id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0909.0347
|
Tobias Harks
|
Tobias Harks, Max Klimm, Rolf H. Moehring
|
Strong Nash Equilibria in Games with the Lexicographical Improvement
Property
| null | null | null |
Preprint 011-2009
|
cs.GT cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a class of finite strategic games with the property that every
deviation of a coalition of players that is profitable to each of its members
strictly decreases the lexicographical order of a certain function defined on
the set of strategy profiles. We call this property the Lexicographical
Improvement Property (LIP) and show that it implies the existence of a
generalized strong ordinal potential function. We use this characterization to
derive existence, efficiency and fairness properties of strong Nash equilibria.
We then study a class of games that generalizes congestion games with
bottleneck objectives that we call bottleneck congestion games. We show that
these games possess the LIP and thus the above mentioned properties. For
bottleneck congestion games in networks, we identify cases in which the
potential function associated with the LIP leads to polynomial time algorithms
computing a strong Nash equilibrium. Finally, we investigate the LIP for
infinite games. We show that the LIP does not imply the existence of a
generalized strong ordinal potential, thus, the existence of SNE does not
follow. Assuming that the function associated with the LIP is continuous,
however, we prove existence of SNE. As a consequence, we prove that bottleneck
congestion games with infinite strategy spaces and continuous cost functions
possess a strong Nash equilibrium.
|
[
{
"version": "v1",
"created": "Wed, 2 Sep 2009 08:45:54 GMT"
}
] | 2009-09-03T00:00:00 |
[
[
"Harks",
"Tobias",
""
],
[
"Klimm",
"Max",
""
],
[
"Moehring",
"Rolf H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.0393
|
Olivier Finkel
|
Olivier Finkel (ELM), Pierre Simonnet (SPE)
|
On Recognizable Tree Languages Beyond the Borel Hierarchy
|
To appear in Fundamenta Informaticae
|
Fundamenta Informaticae 95, 2-3 (2009) 287-303
| null | null |
math.LO cs.CC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the topological complexity of non Borel recognizable tree
languages with regard to the difference hierarchy of analytic sets. We show
that, for each integer $n \geq 1$, there is a $D_{\omega^n}({\bf
\Sigma}^1_1)$-complete tree language L_n accepted by a (non deterministic)
Muller tree automaton. On the other hand, we prove that a tree language
accepted by an unambiguous B\"uchi tree automaton must be Borel. Then we
consider the game tree languages $W_{(i,k)}$, for Mostowski-Rabin indices $(i,
k)$. We prove that the $D_{\omega^n}({\bf \Sigma}^1_1)$-complete tree languages
L_n are Wadge reducible to the game tree language $W_{(i, k)}$ for $k-i \geq
2$. In particular these languages $W_{(i, k)}$ are not in any class
$D_{\alpha}({\bf \Sigma}^1_1)$ for $\alpha < \omega^\omega$.
|
[
{
"version": "v1",
"created": "Wed, 2 Sep 2009 11:37:15 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
],
[
"Simonnet",
"Pierre",
"",
"SPE"
]
] |
[
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.0400
|
Noam Shental
|
Noam Shental, Amnon Amir and Or Zuk
|
Rare-Allele Detection Using Compressed Se(que)nsing
|
29 pages, 11 figures
| null | null | null |
q-bio.GN cs.IT cs.LG math.IT q-bio.QM stat.AP stat.ML
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detection of rare variants by resequencing is important for the
identification of individuals carrying disease variants. Rapid sequencing by
new technologies enables low-cost resequencing of target regions, although it
is still prohibitive to test more than a few individuals. In order to improve
cost trade-offs, it has recently been suggested to apply pooling designs which
enable the detection of carriers of rare alleles in groups of individuals.
However, this was shown to hold only for a relatively low number of individuals
in a pool, and requires the design of pooling schemes for particular cases.
We propose a novel pooling design, based on a compressed sensing approach,
which is both general, simple and efficient. We model the experimental
procedure and show via computer simulations that it enables the recovery of
rare allele carriers out of larger groups than were possible before, especially
in situations where high coverage is obtained for each individual.
Our approach can also be combined with barcoding techniques to enhance
performance and provide a feasible solution based on current resequencing
costs. For example, when targeting a small enough genomic region (~100
base-pairs) and using only ~10 sequencing lanes and ~10 distinct barcodes, one
can recover the identity of 4 rare allele carriers out of a population of over
4000 individuals.
|
[
{
"version": "v1",
"created": "Wed, 2 Sep 2009 13:25:48 GMT"
}
] | 2009-09-03T00:00:00 |
[
[
"Shental",
"Noam",
""
],
[
"Amir",
"Amnon",
""
],
[
"Zuk",
"Or",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
}
] |
0909.0442
|
Damien Chablat
|
Philippe Wenger (IRCCyN), Damien Chablat (IRCCyN)
|
Kinematic analysis of a class of analytic planar 3-RPR parallel
manipulators
| null |
International Workshop on Computational Kinematics, Duisburg :
Germany (2009)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A class of analytic planar 3-RPR manipulators is analyzed in this paper.
These manipulators have congruent base and moving platforms and the moving
platform is rotated of 180 deg about an axis in the plane. The forward
kinematics is reduced to the solution of a 3rd-degree polynomial and a
quadratic equation in sequence. The singularities are calculated and plotted in
the joint space. The second-order singularities (cups points), which play an
important role in non-singular change of assembly-mode motions, are also
analyzed.
|
[
{
"version": "v1",
"created": "Wed, 2 Sep 2009 14:37:01 GMT"
}
] | 2009-09-03T00:00:00 |
[
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0909.0481
|
Fionn Murtagh
|
Fionn Murtagh, Pedro Contreras and Jean-Luc Starck
|
Scale-Based Gaussian Coverings: Combining Intra and Inter Mixture Models
in Image Segmentation
|
20 pages, 5 figures
|
Entropy, 11 (3), 513-528, 2009
|
10.3390/e11030513
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By a "covering" we mean a Gaussian mixture model fit to observed data.
Approximations of the Bayes factor can be availed of to judge model fit to the
data within a given Gaussian mixture model. Between families of Gaussian
mixture models, we propose the R\'enyi quadratic entropy as an excellent and
tractable model comparison framework. We exemplify this using the segmentation
of an MRI image volume, based (1) on a direct Gaussian mixture model applied to
the marginal distribution function, and (2) Gaussian model fit through k-means
applied to the 4D multivalued image volume furnished by the wavelet transform.
Visual preference for one model over another is not immediate. The R\'enyi
quadratic entropy allows us to show clearly that one of these modelings is
superior to the other.
|
[
{
"version": "v1",
"created": "Wed, 2 Sep 2009 17:46:08 GMT"
}
] | 2011-01-11T00:00:00 |
[
[
"Murtagh",
"Fionn",
""
],
[
"Contreras",
"Pedro",
""
],
[
"Starck",
"Jean-Luc",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0909.0537
|
Sariel Har-Peled
|
Chandra Chekuri, Kenneth L. Clarkson, and Sariel Har-Peled
|
On the Set Multi-Cover Problem in Geometric Settings
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the set multi-cover problem in geometric settings. Given a set of
points P and a collection of geometric shapes (or sets) F, we wish to find a
minimum cardinality subset of F such that each point p in P is covered by
(contained in) at least d(p) sets. Here d(p) is an integer demand (requirement)
for p. When the demands d(p)=1 for all p, this is the standard set cover
problem. The set cover problem in geometric settings admits an approximation
ratio that is better than that for the general version. In this paper, we show
that similar improvements can be obtained for the multi-cover problem as well.
In particular, we obtain an O(log Opt) approximation for set systems of bounded
VC-dimension, where Opt is the cardinality of an optimal solution, and an O(1)
approximation for covering points by half-spaces in three dimensions and for
some other classes of shapes.
|
[
{
"version": "v1",
"created": "Wed, 2 Sep 2009 22:03:11 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Chekuri",
"Chandra",
""
],
[
"Clarkson",
"Kenneth L.",
""
],
[
"Har-Peled",
"Sariel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.0549
|
Pradeep Sarvepalli
|
Pradeep Sarvepalli and Robert Raussendorf
|
Matroids and Quantum Secret Sharing Schemes
| null |
Phys. Rev. A 81, 052333 (2010)
|
10.1103/PhysRevA.81.052333
| null |
quant-ph cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A secret sharing scheme is a cryptographic protocol to distribute a secret
state in an encoded form among a group of players such that only authorized
subsets of the players can reconstruct the secret. Classically, efficient
secret sharing schemes have been shown to be induced by matroids. Furthermore,
access structures of such schemes can be characterized by an excluded minor
relation. No such relations are known for quantum secret sharing schemes. In
this paper we take the first steps toward a matroidal characterization of
quantum secret sharing schemes. In addition to providing a new perspective on
quantum secret sharing schemes, this characterization has important benefits.
While previous work has shown how to construct quantum secret sharing schemes
for general access structures, these schemes are not claimed to be efficient.
In this context the present results prove to be useful; they enable us to
construct efficient quantum secret sharing schemes for many general access
structures. More precisely, we show that an identically self-dual matroid that
is representable over a finite field induces a pure state quantum secret
sharing scheme with information rate one.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 17:26:22 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Sep 2009 21:55:12 GMT"
},
{
"version": "v3",
"created": "Fri, 23 Oct 2009 23:40:01 GMT"
}
] | 2010-07-08T00:00:00 |
[
[
"Sarvepalli",
"Pradeep",
""
],
[
"Raussendorf",
"Robert",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.0553
|
Jie Luo
|
Jie Luo, Anthony Ephremides
|
A New Approach to Random Access: Reliable Communication and Reliable
Collision Detection
|
submitted to IEEE Transactions on Information Theory
| null |
10.1109/TIT.2011.2173705
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper applies Information Theoretic analysis to packet-based random
multiple access communication systems. A new channel coding approach is
proposed for coding within each data packet with built-in support for bursty
traffic properties, such as message underflow, and for random access
properties, such as packet collision detection. The coding approach does not
require joint communication rate determination either among the transmitters or
between the transmitters and the receiver. Its performance limitation is
characterized by an achievable region defined in terms of communication rates,
such that reliable packet recovery is supported for all rates inside the region
and reliable collision detection is supported for all rates outside the region.
For random access communication over a discrete-time memoryless channel, it is
shown that the achievable rate region of the introduced coding approach equals
the Shannon information rate region without a convex hull operation. Further
connections between the achievable rate region and the Shannon information rate
region are developed and explained.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 00:36:58 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Aug 2010 21:40:49 GMT"
},
{
"version": "v3",
"created": "Mon, 9 May 2011 05:26:16 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Luo",
"Jie",
""
],
[
"Ephremides",
"Anthony",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0555
|
Boyu Li
|
Boyu Li and Ender Ayanoglu
|
Reduced Complexity Sphere Decoding
|
accepted to Journal. arXiv admin note: substantial text overlap with
arXiv:1009.3514
|
Wiley WCMC, Vol. 11, No. 12, pages 1518-1527, Dec. 2011
|
10.1002/wcm.1216
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In Multiple-Input Multiple-Output (MIMO) systems, Sphere Decoding (SD) can
achieve performance equivalent to full search Maximum Likelihood (ML) decoding,
with reduced complexity. Several researchers reported techniques that reduce
the complexity of SD further. In this paper, a new technique is introduced
which decreases the computational complexity of SD substantially, without
sacrificing performance. The reduction is accomplished by deconstructing the
decoding metric to decrease the number of computations and exploiting the
structure of a lattice representation. Furthermore, an application of SD,
employing a proposed smart implementation with very low computational
complexity is introduced. This application calculates the soft bit metrics of a
bit-interleaved convolutional-coded MIMO system in an efficient manner. Based
on the reduced complexity SD, the proposed smart implementation employs the
initial radius acquired by Zero-Forcing Decision Feedback Equalization (ZF-DFE)
which ensures no empty spheres. Other than that, a technique of a particular
data structure is also incorporated to efficiently reduce the number of
executions carried out by SD. Simulation results show that these approaches
achieve substantial gains in terms of the computational complexity for both
uncoded and coded MIMO systems.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 00:46:16 GMT"
},
{
"version": "v2",
"created": "Mon, 15 Mar 2010 23:50:42 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Sep 2011 08:03:57 GMT"
},
{
"version": "v4",
"created": "Mon, 30 Jan 2012 22:02:05 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Li",
"Boyu",
""
],
[
"Ayanoglu",
"Ender",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0571
|
R Doomun
|
Saad Ahmad Khan, Sheheryar Ali Arshad
|
QoS Provisioning Using Hybrid FSO RF Based Hierarchical Model for
Wireless Multimedia Sensor Networks
|
6 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Our objective is to provide guaranteed packet delivery service in time
constrained sensor networks. The wireless network is a highly variable
environment, where available link bandwidth may vary with network load. Since
multimedia applications require higher bandwidth so we use FSO links for their
transmission. The main advantage of FSO links is that they offer higher
bandwidth and security, while RF links offer more reliability. The routing in
this multitier network is based on directional geographic routing protocol, in
which sensors route their data via multihop paths, to a powerful base station,
through a cluster head. Some modifications have also been incorporated in the
MAC layer to improve the QoS of such systems.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 05:31:18 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Khan",
"Saad Ahmad",
""
],
[
"Arshad",
"Sheheryar Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.0572
|
Andri Mirzal M.Sc.
|
Andri Mirzal and Masashi Furukawa
|
A Method for Accelerating the HITS Algorithm
|
10 pages, 3 figures, to be appear in Journal of Advanced
Computational Intelligence and Intelligent Informatics, Vol. 14 No. 1, 2010
| null | null | null |
cs.IR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
We present a new method to accelerate the HITS algorithm by exploiting
hyperlink structure of the web graph. The proposed algorithm extends the idea
of authority and hub scores from HITS by introducing two diagonal matrices
which contain constants that act as weights to make authority pages more
authoritative and hub pages more hubby. This method works because in the web
graph good authorities are pointed to by good hubs and good hubs point to good
authorities. Consequently, these pages will collect their scores faster under
the proposed algorithm than under the standard HITS. We show that the authority
and hub vectors of the proposed algorithm exist but are not necessarily be
unique, and then give a treatment to ensure the uniqueness property of the
vectors. The experimental results show that the proposed algorithm can improve
HITS computations, especially for back button datasets.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 05:34:35 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Mirzal",
"Andri",
""
],
[
"Furukawa",
"Masashi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.0573
|
R Doomun
|
Jalpa Bani, Syed S. Rizvi
|
Minimizing Cache Timing Attack Using Dynamic Cache Flushing (DCF)
Algorithm
|
7 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Rijndael algorithm was unanimously chosen as the Advanced Encryption Standard
(AES) by the panel of researchers at National Institute of Standards and
Technology (NIST) in October 2000. Since then, Rijndael was destined to be used
massively in various software as well as hardware entities for encrypting data.
However, a few years back, Daniel Bernstein devised a cache timing attack that
was capable enough to break Rijndael seal that encapsulates the encryption key.
In this paper, we propose a new Dynamic Cache Flushing (DCF) algorithm which
shows a set of pragmatic software measures that would make Rijndael impregnable
to cache timing attack. The simulation results demonstrate that the proposed
DCF algorithm provides better security by encrypting key at a constant time.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 05:53:38 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Bani",
"Jalpa",
""
],
[
"Rizvi",
"Syed S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.0576
|
R Doomun
|
Dr. G. Padmavathi, Mrs. D. Shanmugapriya
|
A Survey of Attacks, Security Mechanisms and Challenges in Wireless
Sensor Networks
|
9 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless Sensor networks (WSN) is an emerging technology and have great
potential to be employed in critical situations like battlefields and
commercial applications such as building, traffic surveillance, habitat
monitoring and smart homes and many more scenarios. One of the major challenges
wireless sensor networks face today is security. While the deployment of sensor
nodes in an unattended environment makes the networks vulnerable to a variety
of potential attacks, the inherent power and memory limitations of sensor nodes
makes conventional security solutions unfeasible. The sensing technology
combined with processing power and wireless communication makes it profitable
for being exploited in great quantity in future. The wireless communication
technology also acquires various types of security threats. This paper
discusses a wide variety of attacks in WSN and their classification mechanisms
and different securities available to handle them including the challenges
faced.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 06:13:36 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Padmavathi",
"Dr. G.",
""
],
[
"Shanmugapriya",
"Mrs. D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.0583
|
R Doomun
|
Raheel Maqsood Hashmi, Arooj Mubashara Siddiqui, Memoona Jabeen,
Khurram S. Alimgeer, Shahid A. Khan
|
Computational Complexities and Breaches in Authentication Frameworks of
Broadband Wireless Access
|
5 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor
0.423,http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSn 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Secure access of communication networks has become an increasingly important
area of consideration for the communication service providers of present day.
Broadband Wireless Access (BWA) networks are proving to be an efficient and
cost effective solution for the provisioning of high rate wireless traffic
links in static and mobile domains. The secure access of these networks is
necessary to ensure their superior operation and revenue efficacy. Although
authentication process is a key to secure access in BWA networks, the breaches
present in them limit the networks performance. In this paper, the
vulnerabilities in the authentication frameworks of BWA networks have been
unveiled. Moreover, this paper also describes the limitations of these
protocols and of the solutions proposed to them due to the involved
computational complexities and overheads. The possible attacks on privacy and
performance of BWA networks have been discussed and explained in detail.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 07:56:44 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Hashmi",
"Raheel Maqsood",
""
],
[
"Siddiqui",
"Arooj Mubashara",
""
],
[
"Jabeen",
"Memoona",
""
],
[
"Alimgeer",
"Khurram S.",
""
],
[
"Khan",
"Shahid A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.0588
|
Jos\'e Ignacio Iglesias Curto
|
Jose Ignacio Iglesias Curto, Uwe Helmke
|
Receding horizon decoding of convolutional codes
| null | null | null | null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Decoding of convolutional codes poses a significant challenge for coding
theory. Classical methods, based on e.g. Viterbi decoding, suffer from being
computationally expensive and are restricted therefore to codes of small
complexity. Based on analogies with model predictive optimal control, we
propose a new iterative method for convolutional decoding that is cheaper to
implement than established algorithms, while still offering significant error
correction capabilities. The algorithm is particularly well-suited for decoding
special types of convolutional codes, such as e.g. cyclic convolutional codes.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 08:27:59 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Curto",
"Jose Ignacio Iglesias",
""
],
[
"Helmke",
"Uwe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0909.0599
|
R Doomun
|
Md. Rabiul Islam, Md. Fayzur Rahman
|
Codebook Design Method for Noise Robust Speaker Identification based on
Genetic Algorithm
|
5 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor
0.423,http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSn 1947 5500
|
cs.SD cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, a novel method of designing a codebook for noise robust
speaker identification purpose utilizing Genetic Algorithm has been proposed.
Wiener filter has been used to remove the background noises from the source
speech utterances. Speech features have been extracted using standard speech
parameterization method such as LPC, LPCC, RCC, MFCC, (delta)MFCC and
(delta)(delta) MFCC. For each of these techniques, the performance of the
proposed system has been compared. In this codebook design method, Genetic
Algorithm has the capability of getting global optimal result and hence
improves the quality of the codebook. Comparing with the NOIZEOUS speech
database, the experimental result shows that 79.62 percent accuracy has been
achieved.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 08:49:54 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Islam",
"Md. Rabiul",
""
],
[
"Rahman",
"Md. Fayzur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0909.0611
|
Katsutoshi Yoshida
|
Katsutoshi Yoshida, Atsushi Higeta and Shinichi Watanabe
|
Effects of Mechanical Coupling on the Dynamics of Balancing Tasks
|
18 pages, 16 figures
|
International Journal of Innovative Computing, Information and
Control, Vol.7, No.4, April 2011, pp.1661-1674
| null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Coupled human balancing tasks are investigated based on both pseudo-neural
controllers characterized by time-delayed feedback with random gain and natural
human balancing tasks. It is shown numerically that, compared to single
balancing tasks, balancing tasks coupled by mechanical structures exhibit
enhanced stability against balancing errors in terms of both amplitude and
velocity and also improve the tracking ability of the controllers. We then
perform an experiment in which numerical pseudo-neural controllers are replaced
with natural human balancing tasks carried out using computer mice. The results
reveal that the coupling structure generates asymmetric tracking abilities in
subjects whose tracking abilities are nearly symmetric in their single
balancing tasks.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 09:38:18 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jul 2010 00:02:40 GMT"
}
] | 2011-03-14T00:00:00 |
[
[
"Yoshida",
"Katsutoshi",
""
],
[
"Higeta",
"Atsushi",
""
],
[
"Watanabe",
"Shinichi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0909.0633
|
Amr Rizk
|
Amr Rizk, Markus Fidler
|
Statistical End-to-end Performance Bounds for Networks under Long Memory
FBM Cross Traffic
| null | null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fractional Brownian motion (fBm) emerged as a useful model for self-similar
and long-range dependent Internet traffic. Approximate performance measures are
known from large deviations theory for single queuing systems with fBm through
traffic. In this paper we derive end-to-end performance bounds for a through
flow in a network of tandem queues under fBm cross traffic. To this end, we
prove a rigorous sample path envelope for fBm that complements previous
approximate results. We find that both approaches agree in their outcome that
overflow probabilities for fBm traffic have a Weibullian tail. We employ the
sample path envelope and the concept of leftover service curves to model the
remaining service after scheduling fBm cross traffic at a system. Using
composition results for tandem systems from the stochastic network calculus we
derive end-to-end statistical performance bounds for individual flows in
networks under fBm cross traffic. We discover that these bounds grow in O(n
(log n)^(1/(2-2H))) for n systems in series where H is the Hurst parameter of
the fBm cross traffic. We show numerical results on the impact of the
variability and the correlation of fBm traffic on network performance.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 12:32:46 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Rizk",
"Amr",
""
],
[
"Fidler",
"Markus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.0635
|
Fabrice Rossi
|
Michel Verleysen (DICE - MLG), Fabrice Rossi (LTCI), Damien
Fran\c{c}ois (CESAME)
|
Advances in Feature Selection with Mutual Information
| null |
Similarity-Based Clustering, Villmann, Th.; Biehl, M.; Hammer, B.;
Verleysen, M. (Ed.) (2009) 52-69
|
10.1007/978-3-642-01805-3_4
| null |
cs.LG cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The selection of features that are relevant for a prediction or
classification problem is an important problem in many domains involving
high-dimensional data. Selecting features helps fighting the curse of
dimensionality, improving the performances of prediction or classification
methods, and interpreting the application. In a nonlinear context, the mutual
information is widely used as relevance criterion for features and sets of
features. Nevertheless, it suffers from at least three major limitations:
mutual information estimators depend on smoothing parameters, there is no
theoretically justified stopping criterion in the feature selection greedy
procedure, and the estimation itself suffers from the curse of dimensionality.
This chapter shows how to deal with these problems. The two first ones are
addressed by using resampling techniques that provide a statistical basis to
select the estimator parameters and to stop the search procedure. The third one
is addressed by modifying the mutual information criterion into a measure of
how features are complementary (and not only informative) for the problem at
hand.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 12:04:57 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Verleysen",
"Michel",
"",
"DICE - MLG"
],
[
"Rossi",
"Fabrice",
"",
"LTCI"
],
[
"François",
"Damien",
"",
"CESAME"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0638
|
Fabrice Rossi
|
Barbara Hammer, Alexander Hasenfu{\ss}, Fabrice Rossi (LTCI)
|
Median topographic maps for biomedical data sets
| null |
Similarity-Based Clustering, Villmann, Th.; Biehl, M.; Hammer, B.;
Verleysen, M. (Ed.) (2009) 92-117
|
10.1007/978-3-642-01805-3_6
| null |
cs.LG q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Median clustering extends popular neural data analysis methods such as the
self-organizing map or neural gas to general data structures given by a
dissimilarity matrix only. This offers flexible and robust global data
inspection methods which are particularly suited for a variety of data as
occurs in biomedical domains. In this chapter, we give an overview about median
clustering and its properties and extensions, with a particular focus on
efficient implementations adapted to large scale data analysis.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 12:09:08 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Hammer",
"Barbara",
"",
"LTCI"
],
[
"Hasenfuß",
"Alexander",
"",
"LTCI"
],
[
"Rossi",
"Fabrice",
"",
"LTCI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0909.0641
|
Oliver Johnson
|
Oliver Johnson and Yaming Yu
|
Monotonicity, thinning and discrete versions of the Entropy Power
Inequality
|
9 pages (revised to take account of referees' comments)
|
IEEE Transactions on Information Theory, Vol 56/11, 2010, pages
5387-5395
|
10.1109/TIT.2010.2070570
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the entropy of sums of independent discrete random variables, in
analogy with Shannon's Entropy Power Inequality, where equality holds for
normals. In our case, infinite divisibility suggests that equality should hold
for Poisson variables. We show that some natural analogues of the Entropy Power
Inequality do not in fact hold, but propose an alternative formulation which
does always hold. The key to many proofs of Shannon's Entropy Power Inequality
is the behaviour of entropy on scaling of continuous random variables. We
believe that R\'{e}nyi's operation of thinning discrete random variables plays
a similar role to scaling, and give a sharp bound on how the entropy of ultra
log-concave random variables behaves on thinning. In the spirit of the
monotonicity results established by Artstein, Ball, Barthe and Naor, we prove a
stronger version of concavity of entropy, which implies a strengthened form of
our discrete Entropy Power Inequality.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 16:22:01 GMT"
},
{
"version": "v2",
"created": "Thu, 15 Jul 2010 10:27:00 GMT"
}
] | 2010-10-21T00:00:00 |
[
[
"Johnson",
"Oliver",
""
],
[
"Yu",
"Yaming",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0682
|
Shirin Sohrabi
|
Shirin Sohrabi and Sheila A. McIlraith
|
On Planning with Preferences in HTN
|
This paper appears in Twelfth International Workshop on Non-Monotonic
Reasoning (NMR08). An earlier version of this paper appears in Fourth
Multidisciplinary Workshop on Advances in Preference Handling (M-Pref08) at
AAAI-08
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we address the problem of generating preferred plans by
combining the procedural control knowledge specified by Hierarchical Task
Networks (HTNs) with rich qualitative user preferences. The outcome of our work
is a language for specifyin user preferences, tailored to HTN planning,
together with a provably optimal preference-based planner, HTNPLAN, that is
implemented as an extension of SHOP2. To compute preferred plans, we propose an
approach based on forward-chaining heuristic search. Our heuristic uses an
admissible evaluation function measuring the satisfaction of preferences over
partial plans. Our empirical evaluation demonstrates the effectiveness of our
HTNPLAN heuristics. We prove our approach sound and optimal with respect to the
plans it generates by appealing to a situation calculus semantics of our
preference language and of HTN planning. While our implementation builds on
SHOP2, the language and techniques proposed here are relevant to a broad range
of HTN planners.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 15:27:52 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Sohrabi",
"Shirin",
""
],
[
"McIlraith",
"Sheila A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.0685
|
Chris Giannella
|
Joel W. Branch, Chris Giannella, Boleslaw Szymanski, Ran Wolff, Hillol
Kargupta
|
In-Network Outlier Detection in Wireless Sensor Networks
|
Extended version of a paper appearing in the Int'l Conference on
Distributed Computing Systems 2006
|
Knowledge and Information Systems 34(1) January, 2013, pp. 23-54
|
10.1007/s10115-011-0474-5
| null |
cs.DB cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To address the problem of unsupervised outlier detection in wireless sensor
networks, we develop an approach that (1) is flexible with respect to the
outlier definition, (2) computes the result in-network to reduce both bandwidth
and energy usage,(3) only uses single hop communication thus permitting very
simple node failure detection and message reliability assurance mechanisms
(e.g., carrier-sense), and (4) seamlessly accommodates dynamic updates to data.
We examine performance using simulation with real sensor data streams. Our
results demonstrate that our approach is accurate and imposes a reasonable
communication load and level of power consumption.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 15:26:38 GMT"
}
] | 2013-05-15T00:00:00 |
[
[
"Branch",
"Joel W.",
""
],
[
"Giannella",
"Chris",
""
],
[
"Szymanski",
"Boleslaw",
""
],
[
"Wolff",
"Ran",
""
],
[
"Kargupta",
"Hillol",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.0704
|
Lav Varshney
|
Ha Q. Nguyen, Lav R. Varshney, and Vivek K Goyal
|
Concentric Permutation Source Codes
| null |
IEEE Transactions on Communications, vol. 58, no. 11, pp.
3154-3164, November 2010
|
10.1109/TCOMM.2010.101210.090535
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Permutation codes are a class of structured vector quantizers with a
computationally-simple encoding procedure based on sorting the scalar
components. Using a codebook comprising several permutation codes as subcodes
preserves the simplicity of encoding while increasing the number of
rate-distortion operating points, improving the convex hull of operating
points, and increasing design complexity. We show that when the subcodes are
designed with the same composition, optimization of the codebook reduces to a
lower-dimensional vector quantizer design within a single cone. Heuristics for
reducing design complexity are presented, including an optimization of the rate
allocation in a shape-gain vector quantizer with gain-dependent wrapped
spherical shape codebook.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 16:33:18 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Sep 2009 21:32:37 GMT"
},
{
"version": "v3",
"created": "Wed, 14 Apr 2010 01:10:13 GMT"
},
{
"version": "v4",
"created": "Wed, 23 Jun 2010 19:19:31 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Nguyen",
"Ha Q.",
""
],
[
"Varshney",
"Lav R.",
""
],
[
"Goyal",
"Vivek K",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0717
|
Sariel Har-Peled
|
Sariel Har-Peled and Micha Sharir
|
Relative $(p,\epsilon)$-Approximations in Geometry
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We re-examine the notion of relative $(p,\eps)$-approximations, recently
introduced in [CKMS06], and establish upper bounds on their size, in general
range spaces of finite VC-dimension, using the sampling theory developed in
[LLS01] and in several earlier studies [Pol86, Hau92, Tal94]. We also survey
the different notions of sampling, used in computational geometry, learning,
and other areas, and show how they relate to each other. We then give
constructions of smaller-size relative $(p,\eps)$-approximations for range
spaces that involve points and halfspaces in two and higher dimensions. The
planar construction is based on a new structure--spanning trees with small
relative crossing number, which we believe to be of independent interest.
Relative $(p,\eps)$-approximations arise in several geometric problems, such as
approximate range counting, and we apply our new structures to obtain efficient
solutions for approximate range counting in three dimensions. We also present a
simple solution for the planar case.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 17:16:30 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jan 2010 03:25:43 GMT"
}
] | 2010-01-25T00:00:00 |
[
[
"Har-Peled",
"Sariel",
""
],
[
"Sharir",
"Micha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.0732
|
R Doomun
|
Shahid Hussain, Muhammad Zubair Asghar, Bashir Ahmad, Shakeel Ahmad
|
A Step towards Software Corrective Maintenance Using RCM model
|
6 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From the preliminary stage of software engineering, selection of appropriate
enforcement of standards remained a challenge for stakeholders during entire
cycle of software development, but it can lead to reduce the efforts desired
for software maintenance phase. Corrective maintenance is the reactive
modification of a software product performed after delivery to correct
discovered faults. Studies conducted by different researchers reveal that
approximately 50 to 75 percent of the effort is spent on maintenance, out of
which about 17 to 21 percent is exercised on corrective maintenance. In this
paper, authors proposed a RCM (Reduce Corrective Maintenance) model which
represents the implementation process of number of checklists to guide the
stakeholders of all phases of software development. These check lists will be
filled by corresponding stake holder of all phases before its start. More
precise usage of the check list in relevant phase ensures successful
enforcement of analysis, design, coding and testing standards for reducing
errors in operation stage. Moreover authors represent the step by step
integration of checklists in software development life cycle through RCM model.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 19:06:50 GMT"
}
] | 2009-09-04T00:00:00 |
[
[
"Hussain",
"Shahid",
""
],
[
"Asghar",
"Muhammad Zubair",
""
],
[
"Ahmad",
"Bashir",
""
],
[
"Ahmad",
"Shakeel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.0736
|
Olivier Finkel
|
Olivier Finkel (ELM), Dominique Lecomte (IMJ)
|
Decision Problems For Turing Machines
|
To appear in Information Processing Letters
|
Information Processing Letters 109, 23-24 (2009) 1223-1226
| null | null |
cs.LO cs.CC math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We answer two questions posed by Castro and Cucker, giving the exact
complexities of two decision problems about cardinalities of omega-languages of
Turing machines. Firstly, it is $D_2(\Sigma_1^1)$-complete to determine whether
the omega-language of a given Turing machine is countably infinite, where
$D_2(\Sigma_1^1)$ is the class of 2-differences of $\Sigma_1^1$-sets. Secondly,
it is $\Sigma_1^1$-complete to determine whether the omega-language of a given
Turing machine is uncountable.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 19:19:48 GMT"
}
] | 2009-11-05T00:00:00 |
[
[
"Finkel",
"Olivier",
"",
"ELM"
],
[
"Lecomte",
"Dominique",
"",
"IMJ"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0909.0737
|
Irmtraud Meyer
|
Tin Yin Lam and Irmtraud M. Meyer
|
Efficient algorithms for training the parameters of hidden Markov models
using stochastic expectation maximization EM training and Viterbi training
|
32 pages including 9 figures and 2 tables
|
BMC Algorithms for Molecular Biology (2010) 5:38
| null | null |
q-bio.QM cs.LG q-bio.GN
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background: Hidden Markov models are widely employed by numerous
bioinformatics programs used today. Applications range widely from comparative
gene prediction to time-series analyses of micro-array data. The parameters of
the underlying models need to be adjusted for specific data sets, for example
the genome of a particular species, in order to maximize the prediction
accuracy. Computationally efficient algorithms for parameter training are thus
key to maximizing the usability of a wide range of bioinformatics applications.
Results: We introduce two computationally efficient training algorithms, one
for Viterbi training and one for stochastic expectation maximization (EM)
training, which render the memory requirements independent of the sequence
length. Unlike the existing algorithms for Viterbi and stochastic EM training
which require a two-step procedure, our two new algorithms require only one
step and scan the input sequence in only one direction. We also implement these
two new algorithms and the already published linear-memory algorithm for EM
training into the hidden Markov model compiler HMM-Converter and examine their
respective practical merits for three small example models.
Conclusions: Bioinformatics applications employing hidden Markov models can
use the two algorithms in order to make Viterbi training and stochastic EM
training more computationally efficient. Using these algorithms, parameter
training can thus be attempted for more complex models and longer training
sequences. The two new algorithms have the added advantage of being easier to
implement than the corresponding default algorithms for Viterbi training and
stochastic EM training.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 19:29:56 GMT"
},
{
"version": "v2",
"created": "Tue, 16 Oct 2012 21:57:24 GMT"
}
] | 2012-10-18T00:00:00 |
[
[
"Lam",
"Tin Yin",
""
],
[
"Meyer",
"Irmtraud M.",
""
]
] |
[
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
}
] |
0909.0760
|
Antonio Marques
|
Antonio G. Marques, Georgios B. Giannakis, Javier Ramos
|
Optimizing Orthogonal Multiple Access based on Quantized Channel State
Information
|
30 pages, 6 figures, 2 tables
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The performance of systems where multiple users communicate over wireless
fading links benefits from channel-adaptive allocation of the available
resources. Different from most existing approaches that allocate resources
based on perfect channel state information, this work optimizes channel
scheduling along with per user rate and power loadings over orthogonal fading
channels, when both terminals and scheduler rely on quantized channel state
information. Channel-adaptive policies are designed to optimize an average
transmit-performance criterion subject to average quality of service
requirements. While the resultant optimal policy per fading realization shows
that the individual rate and power loadings can be obtained separately for each
user, the optimal scheduling is slightly more complicated. Specifically, per
fading realization each channel is allocated either to a single (winner) user,
or, to a small group of winner users whose percentage of shared resources is
found by solving a linear program. A single scheduling scheme combining both
alternatives becomes possible by smoothing the original disjoint scheme. The
smooth scheduling is asymptotically optimal and incurs reduced computational
complexity. Different alternatives to obtain the Lagrange multipliers required
to implement the channel-adaptive policies are proposed, including stochastic
iterations that are provably convergent and do not require knowledge of the
channel distribution. The development of the optimal channel-adaptive
allocation is complemented with discussions on the overhead required to
implement the novel policies.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 20:54:43 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Marques",
"Antonio G.",
""
],
[
"Giannakis",
"Georgios B.",
""
],
[
"Ramos",
"Javier",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0763
|
Lei Ying
|
Lei Ying, R. Srikant and Srinivas Shakkottai
|
The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P
Streaming Networks
| null | null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The growth of real-time content streaming over the Internet has resulted in
the use of peer-to-peer (P2P) approaches for scalable content delivery. In such
P2P streaming systems, each peer maintains a playout buffer of content chunks
which it attempts to fill by contacting other peers in the network. The
objective is to ensure that the chunk to be played out is available with high
probability while keeping the buffer size small. Given that a particular peer
has been selected, a \emph{policy} is a rule that suggests which chunks should
be requested by the peer from other peers.. We consider consider a number of
recently suggested policies consistent with buffer minimization for a given
target of skip free playout. We first study a \emph{rarest-first} policy that
attempts to obtain chunks farthest from playout, and a \emph{greedy} policy
that attempts to obtain chunks nearest to playout. We show that they both have
similar buffer scalings (as a function of the number of peers of target
probability of skip-free probability). We then study a hybrid policy which
achieves order sense improvements over both policies and can achieve order
optimal performance. We validate our results using simulations.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 21:11:46 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Ying",
"Lei",
""
],
[
"Srikant",
"R.",
""
],
[
"Shakkottai",
"Srinivas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.0764
|
Serguei Mokhov
|
Aihua Wu, Joey Paquet, and Serguei A. Mokhov
|
Object-Oriented Intensional Programming: Intensional Classes Using Java
and Lucid
|
27 pages, 8 listings, 2 tables, 5 figures
| null |
10.1109/SERA.2010.29
| null |
cs.PL cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article introduces Object-Oriented Intensional Programming (OO-IP), a
new hybrid language between Object-Oriented and Intensional Programming
Languages in the sense of the latest evolutions of Lucid. This new hybrid
language combines the essential characteristics of Lucid and Java, and
introduces the notion of object streams which makes it is possible that each
element in a Lucid stream to be an object with embedded intensional properties.
Interestingly, this hybrid language also brings to Java objects the power to
explicitly express and manipulate the notion of context, creating the novel
concept of intensional object, i.e. objects whose evaluation is
context-dependent, which are here demonstrated to be translatable into standard
objects. By this new approach, we extend the use and meaning of the notion of
intensional objects and enrich the meaning of object streams in Lucid and
semantics of intensional objects in Java.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 21:13:44 GMT"
}
] | 2010-07-09T00:00:00 |
[
[
"Wu",
"Aihua",
""
],
[
"Paquet",
"Joey",
""
],
[
"Mokhov",
"Serguei A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.0777
|
Arian Maleki
|
Arian Maleki, David L. Donoho
|
Optimally Tuned Iterative Reconstruction Algorithms for Compressed
Sensing
|
12 pages, 14 figures
| null |
10.1109/JSTSP.2009.2039176
| null |
cs.NA cs.IT cs.MS math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We conducted an extensive computational experiment, lasting multiple
CPU-years, to optimally select parameters for two important classes of
algorithms for finding sparse solutions of underdetermined systems of linear
equations. We make the optimally tuned implementations available at {\tt
sparselab.stanford.edu}; they run `out of the box' with no user tuning: it is
not necessary to select thresholds or know the likely degree of sparsity. Our
class of algorithms includes iterative hard and soft thresholding with or
without relaxation, as well as CoSaMP, subspace pursuit and some natural
extensions. As a result, our optimally tuned algorithms dominate such
proposals. Our notion of optimality is defined in terms of phase transitions,
i.e. we maximize the number of nonzeros at which the algorithm can successfully
operate. We show that the phase transition is a well-defined quantity with our
suite of random underdetermined linear systems. Our tuning gives the highest
transition possible within each class of algorithms.
|
[
{
"version": "v1",
"created": "Thu, 3 Sep 2009 22:26:32 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Maleki",
"Arian",
""
],
[
"Donoho",
"David L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0801
|
Marcus Hutter
|
Joel Veness and Kee Siong Ng and Marcus Hutter and William Uther and
David Silver
|
A Monte Carlo AIXI Approximation
|
51 LaTeX pages, 11 figures, 6 tables, 4 algorithms
| null | null | null |
cs.AI cs.IT cs.LG math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a principled approach for the design of a scalable
general reinforcement learning agent. Our approach is based on a direct
approximation of AIXI, a Bayesian optimality notion for general reinforcement
learning agents. Previously, it has been unclear whether the theory of AIXI
could motivate the design of practical algorithms. We answer this hitherto open
question in the affirmative, by providing the first computationally feasible
approximation to the AIXI agent. To develop our approximation, we introduce a
new Monte-Carlo Tree Search algorithm along with an agent-specific extension to
the Context Tree Weighting algorithm. Empirically, we present a set of
encouraging results on a variety of stochastic and partially observable
domains. We conclude by proposing a number of directions for future research.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 03:13:58 GMT"
},
{
"version": "v2",
"created": "Sun, 26 Dec 2010 11:01:10 GMT"
}
] | 2010-12-30T00:00:00 |
[
[
"Veness",
"Joel",
""
],
[
"Ng",
"Kee Siong",
""
],
[
"Hutter",
"Marcus",
""
],
[
"Uther",
"William",
""
],
[
"Silver",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0809
|
Dae San Kim
|
Dae San Kim
|
An Infinite Family of Recursive Formulas Generating Power Moments of
Kloosterman Sums with Trace One Arguments: O(2n+1,2^r) Case
|
14 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct an infinite family of binary linear codes
associated with double cosets with respect to certain maximal parabolic
subgroup of the orthogonal group O(2n+1,q). Here q is a power of two. Then we
obtain an infinite family of recursive formulas generating the odd power
moments of Kloosterman sums with trace one arguments in terms of the
frequencies of weights in the codes associated with those double cosets in
O(2n+1,q) and in the codes associated with similar double cosets in the
symplectic group Sp(2n,q). This is done via Pless power moment identity and by
utilizing the explicit expressions of exponential sums over those double cosets
related to the evaluations of "Gauss sums" for the orthogonal group O(2n+1,q).
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 04:56:31 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0811
|
Dae San Kim
|
Dae San Kim
|
Ternary Codes Associated with O^-(2n,q) and Power Moments of Kloosterman
Sums with Square Arguments
|
16 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct three ternary linear codes associated with the
orthogonal group O^-(2,q) and the special orthogonal groups SO^-(2,q) and
SO^-(4,q). Here q is a power of three. Then we obtain recursive formulas for
the power moments of Kloosterman sums with square arguments and for the even
power moments of those in terms of the frequencies of weights in the codes.
This is done via Pless power moment identity and by utilizing the explicit
expressions of "Gauss sums" for the orthogonal and special orthogonal groups
O^-(2n,q) and SO^-(2n,q).
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 05:18:10 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.0814
|
Otfried Cheong
|
Binay Bhattacharya, Arijit Bishnu, Otfried Cheong, Sandip Das, Arindam
Karmakar and Jack Snoeyink
|
Computation of Spatial Skyline Points
| null | null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We discuss a method of finding skyline or non-dominated sites in a set $P$ of
$n$ point sites with respect to a set $S$ of $m$ points. A site $p \in P$ is
non-dominated if and only if for each $q \in P \setminus \{p\}$, there exists
at least one point $s \in S$ that is closer to $p$ than to $q$. We reduce this
problem of determining non-dominated sites to the problem of finding sites that
have non-empty cells in an additively weighted Voronoi diagram under a convex
distance function. The weights of said Voronoi diagram are derived from the
coordinates of the sites of $P$, while the convex distance function is derived
from $S$. In the two-dimensional plane, this reduction gives an $O((n + m) \log
(n + m))$-time algorithm to find the non-dominated points.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 05:31:53 GMT"
},
{
"version": "v2",
"created": "Mon, 16 Dec 2019 12:31:38 GMT"
}
] | 2019-12-17T00:00:00 |
[
[
"Bhattacharya",
"Binay",
""
],
[
"Bishnu",
"Arijit",
""
],
[
"Cheong",
"Otfried",
""
],
[
"Das",
"Sandip",
""
],
[
"Karmakar",
"Arindam",
""
],
[
"Snoeyink",
"Jack",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.0844
|
Francis Bach
|
Francis Bach (INRIA Rocquencourt)
|
High-Dimensional Non-Linear Variable Selection through Hierarchical
Kernel Learning
| null | null | null | null |
cs.LG math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of high-dimensional non-linear variable selection for
supervised learning. Our approach is based on performing linear selection among
exponentially many appropriately defined positive definite kernels that
characterize non-linear interactions between the original variables. To select
efficiently from these many kernels, we use the natural hierarchical structure
of the problem to extend the multiple kernel learning framework to kernels that
can be embedded in a directed acyclic graph; we show that it is then possible
to perform kernel selection through a graph-adapted sparsity-inducing norm, in
polynomial time in the number of selected kernels. Moreover, we study the
consistency of variable selection in high-dimensional settings, showing that
under certain assumptions, our regularization framework allows a number of
irrelevant variables which is exponential in the number of observations. Our
simulations on synthetic datasets and datasets from the UCI repository show
state-of-the-art predictive performance for non-linear regression problems.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 09:43:38 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Bach",
"Francis",
"",
"INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0909.0884
|
Carlo Alberto Furia
|
Carlo A. Furia and Bertrand Meyer
|
Inferring Loop Invariants using Postconditions
|
Slightly revised version
|
Fields of Logic and Computation: Essays Dedicated to Yuri Gurevich
on the Occasion of His 70th Birthday. Lecture Notes in Computer Science,
6300:277--300, Springer, August 2010
|
10.1007/978-3-642-15025-8_15
| null |
cs.SE cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the obstacles in automatic program proving is to obtain suitable loop
invariants.
The invariant of a loop is a weakened form of its postcondition (the loop's
goal, also known as its contract); the present work takes advantage of this
observation by using the postcondition as the basis for invariant inference,
using various heuristics such as "uncoupling" which prove useful in many
important algorithms.
Thanks to these heuristics, the technique is able to infer invariants for a
large variety of loop examples.
We present the theory behind the technique, its implementation (freely
available for download and currently relying on Microsoft Research's Boogie
tool), and the results obtained.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 16:13:47 GMT"
},
{
"version": "v2",
"created": "Fri, 5 Feb 2010 13:38:24 GMT"
}
] | 2013-08-14T00:00:00 |
[
[
"Furia",
"Carlo A.",
""
],
[
"Meyer",
"Bertrand",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.0892
|
Brendan Lucier
|
Brendan Lucier (1) and Allan Borodin (1) ((1) University of Toronto)
|
Price of Anarchy for Greedy Auctions
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider auctions in which greedy algorithms, paired with first-price or
critical-price payment rules, are used to resolve multi-parameter combinatorial
allocation problems. We study the price of anarchy for social welfare in such
auctions. We show for a variety of equilibrium concepts, including Bayes-Nash
equilibrium and correlated equilibrium, the resulting price of anarchy bound is
close to the approximation factor of the underlying greedy algorithm.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 13:39:25 GMT"
},
{
"version": "v2",
"created": "Sun, 30 Nov 2014 16:21:30 GMT"
}
] | 2014-12-02T00:00:00 |
[
[
"Lucier",
"Brendan",
"",
"University of Toronto"
],
[
"Borodin",
"Allan",
"",
"University of Toronto"
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.0901
|
Eugen Staab
|
Eugen Staab and Martin Caminada
|
Assessing the Impact of Informedness on a Consultant's Profit
|
20 pages, 42 figures, Technical Report, University of Luxembourg
| null | null |
ISBN 978-2-87971-027-3
|
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the notion of informedness in a client-consultant setting. Using a
software simulator, we examine the extent to which it pays off for consultants
to provide their clients with advice that is well-informed, or with advice that
is merely meant to appear to be well-informed. The latter strategy is
beneficial in that it costs less resources to keep up-to-date, but carries the
risk of a decreased reputation if the clients discover the low level of
informedness of the consultant. Our experimental results indicate that under
different circumstances, different strategies yield the optimal results (net
profit) for the consultants.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 15:31:37 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Staab",
"Eugen",
""
],
[
"Caminada",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.0941
|
Nicholas Harvey
|
Michel X. Goemans, Nicholas J. A. Harvey, Kamal Jain, Mohit Singh
|
A Randomized Rounding Algorithm for the Asymmetric Traveling Salesman
Problem
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an algorithm for the asymmetric traveling salesman problem on
instances which satisfy the triangle inequality. Like several existing
algorithms, it achieves approximation ratio O(log n). Unlike previous
algorithms, it uses randomized rounding.
|
[
{
"version": "v1",
"created": "Fri, 4 Sep 2009 19:49:22 GMT"
}
] | 2009-09-07T00:00:00 |
[
[
"Goemans",
"Michel X.",
""
],
[
"Harvey",
"Nicholas J. A.",
""
],
[
"Jain",
"Kamal",
""
],
[
"Singh",
"Mohit",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.0996
|
Ravi Teja Sukhavasi
|
Ravi Teja Sukhavasi, Babak Hassibi
|
The Kalman Like Particle Filter : Optimal Estimation With Quantized
Innovations/Measurements
| null | null | null | null |
cs.IT math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of optimal estimation and control of linear systems
using quantized measurements, with a focus on applications over sensor
networks. We show that the state conditioned on a causal quantization of the
measurements can be expressed as the sum of a Gaussian random vector and a
certain truncated Gaussian vector. This structure bears close resemblance to
the full information Kalman filter and so allows us to effectively combine the
Kalman structure with a particle filter to recursively compute the state
estimate. We call the resulting filter the Kalman like particle filter (KLPF)
and observe that it delivers close to optimal performance using far fewer
particles than that of a particle filter directly applied to the original
problem. We show that the conditional state density follows a, so called,
generalized closed skew-normal (GCSN) distribution. We further show that for
such systems the classical separation property between control and estimation
holds and that the certainty equivalent control law is LQG optimal.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 04:22:42 GMT"
},
{
"version": "v2",
"created": "Wed, 5 Jan 2011 07:32:45 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Sukhavasi",
"Ravi Teja",
""
],
[
"Hassibi",
"Babak",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0909.1011
|
Vaneet Aggarwal
|
Vaneet Aggarwal and Ashutosh Sabharwal
|
Bits About the Channel: Multi-round Protocols for Two-way Fading
Channels
|
Submitted to IEEE Transactions on Information Theory
|
IEEE Transactions on Information Theory, vol.57, no.6,
pp.3352,3370, June 2011
|
10.1109/TIT.2011.2137090
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Most communication systems use some form of feedback, often related to
channel state information. In this paper, we study diversity multiplexing
tradeoff for both FDD and TDD systems, when both receiver and transmitter
knowledge about the channel is noisy and potentially mismatched. For FDD
systems, we first extend the achievable tradeoff region for 1.5 rounds of
message passing to get higher diversity compared to the best known scheme, in
the regime of higher multiplexing gains. We then break the mold of all current
channel state based protocols by using multiple rounds of conferencing to
extract more bits about the actual channel. This iterative refinement of the
channel increases the diversity order with every round of communication. The
protocols are on-demand in nature, using high powers for training and feedback
only when the channel is in poor states. The key result is that the diversity
multiplexing tradeoff with perfect training and K levels of perfect feedback
can be achieved, even when there are errors in training the receiver and errors
in the feedback link, with a multi-round protocol which has K rounds of
training and K-1 rounds of binary feedback. The above result can be viewed as a
generalization of Zheng and Tse, and Aggarwal and Sabharwal, where the result
was shown to hold for K=1 and K=2 respectively. For TDD systems, we also
develop new achievable strategies with multiple rounds of communication between
the transmitter and the receiver, which use the reciprocity of the forward and
the feedback channel. The multi-round TDD protocol achieves a
diversity-multiplexing tradeoff which uniformly dominates its FDD counterparts,
where no channel reciprocity is available.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 09:35:25 GMT"
}
] | 2014-07-15T00:00:00 |
[
[
"Aggarwal",
"Vaneet",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1021
|
Pierrick Tranouez
|
Pierrick Tranouez (LITIS), Patrice Langlois (IDEES), Eric Daud\'e
(IDEES)
|
A multiagent urban traffic simulation Part I: dealing with the ordinary
| null |
ICCSA 2009, France (2009)
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe in this article a multiagent urban traffic simulation, as we
believe individual-based modeling is necessary to encompass the complex
influence the actions of an individual vehicle can have on the overall flow of
vehicles. We first describe how we build a graph description of the network
from purely geometric data, ESRI shapefiles. We then explain how we include
traffic related data to this graph. We go on after that with the model of the
vehicle agents: origin and destination, driving behavior, multiple lanes,
crossroads, and interactions with the other vehicles in day-to-day, ?ordinary?
traffic. We conclude with the presentation of the resulting simulation of this
model on the Rouen agglomeration.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 12:20:17 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Tranouez",
"Pierrick",
"",
"LITIS"
],
[
"Langlois",
"Patrice",
"",
"IDEES"
],
[
"Daudé",
"Eric",
"",
"IDEES"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.1030
|
Amir Ben-Amram
|
Amir M. Ben-Amram
|
The Euler Path to Static Level-Ancestors
|
11 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Suppose that a rooted tree T is given for preprocessing. The Level-Ancestor
Problem is to answer quickly queries of the following form. Given a vertex v
and an integer i > 0, find the i-th vertex on the path from the root to v.
Algorithms that achieve a linear time bound for preprocessing and a constant
time bound for a query have been published by Dietz (1991), Alstrup and Holm
(2000), and Bender and Farach (2002). The first two algorithms address dynamic
versions of the problem; the last addresses the static version only and is the
simplest so far. The purpose of this note is to expose another simple
algorithm, derived from a complicated PRAM algorithm by Berkman and Vishkin
(1990,1994). We further show some easy extensions of its functionality, adding
queries for descendants and level successors as well as ancestors, extensions
for which the formerly known algorithms are less suitable.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 14:15:29 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Ben-Amram",
"Amir M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1037
|
Michael Goodrich
|
Michael T. Goodrich
|
Randomized Shellsort: A Simple Oblivious Sorting Algorithm
|
Version of paper accepted to 2010 ACM-SIAM Symposium on Discrete
Algorithms (SODA)
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we describe randomized Shellsort--a simple, randomized,
data-oblivious version of the Shellsort algorithm that always runs in O(n log
n) time and, as we show, succeeds in sorting any given input permutation with
very high probability. Thus, randomized Shellsort is simultaneously simple,
time-optimal, and data-oblivious. Taken together, these properties imply
applications in the design of new efficient privacy-preserving computations
based on the secure multi-party computation (SMC) paradigm. In addition, by a
trivial conversion of this Monte Carlo algorithm to its Las Vegas equivalent,
one gets the first version of Shellsort with a running time that is provably
O(n log n) with very high probability.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 15:40:42 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Sep 2009 00:37:15 GMT"
},
{
"version": "v3",
"created": "Wed, 4 Aug 2010 18:16:47 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Goodrich",
"Michael T.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1045
|
R Doomun
|
Alexei Barbosa de Aguiar, Placido Rogerio Pinheiro, Alvaro de Menezes
S. Neto, Ruddy P. P. Cunha, Rebecca F. Pinheiro
|
A Novel Model for Optimized GSM Network Design
|
6 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSn 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
GSM networks are very expensive. The network design process requires too many
decisions in a combinatorial explosion. For this reason, the larger is the
network, the harder is to achieve a totally human based optimized solution. The
BSC (Base Station Control) nodes have to be geographically well allocated to
reduce the transmission costs. There are decisions of association between BTS
and BSC those impacts in the correct dimensioning of these BSC. The choice of
BSC quantity and model capable of carrying the cumulated traffic of its
affiliated BTS nodes in turn reflects on the total cost. In addition, the last
component of the total cost is due to transmission for linking BSC nodes to
MSC. These trunks have a major significance since the number of required E1
lines is larger than BTS to BSC link. This work presents an integer programming
model and a computational tool for designing GSM (Global System for Mobile
Communications) networks, regarding BSS (Base Station Subsystem) with optimized
cost.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 18:20:22 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"de Aguiar",
"Alexei Barbosa",
""
],
[
"Pinheiro",
"Placido Rogerio",
""
],
[
"Neto",
"Alvaro de Menezes S.",
""
],
[
"Cunha",
"Ruddy P. P.",
""
],
[
"Pinheiro",
"Rebecca F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1049
|
R Doomun
|
M. N. Doja, and Dharmender Saini
|
Electronic Authority Variation
|
5 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When a person joins in an organization, he becomes authorize to take some
decisions on behalf of that organization; means he is given some authority to
exercise. After some time, on the basis of his performance in the organization,
he is given promotion and he becomes eligible to exercise to some higher
authorities. And further, he may get some higher promotion or he may leave the
organization. So, during his stay in the organization, the authority of that
person varies from the time he joins the organization until he/she leaves the
organization. This paper presents the variation in authorities of a person in
the organization. The method implements the queuing model to analyze the
various people in the queue of their promotion and looks at various parameters
like average waiting time etc.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 19:15:58 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Doja",
"M. N.",
""
],
[
"Saini",
"Dharmender",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.1051
|
Gleb Oshanin
|
G. Kabatiansky (1,2), G.Oshanin (2,3) ((1) Dobrushin Mathematical
Laboratory, Institute of Information Transmission Problems, Moscow, Russia,
(2) Laboratory J.-V. Poncelet, Independent University of Moscow, Russia, (3)
LPTMC, University Pierre & Marie Curie, Paris, France)
|
Finding passwords by random walks: How long does it take?
|
To appear in J. Phys. A, special issue on "Random Search Problem:
Trends and Perspectives", eds.: MEG da Luz, E Raposo, GM Viswanathan and A
Grosberg
|
J. Phys. A 42 No 43, 434016 (2009)
|
10.1088/1751-8113/42/43/434016
| null |
cs.CR cond-mat.other cs.DS math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We compare an efficiency of a deterministic "lawnmower" and random search
strategies for finding a prescribed sequence of letters (a password) of length
M in which all letters are taken from the same Q-ary alphabet. We show that at
best a random search takes two times longer than a "lawnmower" search.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 19:25:35 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Kabatiansky",
"G.",
""
],
[
"Oshanin",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0909.1062
|
Ankan Saha
|
Ankan Saha (1), S.V.N. Vishwanathan (2), Xinhua Zhang (3) ((1)
University of Chicago, (2) Purdue University, (3) University of Alberta)
|
New Approximation Algorithms for Minimum Enclosing Convex Shapes
|
18 Pages Accepted in SODA 2011
| null | null | null |
cs.CG cs.DS cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given $n$ points in a $d$ dimensional Euclidean space, the Minimum Enclosing
Ball (MEB) problem is to find the ball with the smallest radius which contains
all $n$ points. We give a $O(nd\Qcal/\sqrt{\epsilon})$ approximation algorithm
for producing an enclosing ball whose radius is at most $\epsilon$ away from
the optimum (where $\Qcal$ is an upper bound on the norm of the points). This
improves existing results using \emph{coresets}, which yield a $O(nd/\epsilon)$
greedy algorithm. Finding the Minimum Enclosing Convex Polytope (MECP) is a
related problem wherein a convex polytope of a fixed shape is given and the aim
is to find the smallest magnification of the polytope which encloses the given
points. For this problem we present a $O(mnd\Qcal/\epsilon)$ approximation
algorithm, where $m$ is the number of faces of the polytope. Our algorithms
borrow heavily from convex duality and recently developed techniques in
non-smooth optimization, and are in contrast with existing methods which rely
on geometric arguments. In particular, we specialize the excessive gap
framework of \citet{Nesterov05a} to obtain our results.
|
[
{
"version": "v1",
"created": "Sat, 5 Sep 2009 23:24:32 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Sep 2009 16:01:53 GMT"
},
{
"version": "v3",
"created": "Mon, 21 Dec 2009 14:30:54 GMT"
},
{
"version": "v4",
"created": "Wed, 15 Sep 2010 00:54:09 GMT"
}
] | 2010-09-16T00:00:00 |
[
[
"Saha",
"Ankan",
""
],
[
"Vishwanathan",
"S. V. N.",
""
],
[
"Zhang",
"Xinhua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0909.1072
|
Michal Feldman
|
Edith Cohen and Michal Feldman and Amos Fiat and Haim Kaplan and
Svetlana Olonetsky
|
Envy-Free Makespan Approximation
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study envy-free mechanisms for scheduling tasks on unrelated machines
(agents) that approximately minimize the makespan. For indivisible tasks, we
put forward an envy-free poly-time mechanism that approximates the minimal
makespan to within a factor of $O(\log m)$, where $m$ is the number of
machines. We also show a lower bound of $\Omega(\log m / \log\log m)$. This
improves the recent result of Hartline {\sl et al.} \cite{Ahuva:2008} who give
an upper bound of $(m+1)/2$, and a lower bound of $2-1/m$. For divisible tasks,
we show that there always exists an envy-free poly-time mechanism with optimal
makespan.
|
[
{
"version": "v1",
"created": "Sun, 6 Sep 2009 09:19:59 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Cohen",
"Edith",
""
],
[
"Feldman",
"Michal",
""
],
[
"Fiat",
"Amos",
""
],
[
"Kaplan",
"Haim",
""
],
[
"Olonetsky",
"Svetlana",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.1102
|
Stefan G\"oller
|
Stefan G\"oller, Markus Lohrey
|
Branching-time model checking of one-counter processes
| null | null | null | null |
cs.LO cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One-counter processes (OCPs) are pushdown processes which operate only on a
unary stack alphabet. We study the computational complexity of model checking
computation tree logic (CTL) over OCPs. A PSPACE upper bound is inherited from
the modal mu-calculus for this problem. First, we analyze the periodic
behaviour of CTL over OCPs and derive a model checking algorithm whose running
time is exponential only in the number of control locations and a syntactic
notion of the formula that we call leftward until depth. Thus, model checking
fixed OCPs against CTL formulas with a fixed leftward until depth is in P. This
generalizes a result of the first author, Mayr, and To for the expression
complexity of CTL's fragment EF. Second, we prove that already over some fixed
OCP, CTL model checking is PSPACE-hard. Third, we show that there already
exists a fixed CTL formula for which model checking of OCPs is PSPACE-hard. To
obtain the latter result, we employ two results from complexity theory: (i)
Converting a natural number in Chinese remainder presentation into binary
presentation is in logspace-uniform NC^1 and (ii) PSPACE is AC^0-serializable.
We demonstrate that our approach can be used to obtain further results. We show
that model-checking CTL's fragment EF over OCPs is hard for P^NP, thus
establishing a matching lower bound and answering an open question of the first
author, Mayr, and To. We moreover show that the following problem is hard for
PSPACE: Given a one-counter Markov decision process, a set of target states
with counter value zero each, and an initial state, to decide whether the
probability that the initial state will eventually reach one of the target
states is arbitrarily close to 1. This improves a previously known lower bound
for every level of the Boolean hierarchy by Brazdil et al.
|
[
{
"version": "v1",
"created": "Sun, 6 Sep 2009 19:12:25 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Göller",
"Stefan",
""
],
[
"Lohrey",
"Markus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.1115
|
Yan Zhu
|
Yan Zhu and Dongning Guo
|
Capacity Region of Layered Erasure One-sided Interference Channels
without CSIT
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies a layered erasure interference channel model, which is a
simplification of the Gaussian interference channel with fading using the
deterministic model approach. In particular, the capacity region of the layered
erasure one-sided interference channel is completely determined, assuming that
the channel state information (CSI) is known to the receivers, but there is no
CSI at transmitters (CSIT). The result holds for arbitrary fading statistics.
Previous results of Aggarwal, Sankar, Calderbank and Poor on the capacity
region or sum capacity under several interference configurations are shown to
be special cases of the capacity region shown in this paper.
|
[
{
"version": "v1",
"created": "Sun, 6 Sep 2009 21:37:21 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Zhu",
"Yan",
""
],
[
"Guo",
"Dongning",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1127
|
Raymond Chi-Wing Wong
|
Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei,
Philip S. Yu
|
Anonymization with Worst-Case Distribution-Based Background Knowledge
| null | null | null | null |
cs.DB cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Background knowledge is an important factor in privacy preserving data
publishing. Distribution-based background knowledge is one of the well studied
background knowledge. However, to the best of our knowledge, there is no
existing work considering the distribution-based background knowledge in the
worst case scenario, by which we mean that the adversary has accurate knowledge
about the distribution of sensitive values according to some tuple attributes.
Considering this worst case scenario is essential because we cannot overlook
any breaching possibility. In this paper, we propose an algorithm to anonymize
dataset in order to protect individual privacy by considering this background
knowledge. We prove that the anonymized datasets generated by our proposed
algorithm protects individual privacy. Our empirical studies show that our
method preserves high utility for the published data at the same time.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 01:44:36 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Wong",
"Raymond Chi-Wing",
""
],
[
"Fu",
"Ada Wai-Chee",
""
],
[
"Wang",
"Ke",
""
],
[
"Xu",
"Yabo",
""
],
[
"Pei",
"Jian",
""
],
[
"Yu",
"Philip S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.1138
|
Richard Diamond
|
Richard V. Diamond
|
User Experience, Software Interfaces, and The Unconscious
|
Under Review
| null | null | null |
cs.HC
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Ideas about how to increase the unconscious participation in interaction
between 'a human' and 'a computer' are developed in this paper. Evidence of
impact of the unconscious functioning is presented. The unconscious is
characterised as being a responsive, contextual, and autonomous participant of
human-computer interaction. The unconscious participation occurs independently
of one's cognitive and educational levels and, if ignored, leads to learning
inefficiencies and compulsive behaviours, illustrations of which are provided.
Three practical approaches to a study of subjective user experience are
outlined as follows: (a) tracing operant conditioning effects of software, (b)
registering signs of brain activity psychological or information processing
meaning of which is well-explored and (c) exploring submodality interfaces.
Implications for improvement of current usability study methods, such as
eye-tracking, are generally considered. Conclusions consider advantages and
disadvantages of unconscious-embracing design and remind about a loss of human
evolutionary choices if unconscious participation is ignored, complicated or
blocked in interaction with computer interfaces and built environment.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 03:15:42 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Sep 2009 04:20:05 GMT"
},
{
"version": "v3",
"created": "Mon, 2 Nov 2009 01:46:35 GMT"
}
] | 2009-11-02T00:00:00 |
[
[
"Diamond",
"Richard V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.1145
|
R Doomun
|
Yi Yi Thaw, Ahmad Kamil Mahmood, P. Dhanapal Durai Dominic
|
A Study on the Factors That Influence the Consumers Trust on Ecommerce
Adoption
|
7 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The development of electronic commerce is characterized with anonymity,
uncertainty, lack of control and potential opportunism. Therefore, the success
of electronic commerce significantly depends on providing security and privacy
for its consumers sensitive personal data. Consumers lack of acceptance in
electronic commerce adoption today is not merely due to the concern on security
and privacy of their personal data, but also lack of trust and reliability of
Web vendors. Consumers trust in online transactions is crucial for the
continuous growth and development of electronic commerce. Since Business to
Consumer (B2C) ecommerce requires the consumers to engage the technologies, the
consumers face a variety of security risks. This study addressed the role of
security, privacy and risk perceptions of consumers to shop online in order to
establish a consensus among them. The analyses provided descriptive frequencies
for the research variables and for each of the study s research constructs. In
addition, the analyses were completed with factor analysis and Pearson
correlation coefficients. The findings suggested that perceived privacy of
online transaction on trust is mediated by perceived security, and consumers
trust in online transaction is significantly related with the trustworthiness
of Web vendors. Also, consumers trust is negatively associated with perceived
risks in online transactions. However, there is no significant impact from
perceived security and perceived privacy to trust in online transactions.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 06:06:50 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Thaw",
"Yi Yi",
""
],
[
"Mahmood",
"Ahmad Kamil",
""
],
[
"Dominic",
"P. Dhanapal Durai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0909.1146
|
Saurabh Kumar Garg
|
Saurabh Kumar Garg, Chee Shin Yeo, Arun Anandasivam, Rajkumar Buyya
|
Energy-Efficient Scheduling of HPC Applications in Cloud Computing
Environments
| null | null | null | null |
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The use of High Performance Computing (HPC) in commercial and consumer IT
applications is becoming popular. They need the ability to gain rapid and
scalable access to high-end computing capabilities. Cloud computing promises to
deliver such a computing infrastructure using data centers so that HPC users
can access applications and data from a Cloud anywhere in the world on demand
and pay based on what they use. However, the growing demand drastically
increases the energy consumption of data centers, which has become a critical
issue. High energy consumption not only translates to high energy cost, which
will reduce the profit margin of Cloud providers, but also high carbon
emissions which is not environmentally sustainable. Hence, energy-efficient
solutions are required that can address the high increase in the energy
consumption from the perspective of not only Cloud provider but also from the
environment. To address this issue we propose near-optimal scheduling policies
that exploits heterogeneity across multiple data centers for a Cloud provider.
We consider a number of energy efficiency factors such as energy cost, carbon
emission rate, workload, and CPU power efficiency which changes across
different data center depending on their location, architectural design, and
management system. Our carbon/energy based scheduling policies are able to
achieve on average up to 30% of energy savings in comparison to profit based
scheduling policies leading to higher profit and less carbon emissions.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 06:13:40 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Garg",
"Saurabh Kumar",
""
],
[
"Yeo",
"Chee Shin",
""
],
[
"Anandasivam",
"Arun",
""
],
[
"Buyya",
"Rajkumar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.1147
|
Prabhulla Chandran Pillai
|
B Prabhulla Chandran Pillai
|
Empowering OLAC Extension using Anusaaraka and Effective text processing
using Double Byte coding
|
5 Pages, 4 figures
| null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper reviews the hurdles while trying to implement the OLAC extension
for Dravidian / Indian languages. The paper further explores the possibilities
which could minimise or solve these problems. In this context, the Chinese
system of text processing and the anusaaraka system are scrutinised.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 06:29:51 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Pillai",
"B Prabhulla Chandran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.1151
|
Antoine Seilles
|
Jean Sallantin (LIRMM), Antoine Seilles (LIRMM)
|
n-Opposition theory to structure debates
| null | null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
2007 was the first international congress on the ?square of oppositions?. A
first attempt to structure debate using n-opposition theory was presented along
with the results of a first experiment on the web. Our proposal for this paper
is to define relations between arguments through a structure of opposition
(square of oppositions is one structure of opposition). We will be trying to
answer the following questions: How to organize debates on the web 2.0? How to
structure them in a logical way? What is the role of n-opposition theory, in
this context? We present in this paper results of three experiments
(Betapolitique 2007, ECAP 2008, Intermed 2008).
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 06:41:06 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Sallantin",
"Jean",
"",
"LIRMM"
],
[
"Seilles",
"Antoine",
"",
"LIRMM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.1153
|
Dae San Kim
|
Dae San Kim
|
Recursive formulas generating power moments of multi-dimensional
Kloosterman sums and $m$-multiple power moments of Kloosterman sums
|
14 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct two binary linear codes associated with
multi-dimensional and $m -$multiple power Kloosterman sums (for any fixed $m$)
over the finite field $\mathbb{F}_{q}$. Here $q$ is a power of two. The former
codes are dual to a subcode of the binary hyper-Kloosterman code. Then we
obtain two recursive formulas for the power moments of multi-dimensional
Kloosterman sums and for the $m$-multiple power moments of Kloosterman sums in
terms of the frequencies of weights in the respective codes. This is done via
Pless power moment identity and yields, in the case of power moments of
multi-dimensional Kloosterman sums, much simpler recursive formulas than those
associated with finite special linear groups obtained previously.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 07:00:11 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1156
|
Dae San Kim
|
Dae San Kim
|
Ternary Codes Associated with $O(3,3^r)$ and Power Moments of
Kloosterman Sums with Trace Nonzero Square Arguments
|
15 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct two ternary linear codes $C(SO(3,q))$ and
$C(O(3,q))$, respectively associated with the orthogonal groups $SO(3,q)$ and
$O(3,q)$. Here $q$ is a power of three. Then we obtain two recursive formulas
for the power moments of Kloosterman sums with $``$trace nonzero square
arguments" in terms of the frequencies of weights in the codes. This is done
via Pless power moment identity and by utilizing the explicit expressions of
Gauss sums for the orthogonal groups.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 07:35:12 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1175
|
Dae San Kim
|
Dae San Kim
|
Infinite Families of Recursive Formulas Generating Power Moments of
Ternary Kloosterman Sums with Trace Nonzero Square Arguments: $O(2n+1,2^{r})$
Case
|
19 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct four infinite families of ternary linear codes
associated with double cosets in $O(2n+1,q)$ with respect to certain maximal
parabolic subgroup of the special orthogonal group $SO(2n+1,q)$. Here $q$ is a
power of three. Then we obtain two infinite families of recursive formulas, the
one generating the power moments of Kloosterman sums with $``$trace nonzero
square arguments" and the other generating the even power moments of those.
Both of these families are expressed in terms of the frequencies of weights in
the codes associated with those double cosets in $O(2n+1,q)$ and in the codes
associated with similar double cosets in the symplectic group $Sp(2n,q)$. This
is done via Pless power moment identity and by utilizing the explicit
expressions of exponential sums over those double cosets related to the
evaluations of $"$Gauss sums" for the orthogonal group $O(2n+1,q)$.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 09:01:10 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1178
|
Dae San Kim
|
Dae San Kim
|
Infinite Families of Recursive Formulas Generating Power Moments of
Ternary Kloosterman Sums with Square Arguments Associated with
$O^{-}_{}(2n,q)$
|
20 pages
| null | null | null |
math.NT cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we construct eight infinite families of ternary linear codes
associated with double cosets with respect to certain maximal parabolic
subgroup of the special orthogonal group $SO^{-}(2n,q)$. Here ${q}$ is a power
of three. Then we obtain four infinite families of recursive formulas for power
moments of Kloosterman sums with square arguments and four infinite families of
recursive formulas for even power moments of those in terms of the frequencies
of weights in the codes. This is done via Pless power moment identity and by
utilizing the explicit expressions of exponential sums over those double cosets
related to the evaluations of $"$Gauss sums" for the orthogonal groups
$O^{-}(2n,q)$.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 09:10:01 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Kim",
"Dae San",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1186
|
Vyacheslav Yukalov
|
V.I. Yukalov and D. Sornette
|
Scheme of thinking quantum systems
|
Latex file, 15 pages, 1 figure
|
Laser Phys. Lett. 6 (2009) 833-839
|
10.1002/lapl.200910086
| null |
quant-ph cond-mat.quant-gas cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A general approach describing quantum decision procedures is developed. The
approach can be applied to quantum information processing, quantum computing,
creation of artificial quantum intelligence, as well as to analyzing decision
processes of human decision makers. Our basic point is to consider an active
quantum system possessing its own strategic state. Processing information by
such a system is analogous to the cognitive processes associated to decision
making by humans. The algebra of probability operators, associated with the
possible options available to the decision maker, plays the role of the algebra
of observables in quantum theory of measurements. A scheme is advanced for a
practical realization of decision procedures by thinking quantum systems. Such
thinking quantum systems can be realized by using spin lattices, systems of
magnetic molecules, cold atoms trapped in optical lattices, ensembles of
quantum dots, or multilevel atomic systems interacting with electromagnetic
field.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 09:32:00 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Yukalov",
"V. I.",
""
],
[
"Sornette",
"D.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Physics",
"code": "cond-mat.quant-gas",
"description": "Ultracold atomic and molecular gases, Bose-Einstein condensation, Feshbach resonances, spinor condensates, optical lattices, quantum simulation with cold atoms and molecules, macroscopic interference phenomena",
"span": "(Quantum Gases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.1187
|
Marco Aldinucci
|
Marco Aldinucci, Massimo Torquati, Massimiliano Meneghin
|
FastFlow: Efficient Parallel Streaming Applications on Multi-core
|
23 pages + cover
| null | null |
TR-09-12
|
cs.DC cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Shared memory multiprocessors come back to popularity thanks to rapid
spreading of commodity multi-core architectures. As ever, shared memory
programs are fairly easy to write and quite hard to optimise; providing
multi-core programmers with optimising tools and programming frameworks is a
nowadays challenge. Few efforts have been done to support effective streaming
applications on these architectures. In this paper we introduce FastFlow, a
low-level programming framework based on lock-free queues explicitly designed
to support high-level languages for streaming applications. We compare FastFlow
with state-of-the-art programming frameworks such as Cilk, OpenMP, and Intel
TBB. We experimentally demonstrate that FastFlow is always more efficient than
all of them in a set of micro-benchmarks and on a real world application; the
speedup edge of FastFlow over other solutions might be bold for fine grain
tasks, as an example +35% on OpenMP, +226% on Cilk, +96% on TBB for the
alignment of protein P01111 against UniProt DB using Smith-Waterman algorithm.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 09:33:57 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Aldinucci",
"Marco",
""
],
[
"Torquati",
"Massimo",
""
],
[
"Meneghin",
"Massimiliano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0909.1198
|
Dag Normann
|
Dag Normann
|
A rich hierarchy of functionals of finite types
|
21 pages
|
Logical Methods in Computer Science, Volume 5, Issue 3 (September
24, 2009) lmcs:954
|
10.2168/LMCS-5(3:11)2009
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We are considering typed hierarchies of total, continuous functionals using
complete, separable metric spaces at the base types. We pay special attention
to the so called Urysohn space constructed by P. Urysohn. One of the properties
of the Urysohn space is that every other separable metric space can be
isometrically embedded into it. We discuss why the Urysohn space may be
considered as the universal model of possibly infinitary outputs of algorithms.
The main result is that all our typed hierarchies may be topologically
embedded, type by type, into the corresponding hierarchy over the Urysohn
space. As a preparation for this, we prove an effective density theorem that is
also of independent interest.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 10:16:20 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Sep 2009 10:02:03 GMT"
}
] | 2015-07-01T00:00:00 |
[
[
"Normann",
"Dag",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.1209
|
Doron Ezri
|
Oded Redlich, Doron Ezri and Dov Wulich
|
SNR Estimation in Maximum Likelihood Decoded Spatial Multiplexing
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Link adaptation is a crucial part of many modern communications systems,
allowing the system to adapt the transmission and reception strategies to
changes in channel conditions. One of the fundamental components of the link
adaptation mechanism is signal to noise ratio (SNR) estimation, measuring the
instantaneous (mostly post processing) SNR at the receiver. That is, the SNR at
the decoder input, which is an important metric for the prediction of decoder
performance. In linearly decoded MIMO, which is the common MIMO decoding
strategy, the post processing SNR is well defined. However, this is not the
case in optimal maximum likelihood (ML) decoding applied to spatial
multiplexing (SM). This gap is interesting since ML decoded SM is gaining ever
growing interest in recent research and practice due to the rapid increase in
computation power, and available near optimal low complexity schemes. In this
paper we close the gap and provide SNR estimation schemes for ML decoded SM,
which are based on various approximations of the "per stream" error
probability. The proposed methods are applicable for both horizonal and
vertical decoding. Moreover, we propose a very low complexity implementation
for the SNR estimation mechanism employing the ML decoder itself with
negligible overhead.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 11:05:42 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Redlich",
"Oded",
""
],
[
"Ezri",
"Doron",
""
],
[
"Wulich",
"Dov",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1241
|
Virag Shah
|
Virag Shah, Neelesh B. Mehta, Raymond Yim
|
Optimal Timer Based Selection Schemes
|
21 pages, 6 figures, 1 table, submitted to IEEE Transactions on
Communications, uses stackrel.sty
| null |
10.1109/TCOMM.2010.06.090266
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Timer-based mechanisms are often used to help a given (sink) node select the
best helper node among many available nodes. Specifically, a node transmits a
packet when its timer expires, and the timer value is a monotone non-increasing
function of its local suitability metric. The best node is selected
successfully if no other node's timer expires within a 'vulnerability' window
after its timer expiry, and so long as the sink can hear the available nodes.
In this paper, we show that the optimal metric-to-timer mapping that (i)
maximizes the probability of success or (ii) minimizes the average selection
time subject to a minimum constraint on the probability of success, maps the
metric into a set of discrete timer values. We specify, in closed-form, the
optimal scheme as a function of the maximum selection duration, the
vulnerability window, and the number of nodes. An asymptotic characterization
of the optimal scheme turns out to be elegant and insightful. For any
probability distribution function of the metric, the optimal scheme is
scalable, distributed, and performs much better than the popular inverse metric
timer mapping. It even compares favorably with splitting-based selection, when
the latter's feedback overhead is accounted for.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 16:13:39 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Shah",
"Virag",
""
],
[
"Mehta",
"Neelesh B.",
""
],
[
"Yim",
"Raymond",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1257
|
Jaap-Henk Hoepman
|
Jaap-Henk Hoepman, Rieks Joosten
|
Practical Schemes For Privacy & Security Enhanced RFID
|
18 pages
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Proper privacy protection in RFID systems is important. However, many of the
schemes known are impractical, either because they use hash functions instead
of the more hardware efficient symmetric encryption schemes as a efficient
cryptographic primitive, or because they incur a rather costly key search time
penalty at the reader. Moreover, they do not allow for dynamic, fine-grained
access control to the tag that cater for more complex usage scenarios.
In this paper we investigate such scenarios, and propose a model and
corresponding privacy friendly protocols for efficient and fine-grained
management of access permissions to tags. In particular we propose an efficient
mutual authentication protocol between a tag and a reader that achieves a
reasonable level of privacy, using only symmetric key cryptography on the tag,
while not requiring a costly key-search algorithm at the reader side. Moreover,
our protocol is able to recover from stolen readers.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 14:32:01 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jan 2010 14:44:41 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Feb 2010 14:13:52 GMT"
}
] | 2010-02-25T00:00:00 |
[
[
"Hoepman",
"Jaap-Henk",
""
],
[
"Joosten",
"Rieks",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.1305
|
Christian Mercat
|
Alexander I. Bobenko (IM TU-B), Christian Mercat (LIRMM, I3M), Markus
Schmies (IM TU-B)
|
Conformal Structures and Period Matrices of Polyhedral Surfaces
|
1--13
| null | null | null |
math.DG cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We recall the theory of linear discrete Riemann surfaces and show how to use
it in order to interpret a surface embedded in R^3 as a discrete Riemann
surface and compute its basis of holomorphic forms on it. We present numerical
examples, recovering known results to test the numerics and giving the yet
unknown period matrix of the Lawson genus-2 surface.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 18:46:03 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Bobenko",
"Alexander I.",
"",
"IM TU-B"
],
[
"Mercat",
"Christian",
"",
"LIRMM, I3M"
],
[
"Schmies",
"Markus",
"",
"IM TU-B"
]
] |
[
{
"class": "Mathematics",
"code": "math.DG",
"description": "Complex, contact, Riemannian, pseudo-Riemannian and Finsler geometry, relativity, gauge theory, global analysis",
"span": "(Differential Geometry)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0909.1308
|
Olivier Cappe
|
Nataliya Sokolovska (LTCI), Thomas Lavergne (LIMSI), Olivier Capp\'e
(LTCI), Fran\c{c}ois Yvon (LIMSI)
|
Efficient Learning of Sparse Conditional Random Fields for Supervised
Sequence Labelling
| null | null |
10.1109/JSTSP.2010.2076150
| null |
cs.LG cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Conditional Random Fields (CRFs) constitute a popular and efficient approach
for supervised sequence labelling. CRFs can cope with large description spaces
and can integrate some form of structural dependency between labels. In this
contribution, we address the issue of efficient feature selection for CRFs
based on imposing sparsity through an L1 penalty. We first show how sparsity of
the parameter set can be exploited to significantly speed up training and
labelling. We then introduce coordinate descent parameter update schemes for
CRFs with L1 regularization. We finally provide some empirical comparisons of
the proposed approach with state-of-the-art CRF training strategies. In
particular, it is shown that the proposed approach is able to take profit of
the sparsity to speed up processing and hence potentially handle larger
dimensional models.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 18:48:42 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Jan 2010 16:48:14 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Sokolovska",
"Nataliya",
"",
"LTCI"
],
[
"Lavergne",
"Thomas",
"",
"LIMSI"
],
[
"Cappé",
"Olivier",
"",
"LTCI"
],
[
"Yvon",
"François",
"",
"LIMSI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.1310
|
Laura Rebollo-Neira
|
James Bowley and Laura Rebollo-Neira
|
Sparse image representation by discrete cosine/spline based dictionaries
| null | null | null | null |
math.NA cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mixed dictionaries generated by cosine and B-spline functions are considered.
It is shown that, by highly nonlinear approaches such as Orthogonal Matching
Pursuit, the discrete version of the proposed dictionaries yields a significant
gain in the sparsity of an image representation.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 18:50:23 GMT"
}
] | 2009-09-08T00:00:00 |
[
[
"Bowley",
"James",
""
],
[
"Rebollo-Neira",
"Laura",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0909.1315
|
Catalin Anghel Mr
|
Catalin Anghel
|
Base Selection and Transmission Synchronization Algorithm in Quantum
Cryptography
|
4 pages, 1 figure, [12]. Proceedings CSCS17 - 17th International
Conference on Control Systems and Computer Science, Romania, Bucharest, May
2009
| null | null | null |
cs.CR quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One Achilles heal of classical cryptographic communication systems is that
secret communication can only take place after a key is communicated in secret
over a totally secure communication channel. Here comes quantum key
distribution which takes advantage of certain phenomena that occur at the
subatomic level, so that any attempt by an enemy to obtain the bits in a key
not only fails, but gets detected as well. This paper proposes the idea of on
algorithm, intended to be a quantum network algorithm named Base Selection and
Transmission Synchronization - BSTS, which can realize a perfectly secure
communication between two computers.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 19:48:17 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Anghel",
"Catalin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0909.1334
|
Ankan Saha
|
Ankan Saha (1), Xinhua Zhang (2), S.V.N. Vishwanathan (3) ((1)
University of Chicago, (2) Australian National University, NICTA, (3) Purdue
University)
|
Lower Bounds for BMRM and Faster Rates for Training SVMs
|
21 pages, 49 figures
| null | null | null |
cs.LG cs.AI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Regularized risk minimization with the binary hinge loss and its variants
lies at the heart of many machine learning problems. Bundle methods for
regularized risk minimization (BMRM) and the closely related SVMStruct are
considered the best general purpose solvers to tackle this problem. It was
recently shown that BMRM requires $O(1/\epsilon)$ iterations to converge to an
$\epsilon$ accurate solution. In the first part of the paper we use the
Hadamard matrix to construct a regularized risk minimization problem and show
that these rates cannot be improved. We then show how one can exploit the
structure of the objective function to devise an algorithm for the binary hinge
loss which converges to an $\epsilon$ accurate solution in
$O(1/\sqrt{\epsilon})$ iterations.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 20:58:47 GMT"
},
{
"version": "v2",
"created": "Tue, 8 Sep 2009 22:00:12 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Saha",
"Ankan",
""
],
[
"Zhang",
"Xinhua",
""
],
[
"Vishwanathan",
"S. V. N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1338
|
Keigo Hirakawa
|
Keigo Hirakawa and Patrick J. Wolfe
|
"Rewiring" Filterbanks for Local Fourier Analysis: Theory and Practice
| null |
IEEE Transactions on Information Theory, vol. 57, pp. 5360-5374,
2011
|
10.1109/TIT.2011.2158895
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article describes a series of new results outlining equivalences between
certain "rewirings" of filterbank system block diagrams, and the corresponding
actions of convolution, modulation, and downsampling operators. This gives rise
to a general framework of reverse-order and convolution subband structures in
filterbank transforms, which we show to be well suited to the analysis of
filterbank coefficients arising from subsampled or multiplexed signals. These
results thus provide a means to understand time-localized aliasing and
modulation properties of such signals and their subband
representations--notions that are notably absent from the global viewpoint
afforded by Fourier analysis. The utility of filterbank rewirings is
demonstrated by the closed-form analysis of signals subject to degradations
such as missing data, spatially or temporally multiplexed data acquisition, or
signal-dependent noise, such as are often encountered in practical signal
processing applications.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 20:58:01 GMT"
}
] | 2012-10-15T00:00:00 |
[
[
"Hirakawa",
"Keigo",
""
],
[
"Wolfe",
"Patrick J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1344
|
Hoon Huh
|
Hoon Huh, Haralabos C. Papadopoulos, and Giuseppe Caire
|
Multiuser MISO Transmitter Optimization for Inter-Cell Interference
Mitigation
|
30 pages, 10 figures, and 1 table. revised and resubmitted to IEEE
Transactions on Signal Processing
| null |
10.1109/TSP.2010.2048564
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The transmitter optimization (i.e., steering vectors and power allocation)
for a MISO Broadcast Channel (MISO-BC) subject to general linear constraints is
considered. Such constraints include, as special cases, the sum power, the
per-antenna or per-group-of-antennas power, and "forbidden interference
direction" constraints. We consider both the optimal dirty-paper coding and the
simple suboptimal linear zero-forcing beamforming strategies, and provide
numerically efficient algorithms that solve the problem in its most general
form. As an application, we consider a multi-cell scenario with partial cell
cooperation, where each cell optimizes its precoder by taking into account
interference constraints on specific users in adjacent cells. The effectiveness
of the proposed methods is evaluated in a simple system scenario including two
adjacent cells, under different fairness criteria that emphasize the bottleneck
role of users near the cell "boundary". Our results show that "active"
Inter-Cell Interference (ICI) mitigation outperforms the conventional "static"
ICI mitigation based on fractional frequency reuse.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 21:14:34 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Mar 2010 01:16:07 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Huh",
"Hoon",
""
],
[
"Papadopoulos",
"Haralabos C.",
""
],
[
"Caire",
"Giuseppe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1346
|
Daniel Lemire
|
Daniel Lemire and Owen Kaser
|
Reordering Columns for Smaller Indexes
|
to appear in Information Sciences
|
Daniel Lemire and Owen Kaser, Reordering Columns for Smaller
Indexes, Information Sciences 181 (12), 2011
|
10.1016/j.ins.2011.02.002
| null |
cs.DB
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Column-oriented indexes-such as projection or bitmap indexes-are compressed
by run-length encoding to reduce storage and increase speed. Sorting the tables
improves compression. On realistic data sets, permuting the columns in the
right order before sorting can reduce the number of runs by a factor of two or
more. Unfortunately, determining the best column order is NP-hard. For many
cases, we prove that the number of runs in table columns is minimized if we
sort columns by increasing cardinality. Experimentally, sorting based on
Hilbert space-filling curves is poor at minimizing the number of runs.
|
[
{
"version": "v1",
"created": "Mon, 7 Sep 2009 21:34:52 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Sep 2009 03:38:20 GMT"
},
{
"version": "v3",
"created": "Wed, 6 Jan 2010 01:28:29 GMT"
},
{
"version": "v4",
"created": "Mon, 22 Mar 2010 19:04:11 GMT"
},
{
"version": "v5",
"created": "Mon, 6 Sep 2010 13:00:38 GMT"
},
{
"version": "v6",
"created": "Thu, 6 Jan 2011 23:57:37 GMT"
},
{
"version": "v7",
"created": "Wed, 9 Feb 2011 21:38:42 GMT"
},
{
"version": "v8",
"created": "Tue, 22 Feb 2011 16:00:56 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Lemire",
"Daniel",
""
],
[
"Kaser",
"Owen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1361
|
Dai Tri Man Le
|
Dai Tri Man Le
|
Statechart Verification with iState
|
11 pages, 1 figure
| null | null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is the longer version of the extended abstract with the same name
published in FM 06. We describe in detail the algorithm to generate
verification conditions from statechart structures implemented in the iState
tool. This approach also suggests us a novel method to define a version of
predicate semantics for statecharts analogous to how we assign predicate
semantics to programming languages.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 19:44:49 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Le",
"Dai Tri Man",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.1364
|
Wenguang Wang
|
Wenguang Wang (1), Yongping Xu (1), Xin Chen (2,3), Qun Li (1),
Weiping Wang (1) ((1) College of Information System and Management, National
University of Defense Technology, Changsha, China, (2) Beijing Key Laboratory
of Intelligent Telecommunications Software and Multimedia, Beijing University
of Posts and Telecommunications, Beijing, China, (3) State Key Laboratory for
Complex Systems Simulation, Beijing, China)
|
High level architecture evolved modular federation object model
|
11 pages, 3 figures, 1 table, Journal of Systems Engineering and
Electronics, 2009, 20(3):625-635
|
Journal of Systems Engineering and Electronics, 2009,
20(3):625-635
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
To improve the agility, dynamics, composability, reusability, and development
efficiency restricted by monolithic Federation Object Model (FOM), a modular
FOM was proposed by High Level Architecture (HLA) Evolved product development
group. This paper reviews the state-of-the-art of HLA Evolved modular FOM. In
particular, related concepts, the overall impact on HLA standards, extension
principles, and merging processes are discussed. Also permitted and restricted
combinations, and merging rules are provided, and the influence on HLA
interface specification is given. The comparison between modular FOM and Base
Object Model (BOM) is performed to illustrate the importance of their
combination. The applications of modular FOM are summarized. Finally, the
significance to facilitate composable simulation both in academia and practice
is presented and future directions are pointed out.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 00:50:30 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Wang",
"Wenguang",
""
],
[
"Xu",
"Yongping",
""
],
[
"Chen",
"Xin",
""
],
[
"Li",
"Qun",
""
],
[
"Wang",
"Weiping",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.1372
|
R Doomun
|
Mohammed M. Kadhum, and Suhaidi Hassan
|
The Uniformization Process of the Fast Congestion Notification (FN)
|
5 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500,Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fast Congestion Notification (FN) is one of the proactive queue management
mechanisms that practices congestion avoidance to help avoid the beginning of
congestion by marking or dropping packets before the routers queue gets full;
and exercises congestion control, when congestion avoidance fails, by
increasing the rate of packet marking or dropping. Technically, FN avoids the
queue overflows by controlling the instantaneous queue size below the optimal
queue size, and control congestion by keeping the average arrival rate close to
the outgoing link capacity. Upon arrival of each packet, FN uses the
instantaneous queue size and the average arrival rate to calculate the packet
marking or dropping probability. FN marks or drops packets at fairly regular
intervals to avoid long intermarking intervals and clustered packet marks or
drops. Too many marked or dropped packets close together can cause global
synchronization, and also too long packet intermarking times between marked or
dropped packets can cause large queue sizes and congestion. This paper shows
how FN controls the queue size, avoids congestion, and reduces global
synchronization by uniformizing marked or dropped packet intervals.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 02:14:31 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Kadhum",
"Mohammed M.",
""
],
[
"Hassan",
"Suhaidi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1374
|
R Doomun
|
Jean Pierre Jung, Ibrahima Sakho
|
On The Optimality Of All To All Broadcast In k ary n dimensional Tori
|
8 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500,Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
All to all broadcast is a collective communication in a network with the
constraint that every node must send to each other certain piece of its data.
This paper addresses the problem of optimal all port all to all broadcast in
multidimensional tori. The optimality criteria considered are the minimum
exchange steps, no duplicated data in the sense that only new data are conveyed
to receivers and the balance of the communication links load. It is proved that
under these constraints, an optimal broadcast is not feasible in any
multidimensional torus. Then, the tori which are capable of optimal broadcasts
are characterized.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 02:43:24 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Jung",
"Jean Pierre",
""
],
[
"Sakho",
"Ibrahima",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1381
|
Goutam Paul
|
Sayan Bhattacharya, Goutam Paul, Swagato Sanyal
|
On Necessary and Sufficient Number of Cops in the Game of Cops and
Robber in Multidimensional Grids
|
This is a revised and extended version of the poster paper with the
same title that has been presented in the 8th Asian Symposium on Computer
Mathematics (ASCM), December 15-17, 2007, Singapore
|
Discrete Applied Mathematics, pages 1745--1751, vol. 158, no. 16,
August 2010
|
10.1016/j.dam.2010.06.014
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We theoretically analyze the Cops and Robber Game for the first time in a
multidimensional grid. It is shown that for an $n$-dimensional grid, at least
$n$ cops are necessary to ensure capture of the robber. We also present a set
of cop strategies for which $n$ cops are provably sufficient to catch the
robber. Further, for two-dimensional grid, we provide an efficient cop strategy
for which the robber is caught even by a single cop under certain conditions.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 03:55:29 GMT"
}
] | 2015-06-12T00:00:00 |
[
[
"Bhattacharya",
"Sayan",
""
],
[
"Paul",
"Goutam",
""
],
[
"Sanyal",
"Swagato",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.1388
|
Paul Wang
|
Shengbao Wang
|
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from
Pairings
| null | null | null | null |
cs.CR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper studies the relationships between the traditional Diffie-Hellman
key agreement protocol and the identity-based (ID-based) key agreement protocol
from pairings.
For the Sakai-Ohgishi-Kasahara (SOK) ID-based key construction, we show that
identical to the Diffie-Hellman protocol, the SOK key agreement protocol also
has three variants, namely \emph{ephemeral}, \emph{semi-static} and
\emph{static} versions. Upon this, we build solid relations between
authenticated Diffie-Hellman (Auth-DH) protocols and ID-based authenticated key
agreement (IB-AK) protocols, whereby we present two \emph{substitution rules}
for this two types of protocols. The rules enable a conversion between the two
types of protocols. In particular, we obtain the \emph{real} ID-based version
of the well-known MQV (and HMQV) protocol.
Similarly, for the Sakai-Kasahara (SK) key construction, we show that the key
transport protocol underlining the SK ID-based encryption scheme (which we call
the "SK protocol") has its non-ID counterpart, namely the Hughes protocol.
Based on this observation, we establish relations between corresponding
ID-based and non-ID-based protocols. In particular, we propose a highly
enhanced version of the McCullagh-Barreto protocol.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 05:11:00 GMT"
},
{
"version": "v2",
"created": "Wed, 9 Sep 2009 08:56:22 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Wang",
"Shengbao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.1392
|
Dhananjoy Dey
|
Dhananjoy Dey, Prasanna Raghaw Mishra and Indranath Sengupta
|
HF-hash : Hash Functions Using Restricted HFE Challenge-1
|
44 pages including 32 pages appendix (list of polynomials) 2 figures,
corrected Surname
| null | null | null |
cs.CR math.AC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Vulnerability of dedicated hash functions to various attacks has made the
task of designing hash function much more challenging. This provides us a
strong motivation to design a new cryptographic hash function viz. HF-hash.
This is a hash function, whose compression function is designed by using first
32 polynomials of HFE Challenge-1 with 64 variables by forcing remaining 16
variables as zero. HF-hash gives 256 bits message digest and is as efficient as
SHA-256. It is secure against the differential attack proposed by Chabaud and
Joux as well as by Wang et. al. applied to SHA-0 and SHA-1.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 05:42:54 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 11:25:40 GMT"
}
] | 2010-07-21T00:00:00 |
[
[
"Dey",
"Dhananjoy",
""
],
[
"Mishra",
"Prasanna Raghaw",
""
],
[
"Sengupta",
"Indranath",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.AC",
"description": "Commutative rings, modules, ideals, homological algebra, computational aspects, invariant theory, connections to algebraic geometry and combinatorics",
"span": "(Commutative Algebra)"
}
] |
0909.1397
|
R Doomun
|
Iraj Ataollahi, Mortza Analoui
|
Resource Matchmaking Algorithm using Dynamic Rough Set in Grid
Environment
|
10 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.DC cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Grid environment is a service oriented infrastructure in which many
heterogeneous resources participate to provide the high performance
computation. One of the bug issues in the grid environment is the vagueness and
uncertainty between advertised resources and requested resources. Furthermore,
in an environment such as grid dynamicity is considered as a crucial issue
which must be dealt with. Classical rough set have been used to deal with the
uncertainty and vagueness. But it can just be used on the static systems and
can not support dynamicity in a system. In this work we propose a solution,
called Dynamic Rough Set Resource Discovery (DRSRD), for dealing with cases of
vagueness and uncertainty problems based on Dynamic rough set theory which
considers dynamic features in this environment. In this way, requested resource
properties have a weight as priority according to which resource matchmaking
and ranking process is done. We also report the result of the solution obtained
from the simulation in GridSim simulator. The comparison has been made between
DRSRD, classical rough set theory based algorithm, and UDDI and OWL S combined
algorithm. DRSRD shows much better precision for the cases with vagueness and
uncertainty in a dynamic system such as the grid rather than the classical
rough set theory based algorithm, and UDDI and OWL S combined algorithm.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 05:57:20 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Ataollahi",
"Iraj",
""
],
[
"Analoui",
"Mortza",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.1402
|
R Doomun
|
V. Palanisamy, P. Annadurai
|
Impact of Rushing attack on Multicast in Mobile Ad Hoc Network
|
7 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A mobile ad hoc network (MANETs) is a self-organizing system of mobile nodes
that communicate with each other via wireless links with no fixed
infrastructure or centralized administration such as base station or access
points. Nodes in a MANETs operate both as host as well as routers to forward
packets for each other in a multihop fashion. For many applications in wireless
networks, multicasting is an important and frequent communication service. By
multicasting, since a single message can be delivered to multiple receivers
simultaneously. It greatly reduces the transmission cost when sending the same
packet to multiple recipients.
The security issue of MANETs in group communications is even more challenging
because of involvement of multiple senders and multiple receivers. At that time
of multicasting, mobile ad hoc network are unprotected by the attacks of
malicious nodes because of vulnerabilities of routing protocols. Some of the
attacks are Rushing attack, Blackhole attack, Sybil attack, Neighbor attack and
Jellyfish attack.
This paper is based on Rushing attack. In Rushing attack, the attacker
exploits the duplicate suppression mechanism by quickly forwarding route
discovery packets in order to gain access to the forwarding group and this will
affect the Average Attack Success Rate.
In this paper, the goal is to measure the impact of Rushing attack and their
node positions which affect the performance metrics of Average Attack Success
Rate with respect to three scenarios: near sender, near receiver and anywhere
within the network. The performance of the Attack Success Rate with respect to
above three scenarios is also compared.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 06:28:48 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Palanisamy",
"V.",
""
],
[
"Annadurai",
"P.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1405
|
R Doomun
|
Mohsen lashkargir, S. Amirhassan Monadjemi, Ahmad Baraani Dastjerdi
|
A Hybrid Multi Objective Particle Swarm Optimization Method to Discover
Biclusters in Microarray Data
|
6 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 4, No. 1 & 2, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CE cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In recent years, with the development of microarray technique, discovery of
useful knowledge from microarray data has become very important. Biclustering
is a very useful data mining technique for discovering genes which have similar
behavior. In microarray data, several objectives have to be optimized
simultaneously and often these objectives are in conflict with each other. A
Multi Objective model is capable of solving such problems. Our method proposes
a Hybrid algorithm which is based on the Multi Objective Particle Swarm
Optimization for discovering biclusters in gene expression data. In our method,
we will consider a low level of overlapping amongst the biclusters and try to
cover all elements of the gene expression matrix. Experimental results in the
bench mark database show a significant improvement in both overlap among
biclusters and coverage of elements in the gene expression matrix.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 06:43:54 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"lashkargir",
"Mohsen",
""
],
[
"Monadjemi",
"S. Amirhassan",
""
],
[
"Dastjerdi",
"Ahmad Baraani",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0909.1412
|
Prashant Kushwah
|
Munendra Agrawal, Prashant Kushwah and Sunder Lal
|
An Efficient and Publicly Verifiable Id-Based Multi-Signcryption Scheme
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multi-signcryption is used when different senders wants to authenticate a
single message without revealing it. This paper proposes a multi signcryption
scheme in which no pairing is computed on the signcryption stage and the
signatures can be verified publicly.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 07:39:31 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Agrawal",
"Munendra",
""
],
[
"Kushwah",
"Prashant",
""
],
[
"Lal",
"Sunder",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.1426
|
Kunal Narayan Chaudhury
|
Kunal N. Chaudhury
|
L^p boundedness of the Hilbert transform
|
Notes on the L^p boundedness of the Hilbert transform
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Hilbert transform is essentially the \textit{only} singular operator in
one dimension. This undoubtedly makes it one of the the most important linear
operators in harmonic analysis. The Hilbert transform has had a profound
bearing on several theoretical and physical problems across a wide range of
disciplines; this includes problems in Fourier convergence, complex analysis,
potential theory, modulation theory, wavelet theory, aerofoil design,
dispersion relations and high-energy physics, to name a few.
In this monograph, we revisit some of the established results concerning the
global behavior of the Hilbert transform, namely that it is is weakly bounded
on $\eL^1(\R)$, and strongly bounded on $\eL^p(\R)$ for $1 < p <\infty$, and
provide a self-contained derivation of the same using real-variable techniques.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 11:43:09 GMT"
},
{
"version": "v2",
"created": "Thu, 10 Sep 2009 15:36:51 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Sep 2009 14:38:22 GMT"
},
{
"version": "v4",
"created": "Mon, 25 Jan 2010 09:13:17 GMT"
},
{
"version": "v5",
"created": "Fri, 29 Jan 2010 14:34:06 GMT"
},
{
"version": "v6",
"created": "Thu, 18 Feb 2010 14:14:44 GMT"
},
{
"version": "v7",
"created": "Tue, 2 Mar 2010 15:45:59 GMT"
},
{
"version": "v8",
"created": "Wed, 14 Jul 2010 09:05:50 GMT"
},
{
"version": "v9",
"created": "Tue, 2 Oct 2012 13:52:04 GMT"
}
] | 2012-10-03T00:00:00 |
[
[
"Chaudhury",
"Kunal N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1428
|
Daowen Qiu
|
Daowen Qiu, Lvzhou Li, Paulo Mateus, Amilcar Sernadas
|
Exponentially more concise quantum recognition of non-RMM regular
languages
|
32 pages, 6 figures. We have added a number of results concerning the
state complexity, and the proof methods for accepting languages and
equivalence have been changed. Also, the title has been changed
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that there are quantum devices that accept all regular languages and
that are exponentially more concise than deterministic finite automata (DFA).
For this purpose, we introduce a new computing model of {\it one-way quantum
finite automata} (1QFA), namely, {\it one-way quantum finite automata together
with classical states} (1QFAC), which extends naturally both measure-only 1QFA
and DFA and whose state complexity is upper-bounded by both. The original
contributions of the paper are the following. First, we show that the set of
languages accepted by 1QFAC with bounded error consists precisely of all
regular languages. Second, we prove that 1QFAC are at most exponentially more
concise than DFA. Third, we show that the previous bound is tight for families
of regular languages that are not recognized by measure-once (RMO),
measure-many (RMM) and multi-letter 1QFA. % More concretely we exhibit regular
languages $L^0(m)$ for $m$ prime such that: (i) $L^0(m)$ cannot be recognized
by measure-once, measure-many and multi-letter 1QFA; (ii) the minimal DFA that
accepts $L^0(m)$ has $O(m)$ states; (iii) there is a 1QFAC with constant
classical states and $O(\log(m))$ quantum basis that accepts $L^0(m)$. Fourth,
we give a polynomial-time algorithm for determining whether any two 1QFAC are
equivalent. Finally, we show that state minimization of 1QFAC is decidable
within EXPSPACE. We conclude the paper by posing some open problems.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 08:57:26 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Dec 2009 12:19:01 GMT"
},
{
"version": "v3",
"created": "Tue, 19 Oct 2010 03:40:31 GMT"
},
{
"version": "v4",
"created": "Tue, 19 Apr 2011 01:47:22 GMT"
},
{
"version": "v5",
"created": "Sat, 18 May 2013 13:07:38 GMT"
}
] | 2013-05-21T00:00:00 |
[
[
"Qiu",
"Daowen",
""
],
[
"Li",
"Lvzhou",
""
],
[
"Mateus",
"Paulo",
""
],
[
"Sernadas",
"Amilcar",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.1460
|
Damien Chablat
|
Anatoly Pashkevich (IRCCyN), Alexandr Klimchik (IRCCyN), Damien
Chablat (IRCCyN), Philippe Wenger (IRCCyN)
|
Accuracy Improvement for Stiffness Modeling of Parallel Manipulators
| null |
42\`eme CIRP Conference on Manufacturing Systems, Grenoble :
France (2009)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper focuses on the accuracy improvement of stiffness models for
parallel manipulators, which are employed in high-speed precision machining. It
is based on the integrated methodology that combines analytical and numerical
techniques and deals with multidimensional lumped-parameter models of the
links. The latter replace the link flexibility by localized 6-dof virtual
springs describing both translational/rotational compliance and the coupling
between them. There is presented detailed accuracy analysis of the stiffness
identification procedures employed in the commercial CAD systems (including
statistical analysis of round-off errors, evaluating the confidence intervals
for stiffness matrices). The efficiency of the developed technique is confirmed
by application examples, which deal with stiffness analysis of translational
parallel manipulators.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 11:22:09 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Klimchik",
"Alexandr",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0909.1475
|
Damien Chablat
|
Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger
(IRCCyN)
|
Design optimization of parallel manipulators for high-speed precision
machining applications
| null |
13th IFAC Symposium on Information Control Problems in
Manufacturing, Moscou : Russian Federation (2009)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper proposes an integrated approach to the design optimization of
parallel manipulators, which is based on the concept of the workspace grid and
utilizes the goal-attainment formulation for the global optimization. To
combine the non-homogenous design specification, the developed optimization
technique transforms all constraints and objectives into similar performance
indices related to the maximum size of the prescribed shape workspace. This
transformation is based on the dedicated dynamic programming procedures that
satisfy computational requirements of modern CAD. Efficiency of the developed
technique is demonstrated via two case studies that deal with optimization of
the kinematical and stiffness performances for parallel manipulators of the
Orthoglide family.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 12:39:11 GMT"
}
] | 2009-09-09T00:00:00 |
[
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0909.1517
|
Marco Aldinucci
|
Marco Aldinucci, Marco Danelutto, Peter Kilpatrick
|
Autonomic management of multiple non-functional concerns in behavioural
skeletons
|
20 pages + cover page
| null |
10.1007/978-1-4419-6794-7_8
|
TR-09-10
|
cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce and address the problem of concurrent autonomic management of
different non-functional concerns in parallel applications build as a
hierarchical composition of behavioural skeletons. We first define the problems
arising when multiple concerns are dealt with by independent managers, then we
propose a methodology supporting coordinated management, and finally we discuss
how autonomic management of multiple concerns may be implemented in a typical
use case. The paper concludes with an outline of the challenges involved in
realizing the proposed methodology on distributed target architectures such as
clusters and grids. Being based on the behavioural skeleton concept proposed in
the CoreGRID GCM, it is anticipated that the methodology will be readily
integrated into the current reference implementation of GCM based on Java
ProActive and running on top of major grid middleware systems.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 17:02:58 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Aldinucci",
"Marco",
""
],
[
"Danelutto",
"Marco",
""
],
[
"Kilpatrick",
"Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.1525
|
Harshan Jagadeesh
|
J. Harshan, B. Sundar Rajan, Are Hj{\o}rungnes
|
Training-Embedded, Single-Symbol ML-Decodable, Distributed STBCs for
Relay Networks
|
7 pages, 2 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, a special class of complex designs called Training-Embedded Complex
Orthogonal Designs (TE-CODs) has been introduced to construct single-symbol
Maximum Likelihood (ML) decodable (SSD) distributed space-time block codes
(DSTBCs) for two-hop wireless relay networks using the amplify and forward
protocol. However, to implement DSTBCs from square TE-CODs, the overhead due to
the transmission of training symbols becomes prohibitively large as the number
of relays increase. In this paper, we propose TE-Coordinate Interleaved
Orthogonal Designs (TE-CIODs) to construct SSD DSTBCs. Exploiting the block
diagonal structure of TE-CIODs, we show that, the overhead due to the
transmission of training symbols to implement DSTBCs from TE-CIODs is smaller
than that for TE-CODs. We also show that DSTBCs from TE-CIODs offer higher rate
than those from TE-CODs for identical number of relays while maintaining the
SSD and full-diversity properties.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 17:37:48 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Sep 2009 14:04:47 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Harshan",
"J.",
""
],
[
"Rajan",
"B. Sundar",
""
],
[
"Hjørungnes",
"Are",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1552
|
Adrian Dumitrescu
|
Adrian Dumitrescu and J\'anos Pach
|
Minimum clique partition in unit disk graphs
|
12 pages, 3 figures
| null | null | null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The minimum clique partition (MCP) problem is that of partitioning the vertex
set of a given graph into a minimum number of cliques. Given $n$ points in the
plane, the corresponding unit disk graph (UDG) has these points as vertices,
and edges connecting points at distance at most~1. MCP in unit disk graphs is
known to be NP-hard and several constant factor approximations are known,
including a recent PTAS. We present two improved approximation algorithms for
minimum clique partition in unit disk graphs:
(I) A polynomial time approximation scheme (PTAS) running in time
$n^{O(1/\eps^2)}$. This improves on a previous PTAS with $n^{O(1/\eps^4)}$
running time \cite{PS09}.
(II) A randomized quadratic-time algorithm with approximation ratio 2.16.
This improves on a ratio 3 algorithm with $O(n^2)$ running time \cite{CFFP04}.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 20:47:19 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Dumitrescu",
"Adrian",
""
],
[
"Pach",
"János",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1590
|
Hu Xiong
|
Hu Xiong, Matei Ripeanu, Zhiguang Qin
|
Efficient and Spontaneous Privacy-Preserving Protocol for Secure
Vehicular Communications
|
8 pages, 4 figures, submitted to ICC 2009, uses amssymb.sty,
amsmath.sty, booktabs.sty, mdwlist.sty, pdftex.sty, dvips.sty
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces an efficient and spontaneous privacy-preserving
protocol for vehicular ad-hoc networks based on revocable ring signature. The
proposed protocol has three appealing characteristics: First, it offers
conditional privacy-preservation: while a receiver can verify that a message
issuer is an authorized participant in the system only a trusted authority can
reveal the true identity of a message sender. Second, it is spontaneous: safety
messages can be authenticated locally, without support from the roadside units
or contacting other vehicles. Third, it is efficient by offering fast message
authentication and verification, cost-effective identity tracking in case of a
dispute, and low storage requirements. We use extensive analysis to demonstrate
the merits of the proposed protocol and to contrast it with previously proposed
solutions.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 22:29:03 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Xiong",
"Hu",
""
],
[
"Ripeanu",
"Matei",
""
],
[
"Qin",
"Zhiguang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1594
|
Vladimir V Kisil
|
Vladimir V. Kisil
|
Computation and Dynamics: Classical and Quantum
|
5 pages, 2 EPS figures, LaTeX2e, AMSLaTeX
|
in "Quantum Theory: Reconsideration of Foundations--5'' (A.Yu.
Khrennikov, ed.), AIP Conference Proceedings, v.1232, Amer. Inst. Phys.,
pp.306--312, 2010
|
10.1063/1.3431506
| null |
quant-ph cs.CC cs.FL
|
http://creativecommons.org/licenses/by/3.0/
|
We discuss classical and quantum computations in terms of corresponding
Hamiltonian dynamics. This allows us to introduce quantum computations which
involve parallel processing of both: the data and programme instructions. Using
mixed quantum-classical dynamics we look for a full cost of computations on
quantum computers with classical terminals.
|
[
{
"version": "v1",
"created": "Tue, 8 Sep 2009 23:24:15 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Kisil",
"Vladimir V.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0909.1599
|
Vivek Goyal
|
Ha Q. Nguyen, Vivek K Goyal, and Lav R. Varshney
|
Frame Permutation Quantization
|
29 pages, 5 figures; detailed added to proof of Theorem 4.3 and a few
minor corrections
|
Applied and Computational Harmonic Analysis, vol 31, no, 1, pp,.
74-97, July 2011
|
10.1016/j.acha.2010.10.003
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Frame permutation quantization (FPQ) is a new vector quantization technique
using finite frames. In FPQ, a vector is encoded using a permutation source
code to quantize its frame expansion. This means that the encoding is a partial
ordering of the frame expansion coefficients. Compared to ordinary permutation
source coding, FPQ produces a greater number of possible quantization rates and
a higher maximum rate. Various representations for the partitions induced by
FPQ are presented, and reconstruction algorithms based on linear programming,
quadratic programming, and recursive orthogonal projection are derived.
Implementations of the linear and quadratic programming algorithms for uniform
and Gaussian sources show performance improvements over entropy-constrained
scalar quantization for certain combinations of vector dimension and coding
rate. Monte Carlo evaluation of the recursive algorithm shows that mean-squared
error (MSE) decays as 1/M^4 for an M-element frame, which is consistent with
previous results on optimal decay of MSE. Reconstruction using the canonical
dual frame is also studied, and several results relate properties of the
analysis frame to whether linear reconstruction techniques provide consistent
reconstructions.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 01:01:52 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Sep 2010 22:23:57 GMT"
},
{
"version": "v3",
"created": "Mon, 22 Nov 2010 19:40:33 GMT"
}
] | 2015-03-24T00:00:00 |
[
[
"Nguyen",
"Ha Q.",
""
],
[
"Goyal",
"Vivek K",
""
],
[
"Varshney",
"Lav R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1605
|
Guangliang Chen
|
G. Chen, S. Atev, and G. Lerman
|
Kernel Spectral Curvature Clustering (KSCC)
|
accepted to 2009 ICCV Workshop on Dynamical Vision
|
Computer Vision Workshops (ICCV Workshops), 2009 IEEE 12th
International Conference on, 2009, pp. 765 - 772
|
10.1109/ICCVW.2009.5457627
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multi-manifold modeling is increasingly used in segmentation and data
representation tasks in computer vision and related fields. While the general
problem, modeling data by mixtures of manifolds, is very challenging, several
approaches exist for modeling data by mixtures of affine subspaces (which is
often referred to as hybrid linear modeling). We translate some important
instances of multi-manifold modeling to hybrid linear modeling in embedded
spaces, without explicitly performing the embedding but applying the kernel
trick. The resulting algorithm, Kernel Spectral Curvature Clustering, uses
kernels at two levels - both as an implicit embedding method to linearize
nonflat manifolds and as a principled method to convert a multiway affinity
problem into a spectral clustering one. We demonstrate the effectiveness of the
method by comparing it with other state-of-the-art methods on both synthetic
data and a real-world problem of segmenting multiple motions from two
perspective camera views.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 01:58:23 GMT"
}
] | 2012-10-08T00:00:00 |
[
[
"Chen",
"G.",
""
],
[
"Atev",
"S.",
""
],
[
"Lerman",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0909.1608
|
Guangliang Chen
|
G. Chen and G. Lerman
|
Motion Segmentation by SCC on the Hopkins 155 Database
|
Accepted to 2009 ICCV Workshop on Dynamical Vision
|
Computer Vision Workshops (ICCV Workshops), 2009 IEEE 12th
International Conference on, 2009, pp. 759 - 764
|
10.1109/ICCVW.2009.5457626
| null |
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We apply the Spectral Curvature Clustering (SCC) algorithm to a benchmark
database of 155 motion sequences, and show that it outperforms all other
state-of-the-art methods. The average misclassification rate by SCC is 1.41%
for sequences having two motions and 4.85% for three motions.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 02:12:22 GMT"
}
] | 2012-10-08T00:00:00 |
[
[
"Chen",
"G.",
""
],
[
"Lerman",
"G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.