow us to extend the notion of arbitrary phase-shifts beyond pure sinusoids.
We explicitly characterize this shifting action for a particular family of
Gabor-like wavelets which, in effect, links the corresponding dual-tree
transform with the framework of windowed-Fourier analysis.
We then extend these ideas to the bivariate DT-CWT based on certain
directional extensions of the fHT. In particular, we derive a signal
representation involving the superposition of direction-selective wavelets
affected with appropriate phase-shifts.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 16:24:08 GMT"
}
] | 2010-03-11T00:00:00 |
[
[
"Chaudhury",
"Kunal Narayan",
""
],
[
"Unser",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3861
|
Kunal Narayan Chaudhury Dr.
|
Kunal Narayan Chaudhury, Arrate Munoz Barrutia and Michael Unser
|
Fast adaptive elliptical filtering using box splines
|
9 pages, 1 figure
|
Proceedings IEEE International Conference on Image Processing,
2008
|
10.1109/ICIP.2008.4711872
| null |
cs.IT cs.CV math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We demonstrate that it is possible to filter an image with an elliptic window
of varying size, elongation and orientation with a fixed computational cost per
pixel. Our method involves the application of a suitable global pre-integrator
followed by a pointwise-adaptive localization mesh. We present the basic theory
for the 1D case using a B-spline formalism and then appropriately extend it to
2D using radially-uniform box splines. The size and ellipticity of these
radially-uniform box splines is adaptively controlled. Moreover, they converge
to Gaussians as the order increases. Finally, we present a fast and practical
directional filtering algorithm that has the capability of adapting to the
local image features.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 16:44:42 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Aug 2009 12:53:35 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Chaudhury",
"Kunal Narayan",
""
],
[
"Barrutia",
"Arrate Munoz",
""
],
[
"Unser",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3886
|
Jonathan Yedidia Dr.
|
Stark C. Draper, Lingjia Liu, Andreas F. Molisch, Jonathan S. Yedidia
|
Cooperative Routing for Wireless Networks using Mutual-Information
Accumulation
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cooperation between the nodes of wireless multihop networks can increase
communication reliability, reduce energy consumption, and decrease latency. The
possible improvements are even greater when nodes perform mutual information
accumulation using rateless codes. In this paper, we investigate routing
problems in such networks. Given a network, a source, and a destination, our
objective is to minimize end-to-end transmission delay under energy and
bandwidth constraints. We provide an algorithm that determines which nodes
should participate in forwarding the message and what resources (time, energy,
bandwidth) should be allocated to each.
Our approach factors into two sub-problems, each of which can be solved
efficiently. For any transmission order we show that solving for the optimum
resource allocation can be formulated as a linear programming problem. We then
show that the transmission order can be improved systematically by swapping
nodes based on the solution of the linear program. Solving a sequence of linear
programs leads to a locally optimal solution in a very efficient manner. In
comparison to the proposed cooperative routing solution, it is observed that
conventional shortest path multihop routing typically incurs additional delays
and energy expenditures on the order of 70%.
Our first algorithm is centralized, assuming that routing computations can be
done at a central processor with full access to channel state information for
the entire system. We also design two distributed routing algorithms that
require only local channel state information. We provide simulations showing
that for the same networks the distributed algorithms find routes that are only
about two to five percent less efficient than the centralized algorithm.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 19:36:36 GMT"
}
] | 2009-08-27T00:00:00 |
[
[
"Draper",
"Stark C.",
""
],
[
"Liu",
"Lingjia",
""
],
[
"Molisch",
"Andreas F.",
""
],
[
"Yedidia",
"Jonathan S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3889
|
Manuel Tiglio
|
Frank Herrmann, John Silberholz, Matias Bellone, Gustavo Guerberoff,
Manuel Tiglio
|
Integrating Post-Newtonian Equations on Graphics Processing Units
|
Added one reference
|
Class.Quant.Grav.27:032001,2010
|
10.1088/0264-9381/27/3/032001
| null |
gr-qc astro-ph.CO astro-ph.EP astro-ph.GA astro-ph.HE astro-ph.IM astro-ph.SR cs.DC cs.GR cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We report on early results of a numerical and statistical study of binary
black hole inspirals. The two black holes are evolved using post-Newtonian
approximations starting with initially randomly distributed spin vectors. We
characterize certain aspects of the distribution shortly before merger. In
particular we note the uniform distribution of black hole spin vector dot
products shortly before merger and a high correlation between the initial and
final black hole spin vector dot products in the equal-mass, maximally spinning
case. These simulations were performed on Graphics Processing Units, and we
demonstrate a speed-up of a factor 50 over a more conventional CPU
implementation.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 20:00:38 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Aug 2009 17:39:59 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Herrmann",
"Frank",
""
],
[
"Silberholz",
"John",
""
],
[
"Bellone",
"Matias",
""
],
[
"Guerberoff",
"Gustavo",
""
],
[
"Tiglio",
"Manuel",
""
]
] |
[
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Physics",
"code": "astro-ph.CO",
"description": "Phenomenology of early universe, cosmic microwave background, cosmological parameters, primordial element abundances, extragalactic distance scale, large-scale structure of the universe. Groups, superclusters, voids, intergalactic medium. Particle astrophysics: dark energy, dark matter, baryogenesis, leptogenesis, inflationary models, reheating, monopoles, WIMPs, cosmic strings, primordial black holes, cosmological gravitational radiation",
"span": "(Cosmology and Nongalactic Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.EP",
"description": "Interplanetary medium, planetary physics, planetary astrobiology, extrasolar planets, comets, asteroids, meteorites. Structure and formation of the solar system",
"span": "(Earth and Planetary Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.GA",
"description": "Phenomena pertaining to galaxies or the Milky Way. Star clusters, HII regions and planetary nebulae, the interstellar medium, atomic and molecular clouds, dust. Stellar populations. Galactic structure, formation, dynamics. Galactic nuclei, bulges, disks, halo. Active Galactic Nuclei, supermassive black holes, quasars. Gravitational lens systems. The Milky Way and its contents",
"span": "(Astrophysics of Galaxies)"
},
{
"class": "Physics",
"code": "astro-ph.HE",
"description": "Cosmic ray production, acceleration, propagation, detection. Gamma ray astronomy and bursts, X-rays, charged particles, supernovae and other explosive phenomena, stellar remnants and accretion systems, jets, microquasars, neutron stars, pulsars, black holes",
"span": "(High Energy Astrophysical Phenomena)"
},
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Physics",
"code": "astro-ph.SR",
"description": "White dwarfs, brown dwarfs, cataclysmic variables. Star formation and protostellar systems, stellar astrobiology, binary and multiple systems of stars, stellar evolution and structure, coronas. Central stars of planetary nebulae. Helioseismology, solar neutrinos, production and detection of gravitational radiation from stellar systems",
"span": "(Solar and Stellar Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0908.3902
|
Harm Hollestelle
|
Harm Hollestelle
|
On the Expressiveness of Line Drawings
|
10 pages
| null | null | null |
cs.OH cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Can expressiveness of a drawing be traced with a computer? In this study a
neural network (perceptron) and a support vector machine are used to classify
line drawings. To do this the line drawings are attributed values according to
a kinematic model and a diffusion model for the lines they consist of. The
values for both models are related to looking times. Extreme values according
to these models, that is both extremely short and extremely long looking times,
are interpreted as indicating expressiveness. The results strongly indicate
that expressiveness in this sense can be detected, at least with a neural
network.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 20:34:50 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Hollestelle",
"Harm",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0908.3911
|
Minghui Jiang
|
Minghui Jiang and Pedro J. Tejada
|
Spreading grid cells
| null |
Minghui Jiang, Vincent Pilaud, and Pedro J. Tejada. On a
dispersion problem in grid labeling. In Proceedings of the 22nd Canadian
Conference on Computational Geometry (CCCG 2010), pages 75-78
| null | null |
cs.CG cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $S$ be a set of $n^2$ symbols. Let $A$ be an $n\times n$ square grid with
each cell labeled by a distinct symbol in $S$. Let $B$ be another $n\times n$
square grid, also with each cell labeled by a distinct symbol in $S$. Then each
symbol in $S$ labels two cells, one in $A$ and one in $B$. Define the
\emph{combined distance} between two symbols in $S$ as the distance between the
two cells in $A$ plus the distance between the two cells in $B$ that are
labeled by the two symbols. Bel\'en Palop asked the following question at the
open problems session of CCCG 2009: How to arrange the symbols in the two grids
such that the minimum combined distance between any two symbols is maximized?
In this paper, we give a partial answer to Bel\'en Palop's question.
Define $c_p(n) = \max_{A,B}\min_{s,t \in S} \{\dist_p(A,s,t) + \dist_p(B,s,t)
\}$, where $A$ and $B$ range over all pairs of $n\times n$ square grids labeled
by the same set $S$ of $n^2$ distinct symbols, and where $\dist_p(A,s,t)$ and
$\dist_p(B,s,t)$ are the $L_p$ distances between the cells in $A$ and in $B$,
respectively, that are labeled by the two symbols $s$ and $t$. We present
asymptotically optimal bounds $c_p(n) = \Theta(\sqrt{n})$ for all
$p=1,2,...,\infty$. The bounds also hold for generalizations to $d$-dimensional
grids for any constant $d \ge 2$. Our proof yields a simple linear-time
constant-factor approximation algorithm for maximizing the minimum combined
distance between any two symbols in two grids.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 15:59:23 GMT"
}
] | 2010-08-24T00:00:00 |
[
[
"Jiang",
"Minghui",
""
],
[
"Tejada",
"Pedro J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.3916
|
David Eppstein
|
David Eppstein
|
Graph-Theoretic Solutions to Computational Geometry Problems
|
16 pages, 7 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many problems in computational geometry are not stated in graph-theoretic
terms, but can be solved efficiently by constructing an auxiliary graph and
performing a graph-theoretic algorithm on it. Often, the efficiency of the
algorithm depends on the special properties of the graph constructed in this
way. We survey the art gallery problem, partition into rectangles,
minimum-diameter clustering, rectilinear cartogram construction, mesh
stripification, angle optimization in tilings, and metric embedding from this
perspective.
|
[
{
"version": "v1",
"created": "Wed, 26 Aug 2009 23:28:23 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Eppstein",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.3929
|
Stephen Smith
|
Stephen L. Smith, Shaunak D. Bopardikar, and Francesco Bullo
|
A Dynamic Boundary Guarding Problem with Translating Targets
|
Extended version of paper for the joint 48th IEEE Conference on
Decision and Control and 28th Chinese Control Conference
| null |
10.1109/CDC.2009.5400538
| null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a problem in which a service vehicle seeks to guard a deadline
(boundary) from dynamically arriving mobile targets. The environment is a
rectangle and the deadline is one of its edges. Targets arrive continuously
over time on the edge opposite the deadline, and move towards the deadline at a
fixed speed. The goal for the vehicle is to maximize the fraction of targets
that are captured before reaching the deadline. We consider two cases; when the
service vehicle is faster than the targets, and; when the service vehicle is
slower than the targets. In the first case we develop a novel vehicle policy
based on computing longest paths in a directed acyclic graph. We give a lower
bound on the capture fraction of the policy and show that the policy is optimal
when the distance between the target arrival edge and deadline becomes very
large. We present numerical results which suggest near optimal performance away
from this limiting regime. In the second case, when the targets are slower than
the vehicle, we propose a policy based on servicing fractions of the
translational minimum Hamiltonian path. In the limit of low target speed and
high arrival rate, the capture fraction of this policy is within a small
constant factor of the optimal.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 02:26:40 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Smith",
"Stephen L.",
""
],
[
"Bopardikar",
"Shaunak D.",
""
],
[
"Bullo",
"Francesco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0908.3930
|
Michael Sirivianos
|
Michael Sirivianos, Xiaowei Yang, Kyungbaek Kim
|
SocialFilter: Collaborative Spam Mitigation using Social Networks
|
10 pages
| null | null | null |
cs.CR cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Spam mitigation can be broadly classified into two main approaches: a)
centralized security infrastructures that rely on a limited number of trusted
monitors to detect and report malicious traffic; and b) highly distributed
systems that leverage the experiences of multiple nodes within distinct trust
domains. The first approach offers limited threat coverage and slow response
times, and it is often proprietary. The second approach is not widely adopted,
partly due to the lack of guarantees regarding the trustworthiness of nodes
that comprise the system.
Our proposal, SocialFilter, aims to achieve the trustworthiness of
centralized security services and the wide coverage, responsiveness and
inexpensiveness of large-scale collaborative spam mitigation. We propose a
large-scale distributed system that enables clients with no email
classification functionality to query the network on the behavior of a host. A
SocialFilter node builds trust for its peers by auditing their behavioral
reports and by leveraging the social network of SocialFilter administrators.
The node combines the confidence its peers have in their own reports and the
trust it places on its peers to derive the likelihood that a host is spamming.
The simulation-based evaluation of our approach indicates its potential under
a real-world deployment: during a simulated spam campaign, SocialFilternodes
characterized 92% of spam bot connections with confidence greater than 50%,
while yielding no false positives
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 02:34:11 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Sirivianos",
"Michael",
""
],
[
"Yang",
"Xiaowei",
""
],
[
"Kim",
"Kyungbaek",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0908.3954
|
Alexandre Goldsztejn
|
Alexandre Goldsztejn (LINA)
|
On the Exponentiation of Interval Matrices
| null | null | null | null |
cs.NA cs.CC math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The numerical computation of the exponentiation of a real matrix has been
intensively studied. The main objective of a good numerical method is to deal
with round-off errors and computational cost. The situation is more complicated
when dealing with interval matrices exponentiation: Indeed, the main problem
will now be the dependency loss of the different occurrences of the variables
due to interval evaluation, which may lead to so wide enclosures that they are
useless. In this paper, the problem of computing a sharp enclosure of the
interval matrix exponential is proved to be NP-hard. Then the scaling and
squaring method is adapted to interval matrices and shown to drastically reduce
the dependency loss w.r.t. the interval evaluation of the Taylor series.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 08:49:57 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Goldsztejn",
"Alexandre",
"",
"LINA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0908.3957
|
Jerome Darmont
|
Hadj Mahboubi (ERIC), J\'er\^ome Darmont (ERIC)
|
Enhancing XML Data Warehouse Query Performance by Fragmentation
| null |
24th Annual ACM Symposium on Applied Computing (SAC 09), Hawaii :
United States (2009)
| null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
XML data warehouses form an interesting basis for decision-support
applications that exploit heterogeneous data from multiple sources. However,
XML-native database systems currently suffer from limited performances in terms
of manageable data volume and response time for complex analytical queries.
Fragmenting and distributing XML data warehouses (e.g., on data grids) allow to
address both these issues. In this paper, we work on XML warehouse
fragmentation. In relational data warehouses, several studies recommend the use
of derived horizontal fragmentation. Hence, we propose to adapt it to the XML
context. We particularly focus on the initial horizontal fragmentation of
dimensions' XML documents and exploit two alternative algorithms. We
experimentally validate our proposal and compare these alternatives with
respect to a unified XML warehouse model we advocate for.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 09:12:08 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Mahboubi",
"Hadj",
"",
"ERIC"
],
[
"Darmont",
"Jérôme",
"",
"ERIC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0908.3981
|
Alexander Mozeika
|
Alexander Mozeika, David Saad and Jack Raymond
|
Computing with Noise - Phase Transitions in Boolean Formulas
|
10 pages, 2 figures
| null |
10.1103/PhysRevLett.103.248701
| null |
cond-mat.dis-nn cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Computing circuits composed of noisy logical gates and their ability to
represent arbitrary Boolean functions with a given level of error are
investigated within a statistical mechanics setting. Bounds on their
performance, derived in the information theory literature for specific gates,
are straightforwardly retrieved, generalized and identified as the
corresponding typical-case phase transitions. This framework paves the way for
obtaining new results on error-rates, function-depth and sensitivity, and their
dependence on the gate-type and noise model used.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 11:03:32 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Mozeika",
"Alexander",
""
],
[
"Saad",
"David",
""
],
[
"Raymond",
"Jack",
""
]
] |
[
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.3982
|
Yasutada Oohama
|
Yasutada Oohama
|
Distributed Source Coding for Correlated Memoryless Gaussian Sources
|
23 pages, 2 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a distributed source coding problem of $L$ correlated Gaussian
observations $Y_i, i=1,2,...,L$. We assume that the random vector
$Y^{L}={}^{\rm t} (Y_1,Y_2,$ $...,Y_L)$ is an observation of the Gaussian
random vector $X^K={}^{\rm t}(X_1,X_2,...,X_K)$, having the form $Y^L=AX^K+N^L
,$ where $A$ is a $L\times K$ matrix and $N^L={}^{\rm t}(N_1,N_2,...,N_L)$ is a
vector of $L$ independent Gaussian random variables also independent of $X^K$.
The estimation error on $X^K$ is measured by the distortion covariance matrix.
The rate distortion region is defined by a set of all rate vectors for which
the estimation error is upper bounded by an arbitrary prescribed covariance
matrix in the meaning of positive semi definite. In this paper we derive
explicit outer and inner bounds of the rate distortion region. This result
provides a useful tool to study the direct and indirect source coding problems
on this Gaussian distributed source coding system, which remain open in
general.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 11:21:21 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Sep 2009 10:38:28 GMT"
},
{
"version": "v3",
"created": "Fri, 13 Nov 2009 11:05:55 GMT"
},
{
"version": "v4",
"created": "Wed, 13 Jan 2010 10:26:41 GMT"
}
] | 2010-01-13T00:00:00 |
[
[
"Oohama",
"Yasutada",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.3994
|
Samuel Mimram
|
Samuel Mimram (PPS)
|
The Structure of First-Order Causality
| null |
Logic in Computer Science, Los Angeles : United States (2009)
|
10.1109/LICS.2009.19
| null |
cs.LO math.CT math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Game semantics describe the interactive behavior of proofs by interpreting
formulas as games on which proofs induce strategies. Such a semantics is
introduced here for capturing dependencies induced by quantifications in
first-order propositional logic. One of the main difficulties that has to be
faced during the elaboration of this kind of semantics is to characterize
definable strategies, that is strategies which actually behave like a proof.
This is usually done by restricting the model to strategies satisfying subtle
combinatorial conditions, whose preservation under composition is often
difficult to show. Here, we present an original methodology to achieve this
task, which requires to combine advanced tools from game semantics, rewriting
theory and categorical algebra. We introduce a diagrammatic presentation of the
monoidal category of definable strategies of our model, by the means of
generators and relations: those strategies can be generated from a finite set
of atomic strategies and the equality between strategies admits a finite
axiomatization, this equational structure corresponding to a polarized
variation of the notion of bialgebra. This work thus bridges algebra and
denotational semantics in order to reveal the structure of dependencies induced
by first-order quantifiers, and lays the foundations for a mechanized analysis
of causality in programming languages.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 12:08:34 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Mimram",
"Samuel",
"",
"PPS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0908.3999
|
Ping Zhu
|
Ping Zhu
|
An improved axiomatic definition of information granulation
|
10 pages
| null | null | null |
cs.AI
|
http://creativecommons.org/licenses/by/3.0/
|
To capture the uncertainty of information or knowledge in information
systems, various information granulations, also known as knowledge
granulations, have been proposed. Recently, several axiomatic definitions of
information granulation have been introduced. In this paper, we try to improve
these axiomatic definitions and give a universal construction of information
granulation by relating information granulations with a class of functions of
multiple variables. We show that the improved axiomatic definition has some
concrete information granulations in the literature as instances.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 12:30:49 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Zhu",
"Ping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.4005
|
Emmanuel Nataf
|
Emmanuel Nataf (INRIA Lorraine - LORIA), Olivier Festor (INRIA
Lorraine - LORIA)
|
jYang : A YANG parser in java
| null | null | null | null |
cs.PL cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The NETCONF configuration protocol of the IETF Network Work- ing Group
provides mechanisms to manipulate the configuration of network devices. YANG is
the language currently under consideration within the IETF to specify the data
models to be used in NETCONF . This report describes the design and development
of a syntax and semantics parser for YANG in java.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 13:02:23 GMT"
}
] | 2016-11-25T00:00:00 |
[
[
"Nataf",
"Emmanuel",
"",
"INRIA Lorraine - LORIA"
],
[
"Festor",
"Olivier",
"",
"INRIA\n Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.4013
|
Norbert B\'atfai
|
Norbert B\'atfai
|
Recombinations of Busy Beaver Machines
|
15 pages, 11 figures; added new recombinated M_PP(4097) machines
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Many programmers belive that Turing-based machines cannot think. We also
believe in this, however it is interesting to note that the most sophisticated
machines are not programmed by human beings. We have only discovered them. In
this paper, using well-known Busy Beaver and Placid Platypus machines, we
generate further very similar, but not exactly the same machines. We have found
a recombinated BB_5 machine which can make 70.740.809 steps before halting.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 13:59:27 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Aug 2009 10:23:50 GMT"
},
{
"version": "v3",
"created": "Mon, 7 Sep 2009 10:51:42 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Bátfai",
"Norbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.4016
|
Vadim E. Levit
|
Vadim E. Levit and David Tankus
|
On Relating Edges in Graphs without Cycles of Length 4
|
6 pages, 1 figure
| null | null | null |
cs.DM cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An edge xy is relating in the graph G if there is an independent set S,
containing neither x nor y, such that S_{x} and S_{y} are both maximal
independent sets in G. It is an NP-complete problem to decide whether an edge
is relating (Brown, Nowakowski, Zverovich, 2007). We show that the problem
remains NP-complete even for graphs without cycles of length 4 and 5. On the
other hand, for graphs without cycles of length 4 and 6, the problem can be
solved in polynomial time.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 14:11:47 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Levit",
"Vadim E.",
""
],
[
"Tankus",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.4041
|
Alireza Bagheri
|
Alireza Bagheri and Mohammadreza Razzazi
|
Complexity of Planar Embeddability of Trees inside Simple Polygons
| null | null | null | null |
cs.CG cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Geometric embedding of graphs in a point set in the plane is a well known
problem. In this paper, the complexity of a variant of this problem, where the
point set is bounded by a simple polygon, is considered. Given a point set in
the plane bounded by a simple polygon and a free tree, we show that deciding
whether there is a planar straight-line embedding of the tree on the point set
inside the simple polygon is NP-complete. This implies that the straight-line
constrained point-set embedding of trees is also NP-complete, which was posed
as an open problem in [8].
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 16:35:26 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Bagheri",
"Alireza",
""
],
[
"Razzazi",
"Mohammadreza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0908.4051
|
Aslan Tchamkerten
|
Venkat Chandar, Aslan Tchamkerten, Gregory W. Wornell
|
Training-Based Schemes are Suboptimal for High Rate Asynchronous
Communication
|
To appear in the proceedings of the 2009 IEEE Information Theory
Workshop (Taormina)
| null |
10.1109/ITW.2009.5351435
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider asynchronous point-to-point communication. Building on a recently
developed model, we show that training based schemes, i.e., communication
strategies that separate synchronization from information transmission, perform
suboptimally at high rate.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 19:44:59 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Chandar",
"Venkat",
""
],
[
"Tchamkerten",
"Aslan",
""
],
[
"Wornell",
"Gregory W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.4061
|
Hayim Shaul
|
Micha Sharir, Hayim Shaul
|
Semi-algebraic Range Reporting and Emptiness Searching with Applications
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a typical range emptiness searching (resp., reporting) problem, we are
given a set $P$ of $n$ points in $\reals^d$, and wish to preprocess it into a
data structure that supports efficient range emptiness (resp., reporting)
queries, in which we specify a range $\sigma$, which, in general, is a
semi-algebraic set in $\reals^d$ of constant description complexity, and wish
to determine whether $P\cap\sigma=\emptyset$, or to report all the points in
$P\cap\sigma$. Range emptiness searching and reporting arise in many
applications, and have been treated by Matou\v{s}ek \cite{Ma:rph} in the
special case where the ranges are halfspaces bounded by hyperplanes. As shown
in \cite{Ma:rph}, the two problems are closely related, and have solutions (for
the case of halfspaces) with similar performance bounds. In this paper we
extend the analysis to general semi-algebraic ranges, and show how to adapt
Matou\v{s}ek's technique, without the need to {\em linearize} the ranges into a
higher-dimensional space. This yields more efficient solutions to several
useful problems, and we demonstrate the new technique in four applications.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 18:44:56 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Aug 2009 19:07:04 GMT"
}
] | 2009-08-31T00:00:00 |
[
[
"Sharir",
"Micha",
""
],
[
"Shaul",
"Hayim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0908.4062
|
R Doomun
|
Sushma Kejgir, and Manesh Kokare
|
Optimization of Bit Plane Combination for Efficient Digital Image
Watermarking
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & No. 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In view of the frequent multimedia data transfer authentication and
protection of images has gained importance in todays world. In this paper we
propose a new watermarking technique, based on bit plane, which enhances
robustness and capacity of the watermark, as well as maintains transparency of
the watermark and fidelity of the image. In the proposed technique, higher
strength bit plane of digital signature watermark is embedded in to a
significant bit plane of the original image. The combination of bit planes
(image and watermark) selection is an important issue. Therefore, a mechanism
is developed for appropriate bit plane selection. Ten different attacks are
selected to test different alternatives. These attacks are given different
weightings as appropriate to user requirement. A weighted correlation
coefficient for retrieved watermark is estimated for each of the alternatives.
Based on these estimated values optimal bit plane combination is identified for
a given user requirement. The proposed method is found to be useful for
authentication and to prove legal ownership. We observed better results by our
proposed method in comparison with the previously reported work on pseudorandom
watermark embedded in least significant bit (LSB) plane.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 18:52:26 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Kejgir",
"Sushma",
""
],
[
"Kokare",
"Manesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0908.4073
|
Jinwoo Shin
|
Kyomin Jung, Devavrat Shah, Jinwoo Shin
|
Distributed Averaging via Lifted Markov Chains
| null | null | null | null |
cs.IT cs.DC math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by applications of distributed linear estimation, distributed
control and distributed optimization, we consider the question of designing
linear iterative algorithms for computing the average of numbers in a network.
Specifically, our interest is in designing such an algorithm with the fastest
rate of convergence given the topological constraints of the network. As the
main result of this paper, we design an algorithm with the fastest possible
rate of convergence using a non-reversible Markov chain on the given network
graph. We construct such a Markov chain by transforming the standard Markov
chain, which is obtained using the Metropolis-Hastings method. We call this
novel transformation pseudo-lifting. We apply our method to graphs with
geometry, or graphs with doubling dimension. Specifically, the convergence time
of our algorithm (equivalently, the mixing time of our Markov chain) is
proportional to the diameter of the network graph and hence optimal. As a
byproduct, our result provides the fastest mixing Markov chain given the
network topological constraints, and should naturally find their applications
in the context of distributed optimization, estimation and control.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 19:17:19 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Jung",
"Kyomin",
""
],
[
"Shah",
"Devavrat",
""
],
[
"Shin",
"Jinwoo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0908.4074
|
R Doomun
|
Priti Maheswary and Namita Srivastava
|
Retrieval of Remote Sensing Images Using Colour and Texture Attribute
|
5 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & No. 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.IR cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Grouping images into semantically meaningful categories using low-level
visual feature is a challenging and important problem in content-based image
retrieval. The groupings can be used to build effective indices for an image
database. Digital image analysis techniques are being used widely in remote
sensing assuming that each terrain surface category is characterized with
spectral signature observed by remote sensors. Even with the remote sensing
images of IRS data, integration of spatial information is expected to assist
and to improve the image analysis of remote sensing data. In this paper we
present a satellite image retrieval based on a mixture of old fashioned ideas
and state of the art learning tools. We have developed a methodology to
classify remote sensing images using HSV color features and Haar wavelet
texture features and then grouping them on the basis of particular threshold
value. The experimental results indicate that the use of color and texture
feature extraction is very useful for image retrieval.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 19:21:11 GMT"
}
] | 2009-08-28T00:00:00 |
[
[
"Maheswary",
"Priti",
""
],
[
"Srivastava",
"Namita",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0908.4094
|
Arya Mazumdar
|
Alexander Barg and Arya Mazumdar
|
Codes in Permutations and Error Correction for Rank Modulation
|
Some typos corrected from the published journal version
|
IEEE Transactions on Information Theory, Vol. 56, Issue 7, July
2010, pp. 3158 - 3165
|
10.1109/TIT.2010.2048455
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Codes for rank modulation have been recently proposed as a means of
protecting flash memory devices from errors. We study basic coding theoretic
problems for such codes, representing them as subsets of the set of
permutations of $n$ elements equipped with the Kendall tau distance. We derive
several lower and upper bounds on the size of codes. These bounds enable us to
establish the exact scaling of the size of optimal codes for large values of
$n$. We also show the existence of codes whose size is within a constant factor
of the sphere packing bound for any fixed number of errors.
|
[
{
"version": "v1",
"created": "Thu, 27 Aug 2009 20:28:16 GMT"
},
{
"version": "v2",
"created": "Thu, 8 Oct 2009 03:16:28 GMT"
},
{
"version": "v3",
"created": "Fri, 22 Oct 2010 22:33:52 GMT"
}
] | 2010-12-10T00:00:00 |
[
[
"Barg",
"Alexander",
""
],
[
"Mazumdar",
"Arya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.4116
|
Nikos Triandopoulos
|
Michael T. Goodrich, Roberto Tamassia, Nikos Triandopoulos
|
Efficient Authenticated Data Structures for Graph Connectivity and
Geometric Search Problems
|
Full version of related paper appearing in CT-RSA 2003
| null | null | null |
cs.CR cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Authenticated data structures provide cryptographic proofs that their answers
are as accurate as the author intended, even if the data structure is being
controlled by a remote untrusted host. We present efficient techniques for
authenticating data structures that represent graphs and collections of
geometric objects. We introduce the path hash accumulator, a new primitive
based on cryptographic hashing for efficiently authenticating various
properties of structured data represented as paths, including any decomposable
query over sequences of elements. We show how to employ our primitive to
authenticate queries about properties of paths in graphs and search queries on
multi-catalogs. This allows the design of new, efficient authenticated data
structures for fundamental problems on networks, such as path and connectivity
queries over graphs, and complex queries on two-dimensional geometric objects,
such as intersection and containment queries.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 00:18:06 GMT"
}
] | 2009-08-31T00:00:00 |
[
[
"Goodrich",
"Michael T.",
""
],
[
"Tamassia",
"Roberto",
""
],
[
"Triandopoulos",
"Nikos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0908.4144
|
Ping Li
|
Ping Li
|
ABC-LogitBoost for Multi-class Classification
| null | null | null | null |
cs.LG cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop abc-logitboost, based on the prior work on abc-boost and robust
logitboost. Our extensive experiments on a variety of datasets demonstrate the
considerable improvement of abc-logitboost over logitboost and abc-mart.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 07:09:19 GMT"
}
] | 2009-08-31T00:00:00 |
[
[
"Li",
"Ping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0908.4188
|
R Doomun
|
Suman Saha
|
Consideration Points Detecting Cross-Site Scripting
|
8 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web application (WA) expands its usages to provide more and more services and
it has become one of the most essential communication channels between service
providers and the users. To augment the users experience many web applications
are using client side scripting languages such as JavaScript but this growing
of JavaScript is increasing serious security vulnerabilities in web application
too, such as cross site scripting (XSS). In this paper, I survey all the
techniques those have been used to detect XSS and arrange a number of analyses
to evaluate performances of those methodologies. This paper points major
difficulties to detect XSS. I do not implement any solution of this
vulnerability problem because my focus is for reviewing this issue. But, I
believe that this assessment will be cooperative for further research on this
concern as this treatise figure out everything on this transcendent security
problem.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 11:01:27 GMT"
}
] | 2009-08-31T00:00:00 |
[
[
"Saha",
"Suman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0908.4208
|
Nassar Ksairi
|
Nassar Ksairi, Philippe Ciblat, Pascal Bianchi and Walid Hachem
|
Performance Analysis over Slow Fading Channels of a Half-Duplex
Single-Relay Protocol: Decode or Quantize and Forward
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, a new static relaying protocol is introduced for half duplex
single-relay networks, and its performance is studied in the context of
communications over slow fading wireless channels. The proposed protocol is
based on a Decode or Quantize and Forward (DoQF) approach. In slow fading
scenarios, two performance metrics are relevant and complementary, namely the
outage probability gain and the Diversity-Multiplexing Tradeoff (DMT).
First, we analyze the behavior of the outage probability P_o associated with
the proposed protocol as the SNR tends to infinity. In this case, we prove that
SNR^2 P_o converges to a constant. We refer to this constant as the outage gain
and we derive its closed-form expression for a general class of wireless
channels that includes the Rayleigh and the Rice channels as particular cases.
We furthermore prove that the DoQF protocol has the best achievable outage gain
in the wide class of half-duplex static relaying protocols. A method for
minimizing the outage gain with respect to the power distribution between the
source and the relay, and with respect to the durations of the slots is also
provided.
Next, we focus on Rayleigh distributed fading channels to derive the DMT
associated with the proposed DoQF protocol. Our results show that the DMT of
DoQF achieves the 2 by 1 MISO upper-bound for multiplexing gains r < 0.25.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 13:38:33 GMT"
}
] | 2009-08-31T00:00:00 |
[
[
"Ksairi",
"Nassar",
""
],
[
"Ciblat",
"Philippe",
""
],
[
"Bianchi",
"Pascal",
""
],
[
"Hachem",
"Walid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.4211
|
Zhenning Kong
|
Zhenning Kong, Edmund M. Yeh and Emina Soljanin
|
Coding Improves the Throughput-Delay Trade-off in Mobile Wireless
Networks
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the throughput-delay performance tradeoff in large-scale wireless ad
hoc networks. It has been shown that the per source-destination pair throughput
can be improved from Theta(1/sqrt(n log n)) to Theta(1) if nodes are allowed to
move and a 2-hop relay scheme is employed. The price paid for such an
improvement on throughput is large delay. Indeed, the delay scaling of the
2-hop relay scheme is Theta(n log n) under the random walk mobility model. In
this paper, we employ coding techniques to improve the throughput-delay
trade-off for mobile wireless networks. For the random walk mobility model, we
improve the delay from Theta(n log n) to Theta(n) by employing Reed-Solomon
codes. Our approach maintains the diversity gained by mobility while decreasing
the delay.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 13:40:45 GMT"
}
] | 2009-08-31T00:00:00 |
[
[
"Kong",
"Zhenning",
""
],
[
"Yeh",
"Edmund M.",
""
],
[
"Soljanin",
"Emina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.4256
|
R Doomun
|
Hamdi Salah, Soudani Adel, and Tourki Rached
|
Experimental Performances Analysis of Load Balancing Algorithms in IEEE
802.11
|
6 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor
0.423,http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2., August 2009, USA
| null |
ISSN 1947 5500
|
cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In IEEE 802.11, load balancing algorithms (LBA) consider only the associated
stations to balance the load of the available access points (APs). However,
although the APs are balanced, it causes a bad situation if the AP has a lower
signal length (SNR) less than the neighbor APs. So, balance the load and
associate one mobile station to an access point without care about the signal
to noise ratio (SNR) of the AP cause possibly an unforeseen QoS, such as the
bit rate, the end to end delay, the packet loss. In this way, we study an
improvement load balancing algorithm with SNR integration at the selection
policy.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 18:32:22 GMT"
}
] | 2009-08-31T00:00:00 |
[
[
"Salah",
"Hamdi",
""
],
[
"Adel",
"Soudani",
""
],
[
"Rached",
"Tourki",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0908.4265
|
Muhammad Salman Asif
|
M. Salman Asif, William Mantzel and Justin Romberg
|
Channel Protection: Random Coding Meets Sparse Channels
|
To appear in the proceedings of the 2009 IEEE Information Theory
Workshop (Taormina)
| null |
10.1109/ITW.2009.5351495
| null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multipath interference is an ubiquitous phenomenon in modern communication
systems. The conventional way to compensate for this effect is to equalize the
channel by estimating its impulse response by transmitting a set of training
symbols. The primary drawback to this type of approach is that it can be
unreliable if the channel is changing rapidly. In this paper, we show that
randomly encoding the signal can protect it against channel uncertainty when
the channel is sparse. Before transmission, the signal is mapped into a
slightly longer codeword using a random matrix. From the received signal, we
are able to simultaneously estimate the channel and recover the transmitted
signal. We discuss two schemes for the recovery. Both of them exploit the
sparsity of the underlying channel. We show that if the channel impulse
response is sufficiently sparse, the transmitted signal can be recovered
reliably.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 19:36:46 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Aug 2009 21:34:51 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Asif",
"M. Salman",
""
],
[
"Mantzel",
"William",
""
],
[
"Romberg",
"Justin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0908.4288
|
Jacob G. Foster
|
Jacob G. Foster, David V. Foster, Peter Grassberger, Maya Paczuski
|
Edge direction and the structure of networks
|
13 pages, 6 figures, 3 tables
|
Proceedings of the National Academy of Sciences of the United
States of America 2010, Vol. 107, No. 24
|
10.1073/pnas.0912671107
| null |
physics.soc-ph cond-mat.dis-nn cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Directed networks are ubiquitous and are necessary to represent complex
systems with asymmetric interactions---from food webs to the World Wide Web.
Despite the importance of edge direction for detecting local and community
structure, it has been disregarded in studying a basic type of global diversity
in networks: the tendency of nodes with similar numbers of edges to connect.
This tendency, called assortativity, affects crucial structural and dynamic
properties of real-world networks, such as error tolerance or epidemic
spreading. Here we demonstrate that edge direction has profound effects on
assortativity. We define a set of four directed assortativity measures and
assign statistical significance by comparison to randomized networks. We apply
these measures to three network classes---online/social networks, food webs,
and word-adjacency networks. Our measures (i) reveal patterns common to each
class, (ii) separate networks that have been previously classified together,
and (iii) expose limitations of several existing theoretical models. We reject
the standard classification of directed networks as purely assortative or
disassortative. Many display a class-specific mixture, likely reflecting
functional or historical constraints, contingencies, and forces guiding the
system's evolution.
|
[
{
"version": "v1",
"created": "Sat, 29 Aug 2009 00:25:26 GMT"
},
{
"version": "v2",
"created": "Mon, 8 Nov 2010 04:14:37 GMT"
}
] | 2010-11-09T00:00:00 |
[
[
"Foster",
"Jacob G.",
""
],
[
"Foster",
"David V.",
""
],
[
"Grassberger",
"Peter",
""
],
[
"Paczuski",
"Maya",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.4290
|
Khaled Khalil
|
Khaled M. Khalil, M. Abdel-Aziz, Taymour T. Nazmy, Abdel-Badeeh M.
Salem
|
Bridging the Gap between Crisis Response Operations and Systems
|
6 pages, 1 figure, 2 tables, accepted at The 9th International
Conference on Artificial Intelligence and Digital Communications
| null | null | null |
cs.CY cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There exist huge problems in the current practice of crisis response
operations. Response problems are projected as a combination of failure in
communication, failure in technology, failure in methodology, failure of
management, and finally failure of observation. In this paper we compare eight
crisis response systems namely: DrillSim [2, 13], DEFACTO [12, 17], ALADDIN [1,
6], RoboCup Rescue [11, 15], FireGrid [3, 8, 18], WIPER [16], D-AESOP [4], and
PLAN C [14]. Comparison results will disclose the cause of failure of current
crisis response operations (the response gap). Based on comparison results; we
provide recommendations for bridging this gap between response operations and
systems.
|
[
{
"version": "v1",
"created": "Fri, 28 Aug 2009 20:58:45 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Khalil",
"Khaled M.",
""
],
[
"Abdel-Aziz",
"M.",
""
],
[
"Nazmy",
"Taymour T.",
""
],
[
"Salem",
"Abdel-Badeeh M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0908.4309
|
Li Yan
|
Francis Chin, Marek Chrobak, Li Yan
|
Algorithms for Placing Monitors in a Flow Network
|
13 pages, 5 figures. Preliminary version appeared in AAIM 2009
| null | null | null |
cs.DS cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the Flow Edge-Monitor Problem, we are given an undirected graph G=(V,E),
an integer k > 0 and some unknown circulation \psi on G. We want to find a set
of k edges in G, so that if we place k monitors on those edges to measure the
flow along them, the total number of edges for which the flow can be uniquely
determined is maximized. In this paper, we first show that the Flow
Edge-Monitor Problem is NP-hard, and then we give two approximation algorithms:
a 3-approximation algorithm with running time O((m+n)^2) and a 2-approximation
algorithm with running time O((m+n)^3), where n = |V| and m=|E|.
|
[
{
"version": "v1",
"created": "Sat, 29 Aug 2009 01:45:44 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Chin",
"Francis",
""
],
[
"Chrobak",
"Marek",
""
],
[
"Yan",
"Li",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0908.4310
|
Beatriz Susana Marron
|
Beatriz Marron
|
Co-occurrence Matrix and Fractal Dimension for Image Segmentation
|
This paper has been withdrawn by the author
| null | null | null |
stat.AP cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most important tasks in image processing problem and machine
vision is object recognition, and the success of many proposed methods relies
on a suitable choice of algorithm for the segmentation of an image. This paper
focuses on how to apply texture operators based on the concept of fractal
dimension and cooccurence matrix, to the problem of object recognition and a
new method based on fractal dimension is introduced. Several images, in which
the result of the segmentation can be shown, are used to illustrate the use of
each method and a comparative study of each operator is made.
|
[
{
"version": "v1",
"created": "Sat, 29 Aug 2009 01:48:16 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Dec 2011 11:53:23 GMT"
}
] | 2011-12-07T00:00:00 |
[
[
"Marron",
"Beatriz",
""
]
] |
[
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0908.4325
|
Bela Genge
|
Bela Genge, Iosif Ignat and Piroska Haller
|
Automated Composition of Security Protocols
|
2009 IEEE International Conference on Intelligent Communication and
Processing (ICCP 2009), Cluj-Napoca, Romania, pp. 251-258 (ISBN
978-1-4244-5007-7)
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Determining if two protocols can be securely composed requires analyzing not
only their additive properties but also their destructive properties. In this
paper we propose a new composition method for constructing protocols based on
existing ones found in the literature that can be fully automatized. The
additive properties of the composed protocols are ensured by the composition of
protocol preconditions and effects, denoting, respectively, the conditions that
must hold for protocols to be executed and the conditions that hold after
executing the protocols. The non-destructive property of the final composed
protocol is verified by analyzing the independence of the involved protocols, a
method proposed by the authors in their previous work. The fully automatized
property is ensured by constructing a rich protocol model that contains
explicit description of protocol preconditions, effects, generated terms and
exchanged messages. The proposed method is validated by composing 17 protocol
pairs and by verifying the correctness of the composed protocols with an
existing tool.
|
[
{
"version": "v1",
"created": "Sat, 29 Aug 2009 07:13:36 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Genge",
"Bela",
""
],
[
"Ignat",
"Iosif",
""
],
[
"Haller",
"Piroska",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0908.4353
|
R Doomun
|
Azeez Nureni Ayofe, Azeez Raheem Ajetola
|
Exploration of the Gap Between Computer Science Curriculum and
Industrial I.T Skills Requirements
|
10 pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.GL cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper sets out to examine the skills gaps between the industrial
application of Information Technology and university academic programmes
(curriculum). It looks at some of the causes, and considers the probable
solutions for bridging the gap between them and suggests the possibilities of
exploring a new role for our universities and employers of labor. It also
highlights strategies to abolish the misalignment between university and
industry. The main concept is to blend the academic rigidity with the
industrial relevance.
|
[
{
"version": "v1",
"created": "Sat, 29 Aug 2009 18:33:55 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Ayofe",
"Azeez Nureni",
""
],
[
"Ajetola",
"Azeez Raheem",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0908.4373
|
Adrian Paul Flitney
|
Charles D. Hill, Adrian P. Flitney, and Nicolas C. Menicucci
|
A competitive game whose maximal Nash-equilibrium payoff requires
quantum resources for its achievement
|
8 pages, revtex4
|
Phys. Lett. A 374 (2010) 3619-3624
|
10.1016/j.physleta.2010.07.010
| null |
quant-ph cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While it is known that shared quantum entanglement can offer improved
solutions to a number of purely cooperative tasks for groups of remote agents,
controversy remains regarding the legitimacy of quantum games in a competitive
setting--in particular, whether they offer any advantage beyond what is
achievable using classical resources. We construct a competitive game between
four players based on the minority game where the maximal Nash-equilibrium
payoff when played with the appropriate quantum resource is greater than that
obtainable by classical means, assuming a local hidden variable model. The game
is constructed in a manner analogous to a Bell inequality. This result is
important in confirming the legitimacy of quantum games.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 19:31:33 GMT"
},
{
"version": "v2",
"created": "Mon, 14 Sep 2009 02:44:52 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Hill",
"Charles D.",
""
],
[
"Flitney",
"Adrian P.",
""
],
[
"Menicucci",
"Nicolas C.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0908.4374
|
R Doomun
|
Ratnesh Kumar Jain, Dr. Suresh Jain, Dr. R. S. Kasana
|
Visualization of Mined Pattern and Its Human Aspects
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.HC cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Researchers got success in mining the Web usage data effectively and
efficiently. But representation of the mined patterns is often not in a form
suitable for direct human consumption. Hence mechanisms and tools that can
represent mined patterns in easily understandable format are utilized.
Different techniques are used for pattern analysis, one of them is
visualization. Visualization can provide valuable assistance for data analysis
and decision making tasks. In the data visualization process, technical
representations of web pages are replaced by user attractive text
interpretations. Experiments with the real world problems showed that the
visualization can significantly increase the quality and usefulness of web log
mining results. However, how decision makers perceive and interact with a
visual representation can strongly influence their understanding of the data as
well as the usefulness of the visual presentation. Human factors therefore
contribute significantly to the visualization process and should play an
important role in the design and evaluation of visualization tools. This
electronic document is a live template. The various components of your paper,
title, text, heads, etc., are already defined on the style sheet, as
illustrated by the portions given in this document.
|
[
{
"version": "v1",
"created": "Sun, 30 Aug 2009 05:30:40 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Jain",
"Ratnesh Kumar",
""
],
[
"Jain",
"Dr. Suresh",
""
],
[
"Kasana",
"Dr. R. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0908.4386
|
R Doomun
|
Reza Gharoie Ahangar, Mohammad Farajpoor Ahangar
|
Handwritten Farsi Character Recognition using Artificial Neural Network
|
4 pages IEEE format, International Journal Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Neural Networks are being used for character recognition from last many years
but most of the work was confined to English character recognition. Till date,
a very little work has been reported for Handwritten Farsi Character
recognition. In this paper, we have made an attempt to recognize handwritten
Farsi characters by using a multilayer perceptron with one hidden layer. The
error backpropagation algorithm has been used to train the MLP network. In
addition, an analysis has been carried out to determine the number of hidden
nodes to achieve high performance of backpropagation network in the recognition
of handwritten Farsi characters. The system has been trained using several
different forms of handwriting provided by both male and female participants of
different age groups. Finally, this rigorous training results an automatic HCR
system using MLP network. In this work, the experiments were carried out on two
hundred fifty samples of five writers. The results showed that the MLP networks
trained by the error backpropagation algorithm are superior in recognition
accuracy and memory usage. The result indicates that the backpropagation
network provides good recognition accuracy of more than 80% of handwritten
Farsi characters.
|
[
{
"version": "v1",
"created": "Sun, 30 Aug 2009 11:55:48 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Ahangar",
"Reza Gharoie",
""
],
[
"Ahangar",
"Mohammad Farajpoor",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0908.4413
|
Laurent Romary
|
Patrice Lopez (IDSL), Laurent Romary (IDSL, INRIA Saclay - Ile de
France)
|
Multiple Retrieval Models and Regression Models for Prior Art Search
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents the system called PATATRAS (PATent and Article Tracking,
Retrieval and AnalysiS) realized for the IP track of CLEF 2009. Our approach
presents three main characteristics: 1. The usage of multiple retrieval models
(KL, Okapi) and term index definitions (lemma, phrase, concept) for the three
languages considered in the present track (English, French, German) producing
ten different sets of ranked results. 2. The merging of the different results
based on multiple regression models using an additional validation set created
from the patent collection. 3. The exploitation of patent metadata and of the
citation structures for creating restricted initial working sets of patents and
for producing a final re-ranking regression model. As we exploit specific
metadata of the patent documents and the citation relations only at the
creation of initial working sets and during the final post ranking step, our
architecture remains generic and easy to extend.
|
[
{
"version": "v1",
"created": "Sun, 30 Aug 2009 18:50:19 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Lopez",
"Patrice",
"",
"IDSL"
],
[
"Romary",
"Laurent",
"",
"IDSL, INRIA Saclay - Ile de\n France"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0908.4419
|
Salah A. Aly
|
Salah A. Aly, Hager S. Darwish, Moustafa Youssef, Mahmoud Zidan
|
Distributed Flooding-based Storage Algorithms for Large-scale Sensor
Networks
| null | null | null | null |
cs.IT cs.NI math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we propose distributed flooding-based storage algorithms for
large-scale wireless sensor networks. Assume a wireless sensor network with $n$
nodes that have limited power, memory, and bandwidth. Each node is capable of
both sensing and storing data. Such sensor nodes might disappear from the
network due to failures or battery depletion. Hence it is desired to design
efficient schemes to collect data from these $n$ nodes. We propose two
distributed storage algorithms (DSA's) that utilize network flooding to solve
this problem. In the first algorithm, DSA-I, we assume that every node utilizes
network flooding to disseminate its data throughout the network using a mixing
time of approximately O(n). We show that this algorithm is efficient in terms
of the encoding and decoding operations. In the second algorithm, DSA-II, we
assume that the total number of nodes is not known to every sensor; hence
dissemination of the data does not depend on $n$. The encoding operations in
this case take $O(C\mu^2)$, where $\mu$ is the mean degree of the network graph
and $C$ is a system parameter. We evaluate the performance of the proposed
algorithms through analysis and simulation, and show that their performance
matches the derived theoretical results.
|
[
{
"version": "v1",
"created": "Sun, 30 Aug 2009 20:16:54 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Aly",
"Salah A.",
""
],
[
"Darwish",
"Hager S.",
""
],
[
"Youssef",
"Moustafa",
""
],
[
"Zidan",
"Mahmoud",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.4420
|
Grenville Croll
|
Grenville J. Croll
|
Spreadsheets and the Financial Collapse
|
17 Pages
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 145-161
ISBN 978-1-905617-89-0
| null | null |
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We briefly review the well-known risks, weaknesses and limitations of
spreadsheets and then introduce some more. We review and slightly extend our
previous work on the importance and criticality of spreadsheets in the City of
London, introducing the notions of ubiquity, centrality, legality and
contagion. We identify the sector of the financial market that we believed in
2005 to be highly dependant on the use of spreadsheets and relate this to its
recent catastrophic financial performance. We outline the role of spreadsheets
in the collapse of the Jamaican banking system in the late 1990's and then
review the UK financial regulator's knowledge of the risks of spreadsheets in
the contemporary financial system. We summarise the available evidence and
suggest that there is a link between the use of spreadsheets and the recent
collapse of the global financial system. We provide governments and regulating
authorities with some simple recommendations to reduce the risks of continued
overdependence on unreliable spreadsheets. We conclude with three fundamental
lessons from a century of human error research.
|
[
{
"version": "v1",
"created": "Sun, 30 Aug 2009 20:05:44 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Croll",
"Grenville J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0908.4427
|
Matthew Knepley
|
Matthew G. Knepley, Dmitry A. Karpeev
|
Mesh Algorithms for PDE with Sieve I: Mesh Distribution
|
36 pages, 22 figures
|
Scientific Programming, 17(3), 215-230, 2009
|
10.3233/SPR-2009-0249
| null |
cs.CE cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We have developed a new programming framework, called Sieve, to support
parallel numerical PDE algorithms operating over distributed meshes. We have
also developed a reference implementation of Sieve in C++ as a library of
generic algorithms operating on distributed containers conforming to the Sieve
interface. Sieve makes instances of the incidence relation, or \emph{arrows},
the conceptual first-class objects represented in the containers. Further,
generic algorithms acting on this arrow container are systematically used to
provide natural geometric operations on the topology and also, through duality,
on the data. Finally, coverings and duality are used to encode not only
individual meshes, but all types of hierarchies underlying PDE data structures,
including multigrid and mesh partitions.
In order to demonstrate the usefulness of the framework, we show how the mesh
partition data can be represented and manipulated using the same fundamental
mechanisms used to represent meshes. We present the complete description of an
algorithm to encode a mesh partition and then distribute a mesh, which is
independent of the mesh dimension, element shape, or embedding. Moreover, data
associated with the mesh can be similarly distributed with exactly the same
algorithm. The use of a high level of abstraction within the Sieve leads to
several benefits in terms of code reuse, simplicity, and extensibility. We
discuss these benefits and compare our approach to other existing mesh
libraries.
|
[
{
"version": "v1",
"created": "Sun, 30 Aug 2009 21:53:01 GMT"
}
] | 2010-09-02T00:00:00 |
[
[
"Knepley",
"Matthew G.",
""
],
[
"Karpeev",
"Dmitry A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0908.4431
|
Prabhulla Chandran Pillai
|
B Prabhulla Chandran Pillai
|
An OLAC Extension for Dravidian Languages
|
4 Pages, 2 figures
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
OLAC was founded in 2000 for creating online databases of language resources.
This paper intends to review the bottom-up distributed character of the project
and proposes an extension of the architecture for Dravidian languages. An
ontological structure is considered for effective natural language processing
(NLP) and its advantages over statistical methods are reviewed
|
[
{
"version": "v1",
"created": "Sun, 30 Aug 2009 23:20:41 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Pillai",
"B Prabhulla Chandran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0908.4445
|
Liang-Liang Xie
|
Xiugang Wu and Liang-Liang Xie
|
Asymptotic Equipartition Property of Output when Rate is above Capacity
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The output distribution, when rate is above capacity, is investigated. It is
shown that there is an asymptotic equipartition property (AEP) of the typical
output sequences, independently of the specific codebook used, as long as the
codebook is typical according to the standard random codebook generation. This
equipartition of the typical output sequences is caused by the mixup of input
sequences when there are too many of them, namely, when the rate is above
capacity. This discovery sheds some light on the optimal design of the
compress-and-forward relay schemes.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 01:46:01 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Wu",
"Xiugang",
""
],
[
"Xie",
"Liang-Liang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.4453
|
Shengyu Zhang
|
Rahul Jain, Hartmut Klauck, Shengyu Zhang
|
Depth-Independent Lower bounds on the Communication Complexity of
Read-Once Boolean Formulas
|
5 pages
| null | null | null |
cs.CC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show lower bounds of $\Omega(\sqrt{n})$ and $\Omega(n^{1/4})$ on the
randomized and quantum communication complexity, respectively, of all
$n$-variable read-once Boolean formulas. Our results complement the recent
lower bound of $\Omega(n/8^d)$ by Leonardos and Saks and
$\Omega(n/2^{\Omega(d\log d)})$ by Jayram, Kopparty and Raghavendra for
randomized communication complexity of read-once Boolean formulas with depth
$d$. We obtain our result by "embedding" either the Disjointness problem or its
complement in any given read-once Boolean formula.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 03:40:57 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Jain",
"Rahul",
""
],
[
"Klauck",
"Hartmut",
""
],
[
"Zhang",
"Shengyu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0908.4457
|
Bruno Bauwens
|
Bruno Bauwens
|
Additivity of on-line decision complexity is violated by a linear term
in the length of a binary string
|
10 pages
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that there are infinitely many binary strings z, such that the sum of
the on-line decision complexity of predicting the even bits of z given the
previous uneven bits, and the decision complexity of predicting the uneven bits
given the previous event bits, exceeds the Kolmogorov complexity of z by a
linear term in the length of z.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 19:53:07 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Bauwens",
"Bruno",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0908.4464
|
Damien Chablat
|
Fr\'ed\'eric Boyer (IRCCyN), Damien Chablat (IRCCyN), Philippe Lemoine
(IRCCyN), Philippe Wenger (IRCCyN)
|
The eel-like robot
| null |
ASME Design Engineering Technical Conferences, San Diego : United
States (2009)
| null | null |
cs.RO physics.class-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The aim of this project is to design, study and build an "eel-like robot"
prototype able to swim in three dimensions. The study is based on the analysis
of eel swimming and results in the realization of a prototype with 12
vertebrae, a skin and a head with two fins. To reach these objectives, a
multidisciplinary group of teams and laboratories has been formed in the
framework of two French projects.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 06:27:46 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Sep 2009 07:03:06 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Boyer",
"Frédéric",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Lemoine",
"Philippe",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0908.4491
|
Dominique Duval
|
C\'esar Dominguez, Dominique Duval (LJK)
|
A parameterization process, functorially
| null | null | null | null |
cs.LO math.CT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The parameterization process used in the symbolic computation systems Kenzo
and EAT is studied here as a general construction in a categorical framework.
This parameterization process starts from a given specification and builds a
parameterized specification by adding a parameter as a new variable to some
operations. Given a model of the parameterized specification, each
interpretation of the parameter, called an argument, provides a model of the
given specification. Moreover, under some relevant terminality assumption, this
correspondence between the arguments and the models of the given specification
is a bijection. It is proved in this paper that the parameterization process is
provided by a functor and the subsequent parameter passing process by a natural
transformation. Various categorical notions are used, mainly adjoint functors,
pushouts and lax colimits.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 09:45:53 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Dominguez",
"César",
"",
"LJK"
],
[
"Duval",
"Dominique",
"",
"LJK"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.CT",
"description": "Enriched categories, topoi, abelian categories, monoidal categories, homological algebra",
"span": "(Category Theory)"
}
] |
0908.4494
|
Joel Ratsaby
|
Joel Ratsaby
|
Learning, complexity and information density
| null | null | null | null |
cs.IT cs.CC math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
What is the relationship between the complexity of a learner and the
randomness of his mistakes? This question was posed in \cite{rat0903} who
showed that the more complex the learner the higher the possibility that his
mistakes deviate from a true random sequence. In the current paper we report on
an empirical investigation of this problem. We investigate two characteristics
of randomness, the stochastic and algorithmic complexity of the binary sequence
of mistakes. A learner with a Markov model of order $k$ is trained on a finite
binary sequence produced by a Markov source of order $k^{*}$ and is tested on a
different random sequence. As a measure of learner's complexity we define a
quantity called the \emph{sysRatio}, denoted by $\rho$, which is the ratio
between the compressed and uncompressed lengths of the binary string whose
$i^{th}$ bit represents the maximum \emph{a posteriori} decision made at state
$i$ of the learner's model. The quantity $\rho$ is a measure of information
density. The main result of the paper shows that this ratio is crucial in
answering the above posed question. The result indicates that there is a
critical threshold $\rho^{*}$ such that when $\rho\leq\rho^{*}$ the sequence of
mistakes possesses the following features: (1)\emph{}low divergence $\Delta$
from a random sequence, (2) low variance in algorithmic complexity. When
$\rho>\rho^{*}$, the characteristics of the mistake sequence changes sharply
towards a\emph{}high\emph{$\Delta$} and high variance in algorithmic
complexity.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 10:05:53 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Ratsaby",
"Joel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0908.4499
|
Yann Strozecki
|
Yann Strozecki
|
Monadic second-order model-checking on decomposable matroids
|
32 pages, journal paper. Revision: the last part has been removed and
the writing improved
| null | null | null |
cs.DM cs.DS cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A notion of branch-width, which generalizes the one known for graphs, can be
defined for matroids. We first give a proof of the polynomial time
model-checking of monadic second-order formulas on representable matroids of
bounded branch-width, by reduction to monadic second-order formulas on trees.
This proof is much simpler than the one previously known. We also provide a
link between our logical approach and a grammar that allows to build matroids
of bounded branch-width. Finally, we introduce a new class of non-necessarily
representable matroids, described by a grammar and on which monadic
second-order formulas can be checked in linear time.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 11:00:44 GMT"
},
{
"version": "v2",
"created": "Sat, 29 Jan 2011 23:43:14 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Strozecki",
"Yann",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0908.4580
|
Emanuele Viola
|
Jasmina Hasanhodzic, Andrew W. Lo, Emanuele Viola
|
A Computational View of Market Efficiency
| null | null | null | null |
cs.CE cs.CC q-fin.TR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose to study market efficiency from a computational viewpoint.
Borrowing from theoretical computer science, we define a market to be
\emph{efficient with respect to resources $S$} (e.g., time, memory) if no
strategy using resources $S$ can make a profit. As a first step, we consider
memory-$m$ strategies whose action at time $t$ depends only on the $m$ previous
observations at times $t-m,...,t-1$. We introduce and study a simple model of
market evolution, where strategies impact the market by their decision to buy
or sell. We show that the effect of optimal strategies using memory $m$ can
lead to "market conditions" that were not present initially, such as (1) market
bubbles and (2) the possibility for a strategy using memory $m' > m$ to make a
bigger profit than was initially possible. We suggest ours as a framework to
rationalize the technological arms race of quantitative trading firms.
|
[
{
"version": "v1",
"created": "Mon, 31 Aug 2009 16:57:35 GMT"
}
] | 2009-09-01T00:00:00 |
[
[
"Hasanhodzic",
"Jasmina",
""
],
[
"Lo",
"Andrew W.",
""
],
[
"Viola",
"Emanuele",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Quantitative Finance",
"code": "q-fin.TR",
"description": "Market microstructure, liquidity, exchange and auction design, automated trading, agent-based modeling and market-making",
"span": "(Trading and Market Microstructure)"
}
] |
0909.0067
|
Juan L. Varona
|
L. D. Abreu, \'O. Ciaurri and J. L. Varona
|
Bilinear biorthogonal expansions and the Dunkl kernel on the real line
|
16 pages
|
Expo. Math. 30 (2012), 32-48
| null | null |
math.FA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study an extension of the classical Paley-Wiener space structure, which is
based on bilinear expansions of integral kernels into biorthogonal sequences of
functions. The structure includes both sampling expansions and Fourier-Neumann
type series as special cases, and it also provides a bilinear expansion for the
Dunkl kernel (in the rank 1 case) which is a Dunkl analogue of Gegenbauer's
expansion of the plane wave and the corresponding sampling expansions. In fact,
we show how to derive sampling and Fourier-Neumann type expansions from the
results related to the bilinear expansion for the Dunkl kernel.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 01:33:42 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Nov 2012 01:16:18 GMT"
},
{
"version": "v3",
"created": "Tue, 6 Nov 2012 01:47:14 GMT"
}
] | 2012-11-07T00:00:00 |
[
[
"Abreu",
"L. D.",
""
],
[
"Ciaurri",
"Ó.",
""
],
[
"Varona",
"J. L.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0074
|
R Doomun
|
Philip Olu Jegede
|
Predictors Of Java Programming Self Efficacy Among Engineering Students
In A Nigerian University
|
7 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The study examined the relationship between Java programming self-efficacy
and programming background of engineering students in a Nigerian University.
One hundred and ninety two final year engineering students randomly selected
from six engineering departments of the university participated in the study.
Two research instruments: Programming Background Questionnaire and Java
Programming Self-Efficacy Scale were used in collecting relevant information
from the subjects. The resulting data were analyzed using Pearson product
correlation and Multiple regression analysis. Findings revealed that Java
Programming self-efficacy has no significant relationship with each of the
computing and programming background factors. It was additionally obtained that
the number of programming courses offered and programming courses weighed
scores were the only predictors of Java self-efficacy.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 02:43:54 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Jegede",
"Philip Olu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0909.0093
|
R Doomun
|
Mohammad A. Mikki
|
Energy Efficient Location Aided Routing Protocol for Wireless MANETs
|
9 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes
forming a temporary network without using any centralized access point,
infrastructure, or centralized administration. In this paper we introduce an
Energy Efficient Location Aided Routing (EELAR) Protocol for MANETs that is
based on the Location Aided Routing (LAR). EELAR makes significant reduction in
the energy consumption of the mobile nodes batteries by limiting the area of
discovering a new route to a smaller zone. Thus, control packets overhead is
significantly reduced. In EELAR a reference wireless base station is used and
the network's circular area centered at the base station is divided into six
equal sub-areas. At route discovery instead of flooding control packets to the
whole network area, they are flooded to only the sub-area of the destination
mobile node. The base station stores locations of the mobile nodes in a
position table. To show the efficiency of the proposed protocol we present
simulations using NS-2. Simulation results show that EELAR protocol makes an
improvement in control packet overhead and delivery ratio compared to AODV,
LAR, and DSR protocols.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 05:32:29 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Mikki",
"Mohammad A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.0095
|
Rakesh Mohanty
|
Rakesh Mohanty and N. S. Narayanaswamy
|
Online Algorithms for Self-Organizing Sequential Search - A Survey
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The main objective of this survey is to present the important theoretical and
experimental results contributed till date in the area of online algorithms for
the self organizing sequential search problem, also popularly known as the List
Update Problem(LUP) in a chronological way. The survey includes competitiveness
results of deterministic and randomized online algorithms and complexity
results of optimal off line algorithms for the list update problem. We also
present the results associated with list update with look ahead, list update
with locality of reference and other variants of the list update problem. We
investigate research issues, explore scope of future work associated with each
issue so that future researchers can find it useful to work on.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 05:46:32 GMT"
},
{
"version": "v2",
"created": "Wed, 2 Sep 2009 03:48:38 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Mohanty",
"Rakesh",
""
],
[
"Narayanaswamy",
"N. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.0097
|
R Doomun
|
Kamanashis Biswas, S. A. M. Harun
|
Constraint Minimum Vertex Cover in K Partite Graph, Approximation
Algorithm and Complexity Analysis
|
5 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.DS cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Generally, a graph G, an independent set is a subset S of vertices in G such
that no two vertices in S are adjacent (connected by an edge) and a vertex
cover is a subset S of vertices such that each edge of G has at least one of
its endpoints in S. Again, the minimum vertex cover problem is to find a vertex
cover with the smallest number of vertices. This study shows that the
constrained minimum vertex cover problem in k-partite graph (MIN CVCK) is
NP-Complete which is an important property of k partite graph. Many
combinatorial problems on general graphs are NP-complete, but when restricted
to k partite graph with at most k vertices then many of these problems can be
solved in polynomial time. This paper also illustrates an approximation
algorithm for MIN CVCK and analyzes its complexity. In future work section, we
specified a number of dimensions which may be interesting for the researchers
such as developing algorithm for maximum matching and polynomial algorithm for
constructing k-partite graph from general graph.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 06:10:44 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Biswas",
"Kamanashis",
""
],
[
"Harun",
"S. A. M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.0099
|
R Doomun
|
Kamanashis Biswas, Md. Ashraful Islam
|
Hardware Virtualization Support In INTEL, AMD And IBM Power Processors
|
6 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
At present, the mostly used and developed mechanism is hardware
virtualization which provides a common platform to run multiple operating
systems and applications in independent partitions. More precisely, it is all
about resource virtualization as the term hardware virtualization is
emphasized. In this paper, the aim is to find out the advantages and
limitations of current virtualization techniques, analyze their cost and
performance and also depict which forthcoming hardware virtualization
techniques will able to provide efficient solutions for multiprocessor
operating systems. This is done by making a methodical literature survey and
statistical analysis of the benchmark reports provided by SPEC (Standard
Performance Evaluation Corporation) and TPC (Transaction processing Performance
Council). Finally, this paper presents the current aspects of hardware
virtualization which will help the IT managers of the large organizations to
take effective decision while choosing server with virtualization support.
Again, the future works described in section 4 of this paper focuses on some
real world challenges such as abstraction of multiple servers, language level
virtualization, pre-virtualization etc. which may be point of great interest
for the researchers.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 06:15:22 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Biswas",
"Kamanashis",
""
],
[
"Islam",
"Md. Ashraful",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0909.0105
|
Zachary Chance
|
Zachary Chance and David J. Love
|
Concatenated Coding for the AWGN Channel with Noisy Feedback
|
Accepted to IEEE Trans. on Information Theory, January 2011
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of open-loop coding can be easily extended to a closed-loop
concatenated code if the channel has access to feedback. This can be done by
introducing a feedback transmission scheme as an inner code. In this paper,
this process is investigated for the case when a linear feedback scheme is
implemented as an inner code and, in particular, over an additive white
Gaussian noise (AWGN) channel with noisy feedback. To begin, we look to derive
an optimal linear feedback scheme by optimizing over the received
signal-to-noise ratio. From this optimization, an asymptotically optimal linear
feedback scheme is produced and compared to other well-known schemes. Then, the
linear feedback scheme is implemented as an inner code to a concatenated code
over the AWGN channel with noisy feedback. This code shows improvements not
only in error exponent bounds, but also in bit-error-rate and frame-error-rate.
It is also shown that the if the concatenated code has total blocklength L and
the inner code has blocklength, N, the inner code blocklength should scale as N
= O(C/R), where C is the capacity of the channel and R is the rate of the
concatenated code. Simulations with low density parity check (LDPC) and turbo
codes are provided to display practical applications and their error rate
benefits.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 14:47:57 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Sep 2009 18:02:42 GMT"
},
{
"version": "v3",
"created": "Fri, 20 Nov 2009 21:08:34 GMT"
},
{
"version": "v4",
"created": "Thu, 17 Jun 2010 19:13:38 GMT"
},
{
"version": "v5",
"created": "Mon, 21 Feb 2011 21:48:58 GMT"
}
] | 2011-02-23T00:00:00 |
[
[
"Chance",
"Zachary",
""
],
[
"Love",
"David J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0108
|
Damien Chablat
|
S\'ebastien Briot (IRCCyN), Anatoly Pashkevich (IRCCyN), Damien
Chablat (IRCCyN)
|
On the optimal design of parallel robots taking into account their
deformations and natural frequencies
| null | null | null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper discusses the utility of using simple stiffness and vibrations
models, based on the Jacobian matrix of a manipulator and only the rigidity of
the actuators, whenever its geometry is optimised. In many works, these
simplified models are used to propose optimal design of robots. However, the
elasticity of the drive system is often negligible in comparison with the
elasticity of the elements, especially in applications where high dynamic
performances are needed. Therefore, the use of such a simplified model may lead
to the creation of robots with long legs, which will be submitted to large
bending and twisting deformations. This paper presents an example of
manipulator for which it is preferable to use a complete stiffness or vibration
model to obtain the most suitable design and shows that the use of simplified
models can lead to mechanisms with poorer rigidity.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 06:46:58 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Briot",
"Sébastien",
"",
"IRCCyN"
],
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0909.0109
|
Sanjiang Li
|
Sanjiang Li
|
On the Internal Topological Structure of Plane Regions
|
A short version appeared in KR-10. Several results have been
rephrased and omitted proofs are given here. (Sanjiang Li. A Layered Graph
Representation for Complex Regions, in Proceedings of the 12th International
Conference on the Principles of Knowledge Representation and Reasoning
(KR-10), pages 581-583, Toronto, Canada, May 9-13, 2010)
| null | null | null |
cs.AI cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The study of topological information of spatial objects has for a long time
been a focus of research in disciplines like computational geometry, spatial
reasoning, cognitive science, and robotics. While the majority of these
researches emphasised the topological relations between spatial objects, this
work studies the internal topological structure of bounded plane regions, which
could consist of multiple pieces and/or have holes and islands to any finite
level. The insufficiency of simple regions (regions homeomorphic to closed
disks) to cope with the variety and complexity of spatial entities and
phenomena has been widely acknowledged. Another significant drawback of simple
regions is that they are not closed under set operations union, intersection,
and difference. This paper considers bounded semi-algebraic regions, which are
closed under set operations and can closely approximate most plane regions
arising in practice.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 06:48:16 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Jan 2010 23:49:24 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Dec 2010 19:32:03 GMT"
},
{
"version": "v4",
"created": "Thu, 9 Dec 2010 02:04:36 GMT"
},
{
"version": "v5",
"created": "Fri, 18 Oct 2013 04:50:14 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Li",
"Sanjiang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.0118
|
R Doomun
|
R. Sivaraman, R. Prabakaran, S. Sujatha
|
Dynamic Multimedia Content Retrieval System in Distributed Environment
|
4 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.MM cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
WiCoM enables remote management of web resources. Our application Mobile
reporter is aimed at Journalist, who will be able to capture the events in
real-time using their mobile phones and update their web server on the latest
event. WiCoM has been developed using J2ME technology on the client side and
PHP on the server side. The communication between the client and the server is
established through GPRS. Mobile reporter will be able to upload, edit and
remove both textual as well as multimedia contents in the server.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 08:19:18 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Sivaraman",
"R.",
""
],
[
"Prabakaran",
"R.",
""
],
[
"Sujatha",
"S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.0122
|
Sanjiang Li
|
Sanjiang Li, Anthony G. Cohn
|
Reasoning with Topological and Directional Spatial Information
| null |
Computational Intelligence, 2012, 28(4):579-616
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Current research on qualitative spatial representation and reasoning mainly
focuses on one single aspect of space. In real world applications, however,
multiple spatial aspects are often involved simultaneously.
This paper investigates problems arising in reasoning with combined
topological and directional information. We use the RCC8 algebra and the
Rectangle Algebra (RA) for expressing topological and directional information
respectively. We give examples to show that the bipath-consistency algorithm
BIPATH is incomplete for solving even basic RCC8 and RA constraints. If
topological constraints are taken from some maximal tractable subclasses of
RCC8, and directional constraints are taken from a subalgebra, termed DIR49, of
RA, then we show that BIPATH is able to separate topological constraints from
directional ones. This means, given a set of hybrid topological and directional
constraints from the above subclasses of RCC8 and RA, we can transfer the joint
satisfaction problem in polynomial time to two independent satisfaction
problems in RCC8 and RA. For general RA constraints, we give a method to
compute solutions that satisfy all topological constraints and approximately
satisfy each RA constraint to any prescribed precision.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 08:31:22 GMT"
}
] | 2013-10-21T00:00:00 |
[
[
"Li",
"Sanjiang",
""
],
[
"Cohn",
"Anthony G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.0138
|
Sanjiang Li
|
Xiaotong Zhang, Weiming Liu, Sanjiang Li, Mingsheng Ying
|
Reasoning about Cardinal Directions between Extended Objects
| null |
Artificial Intelligence, Volume 174, Issues 12-13, August 2010,
Pages 951-983
|
10.1016/j.artint.2010.05.006
| null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Direction relations between extended spatial objects are important
commonsense knowledge. Recently, Goyal and Egenhofer proposed a formal model,
known as Cardinal Direction Calculus (CDC), for representing direction
relations between connected plane regions. CDC is perhaps the most expressive
qualitative calculus for directional information, and has attracted increasing
interest from areas such as artificial intelligence, geographical information
science, and image retrieval. Given a network of CDC constraints, the
consistency problem is deciding if the network is realizable by connected
regions in the real plane. This paper provides a cubic algorithm for checking
consistency of basic CDC constraint networks, and proves that reasoning with
CDC is in general an NP-Complete problem. For a consistent network of basic CDC
constraints, our algorithm also returns a 'canonical' solution in cubic time.
This cubic algorithm is also adapted to cope with cardinal directions between
possibly disconnected regions, in which case currently the best algorithm is of
time complexity O(n^5).
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 09:58:22 GMT"
}
] | 2010-07-01T00:00:00 |
[
[
"Zhang",
"Xiaotong",
""
],
[
"Liu",
"Weiming",
""
],
[
"Li",
"Sanjiang",
""
],
[
"Ying",
"Mingsheng",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.0171
|
Jacob Vosmaer
|
Mai Gehrke and Jacob Vosmaer
|
Canonical extension and canonicity via DCPO presentations
|
17 pages. Definition 5 was revised slightly, without changing any of
the results
|
Theoretical Computer Science 412(25), pp. 2714-2723, 2011
|
10.1016/j.tcs.2010.12.032
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The canonical extension of a lattice is in an essential way a two-sided
completion. Domain theory, on the contrary, is primarily concerned with
one-sided completeness. In this paper, we show two things. Firstly, that the
canonical extension of a lattice can be given an asymmetric description in two
stages: a free co-directed meet completion, followed by a completion by
\emph{selected} directed joins. Secondly, we show that the general techniques
for dcpo presentations of dcpo algebras used in the second stage of the
construction immediately give us the well-known canonicity result for bounded
lattices with operators.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 12:49:20 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Sep 2010 14:17:38 GMT"
}
] | 2012-02-16T00:00:00 |
[
[
"Gehrke",
"Mai",
""
],
[
"Vosmaer",
"Jacob",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.0173
|
Robert Shour
|
Robert Shour
|
A theory of intelligence: networked problem solving in animal societies
|
83 pages; v 2-8 correct proofreading errors
| null | null | null |
cs.AI nlin.AO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A society's single emergent, increasing intelligence arises partly from the
thermodynamic advantages of networking the innate intelligence of different
individuals, and partly from the accumulation of solved problems. Economic
growth is proportional to the square of the network entropy of a society's
population times the network entropy of the number of the society's solved
problems.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 14:52:50 GMT"
},
{
"version": "v2",
"created": "Tue, 1 Sep 2009 20:19:13 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Sep 2009 20:42:05 GMT"
},
{
"version": "v4",
"created": "Mon, 14 Sep 2009 17:25:26 GMT"
},
{
"version": "v5",
"created": "Mon, 5 Oct 2009 15:25:22 GMT"
},
{
"version": "v6",
"created": "Wed, 4 May 2011 18:05:36 GMT"
},
{
"version": "v7",
"created": "Fri, 3 Jun 2011 17:26:28 GMT"
},
{
"version": "v8",
"created": "Tue, 11 Sep 2012 21:19:14 GMT"
}
] | 2012-09-13T00:00:00 |
[
[
"Shour",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Physics",
"code": "nlin.AO",
"description": "Adaptation, self-organizing systems, statistical physics, fluctuating systems, stochastic processes, interacting particle systems, machine learning",
"span": "(Adaptation and Self-Organizing Systems)"
}
] |
0909.0174
|
Stylianos Basagiannis
|
Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis
|
State Space Reduction with Message Inspection in Security Protocol Model
Checking
|
15 pages, 8 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Model checking is a widespread automatic formal analysis that has been
successful in discovering flaws in security protocols. However existing
possibilities for state space explosion still hinder analyses of complex
protocols and protocol configurations. Message Inspection, is a technique that
delimits the branching of the state space due to the intruder model without
excluding possible attacks. In a preliminary simulation, the intruder model
tags the eavesdropped messages with specific metadata that enable validation of
feasibility of possible attack actions. The Message Inspection algorithm then
decides based on these metadata, which attacks will certainly fail according to
known security principles. Thus, it is a priori known that i.e. an encryption
scheme attack cannot succeed if the intruder does not posses the right key in
his knowledge. The simulation terminates with a report of the attack actions
that can be safely removed, resulting in a model with a reduced state space.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 13:03:09 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Basagiannis",
"Stylianos",
""
],
[
"Katsaros",
"Panagiotis",
""
],
[
"Pombortsis",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.0206
|
Somantika Datta
|
Somantika Datta, Stephen Howard, Douglas Cochran
|
Geometry of the Welch Bounds
|
changes from previous version include: correction of typos,
additional references added, new Example 3.3
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A geometric perspective involving Grammian and frame operators is used to
derive the entire family of Welch bounds. This perspective unifies a number of
observations that have been made regarding tightness of the bounds and their
connections to symmetric k-tensors, tight frames, homogeneous polynomials, and
t-designs. In particular. a connection has been drawn between sampling of
homogeneous polynomials and frames of symmetric k-tensors. It is also shown
that tightness of the bounds requires tight frames. The lack of tight frames in
symmetric k-tensors in many cases, however, leads to consideration of sets that
come as close as possible to attaining the bounds. The geometric derivation is
then extended in the setting of generalized or continuous frames. The Welch
bounds for finite sets and countably infinite sets become special cases of this
general setting.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 15:30:31 GMT"
},
{
"version": "v2",
"created": "Wed, 30 May 2012 01:13:11 GMT"
}
] | 2012-05-31T00:00:00 |
[
[
"Datta",
"Somantika",
""
],
[
"Howard",
"Stephen",
""
],
[
"Cochran",
"Douglas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0236
|
Reynald Lercier
|
Clement Dunand and Reynald Lercier
|
Normal Elliptic Bases and Torus-Based Cryptography
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider representations of algebraic tori $T_n(F_q)$ over finite fields.
We make use of normal elliptic bases to show that, for infinitely many
squarefree integers $n$ and infinitely many values of $q$, we can encode $m$
torus elements, to a small fixed overhead and to $m$ $\phi(n)$-tuples of $F_q$
elements, in quasi-linear time in $\log q$.
This improves upon previously known algorithms, which all have a
quasi-quadratic complexity. As a result, the cost of the encoding phase is now
negligible in Diffie-Hellman cryptographic schemes.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 18:44:27 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Dunand",
"Clement",
""
],
[
"Lercier",
"Reynald",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.0237
|
Vassilis Kostakos
|
Vassilis Kostakos
|
Is the crowd's wisdom biased? A quantitative asessment of three online
communities
|
17 pages, 6 tagles
|
Computational Science and Engineering, p. 251-255, 2009
|
10.1109/CSE.2009.491
| null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a study of user voting on three websites: Imdb, Amazon
and BookCrossings. It reports on an expert evaluation of the voting mechanisms
of each website and a quantitative data analysis of users' aggregate voting
behavior. The results suggest that voting follows different patterns across the
websites, with higher barrier to vote introducing a more of one-off voters and
attracting mostly experts. The results also show that that one-off voters tend
to vote on popular items, while experts mostly vote for obscure, low-rated
items. The study concludes with design suggestions to address the "wisdom of
the crowd" bias.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 18:31:17 GMT"
},
{
"version": "v2",
"created": "Thu, 3 Sep 2009 13:46:03 GMT"
},
{
"version": "v3",
"created": "Wed, 16 Sep 2009 13:40:23 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Oct 2009 08:43:33 GMT"
},
{
"version": "v5",
"created": "Sun, 8 Nov 2009 01:54:35 GMT"
}
] | 2013-06-06T00:00:00 |
[
[
"Kostakos",
"Vassilis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.0245
|
R Doomun
|
Sourabh Rungta, Kshitij Verma, Neeta Tripathi, Anupam Shukla
|
Enhanced Mode Selection Algorithm for H.264 encoder for Application in
Low Computational power devices
|
7 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The intent of the H.264 AVC project was to create a standard capable of
providing good video quality at substantially lower bit rates than previous
standards without increasing the complexity of design so much that it would be
impractical or excessively expensive to implement. An additional goal was to
provide enough flexibility to allow the standard to be applied to a wide
variety of applications. To achieve better coding efficiency, H.264 AVC uses
several techniques such as inter mode and intra mode prediction with variable
size motion compensation, which adopts Rate Distortion Optimization (RDO). This
increases the computational complexity of the encoder especially for devices
with lower processing capabilities such as mobile and other handheld devices.
In this paper, we propose an algorithm to reduce the number of mode and sub
mode evaluations in inter mode prediction. Experimental results show that this
fast intra mode selection algorithm can lessen about 75 percent encoding time
with little loss of bit rate and visual quality.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 18:57:06 GMT"
}
] | 2009-09-02T00:00:00 |
[
[
"Rungta",
"Sourabh",
""
],
[
"Verma",
"Kshitij",
""
],
[
"Tripathi",
"Neeta",
""
],
[
"Shukla",
"Anupam",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0909.0247
|
R Doomun
|
Abu Shamim Mohammad Arif, Asif Mahamud, Rashedul Islam
|
An Enhanced Static Data Compression Scheme Of Bengali Short Message
|
7 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper concerns a modified approach of compressing Short Bengali Text
Message for small devices. The prime objective of this research technique is to
establish a low complexity compression scheme suitable for small devices having
small memory and relatively lower processing speed. The basic aim is not to
compress text of any size up to its maximum level without having any constraint
on space and time, rather than the main target is to compress short messages up
to an optimal level which needs minimum space, consume less time and the
processor requirement is lower. We have implemented Character Masking,
Dictionary Matching, Associative rule of data mining and Hyphenation algorithm
for syllable based compression in hierarchical steps to achieve low complexity
lossless compression of text message for any mobile devices. The scheme to
choose the diagrams are performed on the basis of extensive statistical model
and the static Huffman coding is done through the same context.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 19:54:57 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Sep 2009 02:47:43 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Arif",
"Abu Shamim Mohammad",
""
],
[
"Mahamud",
"Asif",
""
],
[
"Islam",
"Rashedul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0251
|
Kazi Huq
|
Kazi Mohammed Saidul Huq, Miguel Bergano, Atilio Gameiro, Md. Taslim
Arefin
|
Channel Equalization in Digital Transmission
|
not published
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Channel equalization is the process of reducing amplitude, frequency and
phase distortion in a radio channel with the intent of improving transmission
performance. Different types of equalizers, their applications and some
practical example is given. Especially, in the digital communication scenario
how equalization works is shown. This paper presents a vivid description on
channel equalization in digital transmission system.
|
[
{
"version": "v1",
"created": "Tue, 1 Sep 2009 19:26:44 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Apr 2010 19:44:27 GMT"
}
] | 2020-01-21T00:00:00 |
[
[
"Huq",
"Kazi Mohammed Saidul",
""
],
[
"Bergano",
"Miguel",
""
],
[
"Gameiro",
"Atilio",
""
],
[
"Arefin",
"Md. Taslim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.