id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0909.0347
Tobias Harks
Tobias Harks, Max Klimm, Rolf H. Moehring
Strong Nash Equilibria in Games with the Lexicographical Improvement Property
null
null
null
Preprint 011-2009
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a class of finite strategic games with the property that every deviation of a coalition of players that is profitable to each of its members strictly decreases the lexicographical order of a certain function defined on the set of strategy profiles. We call this property the Lexicographical Improvement Property (LIP) and show that it implies the existence of a generalized strong ordinal potential function. We use this characterization to derive existence, efficiency and fairness properties of strong Nash equilibria. We then study a class of games that generalizes congestion games with bottleneck objectives that we call bottleneck congestion games. We show that these games possess the LIP and thus the above mentioned properties. For bottleneck congestion games in networks, we identify cases in which the potential function associated with the LIP leads to polynomial time algorithms computing a strong Nash equilibrium. Finally, we investigate the LIP for infinite games. We show that the LIP does not imply the existence of a generalized strong ordinal potential, thus, the existence of SNE does not follow. Assuming that the function associated with the LIP is continuous, however, we prove existence of SNE. As a consequence, we prove that bottleneck congestion games with infinite strategy spaces and continuous cost functions possess a strong Nash equilibrium.
[ { "version": "v1", "created": "Wed, 2 Sep 2009 08:45:54 GMT" } ]
2009-09-03T00:00:00
[ [ "Harks", "Tobias", "" ], [ "Klimm", "Max", "" ], [ "Moehring", "Rolf H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.0393
Olivier Finkel
Olivier Finkel (ELM), Pierre Simonnet (SPE)
On Recognizable Tree Languages Beyond the Borel Hierarchy
To appear in Fundamenta Informaticae
Fundamenta Informaticae 95, 2-3 (2009) 287-303
null
null
math.LO cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the topological complexity of non Borel recognizable tree languages with regard to the difference hierarchy of analytic sets. We show that, for each integer $n \geq 1$, there is a $D_{\omega^n}({\bf \Sigma}^1_1)$-complete tree language L_n accepted by a (non deterministic) Muller tree automaton. On the other hand, we prove that a tree language accepted by an unambiguous B\"uchi tree automaton must be Borel. Then we consider the game tree languages $W_{(i,k)}$, for Mostowski-Rabin indices $(i, k)$. We prove that the $D_{\omega^n}({\bf \Sigma}^1_1)$-complete tree languages L_n are Wadge reducible to the game tree language $W_{(i, k)}$ for $k-i \geq 2$. In particular these languages $W_{(i, k)}$ are not in any class $D_{\alpha}({\bf \Sigma}^1_1)$ for $\alpha < \omega^\omega$.
[ { "version": "v1", "created": "Wed, 2 Sep 2009 11:37:15 GMT" } ]
2009-11-05T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ], [ "Simonnet", "Pierre", "", "SPE" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.0400
Noam Shental
Noam Shental, Amnon Amir and Or Zuk
Rare-Allele Detection Using Compressed Se(que)nsing
29 pages, 11 figures
null
null
null
q-bio.GN cs.IT cs.LG math.IT q-bio.QM stat.AP stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detection of rare variants by resequencing is important for the identification of individuals carrying disease variants. Rapid sequencing by new technologies enables low-cost resequencing of target regions, although it is still prohibitive to test more than a few individuals. In order to improve cost trade-offs, it has recently been suggested to apply pooling designs which enable the detection of carriers of rare alleles in groups of individuals. However, this was shown to hold only for a relatively low number of individuals in a pool, and requires the design of pooling schemes for particular cases. We propose a novel pooling design, based on a compressed sensing approach, which is both general, simple and efficient. We model the experimental procedure and show via computer simulations that it enables the recovery of rare allele carriers out of larger groups than were possible before, especially in situations where high coverage is obtained for each individual. Our approach can also be combined with barcoding techniques to enhance performance and provide a feasible solution based on current resequencing costs. For example, when targeting a small enough genomic region (~100 base-pairs) and using only ~10 sequencing lanes and ~10 distinct barcodes, one can recover the identity of 4 rare allele carriers out of a population of over 4000 individuals.
[ { "version": "v1", "created": "Wed, 2 Sep 2009 13:25:48 GMT" } ]
2009-09-03T00:00:00
[ [ "Shental", "Noam", "" ], [ "Amir", "Amnon", "" ], [ "Zuk", "Or", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" } ]
0909.0442
Damien Chablat
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
Kinematic analysis of a class of analytic planar 3-RPR parallel manipulators
null
International Workshop on Computational Kinematics, Duisburg : Germany (2009)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A class of analytic planar 3-RPR manipulators is analyzed in this paper. These manipulators have congruent base and moving platforms and the moving platform is rotated of 180 deg about an axis in the plane. The forward kinematics is reduced to the solution of a 3rd-degree polynomial and a quadratic equation in sequence. The singularities are calculated and plotted in the joint space. The second-order singularities (cups points), which play an important role in non-singular change of assembly-mode motions, are also analyzed.
[ { "version": "v1", "created": "Wed, 2 Sep 2009 14:37:01 GMT" } ]
2009-09-03T00:00:00
[ [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0909.0481
Fionn Murtagh
Fionn Murtagh, Pedro Contreras and Jean-Luc Starck
Scale-Based Gaussian Coverings: Combining Intra and Inter Mixture Models in Image Segmentation
20 pages, 5 figures
Entropy, 11 (3), 513-528, 2009
10.3390/e11030513
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By a "covering" we mean a Gaussian mixture model fit to observed data. Approximations of the Bayes factor can be availed of to judge model fit to the data within a given Gaussian mixture model. Between families of Gaussian mixture models, we propose the R\'enyi quadratic entropy as an excellent and tractable model comparison framework. We exemplify this using the segmentation of an MRI image volume, based (1) on a direct Gaussian mixture model applied to the marginal distribution function, and (2) Gaussian model fit through k-means applied to the 4D multivalued image volume furnished by the wavelet transform. Visual preference for one model over another is not immediate. The R\'enyi quadratic entropy allows us to show clearly that one of these modelings is superior to the other.
[ { "version": "v1", "created": "Wed, 2 Sep 2009 17:46:08 GMT" } ]
2011-01-11T00:00:00
[ [ "Murtagh", "Fionn", "" ], [ "Contreras", "Pedro", "" ], [ "Starck", "Jean-Luc", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0909.0537
Sariel Har-Peled
Chandra Chekuri, Kenneth L. Clarkson, and Sariel Har-Peled
On the Set Multi-Cover Problem in Geometric Settings
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the set multi-cover problem in geometric settings. Given a set of points P and a collection of geometric shapes (or sets) F, we wish to find a minimum cardinality subset of F such that each point p in P is covered by (contained in) at least d(p) sets. Here d(p) is an integer demand (requirement) for p. When the demands d(p)=1 for all p, this is the standard set cover problem. The set cover problem in geometric settings admits an approximation ratio that is better than that for the general version. In this paper, we show that similar improvements can be obtained for the multi-cover problem as well. In particular, we obtain an O(log Opt) approximation for set systems of bounded VC-dimension, where Opt is the cardinality of an optimal solution, and an O(1) approximation for covering points by half-spaces in three dimensions and for some other classes of shapes.
[ { "version": "v1", "created": "Wed, 2 Sep 2009 22:03:11 GMT" } ]
2009-09-04T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Clarkson", "Kenneth L.", "" ], [ "Har-Peled", "Sariel", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.0549
Pradeep Sarvepalli
Pradeep Sarvepalli and Robert Raussendorf
Matroids and Quantum Secret Sharing Schemes
null
Phys. Rev. A 81, 052333 (2010)
10.1103/PhysRevA.81.052333
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum secret sharing schemes. In addition to providing a new perspective on quantum secret sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum secret sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum secret sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure state quantum secret sharing scheme with information rate one.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 17:26:22 GMT" }, { "version": "v2", "created": "Fri, 4 Sep 2009 21:55:12 GMT" }, { "version": "v3", "created": "Fri, 23 Oct 2009 23:40:01 GMT" } ]
2010-07-08T00:00:00
[ [ "Sarvepalli", "Pradeep", "" ], [ "Raussendorf", "Robert", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.0553
Jie Luo
Jie Luo, Anthony Ephremides
A New Approach to Random Access: Reliable Communication and Reliable Collision Detection
submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2173705
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper applies Information Theoretic analysis to packet-based random multiple access communication systems. A new channel coding approach is proposed for coding within each data packet with built-in support for bursty traffic properties, such as message underflow, and for random access properties, such as packet collision detection. The coding approach does not require joint communication rate determination either among the transmitters or between the transmitters and the receiver. Its performance limitation is characterized by an achievable region defined in terms of communication rates, such that reliable packet recovery is supported for all rates inside the region and reliable collision detection is supported for all rates outside the region. For random access communication over a discrete-time memoryless channel, it is shown that the achievable rate region of the introduced coding approach equals the Shannon information rate region without a convex hull operation. Further connections between the achievable rate region and the Shannon information rate region are developed and explained.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 00:36:58 GMT" }, { "version": "v2", "created": "Fri, 13 Aug 2010 21:40:49 GMT" }, { "version": "v3", "created": "Mon, 9 May 2011 05:26:16 GMT" } ]
2016-11-17T00:00:00
[ [ "Luo", "Jie", "" ], [ "Ephremides", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0555
Boyu Li
Boyu Li and Ender Ayanoglu
Reduced Complexity Sphere Decoding
accepted to Journal. arXiv admin note: substantial text overlap with arXiv:1009.3514
Wiley WCMC, Vol. 11, No. 12, pages 1518-1527, Dec. 2011
10.1002/wcm.1216
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In Multiple-Input Multiple-Output (MIMO) systems, Sphere Decoding (SD) can achieve performance equivalent to full search Maximum Likelihood (ML) decoding, with reduced complexity. Several researchers reported techniques that reduce the complexity of SD further. In this paper, a new technique is introduced which decreases the computational complexity of SD substantially, without sacrificing performance. The reduction is accomplished by deconstructing the decoding metric to decrease the number of computations and exploiting the structure of a lattice representation. Furthermore, an application of SD, employing a proposed smart implementation with very low computational complexity is introduced. This application calculates the soft bit metrics of a bit-interleaved convolutional-coded MIMO system in an efficient manner. Based on the reduced complexity SD, the proposed smart implementation employs the initial radius acquired by Zero-Forcing Decision Feedback Equalization (ZF-DFE) which ensures no empty spheres. Other than that, a technique of a particular data structure is also incorporated to efficiently reduce the number of executions carried out by SD. Simulation results show that these approaches achieve substantial gains in terms of the computational complexity for both uncoded and coded MIMO systems.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 00:46:16 GMT" }, { "version": "v2", "created": "Mon, 15 Mar 2010 23:50:42 GMT" }, { "version": "v3", "created": "Thu, 15 Sep 2011 08:03:57 GMT" }, { "version": "v4", "created": "Mon, 30 Jan 2012 22:02:05 GMT" } ]
2015-03-13T00:00:00
[ [ "Li", "Boyu", "" ], [ "Ayanoglu", "Ender", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0571
R Doomun
Saad Ahmad Khan, Sheheryar Ali Arshad
QoS Provisioning Using Hybrid FSO RF Based Hierarchical Model for Wireless Multimedia Sensor Networks
6 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Our objective is to provide guaranteed packet delivery service in time constrained sensor networks. The wireless network is a highly variable environment, where available link bandwidth may vary with network load. Since multimedia applications require higher bandwidth so we use FSO links for their transmission. The main advantage of FSO links is that they offer higher bandwidth and security, while RF links offer more reliability. The routing in this multitier network is based on directional geographic routing protocol, in which sensors route their data via multihop paths, to a powerful base station, through a cluster head. Some modifications have also been incorporated in the MAC layer to improve the QoS of such systems.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 05:31:18 GMT" } ]
2009-09-04T00:00:00
[ [ "Khan", "Saad Ahmad", "" ], [ "Arshad", "Sheheryar Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.0572
Andri Mirzal M.Sc.
Andri Mirzal and Masashi Furukawa
A Method for Accelerating the HITS Algorithm
10 pages, 3 figures, to be appear in Journal of Advanced Computational Intelligence and Intelligent Informatics, Vol. 14 No. 1, 2010
null
null
null
cs.IR
http://creativecommons.org/licenses/by-nc-sa/3.0/
We present a new method to accelerate the HITS algorithm by exploiting hyperlink structure of the web graph. The proposed algorithm extends the idea of authority and hub scores from HITS by introducing two diagonal matrices which contain constants that act as weights to make authority pages more authoritative and hub pages more hubby. This method works because in the web graph good authorities are pointed to by good hubs and good hubs point to good authorities. Consequently, these pages will collect their scores faster under the proposed algorithm than under the standard HITS. We show that the authority and hub vectors of the proposed algorithm exist but are not necessarily be unique, and then give a treatment to ensure the uniqueness property of the vectors. The experimental results show that the proposed algorithm can improve HITS computations, especially for back button datasets.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 05:34:35 GMT" } ]
2009-09-04T00:00:00
[ [ "Mirzal", "Andri", "" ], [ "Furukawa", "Masashi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.0573
R Doomun
Jalpa Bani, Syed S. Rizvi
Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF) Algorithm
7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Rijndael algorithm was unanimously chosen as the Advanced Encryption Standard (AES) by the panel of researchers at National Institute of Standards and Technology (NIST) in October 2000. Since then, Rijndael was destined to be used massively in various software as well as hardware entities for encrypting data. However, a few years back, Daniel Bernstein devised a cache timing attack that was capable enough to break Rijndael seal that encapsulates the encryption key. In this paper, we propose a new Dynamic Cache Flushing (DCF) algorithm which shows a set of pragmatic software measures that would make Rijndael impregnable to cache timing attack. The simulation results demonstrate that the proposed DCF algorithm provides better security by encrypting key at a constant time.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 05:53:38 GMT" } ]
2009-09-04T00:00:00
[ [ "Bani", "Jalpa", "" ], [ "Rizvi", "Syed S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.0576
R Doomun
Dr. G. Padmavathi, Mrs. D. Shanmugapriya
A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks
9 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. One of the major challenges wireless sensor networks face today is security. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. The sensing technology combined with processing power and wireless communication makes it profitable for being exploited in great quantity in future. The wireless communication technology also acquires various types of security threats. This paper discusses a wide variety of attacks in WSN and their classification mechanisms and different securities available to handle them including the challenges faced.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 06:13:36 GMT" } ]
2009-09-04T00:00:00
[ [ "Padmavathi", "Dr. G.", "" ], [ "Shanmugapriya", "Mrs. D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.0583
R Doomun
Raheel Maqsood Hashmi, Arooj Mubashara Siddiqui, Memoona Jabeen, Khurram S. Alimgeer, Shahid A. Khan
Computational Complexities and Breaches in Authentication Frameworks of Broadband Wireless Access
5 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSn 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Secure access of communication networks has become an increasingly important area of consideration for the communication service providers of present day. Broadband Wireless Access (BWA) networks are proving to be an efficient and cost effective solution for the provisioning of high rate wireless traffic links in static and mobile domains. The secure access of these networks is necessary to ensure their superior operation and revenue efficacy. Although authentication process is a key to secure access in BWA networks, the breaches present in them limit the networks performance. In this paper, the vulnerabilities in the authentication frameworks of BWA networks have been unveiled. Moreover, this paper also describes the limitations of these protocols and of the solutions proposed to them due to the involved computational complexities and overheads. The possible attacks on privacy and performance of BWA networks have been discussed and explained in detail.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 07:56:44 GMT" } ]
2009-09-04T00:00:00
[ [ "Hashmi", "Raheel Maqsood", "" ], [ "Siddiqui", "Arooj Mubashara", "" ], [ "Jabeen", "Memoona", "" ], [ "Alimgeer", "Khurram S.", "" ], [ "Khan", "Shahid A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.0588
Jos\'e Ignacio Iglesias Curto
Jose Ignacio Iglesias Curto, Uwe Helmke
Receding horizon decoding of convolutional codes
null
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Decoding of convolutional codes poses a significant challenge for coding theory. Classical methods, based on e.g. Viterbi decoding, suffer from being computationally expensive and are restricted therefore to codes of small complexity. Based on analogies with model predictive optimal control, we propose a new iterative method for convolutional decoding that is cheaper to implement than established algorithms, while still offering significant error correction capabilities. The algorithm is particularly well-suited for decoding special types of convolutional codes, such as e.g. cyclic convolutional codes.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 08:27:59 GMT" } ]
2009-09-04T00:00:00
[ [ "Curto", "Jose Ignacio Iglesias", "" ], [ "Helmke", "Uwe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0909.0599
R Doomun
Md. Rabiul Islam, Md. Fayzur Rahman
Codebook Design Method for Noise Robust Speaker Identification based on Genetic Algorithm
5 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423,http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSn 1947 5500
cs.SD cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, a novel method of designing a codebook for noise robust speaker identification purpose utilizing Genetic Algorithm has been proposed. Wiener filter has been used to remove the background noises from the source speech utterances. Speech features have been extracted using standard speech parameterization method such as LPC, LPCC, RCC, MFCC, (delta)MFCC and (delta)(delta) MFCC. For each of these techniques, the performance of the proposed system has been compared. In this codebook design method, Genetic Algorithm has the capability of getting global optimal result and hence improves the quality of the codebook. Comparing with the NOIZEOUS speech database, the experimental result shows that 79.62 percent accuracy has been achieved.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 08:49:54 GMT" } ]
2009-09-04T00:00:00
[ [ "Islam", "Md. Rabiul", "" ], [ "Rahman", "Md. Fayzur", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0909.0611
Katsutoshi Yoshida
Katsutoshi Yoshida, Atsushi Higeta and Shinichi Watanabe
Effects of Mechanical Coupling on the Dynamics of Balancing Tasks
18 pages, 16 figures
International Journal of Innovative Computing, Information and Control, Vol.7, No.4, April 2011, pp.1661-1674
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Coupled human balancing tasks are investigated based on both pseudo-neural controllers characterized by time-delayed feedback with random gain and natural human balancing tasks. It is shown numerically that, compared to single balancing tasks, balancing tasks coupled by mechanical structures exhibit enhanced stability against balancing errors in terms of both amplitude and velocity and also improve the tracking ability of the controllers. We then perform an experiment in which numerical pseudo-neural controllers are replaced with natural human balancing tasks carried out using computer mice. The results reveal that the coupling structure generates asymmetric tracking abilities in subjects whose tracking abilities are nearly symmetric in their single balancing tasks.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 09:38:18 GMT" }, { "version": "v2", "created": "Mon, 5 Jul 2010 00:02:40 GMT" } ]
2011-03-14T00:00:00
[ [ "Yoshida", "Katsutoshi", "" ], [ "Higeta", "Atsushi", "" ], [ "Watanabe", "Shinichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0909.0633
Amr Rizk
Amr Rizk, Markus Fidler
Statistical End-to-end Performance Bounds for Networks under Long Memory FBM Cross Traffic
null
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fractional Brownian motion (fBm) emerged as a useful model for self-similar and long-range dependent Internet traffic. Approximate performance measures are known from large deviations theory for single queuing systems with fBm through traffic. In this paper we derive end-to-end performance bounds for a through flow in a network of tandem queues under fBm cross traffic. To this end, we prove a rigorous sample path envelope for fBm that complements previous approximate results. We find that both approaches agree in their outcome that overflow probabilities for fBm traffic have a Weibullian tail. We employ the sample path envelope and the concept of leftover service curves to model the remaining service after scheduling fBm cross traffic at a system. Using composition results for tandem systems from the stochastic network calculus we derive end-to-end statistical performance bounds for individual flows in networks under fBm cross traffic. We discover that these bounds grow in O(n (log n)^(1/(2-2H))) for n systems in series where H is the Hurst parameter of the fBm cross traffic. We show numerical results on the impact of the variability and the correlation of fBm traffic on network performance.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 12:32:46 GMT" } ]
2009-09-04T00:00:00
[ [ "Rizk", "Amr", "" ], [ "Fidler", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.0635
Fabrice Rossi
Michel Verleysen (DICE - MLG), Fabrice Rossi (LTCI), Damien Fran\c{c}ois (CESAME)
Advances in Feature Selection with Mutual Information
null
Similarity-Based Clustering, Villmann, Th.; Biehl, M.; Hammer, B.; Verleysen, M. (Ed.) (2009) 52-69
10.1007/978-3-642-01805-3_4
null
cs.LG cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The selection of features that are relevant for a prediction or classification problem is an important problem in many domains involving high-dimensional data. Selecting features helps fighting the curse of dimensionality, improving the performances of prediction or classification methods, and interpreting the application. In a nonlinear context, the mutual information is widely used as relevance criterion for features and sets of features. Nevertheless, it suffers from at least three major limitations: mutual information estimators depend on smoothing parameters, there is no theoretically justified stopping criterion in the feature selection greedy procedure, and the estimation itself suffers from the curse of dimensionality. This chapter shows how to deal with these problems. The two first ones are addressed by using resampling techniques that provide a statistical basis to select the estimator parameters and to stop the search procedure. The third one is addressed by modifying the mutual information criterion into a measure of how features are complementary (and not only informative) for the problem at hand.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 12:04:57 GMT" } ]
2009-09-04T00:00:00
[ [ "Verleysen", "Michel", "", "DICE - MLG" ], [ "Rossi", "Fabrice", "", "LTCI" ], [ "François", "Damien", "", "CESAME" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0638
Fabrice Rossi
Barbara Hammer, Alexander Hasenfu{\ss}, Fabrice Rossi (LTCI)
Median topographic maps for biomedical data sets
null
Similarity-Based Clustering, Villmann, Th.; Biehl, M.; Hammer, B.; Verleysen, M. (Ed.) (2009) 92-117
10.1007/978-3-642-01805-3_6
null
cs.LG q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Median clustering extends popular neural data analysis methods such as the self-organizing map or neural gas to general data structures given by a dissimilarity matrix only. This offers flexible and robust global data inspection methods which are particularly suited for a variety of data as occurs in biomedical domains. In this chapter, we give an overview about median clustering and its properties and extensions, with a particular focus on efficient implementations adapted to large scale data analysis.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 12:09:08 GMT" } ]
2009-09-04T00:00:00
[ [ "Hammer", "Barbara", "", "LTCI" ], [ "Hasenfuß", "Alexander", "", "LTCI" ], [ "Rossi", "Fabrice", "", "LTCI" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0909.0641
Oliver Johnson
Oliver Johnson and Yaming Yu
Monotonicity, thinning and discrete versions of the Entropy Power Inequality
9 pages (revised to take account of referees' comments)
IEEE Transactions on Information Theory, Vol 56/11, 2010, pages 5387-5395
10.1109/TIT.2010.2070570
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the entropy of sums of independent discrete random variables, in analogy with Shannon's Entropy Power Inequality, where equality holds for normals. In our case, infinite divisibility suggests that equality should hold for Poisson variables. We show that some natural analogues of the Entropy Power Inequality do not in fact hold, but propose an alternative formulation which does always hold. The key to many proofs of Shannon's Entropy Power Inequality is the behaviour of entropy on scaling of continuous random variables. We believe that R\'{e}nyi's operation of thinning discrete random variables plays a similar role to scaling, and give a sharp bound on how the entropy of ultra log-concave random variables behaves on thinning. In the spirit of the monotonicity results established by Artstein, Ball, Barthe and Naor, we prove a stronger version of concavity of entropy, which implies a strengthened form of our discrete Entropy Power Inequality.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 16:22:01 GMT" }, { "version": "v2", "created": "Thu, 15 Jul 2010 10:27:00 GMT" } ]
2010-10-21T00:00:00
[ [ "Johnson", "Oliver", "" ], [ "Yu", "Yaming", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0682
Shirin Sohrabi
Shirin Sohrabi and Sheila A. McIlraith
On Planning with Preferences in HTN
This paper appears in Twelfth International Workshop on Non-Monotonic Reasoning (NMR08). An earlier version of this paper appears in Fourth Multidisciplinary Workshop on Advances in Preference Handling (M-Pref08) at AAAI-08
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we address the problem of generating preferred plans by combining the procedural control knowledge specified by Hierarchical Task Networks (HTNs) with rich qualitative user preferences. The outcome of our work is a language for specifyin user preferences, tailored to HTN planning, together with a provably optimal preference-based planner, HTNPLAN, that is implemented as an extension of SHOP2. To compute preferred plans, we propose an approach based on forward-chaining heuristic search. Our heuristic uses an admissible evaluation function measuring the satisfaction of preferences over partial plans. Our empirical evaluation demonstrates the effectiveness of our HTNPLAN heuristics. We prove our approach sound and optimal with respect to the plans it generates by appealing to a situation calculus semantics of our preference language and of HTN planning. While our implementation builds on SHOP2, the language and techniques proposed here are relevant to a broad range of HTN planners.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 15:27:52 GMT" } ]
2009-09-04T00:00:00
[ [ "Sohrabi", "Shirin", "" ], [ "McIlraith", "Sheila A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.0685
Chris Giannella
Joel W. Branch, Chris Giannella, Boleslaw Szymanski, Ran Wolff, Hillol Kargupta
In-Network Outlier Detection in Wireless Sensor Networks
Extended version of a paper appearing in the Int'l Conference on Distributed Computing Systems 2006
Knowledge and Information Systems 34(1) January, 2013, pp. 23-54
10.1007/s10115-011-0474-5
null
cs.DB cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To address the problem of unsupervised outlier detection in wireless sensor networks, we develop an approach that (1) is flexible with respect to the outlier definition, (2) computes the result in-network to reduce both bandwidth and energy usage,(3) only uses single hop communication thus permitting very simple node failure detection and message reliability assurance mechanisms (e.g., carrier-sense), and (4) seamlessly accommodates dynamic updates to data. We examine performance using simulation with real sensor data streams. Our results demonstrate that our approach is accurate and imposes a reasonable communication load and level of power consumption.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 15:26:38 GMT" } ]
2013-05-15T00:00:00
[ [ "Branch", "Joel W.", "" ], [ "Giannella", "Chris", "" ], [ "Szymanski", "Boleslaw", "" ], [ "Wolff", "Ran", "" ], [ "Kargupta", "Hillol", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.0704
Lav Varshney
Ha Q. Nguyen, Lav R. Varshney, and Vivek K Goyal
Concentric Permutation Source Codes
null
IEEE Transactions on Communications, vol. 58, no. 11, pp. 3154-3164, November 2010
10.1109/TCOMM.2010.101210.090535
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Permutation codes are a class of structured vector quantizers with a computationally-simple encoding procedure based on sorting the scalar components. Using a codebook comprising several permutation codes as subcodes preserves the simplicity of encoding while increasing the number of rate-distortion operating points, improving the convex hull of operating points, and increasing design complexity. We show that when the subcodes are designed with the same composition, optimization of the codebook reduces to a lower-dimensional vector quantizer design within a single cone. Heuristics for reducing design complexity are presented, including an optimization of the rate allocation in a shape-gain vector quantizer with gain-dependent wrapped spherical shape codebook.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 16:33:18 GMT" }, { "version": "v2", "created": "Sat, 19 Sep 2009 21:32:37 GMT" }, { "version": "v3", "created": "Wed, 14 Apr 2010 01:10:13 GMT" }, { "version": "v4", "created": "Wed, 23 Jun 2010 19:19:31 GMT" } ]
2015-03-13T00:00:00
[ [ "Nguyen", "Ha Q.", "" ], [ "Varshney", "Lav R.", "" ], [ "Goyal", "Vivek K", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0717
Sariel Har-Peled
Sariel Har-Peled and Micha Sharir
Relative $(p,\epsilon)$-Approximations in Geometry
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We re-examine the notion of relative $(p,\eps)$-approximations, recently introduced in [CKMS06], and establish upper bounds on their size, in general range spaces of finite VC-dimension, using the sampling theory developed in [LLS01] and in several earlier studies [Pol86, Hau92, Tal94]. We also survey the different notions of sampling, used in computational geometry, learning, and other areas, and show how they relate to each other. We then give constructions of smaller-size relative $(p,\eps)$-approximations for range spaces that involve points and halfspaces in two and higher dimensions. The planar construction is based on a new structure--spanning trees with small relative crossing number, which we believe to be of independent interest. Relative $(p,\eps)$-approximations arise in several geometric problems, such as approximate range counting, and we apply our new structures to obtain efficient solutions for approximate range counting in three dimensions. We also present a simple solution for the planar case.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 17:16:30 GMT" }, { "version": "v2", "created": "Mon, 25 Jan 2010 03:25:43 GMT" } ]
2010-01-25T00:00:00
[ [ "Har-Peled", "Sariel", "" ], [ "Sharir", "Micha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.0732
R Doomun
Shahid Hussain, Muhammad Zubair Asghar, Bashir Ahmad, Shakeel Ahmad
A Step towards Software Corrective Maintenance Using RCM model
6 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From the preliminary stage of software engineering, selection of appropriate enforcement of standards remained a challenge for stakeholders during entire cycle of software development, but it can lead to reduce the efforts desired for software maintenance phase. Corrective maintenance is the reactive modification of a software product performed after delivery to correct discovered faults. Studies conducted by different researchers reveal that approximately 50 to 75 percent of the effort is spent on maintenance, out of which about 17 to 21 percent is exercised on corrective maintenance. In this paper, authors proposed a RCM (Reduce Corrective Maintenance) model which represents the implementation process of number of checklists to guide the stakeholders of all phases of software development. These check lists will be filled by corresponding stake holder of all phases before its start. More precise usage of the check list in relevant phase ensures successful enforcement of analysis, design, coding and testing standards for reducing errors in operation stage. Moreover authors represent the step by step integration of checklists in software development life cycle through RCM model.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 19:06:50 GMT" } ]
2009-09-04T00:00:00
[ [ "Hussain", "Shahid", "" ], [ "Asghar", "Muhammad Zubair", "" ], [ "Ahmad", "Bashir", "" ], [ "Ahmad", "Shakeel", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.0736
Olivier Finkel
Olivier Finkel (ELM), Dominique Lecomte (IMJ)
Decision Problems For Turing Machines
To appear in Information Processing Letters
Information Processing Letters 109, 23-24 (2009) 1223-1226
null
null
cs.LO cs.CC math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We answer two questions posed by Castro and Cucker, giving the exact complexities of two decision problems about cardinalities of omega-languages of Turing machines. Firstly, it is $D_2(\Sigma_1^1)$-complete to determine whether the omega-language of a given Turing machine is countably infinite, where $D_2(\Sigma_1^1)$ is the class of 2-differences of $\Sigma_1^1$-sets. Secondly, it is $\Sigma_1^1$-complete to determine whether the omega-language of a given Turing machine is uncountable.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 19:19:48 GMT" } ]
2009-11-05T00:00:00
[ [ "Finkel", "Olivier", "", "ELM" ], [ "Lecomte", "Dominique", "", "IMJ" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0909.0737
Irmtraud Meyer
Tin Yin Lam and Irmtraud M. Meyer
Efficient algorithms for training the parameters of hidden Markov models using stochastic expectation maximization EM training and Viterbi training
32 pages including 9 figures and 2 tables
BMC Algorithms for Molecular Biology (2010) 5:38
null
null
q-bio.QM cs.LG q-bio.GN
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background: Hidden Markov models are widely employed by numerous bioinformatics programs used today. Applications range widely from comparative gene prediction to time-series analyses of micro-array data. The parameters of the underlying models need to be adjusted for specific data sets, for example the genome of a particular species, in order to maximize the prediction accuracy. Computationally efficient algorithms for parameter training are thus key to maximizing the usability of a wide range of bioinformatics applications. Results: We introduce two computationally efficient training algorithms, one for Viterbi training and one for stochastic expectation maximization (EM) training, which render the memory requirements independent of the sequence length. Unlike the existing algorithms for Viterbi and stochastic EM training which require a two-step procedure, our two new algorithms require only one step and scan the input sequence in only one direction. We also implement these two new algorithms and the already published linear-memory algorithm for EM training into the hidden Markov model compiler HMM-Converter and examine their respective practical merits for three small example models. Conclusions: Bioinformatics applications employing hidden Markov models can use the two algorithms in order to make Viterbi training and stochastic EM training more computationally efficient. Using these algorithms, parameter training can thus be attempted for more complex models and longer training sequences. The two new algorithms have the added advantage of being easier to implement than the corresponding default algorithms for Viterbi training and stochastic EM training.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 19:29:56 GMT" }, { "version": "v2", "created": "Tue, 16 Oct 2012 21:57:24 GMT" } ]
2012-10-18T00:00:00
[ [ "Lam", "Tin Yin", "" ], [ "Meyer", "Irmtraud M.", "" ] ]
[ { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" } ]
0909.0760
Antonio Marques
Antonio G. Marques, Georgios B. Giannakis, Javier Ramos
Optimizing Orthogonal Multiple Access based on Quantized Channel State Information
30 pages, 6 figures, 2 tables
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The performance of systems where multiple users communicate over wireless fading links benefits from channel-adaptive allocation of the available resources. Different from most existing approaches that allocate resources based on perfect channel state information, this work optimizes channel scheduling along with per user rate and power loadings over orthogonal fading channels, when both terminals and scheduler rely on quantized channel state information. Channel-adaptive policies are designed to optimize an average transmit-performance criterion subject to average quality of service requirements. While the resultant optimal policy per fading realization shows that the individual rate and power loadings can be obtained separately for each user, the optimal scheduling is slightly more complicated. Specifically, per fading realization each channel is allocated either to a single (winner) user, or, to a small group of winner users whose percentage of shared resources is found by solving a linear program. A single scheduling scheme combining both alternatives becomes possible by smoothing the original disjoint scheme. The smooth scheduling is asymptotically optimal and incurs reduced computational complexity. Different alternatives to obtain the Lagrange multipliers required to implement the channel-adaptive policies are proposed, including stochastic iterations that are provably convergent and do not require knowledge of the channel distribution. The development of the optimal channel-adaptive allocation is complemented with discussions on the overhead required to implement the novel policies.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 20:54:43 GMT" } ]
2009-09-07T00:00:00
[ [ "Marques", "Antonio G.", "" ], [ "Giannakis", "Georgios B.", "" ], [ "Ramos", "Javier", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0763
Lei Ying
Lei Ying, R. Srikant and Srinivas Shakkottai
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks
null
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The growth of real-time content streaming over the Internet has resulted in the use of peer-to-peer (P2P) approaches for scalable content delivery. In such P2P streaming systems, each peer maintains a playout buffer of content chunks which it attempts to fill by contacting other peers in the network. The objective is to ensure that the chunk to be played out is available with high probability while keeping the buffer size small. Given that a particular peer has been selected, a \emph{policy} is a rule that suggests which chunks should be requested by the peer from other peers.. We consider consider a number of recently suggested policies consistent with buffer minimization for a given target of skip free playout. We first study a \emph{rarest-first} policy that attempts to obtain chunks farthest from playout, and a \emph{greedy} policy that attempts to obtain chunks nearest to playout. We show that they both have similar buffer scalings (as a function of the number of peers of target probability of skip-free probability). We then study a hybrid policy which achieves order sense improvements over both policies and can achieve order optimal performance. We validate our results using simulations.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 21:11:46 GMT" } ]
2009-09-07T00:00:00
[ [ "Ying", "Lei", "" ], [ "Srikant", "R.", "" ], [ "Shakkottai", "Srinivas", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.0764
Serguei Mokhov
Aihua Wu, Joey Paquet, and Serguei A. Mokhov
Object-Oriented Intensional Programming: Intensional Classes Using Java and Lucid
27 pages, 8 listings, 2 tables, 5 figures
null
10.1109/SERA.2010.29
null
cs.PL cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article introduces Object-Oriented Intensional Programming (OO-IP), a new hybrid language between Object-Oriented and Intensional Programming Languages in the sense of the latest evolutions of Lucid. This new hybrid language combines the essential characteristics of Lucid and Java, and introduces the notion of object streams which makes it is possible that each element in a Lucid stream to be an object with embedded intensional properties. Interestingly, this hybrid language also brings to Java objects the power to explicitly express and manipulate the notion of context, creating the novel concept of intensional object, i.e. objects whose evaluation is context-dependent, which are here demonstrated to be translatable into standard objects. By this new approach, we extend the use and meaning of the notion of intensional objects and enrich the meaning of object streams in Lucid and semantics of intensional objects in Java.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 21:13:44 GMT" } ]
2010-07-09T00:00:00
[ [ "Wu", "Aihua", "" ], [ "Paquet", "Joey", "" ], [ "Mokhov", "Serguei A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.0777
Arian Maleki
Arian Maleki, David L. Donoho
Optimally Tuned Iterative Reconstruction Algorithms for Compressed Sensing
12 pages, 14 figures
null
10.1109/JSTSP.2009.2039176
null
cs.NA cs.IT cs.MS math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We conducted an extensive computational experiment, lasting multiple CPU-years, to optimally select parameters for two important classes of algorithms for finding sparse solutions of underdetermined systems of linear equations. We make the optimally tuned implementations available at {\tt sparselab.stanford.edu}; they run `out of the box' with no user tuning: it is not necessary to select thresholds or know the likely degree of sparsity. Our class of algorithms includes iterative hard and soft thresholding with or without relaxation, as well as CoSaMP, subspace pursuit and some natural extensions. As a result, our optimally tuned algorithms dominate such proposals. Our notion of optimality is defined in terms of phase transitions, i.e. we maximize the number of nonzeros at which the algorithm can successfully operate. We show that the phase transition is a well-defined quantity with our suite of random underdetermined linear systems. Our tuning gives the highest transition possible within each class of algorithms.
[ { "version": "v1", "created": "Thu, 3 Sep 2009 22:26:32 GMT" } ]
2015-05-14T00:00:00
[ [ "Maleki", "Arian", "" ], [ "Donoho", "David L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0801
Marcus Hutter
Joel Veness and Kee Siong Ng and Marcus Hutter and William Uther and David Silver
A Monte Carlo AIXI Approximation
51 LaTeX pages, 11 figures, 6 tables, 4 algorithms
null
null
null
cs.AI cs.IT cs.LG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a principled approach for the design of a scalable general reinforcement learning agent. Our approach is based on a direct approximation of AIXI, a Bayesian optimality notion for general reinforcement learning agents. Previously, it has been unclear whether the theory of AIXI could motivate the design of practical algorithms. We answer this hitherto open question in the affirmative, by providing the first computationally feasible approximation to the AIXI agent. To develop our approximation, we introduce a new Monte-Carlo Tree Search algorithm along with an agent-specific extension to the Context Tree Weighting algorithm. Empirically, we present a set of encouraging results on a variety of stochastic and partially observable domains. We conclude by proposing a number of directions for future research.
[ { "version": "v1", "created": "Fri, 4 Sep 2009 03:13:58 GMT" }, { "version": "v2", "created": "Sun, 26 Dec 2010 11:01:10 GMT" } ]
2010-12-30T00:00:00
[ [ "Veness", "Joel", "" ], [ "Ng", "Kee Siong", "" ], [ "Hutter", "Marcus", "" ], [ "Uther", "William", "" ], [ "Silver", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0809
Dae San Kim
Dae San Kim
An Infinite Family of Recursive Formulas Generating Power Moments of Kloosterman Sums with Trace One Arguments: O(2n+1,2^r) Case
14 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct an infinite family of binary linear codes associated with double cosets with respect to certain maximal parabolic subgroup of the orthogonal group O(2n+1,q). Here q is a power of two. Then we obtain an infinite family of recursive formulas generating the odd power moments of Kloosterman sums with trace one arguments in terms of the frequencies of weights in the codes associated with those double cosets in O(2n+1,q) and in the codes associated with similar double cosets in the symplectic group Sp(2n,q). This is done via Pless power moment identity and by utilizing the explicit expressions of exponential sums over those double cosets related to the evaluations of "Gauss sums" for the orthogonal group O(2n+1,q).
[ { "version": "v1", "created": "Fri, 4 Sep 2009 04:56:31 GMT" } ]
2009-09-07T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0811
Dae San Kim
Dae San Kim
Ternary Codes Associated with O^-(2n,q) and Power Moments of Kloosterman Sums with Square Arguments
16 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct three ternary linear codes associated with the orthogonal group O^-(2,q) and the special orthogonal groups SO^-(2,q) and SO^-(4,q). Here q is a power of three. Then we obtain recursive formulas for the power moments of Kloosterman sums with square arguments and for the even power moments of those in terms of the frequencies of weights in the codes. This is done via Pless power moment identity and by utilizing the explicit expressions of "Gauss sums" for the orthogonal and special orthogonal groups O^-(2n,q) and SO^-(2n,q).
[ { "version": "v1", "created": "Fri, 4 Sep 2009 05:18:10 GMT" } ]
2009-09-07T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.0814
Otfried Cheong
Binay Bhattacharya, Arijit Bishnu, Otfried Cheong, Sandip Das, Arindam Karmakar and Jack Snoeyink
Computation of Spatial Skyline Points
null
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We discuss a method of finding skyline or non-dominated sites in a set $P$ of $n$ point sites with respect to a set $S$ of $m$ points. A site $p \in P$ is non-dominated if and only if for each $q \in P \setminus \{p\}$, there exists at least one point $s \in S$ that is closer to $p$ than to $q$. We reduce this problem of determining non-dominated sites to the problem of finding sites that have non-empty cells in an additively weighted Voronoi diagram under a convex distance function. The weights of said Voronoi diagram are derived from the coordinates of the sites of $P$, while the convex distance function is derived from $S$. In the two-dimensional plane, this reduction gives an $O((n + m) \log (n + m))$-time algorithm to find the non-dominated points.
[ { "version": "v1", "created": "Fri, 4 Sep 2009 05:31:53 GMT" }, { "version": "v2", "created": "Mon, 16 Dec 2019 12:31:38 GMT" } ]
2019-12-17T00:00:00
[ [ "Bhattacharya", "Binay", "" ], [ "Bishnu", "Arijit", "" ], [ "Cheong", "Otfried", "" ], [ "Das", "Sandip", "" ], [ "Karmakar", "Arindam", "" ], [ "Snoeyink", "Jack", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.0844
Francis Bach
Francis Bach (INRIA Rocquencourt)
High-Dimensional Non-Linear Variable Selection through Hierarchical Kernel Learning
null
null
null
null
cs.LG math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of high-dimensional non-linear variable selection for supervised learning. Our approach is based on performing linear selection among exponentially many appropriately defined positive definite kernels that characterize non-linear interactions between the original variables. To select efficiently from these many kernels, we use the natural hierarchical structure of the problem to extend the multiple kernel learning framework to kernels that can be embedded in a directed acyclic graph; we show that it is then possible to perform kernel selection through a graph-adapted sparsity-inducing norm, in polynomial time in the number of selected kernels. Moreover, we study the consistency of variable selection in high-dimensional settings, showing that under certain assumptions, our regularization framework allows a number of irrelevant variables which is exponential in the number of observations. Our simulations on synthetic datasets and datasets from the UCI repository show state-of-the-art predictive performance for non-linear regression problems.
[ { "version": "v1", "created": "Fri, 4 Sep 2009 09:43:38 GMT" } ]
2009-09-08T00:00:00
[ [ "Bach", "Francis", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0909.0884
Carlo Alberto Furia
Carlo A. Furia and Bertrand Meyer
Inferring Loop Invariants using Postconditions
Slightly revised version
Fields of Logic and Computation: Essays Dedicated to Yuri Gurevich on the Occasion of His 70th Birthday. Lecture Notes in Computer Science, 6300:277--300, Springer, August 2010
10.1007/978-3-642-15025-8_15
null
cs.SE cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the obstacles in automatic program proving is to obtain suitable loop invariants. The invariant of a loop is a weakened form of its postcondition (the loop's goal, also known as its contract); the present work takes advantage of this observation by using the postcondition as the basis for invariant inference, using various heuristics such as "uncoupling" which prove useful in many important algorithms. Thanks to these heuristics, the technique is able to infer invariants for a large variety of loop examples. We present the theory behind the technique, its implementation (freely available for download and currently relying on Microsoft Research's Boogie tool), and the results obtained.
[ { "version": "v1", "created": "Fri, 4 Sep 2009 16:13:47 GMT" }, { "version": "v2", "created": "Fri, 5 Feb 2010 13:38:24 GMT" } ]
2013-08-14T00:00:00
[ [ "Furia", "Carlo A.", "" ], [ "Meyer", "Bertrand", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.0892
Brendan Lucier
Brendan Lucier (1) and Allan Borodin (1) ((1) University of Toronto)
Price of Anarchy for Greedy Auctions
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider auctions in which greedy algorithms, paired with first-price or critical-price payment rules, are used to resolve multi-parameter combinatorial allocation problems. We study the price of anarchy for social welfare in such auctions. We show for a variety of equilibrium concepts, including Bayes-Nash equilibrium and correlated equilibrium, the resulting price of anarchy bound is close to the approximation factor of the underlying greedy algorithm.
[ { "version": "v1", "created": "Fri, 4 Sep 2009 13:39:25 GMT" }, { "version": "v2", "created": "Sun, 30 Nov 2014 16:21:30 GMT" } ]
2014-12-02T00:00:00
[ [ "Lucier", "Brendan", "", "University of Toronto" ], [ "Borodin", "Allan", "", "University of Toronto" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.0901
Eugen Staab
Eugen Staab and Martin Caminada
Assessing the Impact of Informedness on a Consultant's Profit
20 pages, 42 figures, Technical Report, University of Luxembourg
null
null
ISBN 978-2-87971-027-3
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the notion of informedness in a client-consultant setting. Using a software simulator, we examine the extent to which it pays off for consultants to provide their clients with advice that is well-informed, or with advice that is merely meant to appear to be well-informed. The latter strategy is beneficial in that it costs less resources to keep up-to-date, but carries the risk of a decreased reputation if the clients discover the low level of informedness of the consultant. Our experimental results indicate that under different circumstances, different strategies yield the optimal results (net profit) for the consultants.
[ { "version": "v1", "created": "Fri, 4 Sep 2009 15:31:37 GMT" } ]
2009-09-07T00:00:00
[ [ "Staab", "Eugen", "" ], [ "Caminada", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.0941
Nicholas Harvey
Michel X. Goemans, Nicholas J. A. Harvey, Kamal Jain, Mohit Singh
A Randomized Rounding Algorithm for the Asymmetric Traveling Salesman Problem
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an algorithm for the asymmetric traveling salesman problem on instances which satisfy the triangle inequality. Like several existing algorithms, it achieves approximation ratio O(log n). Unlike previous algorithms, it uses randomized rounding.
[ { "version": "v1", "created": "Fri, 4 Sep 2009 19:49:22 GMT" } ]
2009-09-07T00:00:00
[ [ "Goemans", "Michel X.", "" ], [ "Harvey", "Nicholas J. A.", "" ], [ "Jain", "Kamal", "" ], [ "Singh", "Mohit", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.0996
Ravi Teja Sukhavasi
Ravi Teja Sukhavasi, Babak Hassibi
The Kalman Like Particle Filter : Optimal Estimation With Quantized Innovations/Measurements
null
null
null
null
cs.IT math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of optimal estimation and control of linear systems using quantized measurements, with a focus on applications over sensor networks. We show that the state conditioned on a causal quantization of the measurements can be expressed as the sum of a Gaussian random vector and a certain truncated Gaussian vector. This structure bears close resemblance to the full information Kalman filter and so allows us to effectively combine the Kalman structure with a particle filter to recursively compute the state estimate. We call the resulting filter the Kalman like particle filter (KLPF) and observe that it delivers close to optimal performance using far fewer particles than that of a particle filter directly applied to the original problem. We show that the conditional state density follows a, so called, generalized closed skew-normal (GCSN) distribution. We further show that for such systems the classical separation property between control and estimation holds and that the certainty equivalent control law is LQG optimal.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 04:22:42 GMT" }, { "version": "v2", "created": "Wed, 5 Jan 2011 07:32:45 GMT" } ]
2015-03-13T00:00:00
[ [ "Sukhavasi", "Ravi Teja", "" ], [ "Hassibi", "Babak", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0909.1011
Vaneet Aggarwal
Vaneet Aggarwal and Ashutosh Sabharwal
Bits About the Channel: Multi-round Protocols for Two-way Fading Channels
Submitted to IEEE Transactions on Information Theory
IEEE Transactions on Information Theory, vol.57, no.6, pp.3352,3370, June 2011
10.1109/TIT.2011.2137090
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Most communication systems use some form of feedback, often related to channel state information. In this paper, we study diversity multiplexing tradeoff for both FDD and TDD systems, when both receiver and transmitter knowledge about the channel is noisy and potentially mismatched. For FDD systems, we first extend the achievable tradeoff region for 1.5 rounds of message passing to get higher diversity compared to the best known scheme, in the regime of higher multiplexing gains. We then break the mold of all current channel state based protocols by using multiple rounds of conferencing to extract more bits about the actual channel. This iterative refinement of the channel increases the diversity order with every round of communication. The protocols are on-demand in nature, using high powers for training and feedback only when the channel is in poor states. The key result is that the diversity multiplexing tradeoff with perfect training and K levels of perfect feedback can be achieved, even when there are errors in training the receiver and errors in the feedback link, with a multi-round protocol which has K rounds of training and K-1 rounds of binary feedback. The above result can be viewed as a generalization of Zheng and Tse, and Aggarwal and Sabharwal, where the result was shown to hold for K=1 and K=2 respectively. For TDD systems, we also develop new achievable strategies with multiple rounds of communication between the transmitter and the receiver, which use the reciprocity of the forward and the feedback channel. The multi-round TDD protocol achieves a diversity-multiplexing tradeoff which uniformly dominates its FDD counterparts, where no channel reciprocity is available.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 09:35:25 GMT" } ]
2014-07-15T00:00:00
[ [ "Aggarwal", "Vaneet", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1021
Pierrick Tranouez
Pierrick Tranouez (LITIS), Patrice Langlois (IDEES), Eric Daud\'e (IDEES)
A multiagent urban traffic simulation Part I: dealing with the ordinary
null
ICCSA 2009, France (2009)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe in this article a multiagent urban traffic simulation, as we believe individual-based modeling is necessary to encompass the complex influence the actions of an individual vehicle can have on the overall flow of vehicles. We first describe how we build a graph description of the network from purely geometric data, ESRI shapefiles. We then explain how we include traffic related data to this graph. We go on after that with the model of the vehicle agents: origin and destination, driving behavior, multiple lanes, crossroads, and interactions with the other vehicles in day-to-day, ?ordinary? traffic. We conclude with the presentation of the resulting simulation of this model on the Rouen agglomeration.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 12:20:17 GMT" } ]
2009-09-08T00:00:00
[ [ "Tranouez", "Pierrick", "", "LITIS" ], [ "Langlois", "Patrice", "", "IDEES" ], [ "Daudé", "Eric", "", "IDEES" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.1030
Amir Ben-Amram
Amir M. Ben-Amram
The Euler Path to Static Level-Ancestors
11 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Suppose that a rooted tree T is given for preprocessing. The Level-Ancestor Problem is to answer quickly queries of the following form. Given a vertex v and an integer i > 0, find the i-th vertex on the path from the root to v. Algorithms that achieve a linear time bound for preprocessing and a constant time bound for a query have been published by Dietz (1991), Alstrup and Holm (2000), and Bender and Farach (2002). The first two algorithms address dynamic versions of the problem; the last addresses the static version only and is the simplest so far. The purpose of this note is to expose another simple algorithm, derived from a complicated PRAM algorithm by Berkman and Vishkin (1990,1994). We further show some easy extensions of its functionality, adding queries for descendants and level successors as well as ancestors, extensions for which the formerly known algorithms are less suitable.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 14:15:29 GMT" } ]
2009-09-08T00:00:00
[ [ "Ben-Amram", "Amir M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1037
Michael Goodrich
Michael T. Goodrich
Randomized Shellsort: A Simple Oblivious Sorting Algorithm
Version of paper accepted to 2010 ACM-SIAM Symposium on Discrete Algorithms (SODA)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we describe randomized Shellsort--a simple, randomized, data-oblivious version of the Shellsort algorithm that always runs in O(n log n) time and, as we show, succeeds in sorting any given input permutation with very high probability. Thus, randomized Shellsort is simultaneously simple, time-optimal, and data-oblivious. Taken together, these properties imply applications in the design of new efficient privacy-preserving computations based on the secure multi-party computation (SMC) paradigm. In addition, by a trivial conversion of this Monte Carlo algorithm to its Las Vegas equivalent, one gets the first version of Shellsort with a running time that is provably O(n log n) with very high probability.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 15:40:42 GMT" }, { "version": "v2", "created": "Tue, 8 Sep 2009 00:37:15 GMT" }, { "version": "v3", "created": "Wed, 4 Aug 2010 18:16:47 GMT" } ]
2015-03-13T00:00:00
[ [ "Goodrich", "Michael T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1045
R Doomun
Alexei Barbosa de Aguiar, Placido Rogerio Pinheiro, Alvaro de Menezes S. Neto, Ruddy P. P. Cunha, Rebecca F. Pinheiro
A Novel Model for Optimized GSM Network Design
6 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSn 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
GSM networks are very expensive. The network design process requires too many decisions in a combinatorial explosion. For this reason, the larger is the network, the harder is to achieve a totally human based optimized solution. The BSC (Base Station Control) nodes have to be geographically well allocated to reduce the transmission costs. There are decisions of association between BTS and BSC those impacts in the correct dimensioning of these BSC. The choice of BSC quantity and model capable of carrying the cumulated traffic of its affiliated BTS nodes in turn reflects on the total cost. In addition, the last component of the total cost is due to transmission for linking BSC nodes to MSC. These trunks have a major significance since the number of required E1 lines is larger than BTS to BSC link. This work presents an integer programming model and a computational tool for designing GSM (Global System for Mobile Communications) networks, regarding BSS (Base Station Subsystem) with optimized cost.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 18:20:22 GMT" } ]
2009-09-08T00:00:00
[ [ "de Aguiar", "Alexei Barbosa", "" ], [ "Pinheiro", "Placido Rogerio", "" ], [ "Neto", "Alvaro de Menezes S.", "" ], [ "Cunha", "Ruddy P. P.", "" ], [ "Pinheiro", "Rebecca F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1049
R Doomun
M. N. Doja, and Dharmender Saini
Electronic Authority Variation
5 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When a person joins in an organization, he becomes authorize to take some decisions on behalf of that organization; means he is given some authority to exercise. After some time, on the basis of his performance in the organization, he is given promotion and he becomes eligible to exercise to some higher authorities. And further, he may get some higher promotion or he may leave the organization. So, during his stay in the organization, the authority of that person varies from the time he joins the organization until he/she leaves the organization. This paper presents the variation in authorities of a person in the organization. The method implements the queuing model to analyze the various people in the queue of their promotion and looks at various parameters like average waiting time etc.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 19:15:58 GMT" } ]
2009-09-08T00:00:00
[ [ "Doja", "M. N.", "" ], [ "Saini", "Dharmender", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.1051
Gleb Oshanin
G. Kabatiansky (1,2), G.Oshanin (2,3) ((1) Dobrushin Mathematical Laboratory, Institute of Information Transmission Problems, Moscow, Russia, (2) Laboratory J.-V. Poncelet, Independent University of Moscow, Russia, (3) LPTMC, University Pierre & Marie Curie, Paris, France)
Finding passwords by random walks: How long does it take?
To appear in J. Phys. A, special issue on "Random Search Problem: Trends and Perspectives", eds.: MEG da Luz, E Raposo, GM Viswanathan and A Grosberg
J. Phys. A 42 No 43, 434016 (2009)
10.1088/1751-8113/42/43/434016
null
cs.CR cond-mat.other cs.DS math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We compare an efficiency of a deterministic "lawnmower" and random search strategies for finding a prescribed sequence of letters (a password) of length M in which all letters are taken from the same Q-ary alphabet. We show that at best a random search takes two times longer than a "lawnmower" search.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 19:25:35 GMT" } ]
2015-05-14T00:00:00
[ [ "Kabatiansky", "G.", "" ], [ "Oshanin", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0909.1062
Ankan Saha
Ankan Saha (1), S.V.N. Vishwanathan (2), Xinhua Zhang (3) ((1) University of Chicago, (2) Purdue University, (3) University of Alberta)
New Approximation Algorithms for Minimum Enclosing Convex Shapes
18 Pages Accepted in SODA 2011
null
null
null
cs.CG cs.DS cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given $n$ points in a $d$ dimensional Euclidean space, the Minimum Enclosing Ball (MEB) problem is to find the ball with the smallest radius which contains all $n$ points. We give a $O(nd\Qcal/\sqrt{\epsilon})$ approximation algorithm for producing an enclosing ball whose radius is at most $\epsilon$ away from the optimum (where $\Qcal$ is an upper bound on the norm of the points). This improves existing results using \emph{coresets}, which yield a $O(nd/\epsilon)$ greedy algorithm. Finding the Minimum Enclosing Convex Polytope (MECP) is a related problem wherein a convex polytope of a fixed shape is given and the aim is to find the smallest magnification of the polytope which encloses the given points. For this problem we present a $O(mnd\Qcal/\epsilon)$ approximation algorithm, where $m$ is the number of faces of the polytope. Our algorithms borrow heavily from convex duality and recently developed techniques in non-smooth optimization, and are in contrast with existing methods which rely on geometric arguments. In particular, we specialize the excessive gap framework of \citet{Nesterov05a} to obtain our results.
[ { "version": "v1", "created": "Sat, 5 Sep 2009 23:24:32 GMT" }, { "version": "v2", "created": "Thu, 10 Sep 2009 16:01:53 GMT" }, { "version": "v3", "created": "Mon, 21 Dec 2009 14:30:54 GMT" }, { "version": "v4", "created": "Wed, 15 Sep 2010 00:54:09 GMT" } ]
2010-09-16T00:00:00
[ [ "Saha", "Ankan", "" ], [ "Vishwanathan", "S. V. N.", "" ], [ "Zhang", "Xinhua", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0909.1072
Michal Feldman
Edith Cohen and Michal Feldman and Amos Fiat and Haim Kaplan and Svetlana Olonetsky
Envy-Free Makespan Approximation
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study envy-free mechanisms for scheduling tasks on unrelated machines (agents) that approximately minimize the makespan. For indivisible tasks, we put forward an envy-free poly-time mechanism that approximates the minimal makespan to within a factor of $O(\log m)$, where $m$ is the number of machines. We also show a lower bound of $\Omega(\log m / \log\log m)$. This improves the recent result of Hartline {\sl et al.} \cite{Ahuva:2008} who give an upper bound of $(m+1)/2$, and a lower bound of $2-1/m$. For divisible tasks, we show that there always exists an envy-free poly-time mechanism with optimal makespan.
[ { "version": "v1", "created": "Sun, 6 Sep 2009 09:19:59 GMT" } ]
2009-09-08T00:00:00
[ [ "Cohen", "Edith", "" ], [ "Feldman", "Michal", "" ], [ "Fiat", "Amos", "" ], [ "Kaplan", "Haim", "" ], [ "Olonetsky", "Svetlana", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.1102
Stefan G\"oller
Stefan G\"oller, Markus Lohrey
Branching-time model checking of one-counter processes
null
null
null
null
cs.LO cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One-counter processes (OCPs) are pushdown processes which operate only on a unary stack alphabet. We study the computational complexity of model checking computation tree logic (CTL) over OCPs. A PSPACE upper bound is inherited from the modal mu-calculus for this problem. First, we analyze the periodic behaviour of CTL over OCPs and derive a model checking algorithm whose running time is exponential only in the number of control locations and a syntactic notion of the formula that we call leftward until depth. Thus, model checking fixed OCPs against CTL formulas with a fixed leftward until depth is in P. This generalizes a result of the first author, Mayr, and To for the expression complexity of CTL's fragment EF. Second, we prove that already over some fixed OCP, CTL model checking is PSPACE-hard. Third, we show that there already exists a fixed CTL formula for which model checking of OCPs is PSPACE-hard. To obtain the latter result, we employ two results from complexity theory: (i) Converting a natural number in Chinese remainder presentation into binary presentation is in logspace-uniform NC^1 and (ii) PSPACE is AC^0-serializable. We demonstrate that our approach can be used to obtain further results. We show that model-checking CTL's fragment EF over OCPs is hard for P^NP, thus establishing a matching lower bound and answering an open question of the first author, Mayr, and To. We moreover show that the following problem is hard for PSPACE: Given a one-counter Markov decision process, a set of target states with counter value zero each, and an initial state, to decide whether the probability that the initial state will eventually reach one of the target states is arbitrarily close to 1. This improves a previously known lower bound for every level of the Boolean hierarchy by Brazdil et al.
[ { "version": "v1", "created": "Sun, 6 Sep 2009 19:12:25 GMT" } ]
2009-09-08T00:00:00
[ [ "Göller", "Stefan", "" ], [ "Lohrey", "Markus", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.1115
Yan Zhu
Yan Zhu and Dongning Guo
Capacity Region of Layered Erasure One-sided Interference Channels without CSIT
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies a layered erasure interference channel model, which is a simplification of the Gaussian interference channel with fading using the deterministic model approach. In particular, the capacity region of the layered erasure one-sided interference channel is completely determined, assuming that the channel state information (CSI) is known to the receivers, but there is no CSI at transmitters (CSIT). The result holds for arbitrary fading statistics. Previous results of Aggarwal, Sankar, Calderbank and Poor on the capacity region or sum capacity under several interference configurations are shown to be special cases of the capacity region shown in this paper.
[ { "version": "v1", "created": "Sun, 6 Sep 2009 21:37:21 GMT" } ]
2009-09-08T00:00:00
[ [ "Zhu", "Yan", "" ], [ "Guo", "Dongning", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1127
Raymond Chi-Wing Wong
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu
Anonymization with Worst-Case Distribution-Based Background Knowledge
null
null
null
null
cs.DB cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Background knowledge is an important factor in privacy preserving data publishing. Distribution-based background knowledge is one of the well studied background knowledge. However, to the best of our knowledge, there is no existing work considering the distribution-based background knowledge in the worst case scenario, by which we mean that the adversary has accurate knowledge about the distribution of sensitive values according to some tuple attributes. Considering this worst case scenario is essential because we cannot overlook any breaching possibility. In this paper, we propose an algorithm to anonymize dataset in order to protect individual privacy by considering this background knowledge. We prove that the anonymized datasets generated by our proposed algorithm protects individual privacy. Our empirical studies show that our method preserves high utility for the published data at the same time.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 01:44:36 GMT" } ]
2009-09-08T00:00:00
[ [ "Wong", "Raymond Chi-Wing", "" ], [ "Fu", "Ada Wai-Chee", "" ], [ "Wang", "Ke", "" ], [ "Xu", "Yabo", "" ], [ "Pei", "Jian", "" ], [ "Yu", "Philip S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.1138
Richard Diamond
Richard V. Diamond
User Experience, Software Interfaces, and The Unconscious
Under Review
null
null
null
cs.HC
http://creativecommons.org/licenses/by-nc-sa/3.0/
Ideas about how to increase the unconscious participation in interaction between 'a human' and 'a computer' are developed in this paper. Evidence of impact of the unconscious functioning is presented. The unconscious is characterised as being a responsive, contextual, and autonomous participant of human-computer interaction. The unconscious participation occurs independently of one's cognitive and educational levels and, if ignored, leads to learning inefficiencies and compulsive behaviours, illustrations of which are provided. Three practical approaches to a study of subjective user experience are outlined as follows: (a) tracing operant conditioning effects of software, (b) registering signs of brain activity psychological or information processing meaning of which is well-explored and (c) exploring submodality interfaces. Implications for improvement of current usability study methods, such as eye-tracking, are generally considered. Conclusions consider advantages and disadvantages of unconscious-embracing design and remind about a loss of human evolutionary choices if unconscious participation is ignored, complicated or blocked in interaction with computer interfaces and built environment.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 03:15:42 GMT" }, { "version": "v2", "created": "Wed, 9 Sep 2009 04:20:05 GMT" }, { "version": "v3", "created": "Mon, 2 Nov 2009 01:46:35 GMT" } ]
2009-11-02T00:00:00
[ [ "Diamond", "Richard V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.1145
R Doomun
Yi Yi Thaw, Ahmad Kamil Mahmood, P. Dhanapal Durai Dominic
A Study on the Factors That Influence the Consumers Trust on Ecommerce Adoption
7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The development of electronic commerce is characterized with anonymity, uncertainty, lack of control and potential opportunism. Therefore, the success of electronic commerce significantly depends on providing security and privacy for its consumers sensitive personal data. Consumers lack of acceptance in electronic commerce adoption today is not merely due to the concern on security and privacy of their personal data, but also lack of trust and reliability of Web vendors. Consumers trust in online transactions is crucial for the continuous growth and development of electronic commerce. Since Business to Consumer (B2C) ecommerce requires the consumers to engage the technologies, the consumers face a variety of security risks. This study addressed the role of security, privacy and risk perceptions of consumers to shop online in order to establish a consensus among them. The analyses provided descriptive frequencies for the research variables and for each of the study s research constructs. In addition, the analyses were completed with factor analysis and Pearson correlation coefficients. The findings suggested that perceived privacy of online transaction on trust is mediated by perceived security, and consumers trust in online transaction is significantly related with the trustworthiness of Web vendors. Also, consumers trust is negatively associated with perceived risks in online transactions. However, there is no significant impact from perceived security and perceived privacy to trust in online transactions.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 06:06:50 GMT" } ]
2009-09-08T00:00:00
[ [ "Thaw", "Yi Yi", "" ], [ "Mahmood", "Ahmad Kamil", "" ], [ "Dominic", "P. Dhanapal Durai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0909.1146
Saurabh Kumar Garg
Saurabh Kumar Garg, Chee Shin Yeo, Arun Anandasivam, Rajkumar Buyya
Energy-Efficient Scheduling of HPC Applications in Cloud Computing Environments
null
null
null
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The use of High Performance Computing (HPC) in commercial and consumer IT applications is becoming popular. They need the ability to gain rapid and scalable access to high-end computing capabilities. Cloud computing promises to deliver such a computing infrastructure using data centers so that HPC users can access applications and data from a Cloud anywhere in the world on demand and pay based on what they use. However, the growing demand drastically increases the energy consumption of data centers, which has become a critical issue. High energy consumption not only translates to high energy cost, which will reduce the profit margin of Cloud providers, but also high carbon emissions which is not environmentally sustainable. Hence, energy-efficient solutions are required that can address the high increase in the energy consumption from the perspective of not only Cloud provider but also from the environment. To address this issue we propose near-optimal scheduling policies that exploits heterogeneity across multiple data centers for a Cloud provider. We consider a number of energy efficiency factors such as energy cost, carbon emission rate, workload, and CPU power efficiency which changes across different data center depending on their location, architectural design, and management system. Our carbon/energy based scheduling policies are able to achieve on average up to 30% of energy savings in comparison to profit based scheduling policies leading to higher profit and less carbon emissions.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 06:13:40 GMT" } ]
2009-09-08T00:00:00
[ [ "Garg", "Saurabh Kumar", "" ], [ "Yeo", "Chee Shin", "" ], [ "Anandasivam", "Arun", "" ], [ "Buyya", "Rajkumar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.1147
Prabhulla Chandran Pillai
B Prabhulla Chandran Pillai
Empowering OLAC Extension using Anusaaraka and Effective text processing using Double Byte coding
5 Pages, 4 figures
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper reviews the hurdles while trying to implement the OLAC extension for Dravidian / Indian languages. The paper further explores the possibilities which could minimise or solve these problems. In this context, the Chinese system of text processing and the anusaaraka system are scrutinised.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 06:29:51 GMT" } ]
2009-09-08T00:00:00
[ [ "Pillai", "B Prabhulla Chandran", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.1151
Antoine Seilles
Jean Sallantin (LIRMM), Antoine Seilles (LIRMM)
n-Opposition theory to structure debates
null
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
2007 was the first international congress on the ?square of oppositions?. A first attempt to structure debate using n-opposition theory was presented along with the results of a first experiment on the web. Our proposal for this paper is to define relations between arguments through a structure of opposition (square of oppositions is one structure of opposition). We will be trying to answer the following questions: How to organize debates on the web 2.0? How to structure them in a logical way? What is the role of n-opposition theory, in this context? We present in this paper results of three experiments (Betapolitique 2007, ECAP 2008, Intermed 2008).
[ { "version": "v1", "created": "Mon, 7 Sep 2009 06:41:06 GMT" } ]
2009-09-08T00:00:00
[ [ "Sallantin", "Jean", "", "LIRMM" ], [ "Seilles", "Antoine", "", "LIRMM" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.1153
Dae San Kim
Dae San Kim
Recursive formulas generating power moments of multi-dimensional Kloosterman sums and $m$-multiple power moments of Kloosterman sums
14 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct two binary linear codes associated with multi-dimensional and $m -$multiple power Kloosterman sums (for any fixed $m$) over the finite field $\mathbb{F}_{q}$. Here $q$ is a power of two. The former codes are dual to a subcode of the binary hyper-Kloosterman code. Then we obtain two recursive formulas for the power moments of multi-dimensional Kloosterman sums and for the $m$-multiple power moments of Kloosterman sums in terms of the frequencies of weights in the respective codes. This is done via Pless power moment identity and yields, in the case of power moments of multi-dimensional Kloosterman sums, much simpler recursive formulas than those associated with finite special linear groups obtained previously.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 07:00:11 GMT" } ]
2009-09-08T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1156
Dae San Kim
Dae San Kim
Ternary Codes Associated with $O(3,3^r)$ and Power Moments of Kloosterman Sums with Trace Nonzero Square Arguments
15 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct two ternary linear codes $C(SO(3,q))$ and $C(O(3,q))$, respectively associated with the orthogonal groups $SO(3,q)$ and $O(3,q)$. Here $q$ is a power of three. Then we obtain two recursive formulas for the power moments of Kloosterman sums with $``$trace nonzero square arguments" in terms of the frequencies of weights in the codes. This is done via Pless power moment identity and by utilizing the explicit expressions of Gauss sums for the orthogonal groups.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 07:35:12 GMT" } ]
2009-09-08T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1175
Dae San Kim
Dae San Kim
Infinite Families of Recursive Formulas Generating Power Moments of Ternary Kloosterman Sums with Trace Nonzero Square Arguments: $O(2n+1,2^{r})$ Case
19 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct four infinite families of ternary linear codes associated with double cosets in $O(2n+1,q)$ with respect to certain maximal parabolic subgroup of the special orthogonal group $SO(2n+1,q)$. Here $q$ is a power of three. Then we obtain two infinite families of recursive formulas, the one generating the power moments of Kloosterman sums with $``$trace nonzero square arguments" and the other generating the even power moments of those. Both of these families are expressed in terms of the frequencies of weights in the codes associated with those double cosets in $O(2n+1,q)$ and in the codes associated with similar double cosets in the symplectic group $Sp(2n,q)$. This is done via Pless power moment identity and by utilizing the explicit expressions of exponential sums over those double cosets related to the evaluations of $"$Gauss sums" for the orthogonal group $O(2n+1,q)$.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 09:01:10 GMT" } ]
2009-09-08T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1178
Dae San Kim
Dae San Kim
Infinite Families of Recursive Formulas Generating Power Moments of Ternary Kloosterman Sums with Square Arguments Associated with $O^{-}_{}(2n,q)$
20 pages
null
null
null
math.NT cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we construct eight infinite families of ternary linear codes associated with double cosets with respect to certain maximal parabolic subgroup of the special orthogonal group $SO^{-}(2n,q)$. Here ${q}$ is a power of three. Then we obtain four infinite families of recursive formulas for power moments of Kloosterman sums with square arguments and four infinite families of recursive formulas for even power moments of those in terms of the frequencies of weights in the codes. This is done via Pless power moment identity and by utilizing the explicit expressions of exponential sums over those double cosets related to the evaluations of $"$Gauss sums" for the orthogonal groups $O^{-}(2n,q)$.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 09:10:01 GMT" } ]
2009-09-08T00:00:00
[ [ "Kim", "Dae San", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1186
Vyacheslav Yukalov
V.I. Yukalov and D. Sornette
Scheme of thinking quantum systems
Latex file, 15 pages, 1 figure
Laser Phys. Lett. 6 (2009) 833-839
10.1002/lapl.200910086
null
quant-ph cond-mat.quant-gas cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 09:32:00 GMT" } ]
2015-05-14T00:00:00
[ [ "Yukalov", "V. I.", "" ], [ "Sornette", "D.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Physics", "code": "cond-mat.quant-gas", "description": "Ultracold atomic and molecular gases, Bose-Einstein condensation, Feshbach resonances, spinor condensates, optical lattices, quantum simulation with cold atoms and molecules, macroscopic interference phenomena", "span": "(Quantum Gases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.1187
Marco Aldinucci
Marco Aldinucci, Massimo Torquati, Massimiliano Meneghin
FastFlow: Efficient Parallel Streaming Applications on Multi-core
23 pages + cover
null
null
TR-09-12
cs.DC cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Shared memory multiprocessors come back to popularity thanks to rapid spreading of commodity multi-core architectures. As ever, shared memory programs are fairly easy to write and quite hard to optimise; providing multi-core programmers with optimising tools and programming frameworks is a nowadays challenge. Few efforts have been done to support effective streaming applications on these architectures. In this paper we introduce FastFlow, a low-level programming framework based on lock-free queues explicitly designed to support high-level languages for streaming applications. We compare FastFlow with state-of-the-art programming frameworks such as Cilk, OpenMP, and Intel TBB. We experimentally demonstrate that FastFlow is always more efficient than all of them in a set of micro-benchmarks and on a real world application; the speedup edge of FastFlow over other solutions might be bold for fine grain tasks, as an example +35% on OpenMP, +226% on Cilk, +96% on TBB for the alignment of protein P01111 against UniProt DB using Smith-Waterman algorithm.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 09:33:57 GMT" } ]
2009-09-10T00:00:00
[ [ "Aldinucci", "Marco", "" ], [ "Torquati", "Massimo", "" ], [ "Meneghin", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0909.1198
Dag Normann
Dag Normann
A rich hierarchy of functionals of finite types
21 pages
Logical Methods in Computer Science, Volume 5, Issue 3 (September 24, 2009) lmcs:954
10.2168/LMCS-5(3:11)2009
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We are considering typed hierarchies of total, continuous functionals using complete, separable metric spaces at the base types. We pay special attention to the so called Urysohn space constructed by P. Urysohn. One of the properties of the Urysohn space is that every other separable metric space can be isometrically embedded into it. We discuss why the Urysohn space may be considered as the universal model of possibly infinitary outputs of algorithms. The main result is that all our typed hierarchies may be topologically embedded, type by type, into the corresponding hierarchy over the Urysohn space. As a preparation for this, we prove an effective density theorem that is also of independent interest.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 10:16:20 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2009 10:02:03 GMT" } ]
2015-07-01T00:00:00
[ [ "Normann", "Dag", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.1209
Doron Ezri
Oded Redlich, Doron Ezri and Dov Wulich
SNR Estimation in Maximum Likelihood Decoded Spatial Multiplexing
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Link adaptation is a crucial part of many modern communications systems, allowing the system to adapt the transmission and reception strategies to changes in channel conditions. One of the fundamental components of the link adaptation mechanism is signal to noise ratio (SNR) estimation, measuring the instantaneous (mostly post processing) SNR at the receiver. That is, the SNR at the decoder input, which is an important metric for the prediction of decoder performance. In linearly decoded MIMO, which is the common MIMO decoding strategy, the post processing SNR is well defined. However, this is not the case in optimal maximum likelihood (ML) decoding applied to spatial multiplexing (SM). This gap is interesting since ML decoded SM is gaining ever growing interest in recent research and practice due to the rapid increase in computation power, and available near optimal low complexity schemes. In this paper we close the gap and provide SNR estimation schemes for ML decoded SM, which are based on various approximations of the "per stream" error probability. The proposed methods are applicable for both horizonal and vertical decoding. Moreover, we propose a very low complexity implementation for the SNR estimation mechanism employing the ML decoder itself with negligible overhead.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 11:05:42 GMT" } ]
2009-09-08T00:00:00
[ [ "Redlich", "Oded", "" ], [ "Ezri", "Doron", "" ], [ "Wulich", "Dov", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1241
Virag Shah
Virag Shah, Neelesh B. Mehta, Raymond Yim
Optimal Timer Based Selection Schemes
21 pages, 6 figures, 1 table, submitted to IEEE Transactions on Communications, uses stackrel.sty
null
10.1109/TCOMM.2010.06.090266
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Timer-based mechanisms are often used to help a given (sink) node select the best helper node among many available nodes. Specifically, a node transmits a packet when its timer expires, and the timer value is a monotone non-increasing function of its local suitability metric. The best node is selected successfully if no other node's timer expires within a 'vulnerability' window after its timer expiry, and so long as the sink can hear the available nodes. In this paper, we show that the optimal metric-to-timer mapping that (i) maximizes the probability of success or (ii) minimizes the average selection time subject to a minimum constraint on the probability of success, maps the metric into a set of discrete timer values. We specify, in closed-form, the optimal scheme as a function of the maximum selection duration, the vulnerability window, and the number of nodes. An asymptotic characterization of the optimal scheme turns out to be elegant and insightful. For any probability distribution function of the metric, the optimal scheme is scalable, distributed, and performs much better than the popular inverse metric timer mapping. It even compares favorably with splitting-based selection, when the latter's feedback overhead is accounted for.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 16:13:39 GMT" } ]
2016-11-17T00:00:00
[ [ "Shah", "Virag", "" ], [ "Mehta", "Neelesh B.", "" ], [ "Yim", "Raymond", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1257
Jaap-Henk Hoepman
Jaap-Henk Hoepman, Rieks Joosten
Practical Schemes For Privacy & Security Enhanced RFID
18 pages
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key search time penalty at the reader. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios. In this paper we investigate such scenarios, and propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 14:32:01 GMT" }, { "version": "v2", "created": "Mon, 25 Jan 2010 14:44:41 GMT" }, { "version": "v3", "created": "Thu, 25 Feb 2010 14:13:52 GMT" } ]
2010-02-25T00:00:00
[ [ "Hoepman", "Jaap-Henk", "" ], [ "Joosten", "Rieks", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.1305
Christian Mercat
Alexander I. Bobenko (IM TU-B), Christian Mercat (LIRMM, I3M), Markus Schmies (IM TU-B)
Conformal Structures and Period Matrices of Polyhedral Surfaces
1--13
null
null
null
math.DG cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We recall the theory of linear discrete Riemann surfaces and show how to use it in order to interpret a surface embedded in R^3 as a discrete Riemann surface and compute its basis of holomorphic forms on it. We present numerical examples, recovering known results to test the numerics and giving the yet unknown period matrix of the Lawson genus-2 surface.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 18:46:03 GMT" } ]
2009-09-30T00:00:00
[ [ "Bobenko", "Alexander I.", "", "IM TU-B" ], [ "Mercat", "Christian", "", "LIRMM, I3M" ], [ "Schmies", "Markus", "", "IM TU-B" ] ]
[ { "class": "Mathematics", "code": "math.DG", "description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis", "span": "(Differential Geometry)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0909.1308
Olivier Cappe
Nataliya Sokolovska (LTCI), Thomas Lavergne (LIMSI), Olivier Capp\'e (LTCI), Fran\c{c}ois Yvon (LIMSI)
Efficient Learning of Sparse Conditional Random Fields for Supervised Sequence Labelling
null
null
10.1109/JSTSP.2010.2076150
null
cs.LG cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Conditional Random Fields (CRFs) constitute a popular and efficient approach for supervised sequence labelling. CRFs can cope with large description spaces and can integrate some form of structural dependency between labels. In this contribution, we address the issue of efficient feature selection for CRFs based on imposing sparsity through an L1 penalty. We first show how sparsity of the parameter set can be exploited to significantly speed up training and labelling. We then introduce coordinate descent parameter update schemes for CRFs with L1 regularization. We finally provide some empirical comparisons of the proposed approach with state-of-the-art CRF training strategies. In particular, it is shown that the proposed approach is able to take profit of the sparsity to speed up processing and hence potentially handle larger dimensional models.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 18:48:42 GMT" }, { "version": "v2", "created": "Sun, 3 Jan 2010 16:48:14 GMT" } ]
2015-05-14T00:00:00
[ [ "Sokolovska", "Nataliya", "", "LTCI" ], [ "Lavergne", "Thomas", "", "LIMSI" ], [ "Cappé", "Olivier", "", "LTCI" ], [ "Yvon", "François", "", "LIMSI" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.1310
Laura Rebollo-Neira
James Bowley and Laura Rebollo-Neira
Sparse image representation by discrete cosine/spline based dictionaries
null
null
null
null
math.NA cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mixed dictionaries generated by cosine and B-spline functions are considered. It is shown that, by highly nonlinear approaches such as Orthogonal Matching Pursuit, the discrete version of the proposed dictionaries yields a significant gain in the sparsity of an image representation.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 18:50:23 GMT" } ]
2009-09-08T00:00:00
[ [ "Bowley", "James", "" ], [ "Rebollo-Neira", "Laura", "" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0909.1315
Catalin Anghel Mr
Catalin Anghel
Base Selection and Transmission Synchronization Algorithm in Quantum Cryptography
4 pages, 1 figure, [12]. Proceedings CSCS17 - 17th International Conference on Control Systems and Computer Science, Romania, Bucharest, May 2009
null
null
null
cs.CR quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One Achilles heal of classical cryptographic communication systems is that secret communication can only take place after a key is communicated in secret over a totally secure communication channel. Here comes quantum key distribution which takes advantage of certain phenomena that occur at the subatomic level, so that any attempt by an enemy to obtain the bits in a key not only fails, but gets detected as well. This paper proposes the idea of on algorithm, intended to be a quantum network algorithm named Base Selection and Transmission Synchronization - BSTS, which can realize a perfectly secure communication between two computers.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 19:48:17 GMT" } ]
2009-09-24T00:00:00
[ [ "Anghel", "Catalin", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0909.1334
Ankan Saha
Ankan Saha (1), Xinhua Zhang (2), S.V.N. Vishwanathan (3) ((1) University of Chicago, (2) Australian National University, NICTA, (3) Purdue University)
Lower Bounds for BMRM and Faster Rates for Training SVMs
21 pages, 49 figures
null
null
null
cs.LG cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Regularized risk minimization with the binary hinge loss and its variants lies at the heart of many machine learning problems. Bundle methods for regularized risk minimization (BMRM) and the closely related SVMStruct are considered the best general purpose solvers to tackle this problem. It was recently shown that BMRM requires $O(1/\epsilon)$ iterations to converge to an $\epsilon$ accurate solution. In the first part of the paper we use the Hadamard matrix to construct a regularized risk minimization problem and show that these rates cannot be improved. We then show how one can exploit the structure of the objective function to devise an algorithm for the binary hinge loss which converges to an $\epsilon$ accurate solution in $O(1/\sqrt{\epsilon})$ iterations.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 20:58:47 GMT" }, { "version": "v2", "created": "Tue, 8 Sep 2009 22:00:12 GMT" } ]
2009-09-09T00:00:00
[ [ "Saha", "Ankan", "" ], [ "Zhang", "Xinhua", "" ], [ "Vishwanathan", "S. V. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1338
Keigo Hirakawa
Keigo Hirakawa and Patrick J. Wolfe
"Rewiring" Filterbanks for Local Fourier Analysis: Theory and Practice
null
IEEE Transactions on Information Theory, vol. 57, pp. 5360-5374, 2011
10.1109/TIT.2011.2158895
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article describes a series of new results outlining equivalences between certain "rewirings" of filterbank system block diagrams, and the corresponding actions of convolution, modulation, and downsampling operators. This gives rise to a general framework of reverse-order and convolution subband structures in filterbank transforms, which we show to be well suited to the analysis of filterbank coefficients arising from subsampled or multiplexed signals. These results thus provide a means to understand time-localized aliasing and modulation properties of such signals and their subband representations--notions that are notably absent from the global viewpoint afforded by Fourier analysis. The utility of filterbank rewirings is demonstrated by the closed-form analysis of signals subject to degradations such as missing data, spatially or temporally multiplexed data acquisition, or signal-dependent noise, such as are often encountered in practical signal processing applications.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 20:58:01 GMT" } ]
2012-10-15T00:00:00
[ [ "Hirakawa", "Keigo", "" ], [ "Wolfe", "Patrick J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1344
Hoon Huh
Hoon Huh, Haralabos C. Papadopoulos, and Giuseppe Caire
Multiuser MISO Transmitter Optimization for Inter-Cell Interference Mitigation
30 pages, 10 figures, and 1 table. revised and resubmitted to IEEE Transactions on Signal Processing
null
10.1109/TSP.2010.2048564
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The transmitter optimization (i.e., steering vectors and power allocation) for a MISO Broadcast Channel (MISO-BC) subject to general linear constraints is considered. Such constraints include, as special cases, the sum power, the per-antenna or per-group-of-antennas power, and "forbidden interference direction" constraints. We consider both the optimal dirty-paper coding and the simple suboptimal linear zero-forcing beamforming strategies, and provide numerically efficient algorithms that solve the problem in its most general form. As an application, we consider a multi-cell scenario with partial cell cooperation, where each cell optimizes its precoder by taking into account interference constraints on specific users in adjacent cells. The effectiveness of the proposed methods is evaluated in a simple system scenario including two adjacent cells, under different fairness criteria that emphasize the bottleneck role of users near the cell "boundary". Our results show that "active" Inter-Cell Interference (ICI) mitigation outperforms the conventional "static" ICI mitigation based on fractional frequency reuse.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 21:14:34 GMT" }, { "version": "v2", "created": "Tue, 2 Mar 2010 01:16:07 GMT" } ]
2015-05-14T00:00:00
[ [ "Huh", "Hoon", "" ], [ "Papadopoulos", "Haralabos C.", "" ], [ "Caire", "Giuseppe", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1346
Daniel Lemire
Daniel Lemire and Owen Kaser
Reordering Columns for Smaller Indexes
to appear in Information Sciences
Daniel Lemire and Owen Kaser, Reordering Columns for Smaller Indexes, Information Sciences 181 (12), 2011
10.1016/j.ins.2011.02.002
null
cs.DB
http://creativecommons.org/licenses/by-nc-sa/3.0/
Column-oriented indexes-such as projection or bitmap indexes-are compressed by run-length encoding to reduce storage and increase speed. Sorting the tables improves compression. On realistic data sets, permuting the columns in the right order before sorting can reduce the number of runs by a factor of two or more. Unfortunately, determining the best column order is NP-hard. For many cases, we prove that the number of runs in table columns is minimized if we sort columns by increasing cardinality. Experimentally, sorting based on Hilbert space-filling curves is poor at minimizing the number of runs.
[ { "version": "v1", "created": "Mon, 7 Sep 2009 21:34:52 GMT" }, { "version": "v2", "created": "Thu, 10 Sep 2009 03:38:20 GMT" }, { "version": "v3", "created": "Wed, 6 Jan 2010 01:28:29 GMT" }, { "version": "v4", "created": "Mon, 22 Mar 2010 19:04:11 GMT" }, { "version": "v5", "created": "Mon, 6 Sep 2010 13:00:38 GMT" }, { "version": "v6", "created": "Thu, 6 Jan 2011 23:57:37 GMT" }, { "version": "v7", "created": "Wed, 9 Feb 2011 21:38:42 GMT" }, { "version": "v8", "created": "Tue, 22 Feb 2011 16:00:56 GMT" } ]
2015-03-13T00:00:00
[ [ "Lemire", "Daniel", "" ], [ "Kaser", "Owen", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1361
Dai Tri Man Le
Dai Tri Man Le
Statechart Verification with iState
11 pages, 1 figure
null
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is the longer version of the extended abstract with the same name published in FM 06. We describe in detail the algorithm to generate verification conditions from statechart structures implemented in the iState tool. This approach also suggests us a novel method to define a version of predicate semantics for statecharts analogous to how we assign predicate semantics to programming languages.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 19:44:49 GMT" } ]
2009-09-09T00:00:00
[ [ "Le", "Dai Tri Man", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.1364
Wenguang Wang
Wenguang Wang (1), Yongping Xu (1), Xin Chen (2,3), Qun Li (1), Weiping Wang (1) ((1) College of Information System and Management, National University of Defense Technology, Changsha, China, (2) Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, Beijing University of Posts and Telecommunications, Beijing, China, (3) State Key Laboratory for Complex Systems Simulation, Beijing, China)
High level architecture evolved modular federation object model
11 pages, 3 figures, 1 table, Journal of Systems Engineering and Electronics, 2009, 20(3):625-635
Journal of Systems Engineering and Electronics, 2009, 20(3):625-635
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic Federation Object Model (FOM), a modular FOM was proposed by High Level Architecture (HLA) Evolved product development group. This paper reviews the state-of-the-art of HLA Evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and Base Object Model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate composable simulation both in academia and practice is presented and future directions are pointed out.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 00:50:30 GMT" } ]
2009-09-09T00:00:00
[ [ "Wang", "Wenguang", "" ], [ "Xu", "Yongping", "" ], [ "Chen", "Xin", "" ], [ "Li", "Qun", "" ], [ "Wang", "Weiping", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.1372
R Doomun
Mohammed M. Kadhum, and Suhaidi Hassan
The Uniformization Process of the Fast Congestion Notification (FN)
5 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500,Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.NI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fast Congestion Notification (FN) is one of the proactive queue management mechanisms that practices congestion avoidance to help avoid the beginning of congestion by marking or dropping packets before the routers queue gets full; and exercises congestion control, when congestion avoidance fails, by increasing the rate of packet marking or dropping. Technically, FN avoids the queue overflows by controlling the instantaneous queue size below the optimal queue size, and control congestion by keeping the average arrival rate close to the outgoing link capacity. Upon arrival of each packet, FN uses the instantaneous queue size and the average arrival rate to calculate the packet marking or dropping probability. FN marks or drops packets at fairly regular intervals to avoid long intermarking intervals and clustered packet marks or drops. Too many marked or dropped packets close together can cause global synchronization, and also too long packet intermarking times between marked or dropped packets can cause large queue sizes and congestion. This paper shows how FN controls the queue size, avoids congestion, and reduces global synchronization by uniformizing marked or dropped packet intervals.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 02:14:31 GMT" } ]
2009-09-09T00:00:00
[ [ "Kadhum", "Mohammed M.", "" ], [ "Hassan", "Suhaidi", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1374
R Doomun
Jean Pierre Jung, Ibrahima Sakho
On The Optimality Of All To All Broadcast In k ary n dimensional Tori
8 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500,Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.NI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
All to all broadcast is a collective communication in a network with the constraint that every node must send to each other certain piece of its data. This paper addresses the problem of optimal all port all to all broadcast in multidimensional tori. The optimality criteria considered are the minimum exchange steps, no duplicated data in the sense that only new data are conveyed to receivers and the balance of the communication links load. It is proved that under these constraints, an optimal broadcast is not feasible in any multidimensional torus. Then, the tori which are capable of optimal broadcasts are characterized.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 02:43:24 GMT" } ]
2009-09-09T00:00:00
[ [ "Jung", "Jean Pierre", "" ], [ "Sakho", "Ibrahima", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1381
Goutam Paul
Sayan Bhattacharya, Goutam Paul, Swagato Sanyal
On Necessary and Sufficient Number of Cops in the Game of Cops and Robber in Multidimensional Grids
This is a revised and extended version of the poster paper with the same title that has been presented in the 8th Asian Symposium on Computer Mathematics (ASCM), December 15-17, 2007, Singapore
Discrete Applied Mathematics, pages 1745--1751, vol. 158, no. 16, August 2010
10.1016/j.dam.2010.06.014
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We theoretically analyze the Cops and Robber Game for the first time in a multidimensional grid. It is shown that for an $n$-dimensional grid, at least $n$ cops are necessary to ensure capture of the robber. We also present a set of cop strategies for which $n$ cops are provably sufficient to catch the robber. Further, for two-dimensional grid, we provide an efficient cop strategy for which the robber is caught even by a single cop under certain conditions.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 03:55:29 GMT" } ]
2015-06-12T00:00:00
[ [ "Bhattacharya", "Sayan", "" ], [ "Paul", "Goutam", "" ], [ "Sanyal", "Swagato", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.1388
Paul Wang
Shengbao Wang
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
null
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper studies the relationships between the traditional Diffie-Hellman key agreement protocol and the identity-based (ID-based) key agreement protocol from pairings. For the Sakai-Ohgishi-Kasahara (SOK) ID-based key construction, we show that identical to the Diffie-Hellman protocol, the SOK key agreement protocol also has three variants, namely \emph{ephemeral}, \emph{semi-static} and \emph{static} versions. Upon this, we build solid relations between authenticated Diffie-Hellman (Auth-DH) protocols and ID-based authenticated key agreement (IB-AK) protocols, whereby we present two \emph{substitution rules} for this two types of protocols. The rules enable a conversion between the two types of protocols. In particular, we obtain the \emph{real} ID-based version of the well-known MQV (and HMQV) protocol. Similarly, for the Sakai-Kasahara (SK) key construction, we show that the key transport protocol underlining the SK ID-based encryption scheme (which we call the "SK protocol") has its non-ID counterpart, namely the Hughes protocol. Based on this observation, we establish relations between corresponding ID-based and non-ID-based protocols. In particular, we propose a highly enhanced version of the McCullagh-Barreto protocol.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 05:11:00 GMT" }, { "version": "v2", "created": "Wed, 9 Sep 2009 08:56:22 GMT" } ]
2009-09-09T00:00:00
[ [ "Wang", "Shengbao", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.1392
Dhananjoy Dey
Dhananjoy Dey, Prasanna Raghaw Mishra and Indranath Sengupta
HF-hash : Hash Functions Using Restricted HFE Challenge-1
44 pages including 32 pages appendix (list of polynomials) 2 figures, corrected Surname
null
null
null
cs.CR math.AC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Vulnerability of dedicated hash functions to various attacks has made the task of designing hash function much more challenging. This provides us a strong motivation to design a new cryptographic hash function viz. HF-hash. This is a hash function, whose compression function is designed by using first 32 polynomials of HFE Challenge-1 with 64 variables by forcing remaining 16 variables as zero. HF-hash gives 256 bits message digest and is as efficient as SHA-256. It is secure against the differential attack proposed by Chabaud and Joux as well as by Wang et. al. applied to SHA-0 and SHA-1.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 05:42:54 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 11:25:40 GMT" } ]
2010-07-21T00:00:00
[ [ "Dey", "Dhananjoy", "" ], [ "Mishra", "Prasanna Raghaw", "" ], [ "Sengupta", "Indranath", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.AC", "description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics", "span": "(Commutative Algebra)" } ]
0909.1397
R Doomun
Iraj Ataollahi, Mortza Analoui
Resource Matchmaking Algorithm using Dynamic Rough Set in Grid Environment
10 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.DC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Grid environment is a service oriented infrastructure in which many heterogeneous resources participate to provide the high performance computation. One of the bug issues in the grid environment is the vagueness and uncertainty between advertised resources and requested resources. Furthermore, in an environment such as grid dynamicity is considered as a crucial issue which must be dealt with. Classical rough set have been used to deal with the uncertainty and vagueness. But it can just be used on the static systems and can not support dynamicity in a system. In this work we propose a solution, called Dynamic Rough Set Resource Discovery (DRSRD), for dealing with cases of vagueness and uncertainty problems based on Dynamic rough set theory which considers dynamic features in this environment. In this way, requested resource properties have a weight as priority according to which resource matchmaking and ranking process is done. We also report the result of the solution obtained from the simulation in GridSim simulator. The comparison has been made between DRSRD, classical rough set theory based algorithm, and UDDI and OWL S combined algorithm. DRSRD shows much better precision for the cases with vagueness and uncertainty in a dynamic system such as the grid rather than the classical rough set theory based algorithm, and UDDI and OWL S combined algorithm.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 05:57:20 GMT" } ]
2009-09-09T00:00:00
[ [ "Ataollahi", "Iraj", "" ], [ "Analoui", "Mortza", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.1402
R Doomun
V. Palanisamy, P. Annadurai
Impact of Rushing attack on Multicast in Mobile Ad Hoc Network
7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes that communicate with each other via wireless links with no fixed infrastructure or centralized administration such as base station or access points. Nodes in a MANETs operate both as host as well as routers to forward packets for each other in a multihop fashion. For many applications in wireless networks, multicasting is an important and frequent communication service. By multicasting, since a single message can be delivered to multiple receivers simultaneously. It greatly reduces the transmission cost when sending the same packet to multiple recipients. The security issue of MANETs in group communications is even more challenging because of involvement of multiple senders and multiple receivers. At that time of multicasting, mobile ad hoc network are unprotected by the attacks of malicious nodes because of vulnerabilities of routing protocols. Some of the attacks are Rushing attack, Blackhole attack, Sybil attack, Neighbor attack and Jellyfish attack. This paper is based on Rushing attack. In Rushing attack, the attacker exploits the duplicate suppression mechanism by quickly forwarding route discovery packets in order to gain access to the forwarding group and this will affect the Average Attack Success Rate. In this paper, the goal is to measure the impact of Rushing attack and their node positions which affect the performance metrics of Average Attack Success Rate with respect to three scenarios: near sender, near receiver and anywhere within the network. The performance of the Attack Success Rate with respect to above three scenarios is also compared.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 06:28:48 GMT" } ]
2009-09-09T00:00:00
[ [ "Palanisamy", "V.", "" ], [ "Annadurai", "P.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1405
R Doomun
Mohsen lashkargir, S. Amirhassan Monadjemi, Ahmad Baraani Dastjerdi
A Hybrid Multi Objective Particle Swarm Optimization Method to Discover Biclusters in Microarray Data
6 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
null
ISSN 1947 5500
cs.CE cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In recent years, with the development of microarray technique, discovery of useful knowledge from microarray data has become very important. Biclustering is a very useful data mining technique for discovering genes which have similar behavior. In microarray data, several objectives have to be optimized simultaneously and often these objectives are in conflict with each other. A Multi Objective model is capable of solving such problems. Our method proposes a Hybrid algorithm which is based on the Multi Objective Particle Swarm Optimization for discovering biclusters in gene expression data. In our method, we will consider a low level of overlapping amongst the biclusters and try to cover all elements of the gene expression matrix. Experimental results in the bench mark database show a significant improvement in both overlap among biclusters and coverage of elements in the gene expression matrix.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 06:43:54 GMT" } ]
2009-09-09T00:00:00
[ [ "lashkargir", "Mohsen", "" ], [ "Monadjemi", "S. Amirhassan", "" ], [ "Dastjerdi", "Ahmad Baraani", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0909.1412
Prashant Kushwah
Munendra Agrawal, Prashant Kushwah and Sunder Lal
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-signcryption is used when different senders wants to authenticate a single message without revealing it. This paper proposes a multi signcryption scheme in which no pairing is computed on the signcryption stage and the signatures can be verified publicly.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 07:39:31 GMT" } ]
2009-09-09T00:00:00
[ [ "Agrawal", "Munendra", "" ], [ "Kushwah", "Prashant", "" ], [ "Lal", "Sunder", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.1426
Kunal Narayan Chaudhury
Kunal N. Chaudhury
L^p boundedness of the Hilbert transform
Notes on the L^p boundedness of the Hilbert transform
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Hilbert transform is essentially the \textit{only} singular operator in one dimension. This undoubtedly makes it one of the the most important linear operators in harmonic analysis. The Hilbert transform has had a profound bearing on several theoretical and physical problems across a wide range of disciplines; this includes problems in Fourier convergence, complex analysis, potential theory, modulation theory, wavelet theory, aerofoil design, dispersion relations and high-energy physics, to name a few. In this monograph, we revisit some of the established results concerning the global behavior of the Hilbert transform, namely that it is is weakly bounded on $\eL^1(\R)$, and strongly bounded on $\eL^p(\R)$ for $1 < p <\infty$, and provide a self-contained derivation of the same using real-variable techniques.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 11:43:09 GMT" }, { "version": "v2", "created": "Thu, 10 Sep 2009 15:36:51 GMT" }, { "version": "v3", "created": "Fri, 11 Sep 2009 14:38:22 GMT" }, { "version": "v4", "created": "Mon, 25 Jan 2010 09:13:17 GMT" }, { "version": "v5", "created": "Fri, 29 Jan 2010 14:34:06 GMT" }, { "version": "v6", "created": "Thu, 18 Feb 2010 14:14:44 GMT" }, { "version": "v7", "created": "Tue, 2 Mar 2010 15:45:59 GMT" }, { "version": "v8", "created": "Wed, 14 Jul 2010 09:05:50 GMT" }, { "version": "v9", "created": "Tue, 2 Oct 2012 13:52:04 GMT" } ]
2012-10-03T00:00:00
[ [ "Chaudhury", "Kunal N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1428
Daowen Qiu
Daowen Qiu, Lvzhou Li, Paulo Mateus, Amilcar Sernadas
Exponentially more concise quantum recognition of non-RMM regular languages
32 pages, 6 figures. We have added a number of results concerning the state complexity, and the proof methods for accepting languages and equivalence have been changed. Also, the title has been changed
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that there are quantum devices that accept all regular languages and that are exponentially more concise than deterministic finite automata (DFA). For this purpose, we introduce a new computing model of {\it one-way quantum finite automata} (1QFA), namely, {\it one-way quantum finite automata together with classical states} (1QFAC), which extends naturally both measure-only 1QFA and DFA and whose state complexity is upper-bounded by both. The original contributions of the paper are the following. First, we show that the set of languages accepted by 1QFAC with bounded error consists precisely of all regular languages. Second, we prove that 1QFAC are at most exponentially more concise than DFA. Third, we show that the previous bound is tight for families of regular languages that are not recognized by measure-once (RMO), measure-many (RMM) and multi-letter 1QFA. % More concretely we exhibit regular languages $L^0(m)$ for $m$ prime such that: (i) $L^0(m)$ cannot be recognized by measure-once, measure-many and multi-letter 1QFA; (ii) the minimal DFA that accepts $L^0(m)$ has $O(m)$ states; (iii) there is a 1QFAC with constant classical states and $O(\log(m))$ quantum basis that accepts $L^0(m)$. Fourth, we give a polynomial-time algorithm for determining whether any two 1QFAC are equivalent. Finally, we show that state minimization of 1QFAC is decidable within EXPSPACE. We conclude the paper by posing some open problems.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 08:57:26 GMT" }, { "version": "v2", "created": "Tue, 22 Dec 2009 12:19:01 GMT" }, { "version": "v3", "created": "Tue, 19 Oct 2010 03:40:31 GMT" }, { "version": "v4", "created": "Tue, 19 Apr 2011 01:47:22 GMT" }, { "version": "v5", "created": "Sat, 18 May 2013 13:07:38 GMT" } ]
2013-05-21T00:00:00
[ [ "Qiu", "Daowen", "" ], [ "Li", "Lvzhou", "" ], [ "Mateus", "Paulo", "" ], [ "Sernadas", "Amilcar", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.1460
Damien Chablat
Anatoly Pashkevich (IRCCyN), Alexandr Klimchik (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Accuracy Improvement for Stiffness Modeling of Parallel Manipulators
null
42\`eme CIRP Conference on Manufacturing Systems, Grenoble : France (2009)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper focuses on the accuracy improvement of stiffness models for parallel manipulators, which are employed in high-speed precision machining. It is based on the integrated methodology that combines analytical and numerical techniques and deals with multidimensional lumped-parameter models of the links. The latter replace the link flexibility by localized 6-dof virtual springs describing both translational/rotational compliance and the coupling between them. There is presented detailed accuracy analysis of the stiffness identification procedures employed in the commercial CAD systems (including statistical analysis of round-off errors, evaluating the confidence intervals for stiffness matrices). The efficiency of the developed technique is confirmed by application examples, which deal with stiffness analysis of translational parallel manipulators.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 11:22:09 GMT" } ]
2009-09-09T00:00:00
[ [ "Pashkevich", "Anatoly", "", "IRCCyN" ], [ "Klimchik", "Alexandr", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0909.1475
Damien Chablat
Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Design optimization of parallel manipulators for high-speed precision machining applications
null
13th IFAC Symposium on Information Control Problems in Manufacturing, Moscou : Russian Federation (2009)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper proposes an integrated approach to the design optimization of parallel manipulators, which is based on the concept of the workspace grid and utilizes the goal-attainment formulation for the global optimization. To combine the non-homogenous design specification, the developed optimization technique transforms all constraints and objectives into similar performance indices related to the maximum size of the prescribed shape workspace. This transformation is based on the dedicated dynamic programming procedures that satisfy computational requirements of modern CAD. Efficiency of the developed technique is demonstrated via two case studies that deal with optimization of the kinematical and stiffness performances for parallel manipulators of the Orthoglide family.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 12:39:11 GMT" } ]
2009-09-09T00:00:00
[ [ "Pashkevich", "Anatoly", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0909.1517
Marco Aldinucci
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick
Autonomic management of multiple non-functional concerns in behavioural skeletons
20 pages + cover page
null
10.1007/978-1-4419-6794-7_8
TR-09-10
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce and address the problem of concurrent autonomic management of different non-functional concerns in parallel applications build as a hierarchical composition of behavioural skeletons. We first define the problems arising when multiple concerns are dealt with by independent managers, then we propose a methodology supporting coordinated management, and finally we discuss how autonomic management of multiple concerns may be implemented in a typical use case. The paper concludes with an outline of the challenges involved in realizing the proposed methodology on distributed target architectures such as clusters and grids. Being based on the behavioural skeleton concept proposed in the CoreGRID GCM, it is anticipated that the methodology will be readily integrated into the current reference implementation of GCM based on Java ProActive and running on top of major grid middleware systems.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 17:02:58 GMT" } ]
2015-05-14T00:00:00
[ [ "Aldinucci", "Marco", "" ], [ "Danelutto", "Marco", "" ], [ "Kilpatrick", "Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.1525
Harshan Jagadeesh
J. Harshan, B. Sundar Rajan, Are Hj{\o}rungnes
Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for Relay Networks
7 pages, 2 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, a special class of complex designs called Training-Embedded Complex Orthogonal Designs (TE-CODs) has been introduced to construct single-symbol Maximum Likelihood (ML) decodable (SSD) distributed space-time block codes (DSTBCs) for two-hop wireless relay networks using the amplify and forward protocol. However, to implement DSTBCs from square TE-CODs, the overhead due to the transmission of training symbols becomes prohibitively large as the number of relays increase. In this paper, we propose TE-Coordinate Interleaved Orthogonal Designs (TE-CIODs) to construct SSD DSTBCs. Exploiting the block diagonal structure of TE-CIODs, we show that, the overhead due to the transmission of training symbols to implement DSTBCs from TE-CIODs is smaller than that for TE-CODs. We also show that DSTBCs from TE-CIODs offer higher rate than those from TE-CODs for identical number of relays while maintaining the SSD and full-diversity properties.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 17:37:48 GMT" }, { "version": "v2", "created": "Tue, 15 Sep 2009 14:04:47 GMT" } ]
2009-09-15T00:00:00
[ [ "Harshan", "J.", "" ], [ "Rajan", "B. Sundar", "" ], [ "Hjørungnes", "Are", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1552
Adrian Dumitrescu
Adrian Dumitrescu and J\'anos Pach
Minimum clique partition in unit disk graphs
12 pages, 3 figures
null
null
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The minimum clique partition (MCP) problem is that of partitioning the vertex set of a given graph into a minimum number of cliques. Given $n$ points in the plane, the corresponding unit disk graph (UDG) has these points as vertices, and edges connecting points at distance at most~1. MCP in unit disk graphs is known to be NP-hard and several constant factor approximations are known, including a recent PTAS. We present two improved approximation algorithms for minimum clique partition in unit disk graphs: (I) A polynomial time approximation scheme (PTAS) running in time $n^{O(1/\eps^2)}$. This improves on a previous PTAS with $n^{O(1/\eps^4)}$ running time \cite{PS09}. (II) A randomized quadratic-time algorithm with approximation ratio 2.16. This improves on a ratio 3 algorithm with $O(n^2)$ running time \cite{CFFP04}.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 20:47:19 GMT" } ]
2009-09-10T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Pach", "János", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1590
Hu Xiong
Hu Xiong, Matei Ripeanu, Zhiguang Qin
Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications
8 pages, 4 figures, submitted to ICC 2009, uses amssymb.sty, amsmath.sty, booktabs.sty, mdwlist.sty, pdftex.sty, dvips.sty
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces an efficient and spontaneous privacy-preserving protocol for vehicular ad-hoc networks based on revocable ring signature. The proposed protocol has three appealing characteristics: First, it offers conditional privacy-preservation: while a receiver can verify that a message issuer is an authorized participant in the system only a trusted authority can reveal the true identity of a message sender. Second, it is spontaneous: safety messages can be authenticated locally, without support from the roadside units or contacting other vehicles. Third, it is efficient by offering fast message authentication and verification, cost-effective identity tracking in case of a dispute, and low storage requirements. We use extensive analysis to demonstrate the merits of the proposed protocol and to contrast it with previously proposed solutions.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 22:29:03 GMT" } ]
2009-09-10T00:00:00
[ [ "Xiong", "Hu", "" ], [ "Ripeanu", "Matei", "" ], [ "Qin", "Zhiguang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1594
Vladimir V Kisil
Vladimir V. Kisil
Computation and Dynamics: Classical and Quantum
5 pages, 2 EPS figures, LaTeX2e, AMSLaTeX
in "Quantum Theory: Reconsideration of Foundations--5'' (A.Yu. Khrennikov, ed.), AIP Conference Proceedings, v.1232, Amer. Inst. Phys., pp.306--312, 2010
10.1063/1.3431506
null
quant-ph cs.CC cs.FL
http://creativecommons.org/licenses/by/3.0/
We discuss classical and quantum computations in terms of corresponding Hamiltonian dynamics. This allows us to introduce quantum computations which involve parallel processing of both: the data and programme instructions. Using mixed quantum-classical dynamics we look for a full cost of computations on quantum computers with classical terminals.
[ { "version": "v1", "created": "Tue, 8 Sep 2009 23:24:15 GMT" } ]
2015-05-14T00:00:00
[ [ "Kisil", "Vladimir V.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0909.1599
Vivek Goyal
Ha Q. Nguyen, Vivek K Goyal, and Lav R. Varshney
Frame Permutation Quantization
29 pages, 5 figures; detailed added to proof of Theorem 4.3 and a few minor corrections
Applied and Computational Harmonic Analysis, vol 31, no, 1, pp,. 74-97, July 2011
10.1016/j.acha.2010.10.003
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Frame permutation quantization (FPQ) is a new vector quantization technique using finite frames. In FPQ, a vector is encoded using a permutation source code to quantize its frame expansion. This means that the encoding is a partial ordering of the frame expansion coefficients. Compared to ordinary permutation source coding, FPQ produces a greater number of possible quantization rates and a higher maximum rate. Various representations for the partitions induced by FPQ are presented, and reconstruction algorithms based on linear programming, quadratic programming, and recursive orthogonal projection are derived. Implementations of the linear and quadratic programming algorithms for uniform and Gaussian sources show performance improvements over entropy-constrained scalar quantization for certain combinations of vector dimension and coding rate. Monte Carlo evaluation of the recursive algorithm shows that mean-squared error (MSE) decays as 1/M^4 for an M-element frame, which is consistent with previous results on optimal decay of MSE. Reconstruction using the canonical dual frame is also studied, and several results relate properties of the analysis frame to whether linear reconstruction techniques provide consistent reconstructions.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 01:01:52 GMT" }, { "version": "v2", "created": "Wed, 1 Sep 2010 22:23:57 GMT" }, { "version": "v3", "created": "Mon, 22 Nov 2010 19:40:33 GMT" } ]
2015-03-24T00:00:00
[ [ "Nguyen", "Ha Q.", "" ], [ "Goyal", "Vivek K", "" ], [ "Varshney", "Lav R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1605
Guangliang Chen
G. Chen, S. Atev, and G. Lerman
Kernel Spectral Curvature Clustering (KSCC)
accepted to 2009 ICCV Workshop on Dynamical Vision
Computer Vision Workshops (ICCV Workshops), 2009 IEEE 12th International Conference on, 2009, pp. 765 - 772
10.1109/ICCVW.2009.5457627
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multi-manifold modeling is increasingly used in segmentation and data representation tasks in computer vision and related fields. While the general problem, modeling data by mixtures of manifolds, is very challenging, several approaches exist for modeling data by mixtures of affine subspaces (which is often referred to as hybrid linear modeling). We translate some important instances of multi-manifold modeling to hybrid linear modeling in embedded spaces, without explicitly performing the embedding but applying the kernel trick. The resulting algorithm, Kernel Spectral Curvature Clustering, uses kernels at two levels - both as an implicit embedding method to linearize nonflat manifolds and as a principled method to convert a multiway affinity problem into a spectral clustering one. We demonstrate the effectiveness of the method by comparing it with other state-of-the-art methods on both synthetic data and a real-world problem of segmenting multiple motions from two perspective camera views.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 01:58:23 GMT" } ]
2012-10-08T00:00:00
[ [ "Chen", "G.", "" ], [ "Atev", "S.", "" ], [ "Lerman", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0909.1608
Guangliang Chen
G. Chen and G. Lerman
Motion Segmentation by SCC on the Hopkins 155 Database
Accepted to 2009 ICCV Workshop on Dynamical Vision
Computer Vision Workshops (ICCV Workshops), 2009 IEEE 12th International Conference on, 2009, pp. 759 - 764
10.1109/ICCVW.2009.5457626
null
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We apply the Spectral Curvature Clustering (SCC) algorithm to a benchmark database of 155 motion sequences, and show that it outperforms all other state-of-the-art methods. The average misclassification rate by SCC is 1.41% for sequences having two motions and 4.85% for three motions.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 02:12:22 GMT" } ]
2012-10-08T00:00:00
[ [ "Chen", "G.", "" ], [ "Lerman", "G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]