id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
sequencelengths
1
942
categories_descriptions
listlengths
1
13
0708.0353
Dariusz Grech
D. Grech, G. Pamu{\l}a (University of Wroclaw, ITP)
The Local Fractal Properties of the Financial Time Series on the Polish Stock Exchange Market
LaTeX, 14 pages, 12 figures included
null
null
null
q-fin.ST cs.CE physics.data-an
null
We investigate the local fractal properties of the financial time series based on the evolution of the Warsaw Stock Exchange Index (WIG) connected with the largest developing financial market in Europe. Calculating the local Hurst exponent for the WIG time series we find an interesting dependence between the behavior of the local fractal properties of the WIG time series and the crashes appearance on the financial market.
[ { "version": "v1", "created": "Thu, 2 Aug 2007 14:22:30 GMT" } ]
2008-12-02T00:00:00
[ [ "Grech", "D.", "", "University of Wroclaw, ITP" ], [ "Pamuła", "G.", "", "University of Wroclaw, ITP" ] ]
[ { "class": "Quantitative Finance", "code": "q-fin.ST", "description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data", "span": "(Statistical Finance)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0708.0361
Grigoriev Evgeniy
Evgeniy Grigoriev
Why the relational data model can be considered as a formal basis for group operations in object-oriented systems
10 pages
null
null
null
cs.DB
null
Relational data model defines a specification of a type "relation". However, its simplicity does not mean that the system implementing this model must operate with structures having the same simplicity. We consider two principles allowing create a system which combines object-oriented paradigm (OOP) and relational data model (RDM) in one framework. The first principle -- "complex data in encapsulated domains" -- is well known from The Third Manifesto by Date and Darwen. The second principle --"data complexity in names"-- is the basis for a system where data are described as complex objects and uniquely represented as a set of relations. Names of these relations and names of their attributes are combinations of names entered in specifications of the complex objects. Below, we consider the main properties of such a system.
[ { "version": "v1", "created": "Thu, 2 Aug 2007 15:24:29 GMT" }, { "version": "v2", "created": "Fri, 3 Aug 2007 06:11:33 GMT" }, { "version": "v3", "created": "Sun, 5 Aug 2007 22:38:53 GMT" }, { "version": "v4", "created": "Tue, 7 Aug 2007 21:39:14 GMT" }, { "version": "v5", "created": "Thu, 9 Aug 2007 04:56:59 GMT" }, { "version": "v6", "created": "Thu, 9 Aug 2007 22:15:20 GMT" }, { "version": "v7", "created": "Wed, 5 Sep 2007 20:18:51 GMT" } ]
2007-09-05T00:00:00
[ [ "Grigoriev", "Evgeniy", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0708.0386
Sheng Yang
Sheng Yang and Jean-Claude Belfiore
Diversity of MIMO Multihop Relay Channels
62 pages, 10 figures, submitted to the IEEE transactions on Information Theory. Updated version of "Diversity of MIMO Multihop Relay Channels - Part I: Amplify-and-Forward"
null
null
null
cs.IT math.IT
null
We consider slow fading relay channels with a single multi-antenna source-destination terminal pair. The source signal arrives at the destination via N hops through N-1 layers of relays. We analyze the diversity of such channels with fixed network size at high SNR. In the clustered case where the relays within the same layer can have full cooperation, the cooperative decode-and-forward (DF) scheme is shown to be optimal in terms of the diversity-multiplexing tradeoff (DMT). The upper bound on the DMT, the cut-set bound, is attained. In the non-clustered case, we show that the naive amplify-and-forward (AF) scheme has the maximum multiplexing gain of the channel but is suboptimal in diversity, as compared to the cut-set bound. To improve the diversity, space-time relay processing is introduced through the parallel partition of the multihop channel. The idea is to let the source signal go through K different "AF paths" in the multihop channel. This parallel AF scheme creates a parallel channel in the time domain and has the maximum diversity if the partition is properly designed. Since this scheme does not achieve the maximum multiplexing gain in general, we propose a flip-and-forward (FF) scheme that is built from the parallel AF scheme. It is shown that the FF scheme achieves both the maximum diversity and multiplexing gains in a distributed multihop channel of arbitrary size. In order to realize the DMT promised by the relaying strategies, approximately universal coding schemes are also proposed.
[ { "version": "v1", "created": "Thu, 2 Aug 2007 16:59:21 GMT" } ]
2007-08-03T00:00:00
[ [ "Yang", "Sheng", "" ], [ "Belfiore", "Jean-Claude", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0495
Damien Chablat
Philippe D\'epinc\'e (IRCCyN), Damien Chablat (IRCCyN), Peer-Oliver Woelk (IFW)
Virtual Manufacturing : Tools for improving Design and Production
null
Dans International Design Seminar - CIRP International Design Seminar, Caire : \'Egypte (2004)
null
null
cs.RO physics.class-ph
null
The research area "Virtual Manufacturing" can be defined as an integrated manufacturing environment which can enhance one or several levels of decision and control in manufacturing process. Several domains can be addressed: Product and Process Design, Process and Production Planning, Machine Tool, Robot and Manufacturing System. As automation technologies such as CAD/CAM have substantially shortened the time required to design products, Virtual Manufacturing will have a similar effect on the manufacturing phase thanks to the modelling, simulation and optimisation of the product and the processes involved in its fabrication.
[ { "version": "v1", "created": "Fri, 3 Aug 2007 11:15:21 GMT" } ]
2007-08-07T00:00:00
[ [ "Dépincé", "Philippe", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Woelk", "Peer-Oliver", "", "IFW" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" }, { "class": "Physics", "code": "physics.class-ph", "description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.", "span": "(Classical Physics)" } ]
0708.0505
Luca Di Gaspero PhD
Luca Di Gaspero, Andrea Roli
A preliminary analysis on metaheuristics methods applied to the Haplotype Inference Problem
22 pages, 4 figures Technical Report: DEIS - Alma Mater Studiorum, University of Bologna no. DEIS-LIA-006-07
null
null
DEIS-LIA-006-07
cs.AI cs.CE cs.DM q-bio.QM
null
Haplotype Inference is a challenging problem in bioinformatics that consists in inferring the basic genetic constitution of diploid organisms on the basis of their genotype. This information allows researchers to perform association studies for the genetic variants involved in diseases and the individual responses to therapeutic agents. A notable approach to the problem is to encode it as a combinatorial problem (under certain hypotheses, such as the pure parsimony criterion) and to solve it using off-the-shelf combinatorial optimization techniques. The main methods applied to Haplotype Inference are either simple greedy heuristic or exact methods (Integer Linear Programming, Semidefinite Programming, SAT encoding) that, at present, are adequate only for moderate size instances. We believe that metaheuristic and hybrid approaches could provide a better scalability. Moreover, metaheuristics can be very easily combined with problem specific heuristics and they can also be integrated with tree-based search techniques, thus providing a promising framework for hybrid systems in which a good trade-off between effectiveness and efficiency can be reached. In this paper we illustrate a feasibility study of the approach and discuss some relevant design issues, such as modeling and design of approximate solvers that combine constructive heuristics, local search-based improvement strategies and learning mechanisms. Besides the relevance of the Haplotype Inference problem itself, this preliminary analysis is also an interesting case study because the formulation of the problem poses some challenges in modeling and hybrid metaheuristic solver design that can be generalized to other problems.
[ { "version": "v1", "created": "Fri, 3 Aug 2007 12:49:21 GMT" } ]
2007-08-06T00:00:00
[ [ "Di Gaspero", "Luca", "" ], [ "Roli", "Andrea", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0708.0522
Konstantin Avrachenkov
Konstantin Avrachenkov (INRIA Sophia Antipolis), Vivek Borkar, Danil Nemirovsky (INRIA Sophia Antipolis)
Quasi-stationary distributions as centrality measures of reducible graphs
null
null
null
null
cs.NI
null
Random walk can be used as a centrality measure of a directed graph. However, if the graph is reducible the random walk will be absorbed in some subset of nodes and will never visit the rest of the graph. In Google PageRank the problem was solved by introduction of uniform random jumps with some probability. Up to the present, there is no clear criterion for the choice this parameter. We propose to use parameter-free centrality measure which is based on the notion of quasi-stationary distribution. Specifically we suggest four quasi-stationary based centrality measures, analyze them and conclude that they produce approximately the same ranking. The new centrality measures can be applied in spam detection to detect ``link farms'' and in image search to find photo albums.
[ { "version": "v1", "created": "Fri, 3 Aug 2007 14:19:21 GMT" }, { "version": "v2", "created": "Wed, 8 Aug 2007 08:32:44 GMT" } ]
2009-04-17T00:00:00
[ [ "Avrachenkov", "Konstantin", "", "INRIA Sophia Antipolis" ], [ "Borkar", "Vivek", "", "INRIA Sophia Antipolis" ], [ "Nemirovsky", "Danil", "", "INRIA Sophia Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.0580
David Pritchard
David Pritchard
Efficient Divide-and-Conquer Implementations Of Symmetric FSAs
null
Journal of Cellular Automata 5(6) (special issue for Automata 2007, H. Fuks & A. T. Lawniczak, eds), pages 481-490, 2010
null
null
cs.FL cs.DM
http://creativecommons.org/licenses/by/3.0/
A deterministic finite-state automaton (FSA) is an abstract sequential machine that reads the symbols comprising an input word one at a time. An FSA is symmetric if its output is independent of the order in which the input symbols are read, i.e., if the output is invariant under permutations of the input. We show how to convert a symmetric FSA A into an automaton-like divide-and-conquer process whose intermediate results are no larger than the size of A's memory. In comparison, a similar result for general FSA's has been long known via functional composition, but entails an exponential increase in memory size. The new result has applications to parallel processing and symmetric FSA networks.
[ { "version": "v1", "created": "Fri, 3 Aug 2007 20:21:36 GMT" }, { "version": "v2", "created": "Mon, 31 Mar 2008 15:48:20 GMT" }, { "version": "v3", "created": "Thu, 5 Aug 2010 09:18:56 GMT" } ]
2010-08-06T00:00:00
[ [ "Pritchard", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0708.0598
Matthew McCool Dr
Matthew McCool
An Application of Chromatic Prototypes
This paper has been withdrawn
null
null
null
cs.HC cs.MM
null
This paper has been withdrawn.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 02:38:19 GMT" }, { "version": "v2", "created": "Sun, 3 Feb 2008 19:41:44 GMT" } ]
2008-02-03T00:00:00
[ [ "McCool", "Matthew", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0708.0600
Michael Lee
Michael J. Lee
Complementary algorithms for graphs and percolation
5 pages, 3 figures, poster version presented at statphys23 (2007)
null
10.1103/PhysRevE.76.027702
null
cs.DS
null
A pair of complementary algorithms are presented. One of the pair is a fast method for connecting graphs with an edge. The other is a fast method for removing edges from a graph. Both algorithms employ the same tree based graph representation and so, in concert, can arbitrarily modify any graph. Since the clusters of a percolation model may be described as simple connected graphs, an efficient Monte Carlo scheme can be constructed that uses the algorithms to sweep the occupation probability back and forth between two turning points. This approach concentrates computational sampling time within a region of interest. A high precision value of pc = 0.59274603(9) was thus obtained, by Mersenne twister, for the two dimensional square site percolation threshold.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 02:56:13 GMT" } ]
2009-11-13T00:00:00
[ [ "Lee", "Michael J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0708.0603
L.T. Handoko
Z. Akbar, Slamet, B. I. Ajinagoro, G.I. Ohara, I. Firmansyah, B. Hermanto and L.T. Handoko
Public Cluster : parallel machine with multi-block approach
4 pages, Proceeding of the International Conference on Electrical Engineering and Informatics 2007
null
null
FISIKALIPI-07002
cs.DC cs.CY
null
We introduce a new approach to enable an open and public parallel machine which is accessible for multi users with multi jobs belong to different blocks running at the same time. The concept is required especially for parallel machines which are dedicated for public use as implemented at the LIPI Public Cluster. We have deployed the simplest technique by running multi daemons of parallel processing engine with different configuration files specified for each user assigned to access the system, and also developed an integrated system to fully control and monitor the whole system over web. A brief performance analysis is also given for Message Parsing Interface (MPI) engine. It is shown that the proposed approach is quite reliable and affect the whole performances only slightly.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 05:18:21 GMT" } ]
2007-08-07T00:00:00
[ [ "Akbar", "Z.", "" ], [ "Slamet", "", "" ], [ "Ajinagoro", "B. I.", "" ], [ "Ohara", "G. I.", "" ], [ "Firmansyah", "I.", "" ], [ "Hermanto", "B.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0708.0604
L.T. Handoko
T.B. Waluyo and L.T. Handoko
Introducing OPTO : Portal for Optical Communities in Indonesia
3 pages, Proceeding of the 2nd International Conf. on Optics and Laser Applications 2007
null
null
FISIKALIPI-07006
cs.CY
null
Since January 1, 2005 we have launched "OPTO" Portal, a website dedicated to optical communities in Indonesia. The address of this portal is http://www.opto.lipi.go.id and is self-supporting managed and not for commercial purposes. Our aims in launching this portal are to benefit Internet facility in increasing the communities' scientific activity; to provide an online reference in Indonesian language for optics-based science and technology subjects; as well as to pioneer the communities' online activities with real impacts and benefits for our society. We will describe in the paper the features of this portal that can be utilized by all individuals or members of optical communities to store and share information and to build networks or partnership as well. We realized that this portal is still not popular and most of our aims are still not reached. This conference should be a good place for all of us to collaborate to properly utilize this portal for the advantages to the optical communities in Indonesia and our society at large.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 05:16:10 GMT" } ]
2007-08-07T00:00:00
[ [ "Waluyo", "T. B.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0708.0605
L.T. Handoko
Z. Akbar, Slamet, B. I. Ajinagoro, G.I. Ohara, I. Firmansyah, B. Hermanto and L.T. Handoko
Open and Free Cluster for Public
4 pages, Proceeding of the International Conference on Rural Information and Communication Technology 2007
null
null
FISIKALIPI-07003
cs.DC cs.CY
null
We introduce the LIPI Public Cluster, the first parallel machine facility fully open for public and for free in Indonesia and surrounding countries. In this paper, we focus on explaining our globally new concept on open cluster, and how to realize and manage it to meet the users needs. We show that after 2 years trial running and several upgradings, the Public Cluster performs well and is able to fulfil all requirements as expected.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 05:17:34 GMT" } ]
2007-08-07T00:00:00
[ [ "Akbar", "Z.", "" ], [ "Slamet", "", "" ], [ "Ajinagoro", "B. I.", "" ], [ "Ohara", "G. I.", "" ], [ "Firmansyah", "I.", "" ], [ "Hermanto", "B.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0708.0607
L.T. Handoko
I. Firmansyah, B. Hermanto, Hadiyanto and L.T. Handoko
Real-time control and monitoring system for LIPI's Public Cluster
4 pages, Proceeding of the International Conference on Instrumentation, Communication and Information Technology 2007
null
null
FISIKALIPI-07004
cs.DC cs.RO
null
We have developed a monitoring and control system for LIPI's Public Cluster. The system consists of microcontrollers and full web-based user interfaces for daily operation. It is argued that, due to its special natures, the cluster requires fully dedicated and self developed control and monitoring system. We discuss the implementation of using parallel port and dedicated micro-controller for this purpose. We also show that integrating such systems enables an autonomous control system based on the real time monitoring, for instance an autonomous power supply control based on the actual temperature, etc.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 05:16:43 GMT" } ]
2007-08-07T00:00:00
[ [ "Firmansyah", "I.", "" ], [ "Hermanto", "B.", "" ], [ "Hadiyanto", "", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0708.0608
L.T. Handoko
Z. Akbar and L.T. Handoko
Resource Allocation in Public Cluster with Extended Optimization Algorithm
4 pages, Proceeding of the International Conference on Instrumentation, Communication and Information Technology 2007
null
null
FISIKALIPI-07005
cs.DC
null
We introduce an optimization algorithm for resource allocation in the LIPI Public Cluster to optimize its usage according to incoming requests from users. The tool is an extended and modified genetic algorithm developed to match specific natures of public cluster. We present a detail analysis of optimization, and compare the results with the exact calculation. We show that it would be very useful and could realize an automatic decision making system for public clusters.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 05:15:05 GMT" }, { "version": "v2", "created": "Thu, 9 Aug 2007 00:36:19 GMT" } ]
2007-08-09T00:00:00
[ [ "Akbar", "Z.", "" ], [ "Handoko", "L. T.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.0624
Matthias Brust R.
Christian Hutter, Matthias R. Brust, Steffen Rothkugel
ADS-Directory Services for Mobile Ad-Hoc Networks Based on an Information Market Model
9 pages, in the 1st International Workshop on Ubiquitous Computing (IWUC-2004) held in conjunction with the 6th International Conference on Enterprise Information Systems (ICEIS 2004)
null
null
null
cs.NI cs.DC
null
Ubiquitous computing based on small mobile devices using wireless communication links is becoming very attractive. The computational power and storage capacities provided allow the execution of sophisticated applications. Due to the fact that sharing of information is a central problem for distributed applications, the development of self organizing middleware services providing high level interfaces for information managing is essential. ADS is a directory service for mobile ad-hoc networks dealing with local and nearby information as well as providing access to distant information. The approach discussed throughout this paper is based upon the concept of information markets.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 13:21:55 GMT" } ]
2007-08-07T00:00:00
[ [ "Hutter", "Christian", "" ], [ "Brust", "Matthias R.", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.0627
Matthias Brust R.
Matthias R. Brust, Daniel Goergen, Christian Hutter, Steffen Rothkugel
ADS as Information Management Service in an M-Learning Environment
8th International Conference on Knowledge-Based Intelligent Information & Engineering Systems (KES2004)
null
null
null
cs.NI cs.DC
null
Leveraging the potential power of even small handheld devices able to communicate wirelessly requires dedicated support. In particular, collaborative applications need sophisticated assistance in terms of querying and exchanging different kinds of data. Using a concrete example from the domain of mobile learning, the general need for information dissemination is motivated. Subsequently, and driven by infrastructural conditions, realization strategies of an appropriate middleware service are discussed.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 13:32:07 GMT" } ]
2007-08-07T00:00:00
[ [ "Brust", "Matthias R.", "" ], [ "Goergen", "Daniel", "" ], [ "Hutter", "Christian", "" ], [ "Rothkugel", "Steffen", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.0648
Zhu Han
Jianwei Huang, Zhu Han, Mung Chiang, and H. Vincent Poor
Auction-Based Distributed Resource Allocation for Cooperation Transmission in Wireless Networks
To appear in the Proceedings of the IEEE IEEE Global Communications Conference (GLOBECOM), Washington, DC, November 26 - 30, 2007
null
10.1109/GLOCOM.2007.912
null
cs.IT math.IT
null
Cooperative transmission can greatly improve communication system performance by taking advantage of the broadcast nature of wireless channels. Most previous work on resource allocation for cooperation transmission is based on centralized control. In this paper, we propose two share auction mechanisms, the SNR auction and the power auction, to distributively coordinate the resource allocation among users. We prove the existence, uniqueness and effectiveness of the auction results. In particular, the SNR auction leads to a fair resource allocation among users, and the power auction achieves a solution that is close to the efficient allocation.
[ { "version": "v1", "created": "Sat, 4 Aug 2007 21:33:18 GMT" } ]
2016-11-17T00:00:00
[ [ "Huang", "Jianwei", "" ], [ "Han", "Zhu", "" ], [ "Chiang", "Mung", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0654
James P. Crutchfield
Susanne Still, James P. Crutchfield
Structure or Noise?
6 pages, 2 figures; http://cse.ucdavis.edu/~cmg/compmech/pubs/son.html
null
null
null
physics.data-an cond-mat.stat-mech cs.IT cs.LG math-ph math.IT math.MP math.ST nlin.CD stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show how rate-distortion theory provides a mechanism for automated theory building by naturally distinguishing between regularity and randomness. We start from the simple principle that model variables should, as much as possible, render the future and past conditionally independent. From this, we construct an objective function for model making whose extrema embody the trade-off between a model's structural complexity and its predictive power. The solutions correspond to a hierarchy of models that, at each level of complexity, achieve optimal predictive power at minimal cost. In the limit of maximal prediction the resulting optimal model identifies a process's intrinsic organization by extracting the underlying causal states. In this limit, the model's complexity is given by the statistical complexity, which is known to be minimal for achieving maximum prediction. Examples show how theory building can profit from analyzing a process's causal compressibility, which is reflected in the optimal models' rate-distortion curve--the process's characteristic for optimally balancing structure and noise at different levels of representation.
[ { "version": "v1", "created": "Sun, 5 Aug 2007 01:37:53 GMT" }, { "version": "v2", "created": "Sun, 29 Jun 2008 23:52:26 GMT" } ]
2016-09-08T00:00:00
[ [ "Still", "Susanne", "" ], [ "Crutchfield", "James P.", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Physics", "code": "nlin.CD", "description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation", "span": "(Chaotic Dynamics)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0708.0660
Guanrong Chen
Zhisheng Duan, Chao Liu and Guanrong Chen
Network synchronizability analysis: the theory of subgraphs and complementary graphs
13 pages, 7 figures
null
10.1016/j.physd.2007.12.003
null
cs.NI cs.GR
null
In this paper, subgraphs and complementary graphs are used to analyze the network synchronizability. Some sharp and attainable bounds are provided for the eigenratio of the network structural matrix, which characterizes the network synchronizability, especially when the network's corresponding graph has cycles, chains, bipartite graphs or product graphs as its subgraphs.
[ { "version": "v1", "created": "Sun, 5 Aug 2007 05:25:45 GMT" } ]
2009-11-13T00:00:00
[ [ "Duan", "Zhisheng", "" ], [ "Liu", "Chao", "" ], [ "Chen", "Guanrong", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0708.0694
Maurice H. T. Ling
Maurice HT Ling, Christophe Lefevre, Kevin R. Nicholas, and Feng Lin
Reconstruction of Protein-Protein Interaction Pathways by Mining Subject-Verb-Objects Intermediates
2nd IAPR Workshop on Pattern Recognition in Bioinformatics (PRIB 2007). 14 pages, 4 figures
Ling, Maurice HT, Lefevre, Christophe, Nicholas, Kevin R, Lin, Feng. 2007. In J.C. Ragapakse, B. Schmidt, and G. Volkert (Eds.), PRIB 2007. Lecture Notes in Bioinformatics 4774: 286-299. Springer-Verlag.
null
null
cs.IR cs.CL cs.DL
null
The exponential increase in publication rate of new articles is limiting access of researchers to relevant literature. This has prompted the use of text mining tools to extract key biological information. Previous studies have reported extensive modification of existing generic text processors to process biological text. However, this requirement for modification had not been examined. In this study, we have constructed Muscorian, using MontyLingua, a generic text processor. It uses a two-layered generalization-specialization paradigm previously proposed where text was generically processed to a suitable intermediate format before domain-specific data extraction techniques are applied at the specialization layer. Evaluation using a corpus and experts indicated 86-90% precision and approximately 30% recall in extracting protein-protein interactions, which was comparable to previous studies using either specialized biological text processing tools or modified existing tools. Our study had also demonstrated the flexibility of the two-layered generalization-specialization paradigm by using the same generalization layer for two specialized information extraction tasks.
[ { "version": "v1", "created": "Mon, 6 Aug 2007 01:22:46 GMT" } ]
2007-08-07T00:00:00
[ [ "Ling", "Maurice HT", "" ], [ "Lefevre", "Christophe", "" ], [ "Nicholas", "Kevin R.", "" ], [ "Lin", "Feng", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" } ]
0708.0712
Stephanie Gerbaud
St\'ephanie Gerbaud (IRISA), Nicolas Mollet (IRISA), Bruno Arnaldi (IRISA)
Virtual Environments for Training: From Individual Learning to Collaboration with Humanoids
null
Dans Edutainment (2007)
null
null
cs.GR
null
The next generation of virtual environments for training is oriented towards collaborative aspects. Therefore, we have decided to enhance our platform for virtual training environments, adding collaboration opportunities and integrating humanoids. In this paper we put forward a model of humanoid that suits both virtual humans and representations of real users, according to collaborative training activities. We suggest adaptations to the scenario model of our platform making it possible to write collaborative procedures. We introduce a mechanism of action selection made up of a global repartition and an individual choice. These models are currently being integrated and validated in GVT, a virtual training tool for maintenance of military equipments, developed in collaboration with the French company NEXTER-Group.
[ { "version": "v1", "created": "Mon, 6 Aug 2007 07:42:56 GMT" } ]
2007-08-07T00:00:00
[ [ "Gerbaud", "Stéphanie", "", "IRISA" ], [ "Mollet", "Nicolas", "", "IRISA" ], [ "Arnaldi", "Bruno", "", "IRISA" ] ]
[ { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0708.0713
Radu Grigore
Radu Grigore and Micha{\l} Moskal
Edit and verify
null
null
null
null
cs.LO
null
Automated theorem provers are used in extended static checking, where they are the performance bottleneck. Extended static checkers are run typically after incremental changes to the code. We propose to exploit this usage pattern to improve performance. We present two approaches of how to do so and a full solution.
[ { "version": "v1", "created": "Mon, 6 Aug 2007 07:47:34 GMT" } ]
2007-08-07T00:00:00
[ [ "Grigore", "Radu", "" ], [ "Moskal", "Michał", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0708.0741
Shi Zhou Dr.
Shi Zhou, Ingemar Cox and Vaclav Petricek
Characterising Web Site Link Structure
To appear at IEEE/WSE07
null
10.1109/WSE.2007.4380247
null
cs.IR
null
The topological structures of the Internet and the Web have received considerable attention. However, there has been little research on the topological properties of individual web sites. In this paper, we consider whether web sites (as opposed to the entire Web) exhibit structural similarities. To do so, we exhaustively crawled 18 web sites as diverse as governmental departments, commercial companies and university departments in different countries. These web sites consisted of as little as a few thousand pages to millions of pages. Statistical analysis of these 18 sites revealed that the internal link structure of the web sites are significantly different when measured with first and second-order topological properties, i.e. properties based on the connectivity of an individual or a pairs of nodes. However, examination of a third-order topological property that consider the connectivity between three nodes that form a triangle, revealed a strong correspondence across web sites, suggestive of an invariant. Comparison with the Web, the AS Internet, and a citation network, showed that this third-order property is not shared across other types of networks. Nor is the property exhibited in generative network models such as that of Barabasi and Albert.
[ { "version": "v1", "created": "Mon, 6 Aug 2007 11:00:58 GMT" } ]
2016-11-17T00:00:00
[ [ "Zhou", "Shi", "" ], [ "Cox", "Ingemar", "" ], [ "Petricek", "Vaclav", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0708.0805
Lun Dong
Lun Dong, Athina P. Petropulu and H. Vincent Poor
Cooperative Beamforming for Wireless Ad Hoc Networks
5 pages, 4 figures. To appear in the Proceedings of the IEEE Global Communications Conference (GLOBECOM), Washington, DC, November 26 - 30, 2007
null
10.1109/GLOCOM.2007.560
null
cs.IT math.IT
null
Via collaborative beamforming, nodes in a wireless network are able to transmit a common message over long distances in an energy efficient fashion. However, the process of making available the same message to all collaborating nodes introduces delays. In this paper, a MAC-PHY cross-layer scheme is proposed that enables collaborative beamforming at significantly reduced collaboration overhead. It consists of two phases. In the first phase, nodes transmit locally in a random access time-slotted fashion. Simultaneous transmissions from multiple source nodes are viewed as linear mixtures of all transmitted packets. In the second phase, a set of collaborating nodes, acting as a distributed antenna system, beamform the received analog waveform to one or more faraway destinations. This step requires multiplication of the received analog waveform by a complex weight, which is independently computed by each cooperating node, and which allows packets bound to the same destination to add coherently at the destination node. Assuming that each node has access to location information, the proposed scheme can achieve high throughput, which in certain cases exceeds one. An analysis of the symbol error probability corresponding to the proposed scheme is provided.
[ { "version": "v1", "created": "Mon, 6 Aug 2007 17:45:21 GMT" } ]
2016-11-17T00:00:00
[ [ "Dong", "Lun", "" ], [ "Petropulu", "Athina P.", "" ], [ "Poor", "H. Vincent", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0846
Amir Leshem
Amir Leshem and Ephi Zehavi
Cooperative game theory and the Gaussian interference channel
null
null
null
null
cs.IT cs.GT math.IT
null
In this paper we discuss the use of cooperative game theory for analyzing interference channels. We extend our previous work, to games with N players as well as frequency selective channels and joint TDM/FDM strategies. We show that the Nash bargaining solution can be computed using convex optimization techniques. We also show that the same results are applicable to interference channels where only statistical knowledge of the channel is available. Moreover, for the special case of two players $2\times K$ frequency selective channel (with K frequency bins) we provide an $O(K \log_2 K)$ complexity algorithm for computing the Nash bargaining solution under mask constraint and using joint FDM/TDM strategies. Simulation results are also provided.
[ { "version": "v1", "created": "Mon, 6 Aug 2007 21:47:10 GMT" } ]
2007-08-08T00:00:00
[ [ "Leshem", "Amir", "" ], [ "Zehavi", "Ephi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0850
Neri Merhav
Neri Merhav
Relations between random coding exponents and the statistical physics of random codes
26 pages, 2 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The partition function pertaining to finite--temperature decoding of a (typical) randomly chosen code is known to have three types of behavior, corresponding to three phases in the plane of rate vs. temperature: the {\it ferromagnetic phase}, corresponding to correct decoding, the {\it paramagnetic phase}, of complete disorder, which is dominated by exponentially many incorrect codewords, and the {\it glassy phase} (or the condensed phase), where the system is frozen at minimum energy and dominated by subexponentially many incorrect codewords. We show that the statistical physics associated with the two latter phases are intimately related to random coding exponents. In particular, the exponent associated with the probability of correct decoding at rates above capacity is directly related to the free energy in the glassy phase, and the exponent associated with probability of error (the error exponent) at rates below capacity, is strongly related to the free energy in the paramagnetic phase. In fact, we derive alternative expressions of these exponents in terms of the corresponding free energies, and make an attempt to obtain some insights from these expressions. Finally, as a side result, we also compare the phase diagram associated with a simple finite-temperature universal decoder for discrete memoryless channels, to that of the finite--temperature decoder that is aware of the channel statistics.
[ { "version": "v1", "created": "Mon, 6 Aug 2007 22:33:04 GMT" } ]
2007-08-08T00:00:00
[ [ "Merhav", "Neri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0877
Vita Hinze-Hoare
V. Hinze-Hoare
A Portal Analysis for the Design of a Collaborative Research Environment for Students and Supervisors (CRESS) within the CSCR Domain
null
null
null
null
cs.HC
null
In a previous paper the CSCR domain was defined. Here this is taken to the next stage where we consider the design of a particular Collaborative Research Environment to support Students and Supervisors CRESS. Following the CSCR structure a preliminary design for CRESS has been established and a portal framework analysis is undertaken in order to determine the most appropriate set of tools for its implementation.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 19:53:24 GMT" } ]
2007-08-08T00:00:00
[ [ "Hinze-Hoare", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0708.0905
Thorsten Hehn
Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber
Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and Extended Cyclic Codes
40 pages, 6 figures, 10 tables, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2008.2006456
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of the stopping redundancy hierarchy of a linear block code as a measure of the trade-off between performance and complexity of iterative decoding for the binary erasure channel. We derive lower and upper bounds for the stopping redundancy hierarchy via Lovasz's Local Lemma and Bonferroni-type inequalities, and specialize them for codes with cyclic parity-check matrices. Based on the observed properties of parity-check matrices with good stopping redundancy characteristics, we develop a novel decoding technique, termed automorphism group decoding, that combines iterative message passing and permutation decoding. We also present bounds on the smallest number of permutations of an automorphism group decoder needed to correct any set of erasures up to a prescribed size. Simulation results demonstrate that for a large number of algebraic codes, the performance of the new decoding method is close to that of maximum likelihood decoding.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 09:55:31 GMT" }, { "version": "v2", "created": "Wed, 23 Jan 2008 19:05:58 GMT" }, { "version": "v3", "created": "Thu, 3 Jul 2008 15:38:55 GMT" } ]
2016-11-15T00:00:00
[ [ "Hehn", "Thorsten", "" ], [ "Milenkovic", "Olgica", "" ], [ "Laendner", "Stefan", "" ], [ "Huber", "Johannes B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.0909
Sebastien Tixeuil
L\'elia Blin (IBISC), Maria Gradinariu Potop-Butucaru (INRIA Rocquencourt, LIP6), S\'ebastien Tixeuil (INRIA Futurs, LRI)
On the Self-stabilization of Mobile Robots in Graphs
null
null
null
null
cs.DS cs.DC
null
Self-stabilization is a versatile technique to withstand any transient fault in a distributed system. Mobile robots (or agents) are one of the emerging trends in distributed computing as they mimic autonomous biologic entities. The contribution of this paper is threefold. First, we present a new model for studying mobile entities in networks subject to transient faults. Our model differs from the classical robot model because robots have constraints about the paths they are allowed to follow, and from the classical agent model because the number of agents remains fixed throughout the execution of the protocol. Second, in this model, we study the possibility of designing self-stabilizing algorithms when those algorithms are run by mobile robots (or agents) evolving on a graph. We concentrate on the core building blocks of robot and agents problems: naming and leader election. Not surprisingly, when no constraints are given on the network graph topology and local execution model, both problems are impossible to solve. Finally, using minimal hypothesis with respect to impossibility results, we provide deterministic and probabilistic solutions to both problems, and show equivalence of these problems by an algorithmic reduction mechanism.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 09:34:14 GMT" }, { "version": "v2", "created": "Wed, 8 Aug 2007 09:11:22 GMT" } ]
2009-09-29T00:00:00
[ [ "Blin", "Lélia", "", "IBISC" ], [ "Potop-Butucaru", "Maria Gradinariu", "", "INRIA\n Rocquencourt, LIP6" ], [ "Tixeuil", "Sébastien", "", "INRIA Futurs, LRI" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.0927
Emanuel Diamant
Emanuel Diamant
Modeling Visual Information Processing in Brain: A Computer Vision Point of View and Approach
That is a journal version of a paper that in 2007 has been submitted to 15 computer vision conferences and was discarded by 11 of them
Signal Processing: Image Communication, vol. 22, issue 6, pp. 583-590, July 2007
null
null
cs.AI cs.CV
null
We live in the Information Age, and information has become a critically important component of our life. The success of the Internet made huge amounts of it easily available and accessible to everyone. To keep the flow of this information manageable, means for its faultless circulation and effective handling have become urgently required. Considerable research efforts are dedicated today to address this necessity, but they are seriously hampered by the lack of a common agreement about "What is information?" In particular, what is "visual information" - human's primary input from the surrounding world. The problem is further aggravated by a long-lasting stance borrowed from the biological vision research that assumes human-like information processing as an enigmatic mix of perceptual and cognitive vision faculties. I am trying to find a remedy for this bizarre situation. Relying on a new definition of "information", which can be derived from Kolmogorov's compexity theory and Chaitin's notion of algorithmic information, I propose a unifying framework for visual information processing, which explicitly accounts for the perceptual and cognitive image processing peculiarities. I believe that this framework will be useful to overcome the difficulties that are impeding our attempts to develop the right model of human-like intelligent image processing.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 11:16:15 GMT" } ]
2007-08-08T00:00:00
[ [ "Diamant", "Emanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0708.0964
Colm \'O D\'unlaing
Colm O Dunlaing
Nodally 3-connected planar graphs and convex combination mappings
27 pages Latex, 11 postscript figures
null
null
TCDMATH 06-16
cs.CG
null
A convex combination mapping of a planar graph is a plane mapping in which the external vertices are mapped to the corners of a convex polygon and every internal vertex is a proper weighted average of its neighbours. If a planar graph is nodally 3-connected or triangulated then every such mapping is an embedding (Tutte, Floater). We give a simple characterisation of nodally 3-connected planar graphs, and generalise the above result to any planar graph which admits any convex embedding.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 14:32:38 GMT" } ]
2007-08-08T00:00:00
[ [ "Dunlaing", "Colm O", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0708.0975
Cedric Adjih
C\'edric Adjih (INRIA Rocquencourt), Song Yean Cho (INRIA Rocquencourt), Philippe Jacquet (INRIA Rocquencourt)
Near Optimal Broadcast with Network Coding in Large Sensor Networks
Dans First International Workshop on Information Theory for Sensor Netwoks (WITS 2007) (2007)
null
null
null
cs.NI
null
We study efficient broadcasting for wireless sensor networks, with network coding. We address this issue for homogeneous sensor networks in the plane. Our results are based on a simple principle (IREN/IRON), which sets the same rate on most of the nodes (wireless links) of the network. With this rate selection, we give a value of the maximum achievable broadcast rate of the source: our central result is a proof of the value of the min-cut for such networks, viewed as hypergraphs. Our metric for efficiency is the number of transmissions necessary to transmit one packet from the source to every destination: we show that IREN/IRON achieves near optimality for large networks; that is, asymptotically, nearly every transmission brings new information from the source to the receiver. As a consequence, network coding asymptotically outperforms any scheme that does not use network coding.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 15:13:17 GMT" } ]
2009-04-16T00:00:00
[ [ "Adjih", "Cédric", "", "INRIA Rocquencourt" ], [ "Cho", "Song Yean", "", "INRIA\n Rocquencourt" ], [ "Jacquet", "Philippe", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.0977
Valerio Lucarini
Valerio Lucarini
From symmetry break to Poisson point process in 2D Voronoi tessellations: the generic nature of hexagons
14 pages, 4 figures
J. Stat. Phys., 130, 1047-1062 (2008)
10.1007/s10955-007-9475-x
null
cond-mat.stat-mech cond-mat.dis-nn cs.CG math-ph math.MP physics.data-an
null
We bridge the properties of the regular square and honeycomb Voronoi tessellations of the plane to those of the Poisson-Voronoi case, thus analyzing in a common framework symmetry-break processes and the approach to uniformly random distributions of tessellation-generating points. We consider ensemble simulations of tessellations generated by points whose regular positions are perturbed through a Gaussian noise controlled by the parameter alpha. We study the number of sides, the area, and the perimeter of the Voronoi cells. For alpha>0, hexagons are the most common class of cells, and 2-parameter gamma distributions describe well the statistics of the geometrical characteristics. The symmetry break due to noise destroys the square tessellation, whereas the honeycomb hexagonal tessellation is very stable and all Voronoi cells are hexagon for small but finite noise with alpha<0.1. For a moderate amount of Gaussian noise, memory of the specific unperturbed tessellation is lost, because the statistics of the two perturbed tessellations is indistinguishable. When alpha>2, results converge to those of Poisson-Voronoi tessellations. The properties of n-sided cells change with alpha until the Poisson-Voronoi limit is reached for alpha>2. The Desch law for perimeters is confirmed to be not valid and a square root dependence on n is established. The ensemble mean of the cells area and perimeter restricted to the hexagonal cells coincides with the full ensemble mean; this might imply that the number of sides acts as a thermodynamic state variable fluctuating about n=6; this reinforces the idea that hexagons, beyond their ubiquitous numerical prominence, can be taken as generic polygons in 2D Voronoi tessellations.
[ { "version": "v1", "created": "Tue, 7 Aug 2007 15:23:31 GMT" } ]
2011-10-11T00:00:00
[ [ "Lucarini", "Valerio", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Physics", "code": "math-ph", "description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Mathematics", "code": "math.MP", "description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories", "span": "(Mathematical Physics)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0708.1037
Yoichiro Watanabe
Yoichiro Watanabe and Koichi Kamoi
A Formulation of the Channel Capacity of Multiple-Access Channel
This paper has been submitted to IEEE Transactions on Information Theory in March, 2007. 10 pages, 4 figures
null
null
Proc. 2002 IEEE Int'l Sym. on Information Theory, Lausanne, p.308, 2002
cs.IT math.IT
null
The necessary and sufficient condition of the channel capacity is rigorously formulated for the N-user discrete memoryless multiple-access channel (MAC). The essence of the formulation is to invoke an {\em elementary} MAC where sizes of input alphabets are not greater than the size of output alphabet. The main objective is to demonstrate that the channel capacity of an MAC is achieved by an elementary MAC included in the original MAC. The proof is quite straightforward by the very definition of the elementary MAC. Moreover it is proved that the Kuhn-Tucker conditions of the elementary MAC are strictly sufficient and obviously necessary for the channel capacity. The latter proof requires some steps such that for the elementary MAC every solution of the Kuhn-Tucker conditions reveals itself as local maximum on the domain of all possible input probability distributions and then it achieves the channel capacity. As a result, in respect of the channel capacity, the MAC in general can be regarded as an aggregate of a finite number of elementary MAC's.
[ { "version": "v1", "created": "Wed, 8 Aug 2007 02:28:27 GMT" } ]
2007-08-09T00:00:00
[ [ "Watanabe", "Yoichiro", "" ], [ "Kamoi", "Koichi", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.1049
Damien Chablat
Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), F\'elix Majou (IRCCyN), Jean-Pierre Merlet (INRIA Sophia-Antipolis)
An Interval Analysis Based Study for the Design and the Comparison of 3-DOF Parallel Kinematic Machines
null
International Journal of Robotics Research 23, 6 (2004) 615-624
null
null
cs.RO
null
This paper addresses an interval analysis based study that is applied to the design and the comparison of 3-DOF parallel kinematic machines. Two design criteria are used, (i) a regular workspace shape and, (ii) a kinetostatic performance index that needs to be as homogeneous as possible throughout the workspace. The interval analysis based method takes these two criteria into account: on the basis of prescribed kinetostatic performances, the workspace is analysed to find out the largest regular dextrous workspace enclosed in the Cartesian workspace. An algorithm describing this method is introduced. Two 3-DOF translational parallel mechanisms designed for machining applications are compared using this method. The first machine features three fixed linear joints which are mounted orthogonally and the second one features three linear joints which are mounted in parallel. In both cases, the mobile platform moves in the Cartesian x-y-z space with fixed orientation.
[ { "version": "v1", "created": "Wed, 8 Aug 2007 07:06:48 GMT" } ]
2007-08-09T00:00:00
[ [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ], [ "Majou", "Félix", "", "IRCCyN" ], [ "Merlet", "Jean-Pierre", "", "INRIA Sophia-Antipolis" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0708.1078
Jianwen Zhang
Marc A. Armand, Jianwen Zhang
Nearly MDS expander codes with reduced alphabet size
null
null
null
null
cs.IT math.IT
null
Recently, Roth and Skachek proposed two methods for constructing nearly maximum-distance separable (MDS) expander codes. We show that through the simple modification of using mixed-alphabet codes derived from MDS codes as constituent codes in their code designs, one can obtain nearly MDS codes of significantly smaller alphabet size, albeit at the expense of a (very slight) reduction in code rate.
[ { "version": "v1", "created": "Wed, 8 Aug 2007 10:45:51 GMT" } ]
2007-08-09T00:00:00
[ [ "Armand", "Marc A.", "" ], [ "Zhang", "Jianwen", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.1116
Florian Simatos
Florian Simatos
A variant of the Recoil Growth algorithm to generate multi-polymer systems
Title changed
null
null
null
cs.CE cond-mat.stat-mech
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Recoil Growth algorithm, proposed in 1999 by Consta et al., is one of the most efficient algorithm available in the literature to sample from a multi-polymer system. Such problems are closely related to the generation of self-avoiding paths. In this paper, we study a variant of the original Recoil Growth algorithm, where we constrain the generation of a new polymer to take place on a specific class of graphs. This makes it possible to make a fine trade-off between computational cost and success rate. We moreover give a simple proof for a lower bound on the irreducibility of this new algorithm, which applies to the original algorithm as well.
[ { "version": "v1", "created": "Wed, 8 Aug 2007 15:07:53 GMT" }, { "version": "v2", "created": "Fri, 12 Sep 2008 10:02:19 GMT" }, { "version": "v3", "created": "Thu, 2 Jul 2009 12:31:15 GMT" } ]
2009-07-02T00:00:00
[ [ "Simatos", "Florian", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" } ]
0708.1150
Marko Antonio Rodriguez
Marko A. Rodriguez, Johah Bollen, Herbert Van de Sompel
A Practical Ontology for the Large-Scale Modeling of Scholarly Artifacts and their Usage
null
Proceedings of the IEEE/ACM Joint Conference on Digital Libraries (JCDL'07), pp. 278-287, 2007
10.1145/1255175.1255229
null
cs.DL cs.AI
null
The large-scale analysis of scholarly artifact usage is constrained primarily by current practices in usage data archiving, privacy issues concerned with the dissemination of usage data, and the lack of a practical ontology for modeling the usage domain. As a remedy to the third constraint, this article presents a scholarly ontology that was engineered to represent those classes for which large-scale bibliographic and usage data exists, supports usage research, and whose instantiation is scalable to the order of 50 million articles along with their associated artifacts (e.g. authors and journals) and an accompanying 1 billion usage events. The real world instantiation of the presented abstract ontology is a semantic network model of the scholarly community which lends the scholarly process to statistical analysis and computational support. We present the ontology, discuss its instantiation, and provide some example inference rules for calculating various scholarly artifact metrics.
[ { "version": "v1", "created": "Wed, 8 Aug 2007 17:06:55 GMT" } ]
2007-08-09T00:00:00
[ [ "Rodriguez", "Marko A.", "" ], [ "Bollen", "Johah", "" ], [ "Van de Sompel", "Herbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0708.1179
Shuangqing Wei
Shuangqing Wei
Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks
null
null
null
null
cs.IT math.IT
null
Synchronization of relay nodes is an important and critical issue in exploiting cooperative diversity in wireless networks. In this paper, two asynchronous cooperative diversity schemes are proposed, namely, distributed delay diversity and asynchronous space-time coded cooperative diversity schemes. In terms of the overall diversity-multiplexing (DM) tradeoff function, we show that the proposed independent coding based distributed delay diversity and asynchronous space-time coded cooperative diversity schemes achieve the same performance as the synchronous space-time coded approach which requires an accurate symbol-level timing synchronization to ensure signals arriving at the destination from different relay nodes are perfectly synchronized. This demonstrates diversity order is maintained even at the presence of asynchronism between relay node. Moreover, when all relay nodes succeed in decoding the source information, the asynchronous space-time coded approach is capable of achieving better DM-tradeoff than synchronous schemes and performs equivalently to transmitting information through a parallel fading channel as far as the DM-tradeoff is concerned. Our results suggest the benefits of fully exploiting the space-time degrees of freedom in multiple antenna systems by employing asynchronous space-time codes even in a frequency flat fading channel. In addition, it is shown asynchronous space-time coded systems are able to achieve higher mutual information than synchronous space-time coded systems for any finite signal-to-noise-ratio (SNR) when properly selected baseband waveforms are employed.
[ { "version": "v1", "created": "Wed, 8 Aug 2007 21:25:08 GMT" } ]
2007-08-10T00:00:00
[ [ "Wei", "Shuangqing", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.1211
Mark Iwen
M. A. Iwen
A Deterministic Sub-linear Time Sparse Fourier Algorithm via Non-adaptive Compressed Sensing Methods
16 pages total, 10 in paper, 6 in appended
null
null
null
cs.DM cs.NA
null
We study the problem of estimating the best B term Fourier representation for a given frequency-sparse signal (i.e., vector) $\textbf{A}$ of length $N \gg B$. More explicitly, we investigate how to deterministically identify B of the largest magnitude frequencies of $\hat{\textbf{A}}$, and estimate their coefficients, in polynomial$(B,\log N)$ time. Randomized sub-linear time algorithms which have a small (controllable) probability of failure for each processed signal exist for solving this problem. However, for failure intolerant applications such as those involving mission-critical hardware designed to process many signals over a long lifetime, deterministic algorithms with no probability of failure are highly desirable. In this paper we build on the deterministic Compressed Sensing results of Cormode and Muthukrishnan (CM) \cite{CMDetCS3,CMDetCS1,CMDetCS2} in order to develop the first known deterministic sub-linear time sparse Fourier Transform algorithm suitable for failure intolerant applications. Furthermore, in the process of developing our new Fourier algorithm, we present a simplified deterministic Compressed Sensing algorithm which improves on CM's algebraic compressibility results while simultaneously maintaining their results concerning exponential decay.
[ { "version": "v1", "created": "Thu, 9 Aug 2007 04:07:06 GMT" } ]
2007-08-10T00:00:00
[ [ "Iwen", "M. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0708.1242
Christos Dimitrakakis
Christos Dimitrakakis and Christian Savu-Krohn
Cost-minimising strategies for data labelling : optimal stopping and active learning
17 pages, 4 figures. Corrected some errors and changed the flow of the text
null
null
null
cs.LG
null
Supervised learning deals with the inference of a distribution over an output or label space $\CY$ conditioned on points in an observation space $\CX$, given a training dataset $D$ of pairs in $\CX \times \CY$. However, in a lot of applications of interest, acquisition of large amounts of observations is easy, while the process of generating labels is time-consuming or costly. One way to deal with this problem is {\em active} learning, where points to be labelled are selected with the aim of creating a model with better performance than that of an model trained on an equal number of randomly sampled points. In this paper, we instead propose to deal with the labelling cost directly: The learning goal is defined as the minimisation of a cost which is a function of the expected model performance and the total cost of the labels used. This allows the development of general strategies and specific algorithms for (a) optimal stopping, where the expected cost dictates whether label acquisition should continue (b) empirical evaluation, where the cost is used as a performance metric for a given combination of inference, stopping and sampling methods. Though the main focus of the paper is optimal stopping, we also aim to provide the background for further developments and discussion in the related field of active learning.
[ { "version": "v1", "created": "Thu, 9 Aug 2007 10:21:34 GMT" }, { "version": "v2", "created": "Mon, 27 Aug 2007 22:05:57 GMT" }, { "version": "v3", "created": "Thu, 15 Nov 2007 16:37:51 GMT" } ]
2007-11-15T00:00:00
[ [ "Dimitrakakis", "Christos", "" ], [ "Savu-Krohn", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0708.1343
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen, Fai-Lung Tsang
A Matrix Ring Description for Cyclic Convolutional Codes
null
null
null
null
cs.IT math.IT math.RA
null
In this paper, we study convolutional codes with a specific cyclic structure. By definition, these codes are left ideals in a certain skew polynomial ring. Using that the skew polynomial ring is isomorphic to a matrix ring we can describe the algebraic parameters of the codes in a more accessible way. We show that the existence of such codes with given algebraic parameters can be reduced to the solvability of a modified rook problem. It is our strong belief that the rook problem is always solvable, and we present solutions in particular cases.
[ { "version": "v1", "created": "Thu, 9 Aug 2007 21:35:15 GMT" } ]
2007-08-13T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Tsang", "Fai-Lung", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0708.1362
David Wolpert
David H. Wolpert
Physical limits of inference
43 pages, updated version of Physica D version, which originally appeared in 2007 CNLS conference on unconventional computation
PhysicaD237:1257-1281,2008
10.1016/j.physd.2008.03.040
null
cond-mat.stat-mech cs.CC cs.IT gr-qc math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
I show that physical devices that perform observation, prediction, or recollection share an underlying mathematical structure. I call devices with that structure "inference devices". I present a set of existence and impossibility results concerning inference devices. These results hold independent of the precise physical laws governing our universe. In a limited sense, the impossibility results establish that Laplace was wrong to claim that even in a classical, non-chaotic universe the future can be unerringly predicted, given sufficient knowledge of the present. Alternatively, these impossibility results can be viewed as a non-quantum mechanical "uncertainty principle". Next I explore the close connections between the mathematics of inference devices and of Turing Machines. In particular, the impossibility results for inference devices are similar to the Halting theorem for TM's. Furthermore, one can define an analog of Universal TM's (UTM's) for inference devices. I call those analogs "strong inference devices". I use strong inference devices to define the "inference complexity" of an inference task, which is the analog of the Kolmogorov complexity of computing a string. However no universe can contain more than one strong inference device. So whereas the Kolmogorov complexity of a string is arbitrary up to specification of the UTM, there is no such arbitrariness in the inference complexity of an inference task. I end by discussing the philosophical implications of these results, e.g., for whether the universe "is" a computer.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 03:19:38 GMT" }, { "version": "v2", "created": "Thu, 23 Oct 2008 22:11:34 GMT" } ]
2008-11-26T00:00:00
[ [ "Wolpert", "David H.", "" ] ]
[ { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "gr-qc", "description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.", "span": "(General Relativity and Quantum Cosmology)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.1411
Sajad Sadough
Sajad Sadough (LSS), Pablo Piantanida (LSS), Pierre Duhamel (LSS)
Achievable Outage Rates with Improved Decoding of Bicm Multiband Ofdm Under Channel Estimation Errors
null
Dans 40th Asilomar Conference on Signals, Systems, and Computers - 40th Asilomar Conference on Signals, Systems, and Computers, Monterey : \'Etats-Unis d'Am\'erique (2007)
null
null
cs.NI
null
We consider the decoding of bit interleaved coded modulation (BICM) applied to multiband OFDM for practical scenarios where only a noisy (possibly very bad) estimate of the channel is available at the receiver. First, a decoding metric based on the channel it a posteriori probability density, conditioned on the channel estimate is derived and used for decoding BICM multiband OFDM. Then, we characterize the limits of reliable information rates in terms of the maximal achievable outage rates associated to the proposed metric. We also compare our results with the outage rates of a system using a theoretical decoder. Our results are useful for designing a communication system where a prescribed quality of service (QoS), in terms of achievable target rates with small error probability, must be satisfied even in the presence of imperfect channel estimation. Numerical results over both realistic UWB and theoretical Rayleigh fading channels show that the proposed method provides significant gain in terms of BER and outage rates compared to the classical mismatched detector, without introducing any additional complexity.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 12:13:51 GMT" } ]
2007-08-13T00:00:00
[ [ "Sadough", "Sajad", "", "LSS" ], [ "Piantanida", "Pablo", "", "LSS" ], [ "Duhamel", "Pierre", "", "LSS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.1413
Sajad Sadough
Sajad Sadough (LSS), Pierre Duhamel (LSS)
On Optimal Turbo Decoding of Wideband MIMO-OFDM Systems Under Imperfect Channel State Information
null
COST2100 Meeting, Lisbon : Portugal (2007)
null
null
cs.NI
null
We consider the decoding of bit interleaved coded modulation (BICM) applied to both multiband and MIMO OFDM systems for typical scenarios where only a noisy (possibly very bad) estimate of the channel is provided by sending a limited number of pilot symbols. First, by using a Bayesian framework involving the channel a posteriori density, we adopt a practical decoding metric that is robust to the presence of channel estimation errors. Then this metric is used in the demapping part of BICM multiband and MIMO OFDM receivers. We also compare our results with the performance of a mismatched decoder that replaces the channel by its estimate in the decoding metric. Numerical results over both realistic UWB and theoretical Rayleigh fading channels show that the proposed method provides significant gain in terms of bit error rate compared to the classical mismatched detector, without introducing any additional complexity.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 12:16:55 GMT" } ]
2007-08-13T00:00:00
[ [ "Sadough", "Sajad", "", "LSS" ], [ "Duhamel", "Pierre", "", "LSS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.1414
Sajad Sadough
Sajad Sadough (LSS), Mahieddine Ichir (LSS), Emmanuel Jaffrot, Pierre Duhamel (LSS)
Wavelet Based Semi-blind Channel Estimation For Multiband OFDM
null
Dans European Wireless - European Wireless, Paris : France (2007)
null
null
cs.NI
null
This paper introduces an expectation-maximization (EM) algorithm within a wavelet domain Bayesian framework for semi-blind channel estimation of multiband OFDM based UWB communications. A prior distribution is chosen for the wavelet coefficients of the unknown channel impulse response in order to model a sparseness property of the wavelet representation. This prior yields, in maximum a posteriori estimation, a thresholding rule within the EM algorithm. We particularly focus on reducing the number of estimated parameters by iteratively discarding ``unsignificant'' wavelet coefficients from the estimation process. Simulation results using UWB channels issued from both models and measurements show that under sparsity conditions, the proposed algorithm outperforms pilot based channel estimation in terms of mean square error and bit error rate and enhances the estimation accuracy with less computational complexity than traditional semi-blind methods.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 12:18:36 GMT" } ]
2007-08-13T00:00:00
[ [ "Sadough", "Sajad", "", "LSS" ], [ "Ichir", "Mahieddine", "", "LSS" ], [ "Jaffrot", "Emmanuel", "", "LSS" ], [ "Duhamel", "Pierre", "", "LSS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.1416
Sajad Sadough
Sajad Sadough (LSS), Pablo Piantanida (LSS), Pierre Duhamel (LSS)
MIMO-OFDM Optimal Decoding and Achievable Information Rates Under Imperfect Channel Estimation
null
Dans The VIII IEEE Workshop on Signal Processing Advances in Wireless Communications - The VIII IEEE Workshop on Signal Processing Advances in Wireless Communications, Finlande (2007)
null
null
cs.NI
null
Optimal decoding of bit interleaved coded modulation (BICM) MIMO-OFDM where an imperfect channel estimate is available at the receiver is investigated. First, by using a Bayesian approach involving the channel a posteriori density, we derive a practical decoding metric for general memoryless channels that is robust to the presence of channel estimation errors. Then, we evaluate the outage rates achieved by a decoder that uses our proposed metric. The performance of the proposed decoder is compared to the classical mismatched decoder and a theoretical decoder defined as the best decoder in the presence of imperfect channel estimation. Numerical results over Rayleigh block fading MIMO-OFDM channels show that the proposed decoder outperforms mismatched decoding in terms of bit error rate and outage capacity without introducing any additional complexity.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 12:40:08 GMT" } ]
2007-08-13T00:00:00
[ [ "Sadough", "Sajad", "", "LSS" ], [ "Piantanida", "Pablo", "", "LSS" ], [ "Duhamel", "Pierre", "", "LSS" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.1480
Jean-Louis Krivine
Jean-Louis Krivine (PPS), Yves Legrandg\'erard (PPS)
Valid formulas, games and network protocols
12 pages
null
null
null
cs.LO
null
We describe a remarkable relation between the notion of valid formula of predicate logic and the specification of network protocols. We give several examples such as the acknowledgement of one packet or of a sequence of packets. We show how to specify the composition of protocols.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 16:17:00 GMT" }, { "version": "v2", "created": "Wed, 14 Nov 2007 20:03:26 GMT" } ]
2007-11-14T00:00:00
[ [ "Krivine", "Jean-Louis", "", "PPS" ], [ "Legrandgérard", "Yves", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0708.1491
Jean-Luc Marichal
Jean-Luc Marichal
On perfect, amicable, and sociable chains
10 pages
null
null
null
math.CO cs.DM math.NT
null
Let $x = (x_0,...,x_{n-1})$ be an n-chain, i.e., an n-tuple of non-negative integers $< n$. Consider the operator $s: x \mapsto x' = (x'_0,...,x'_{n-1})$, where x'_j represents the number of $j$'s appearing among the components of x. An n-chain x is said to be perfect if $s(x) = x$. For example, (2,1,2,0,0) is a perfect 5-chain. Analogously to the theory of perfect, amicable, and sociable numbers, one can define from the operator s the concepts of amicable pair and sociable group of chains. In this paper we give an exhaustive list of all the perfect, amicable, and sociable chains.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 17:45:38 GMT" } ]
2010-11-19T00:00:00
[ [ "Marichal", "Jean-Luc", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" } ]
0708.1496
Mihai Oltean
Mihai Oltean
A Light-Based Device for Solving the Hamiltonian Path Problem
11 pages, Unconventional Computation conference, 2006
LNCS 4135, Unconventional Computation conference, pp. 217-227, 2006
10.1007/11839132
null
cs.AR cs.DC
null
In this paper we suggest the use of light for performing useful computations. Namely, we propose a special device which uses light rays for solving the Hamiltonian path problem on a directed graph. The device has a graph-like representation and the light is traversing it following the routes given by the connections between nodes. In each node the rays are uniquely marked so that they can be easily identified. At the destination node we will search only for particular rays that have passed only once through each node. We show that the proposed device can solve small and medium instances of the problem in reasonable time.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 18:12:52 GMT" } ]
2007-08-13T00:00:00
[ [ "Oltean", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.1503
Vladimir Vovk
Vladimir Vovk
Defensive forecasting for optimal prediction with expert advice
14 pages
null
null
null
cs.LG
null
The method of defensive forecasting is applied to the problem of prediction with expert advice for binary outcomes. It turns out that defensive forecasting is not only competitive with the Aggregating Algorithm but also handles the case of "second-guessing" experts, whose advice depends on the learner's prediction; this paper assumes that the dependence on the learner's prediction is continuous.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 19:19:54 GMT" } ]
2007-08-13T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0708.1512
Mihai Oltean
Mihai Oltean
Solving the Hamiltonian path problem with a light-based computer
17 pages, Natural Computing journal
Natural Computing, Springer, Vol 6, 2007
10.1007/s11047-007-9042-z
null
cs.AR cs.DC
null
In this paper we propose a special computational device which uses light rays for solving the Hamiltonian path problem on a directed graph. The device has a graph-like representation and the light is traversing it by following the routes given by the connections between nodes. In each node the rays are uniquely marked so that they can be easily identified. At the destination node we will search only for particular rays that have passed only once through each node. We show that the proposed device can solve small and medium instances of the problem in reasonable time.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 20:01:24 GMT" } ]
2007-08-14T00:00:00
[ [ "Oltean", "Mihai", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.1527
Stasinos Konstantopoulos
Stasinos Konstantopoulos
A Data-Parallel Version of Aleph
Proceedings of Parallel and Distributed Computing for Machine Learning workshop, held in conjunction with the 14th European Conference on Machine Learning. Cavtat, Croatia, 2003
null
null
null
cs.AI cs.DC
null
This is to present work on modifying the Aleph ILP system so that it evaluates the hypothesised clauses in parallel by distributing the data-set among the nodes of a parallel or distributed machine. The paper briefly discusses MPI, the interface used to access message- passing libraries for parallel computers and clusters. It then proceeds to describe an extension of YAP Prolog with an MPI interface and an implementation of data-parallel clause evaluation for Aleph through this interface. The paper concludes by testing the data-parallel Aleph on artificially constructed data-sets.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 23:32:16 GMT" } ]
2007-08-14T00:00:00
[ [ "Konstantopoulos", "Stasinos", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.1529
Iddo Tzameret
Ran Raz, Iddo Tzameret
Resolution over Linear Equations and Multilinear Proofs
44 pages
Annals of Pure and Applied Logic , 155(3):194-224, 2008;
10.1016/j.apal.2008.04.001
null
cs.CC cs.LO
null
We develop and study the complexity of propositional proof systems of varying strength extending resolution by allowing it to operate with disjunctions of linear equations instead of clauses. We demonstrate polynomial-size refutations for hard tautologies like the pigeonhole principle, Tseitin graph tautologies and the clique-coloring tautologies in these proof systems. Using the (monotone) interpolation by a communication game technique we establish an exponential-size lower bound on refutations in a certain, considerably strong, fragment of resolution over linear equations, as well as a general polynomial upper bound on (non-monotone) interpolants in this fragment. We then apply these results to extend and improve previous results on multilinear proofs (over fields of characteristic 0), as studied in [RazTzameret06]. Specifically, we show the following: 1. Proofs operating with depth-3 multilinear formulas polynomially simulate a certain, considerably strong, fragment of resolution over linear equations. 2. Proofs operating with depth-3 multilinear formulas admit polynomial-size refutations of the pigeonhole principle and Tseitin graph tautologies. The former improve over a previous result that established small multilinear proofs only for the \emph{functional} pigeonhole principle. The latter are different than previous proofs, and apply to multilinear proofs of Tseitin mod p graph tautologies over any field of characteristic 0. We conclude by connecting resolution over linear equations with extensions of the cutting planes proof system.
[ { "version": "v1", "created": "Fri, 10 Aug 2007 23:23:10 GMT" } ]
2010-04-19T00:00:00
[ [ "Raz", "Ran", "" ], [ "Tzameret", "Iddo", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0708.1558
Luca Giuzzi
A. Aguglia, L. Giuzzi
Construction of a 3-Dimensional MDS code
8 Pages Minor typesetting changes; dedication
Contributions to Discrete Mathematics 3 no. 1: 39-46 (2007)
null
null
cs.IT math.IT
null
In this paper, we describe a procedure for constructing $q$--ary $[N,3,N-2]$--MDS codes, of length $N\leq q+1$ (for $q$ odd) or $N\leq q+2$ (for $q$ even), using a set of non--degenerate Hermitian forms in $PG(2,q^2)$.
[ { "version": "v1", "created": "Sat, 11 Aug 2007 10:26:31 GMT" }, { "version": "v2", "created": "Tue, 18 Sep 2007 13:45:26 GMT" } ]
2009-07-19T00:00:00
[ [ "Aguglia", "A.", "" ], [ "Giuzzi", "L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.1564
Stasinos Konstantopoulos
Stasinos Konstantopoulos
Learning Phonotactics Using ILP
null
Special Issue of the WEB-SLS Journal: The Language Sections of the ESSLLI-01 Student Session. 2002
null
null
cs.CL
null
This paper describes experiments on learning Dutch phonotactic rules using Inductive Logic Programming, a machine learning discipline based on inductive logical operators. Two different ways of approaching the problem are experimented with, and compared against each other as well as with related work on the task. The results show a direct correspondence between the quality and informedness of the background knowledge and the constructed theory, demonstrating the ability of ILP to take good advantage of the prior domain knowledge available. Further research is outlined.
[ { "version": "v1", "created": "Sat, 11 Aug 2007 13:09:27 GMT" } ]
2007-08-14T00:00:00
[ [ "Konstantopoulos", "Stasinos", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0708.1579
Vicen\c{c} G\'omez Cerd\`a
Andreas Kaltenbrunner, Vicen\c{c} G\'omez, Ayman Moghnieh, Rodrigo Meza, Josep Blat, Vicente L\'opez
Homogeneous temporal activity patterns in a large online communication space
17 pages, 10 figures, to be published in International Journal on WWW/Internet
null
null
null
cs.NI
null
The many-to-many social communication activity on the popular technology-news website Slashdot has been studied. We have concentrated on the dynamics of message production without considering semantic relations and have found regular temporal patterns in the reaction time of the community to a news-post as well as in single user behavior. The statistics of these activities follow log-normal distributions. Daily and weekly oscillatory cycles, which cause slight variations of this simple behavior, are identified. A superposition of two log-normal distributions can account for these variations. The findings are remarkable since the distribution of the number of comments per users, which is also analyzed, indicates a great amount of heterogeneity in the community. The reader may find surprising that only a few parameters allow a detailed description, or even prediction, of social many-to-many information exchange in this kind of popular public spaces.
[ { "version": "v1", "created": "Sun, 12 Aug 2007 00:29:03 GMT" } ]
2007-08-14T00:00:00
[ [ "Kaltenbrunner", "Andreas", "" ], [ "Gómez", "Vicenç", "" ], [ "Moghnieh", "Ayman", "" ], [ "Meza", "Rodrigo", "" ], [ "Blat", "Josep", "" ], [ "López", "Vicente", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.1580
James P. Crutchfield
Susanne Still, James P. Crutchfield, Christopher J. Ellison
Optimal Causal Inference: Estimating Stored Information and Approximating Causal Architecture
14 pages, 13 figures; http://cse.ucdavis.edu/~cmg/compmech/pubs/oci.htm; Updated figures and citations; added corrections and clarifications
null
null
null
cs.IT cond-mat.stat-mech cs.LG math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce an approach to inferring the causal architecture of stochastic dynamical systems that extends rate distortion theory to use causal shielding---a natural principle of learning. We study two distinct cases of causal inference: optimal causal filtering and optimal causal estimation. Filtering corresponds to the ideal case in which the probability distribution of measurement sequences is known, giving a principled method to approximate a system's causal structure at a desired level of representation. We show that, in the limit in which a model complexity constraint is relaxed, filtering finds the exact causal architecture of a stochastic dynamical system, known as the causal-state partition. From this, one can estimate the amount of historical information the process stores. More generally, causal filtering finds a graded model-complexity hierarchy of approximations to the causal architecture. Abrupt changes in the hierarchy, as a function of approximation, capture distinct scales of structural organization. For nonideal cases with finite data, we show how the correct number of underlying causal states can be found by optimal causal estimation. A previously derived model complexity control term allows us to correct for the effect of statistical fluctuations in probability estimates and thereby avoid over-fitting.
[ { "version": "v1", "created": "Sat, 11 Aug 2007 19:13:29 GMT" }, { "version": "v2", "created": "Thu, 19 Aug 2010 23:46:24 GMT" } ]
2010-08-23T00:00:00
[ [ "Still", "Susanne", "" ], [ "Crutchfield", "James P.", "" ], [ "Ellison", "Christopher J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0708.1593
Adom Giffin
Adom Giffin and Ariel Caticha
Updating Probabilities with Data and Moments
Presented at the 27th International Workshop on Bayesian Inference and Maximum Entropy Methods in Science and Engineering, Saratoga Springs, NY, July 8-13, 2007. 10 pages, 1 figure V2 has a small typo in the end of the appendix that was fixed. aj=mj+1 is now aj=m(k-j)+1
null
10.1063/1.2821302
null
physics.data-an cs.IT math.IT math.ST physics.comp-ph physics.pop-ph stat.AP stat.CO stat.ME stat.TH
null
We use the method of Maximum (relative) Entropy to process information in the form of observed data and moment constraints. The generic "canonical" form of the posterior distribution for the problem of simultaneous updating with data and moments is obtained. We discuss the general problem of non-commuting constraints, when they should be processed sequentially and when simultaneously. As an illustration, the multinomial example of die tosses is solved in detail for two superficially similar but actually very different problems.
[ { "version": "v1", "created": "Mon, 13 Aug 2007 19:25:41 GMT" }, { "version": "v2", "created": "Wed, 22 Aug 2007 20:23:25 GMT" } ]
2016-09-08T00:00:00
[ [ "Giffin", "Adom", "" ], [ "Caticha", "Ariel", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Physics", "code": "physics.comp-ph", "description": "All aspects of computational science applied to physics.", "span": "(Computational Physics)" }, { "class": "Physics", "code": "physics.pop-ph", "description": "Description coming soon", "span": "(Popular Physics)" }, { "class": "Statistics", "code": "stat.AP", "description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences", "span": "(Applications)" }, { "class": "Statistics", "code": "stat.CO", "description": "Algorithms, Simulation, Visualization", "span": "(Computation)" }, { "class": "Statistics", "code": "stat.ME", "description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods", "span": "(Methodology)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0708.1624
Vita Hinze-Hoare
V. Hinze-Hoare
Designing a Collaborative Research Environment for Students and their Supervisors (CRESS)
null
null
null
null
cs.HC
null
In a previous paper the CSCR domain was defined. Here this is taken to the next stage where the design of a particular Collaborative Research Environment to support Students and Supervisors (CRESS) is considered. Following the CSCR structure this paper deals with an analysis of 13 collaborative working environments to determine a preliminary design for CRESS in order to discover the most appropriate set of tools for its implementation.
[ { "version": "v1", "created": "Sun, 12 Aug 2007 19:58:37 GMT" } ]
2007-08-14T00:00:00
[ [ "Hinze-Hoare", "V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0708.1723
Volker Weber
Volker Weber
Hybrid Branching-Time Logics
An extended abstract of this paper was presented at the International Workshop on Hybrid Logics (HyLo 2007)
null
null
null
cs.LO cs.CC
null
Hybrid branching-time logics are introduced as extensions of CTL-like logics with state variables and the downarrow-binder. Following recent work in the linear framework, only logics with a single variable are considered. The expressive power and the complexity of satisfiability of the resulting logics is investigated. As main result, the satisfiability problem for the hybrid versions of several branching-time logics is proved to be 2EXPTIME-complete. These branching-time logics range from strict fragments of CTL to extensions of CTL that can talk about the past and express fairness-properties. The complexity gap relative to CTL is explained by a corresponding succinctness result. To prove the upper bound, the automata-theoretic approach to branching-time logics is extended to hybrid logics, showing that non-emptiness of alternating one-pebble Buchi tree automata is 2EXPTIME-complete.
[ { "version": "v1", "created": "Mon, 13 Aug 2007 15:04:12 GMT" } ]
2007-08-14T00:00:00
[ [ "Weber", "Volker", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0708.1725
Willemien Visser
Willemien Visser (LTCI)
Design: One, but in different forms
null
Design Studies 30, 3 (2009) 187-223
10.1016/j.destud.2008.11.004
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This overview paper defends an augmented cognitively oriented generic-design hypothesis: there are both significant similarities between the design activities implemented in different situations and crucial differences between these and other cognitive activities; yet, characteristics of a design situation (related to the design process, the designers, and the artefact) introduce specificities in the corresponding cognitive activities and structures that are used, and in the resulting designs. We thus augment the classical generic-design hypothesis with that of different forms of designing. We review the data available in the cognitive design research literature and propose a series of candidates underlying such forms of design, outlining a number of directions requiring further elaboration.
[ { "version": "v1", "created": "Mon, 13 Aug 2007 15:00:37 GMT" }, { "version": "v2", "created": "Thu, 20 Aug 2009 14:55:41 GMT" } ]
2009-08-20T00:00:00
[ [ "Visser", "Willemien", "", "LTCI" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0708.1768
Alexander Ushakov
Jonathan Longrigg and Alexander Ushakov
Cryptanalysis of shifted conjugacy authentication protocol
8 pages
null
null
null
math.GR cs.CR
null
In this paper we present the first practical attack on the shifted conjugacy-based authentication protocol proposed by P. Dehornoy. We discuss the weaknesses of that primitive and propose ways to improve the protocol.
[ { "version": "v1", "created": "Tue, 14 Aug 2007 19:11:59 GMT" } ]
2007-08-15T00:00:00
[ [ "Longrigg", "Jonathan", "" ], [ "Ushakov", "Alexander", "" ] ]
[ { "class": "Mathematics", "code": "math.GR", "description": "Finite groups, topological groups, representation theory, cohomology, classification and structure", "span": "(Group Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0708.1818
Francoise Heres-Renzetti
L.-V. Bochkareva, M.-V. Kireitseu, G. R. Tomlinson, H. Altenbach, V. Kompis, D. Hui
Computational Simulation and 3D Virtual Reality Engineering Tools for Dynamical Modeling and Imaging of Composite Nanomaterials
Submitted on behalf of TIMA Editions (http://irevues.inist.fr/tima-editions)
Dans European Nano Systems Worshop - ENS 2005, Paris : France (2005)
null
null
cs.CE cond-mat.other
null
An adventure at engineering design and modeling is possible with a Virtual Reality Environment (VRE) that uses multiple computer-generated media to let a user experience situations that are temporally and spatially prohibiting. In this paper, an approach to developing some advanced architecture and modeling tools is presented to allow multiple frameworks work together while being shielded from the application program. This architecture is being developed in a framework of workbench interactive tools for next generation nanoparticle-reinforced damping/dynamic systems. Through the use of system, an engineer/programmer can respectively concentrate on tailoring an engineering design concept of novel system and the application software design while using existing databases/software outputs.
[ { "version": "v1", "created": "Tue, 14 Aug 2007 08:17:45 GMT" } ]
2007-08-15T00:00:00
[ [ "Bochkareva", "L. -V.", "" ], [ "Kireitseu", "M. -V.", "" ], [ "Tomlinson", "G. R.", "" ], [ "Altenbach", "H.", "" ], [ "Kompis", "V.", "" ], [ "Hui", "D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "cond-mat.other", "description": "Work in condensed matter that does not fit into the other cond-mat classifications", "span": "(Other Condensed Matter)" } ]
0708.1859
Jan Ostergaard
Jan Ostergaard and Ram Zamir
Multiple-Description Coding by Dithered Delta-Sigma Quantization
Revised, restructured, significantly shortened and minor typos has been fixed. Accepted for publication in the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We address the connection between the multiple-description (MD) problem and Delta-Sigma quantization. The inherent redundancy due to oversampling in Delta-Sigma quantization, and the simple linear-additive noise model resulting from dithered lattice quantization, allow us to construct a symmetric and time-invariant MD coding scheme. We show that the use of a noise shaping filter makes it possible to trade off central distortion for side distortion. Asymptotically as the dimension of the lattice vector quantizer and order of the noise shaping filter approach infinity, the entropy rate of the dithered Delta-Sigma quantization scheme approaches the symmetric two-channel MD rate-distortion function for a memoryless Gaussian source and MSE fidelity criterion, at any side-to-central distortion ratio and any resolution. In the optimal scheme, the infinite-order noise shaping filter must be minimum phase and have a piece-wise flat power spectrum with a single jump discontinuity. An important advantage of the proposed design is that it is symmetric in rate and distortion by construction, so the coding rates of the descriptions are identical and there is therefore no need for source splitting.
[ { "version": "v1", "created": "Tue, 14 Aug 2007 10:23:25 GMT" }, { "version": "v2", "created": "Wed, 15 Jul 2009 13:29:49 GMT" } ]
2009-07-15T00:00:00
[ [ "Ostergaard", "Jan", "" ], [ "Zamir", "Ram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.1877
Travis Gagie
Travis Gagie
A nearly tight memory-redundancy trade-off for one-pass compression
null
null
null
null
cs.IT math.IT
null
Let $s$ be a string of length $n$ over an alphabet of constant size $\sigma$ and let $c$ and $\epsilon$ be constants with (1 \geq c \geq 0) and (\epsilon > 0). Using (O (n)) time, (O (n^c)) bits of memory and one pass we can always encode $s$ in (n H_k (s) + O (\sigma^k n^{1 - c + \epsilon})) bits for all integers (k \geq 0) simultaneously. On the other hand, even with unlimited time, using (O (n^c)) bits of memory and one pass we cannot always encode $s$ in (O (n H_k (s) + \sigma^k n^{1 - c - \epsilon})) bits for, e.g., (k = \lceil (c + \epsilon / 2) \log_\sigma n \rceil).
[ { "version": "v1", "created": "Tue, 14 Aug 2007 12:50:41 GMT" } ]
2007-08-15T00:00:00
[ [ "Gagie", "Travis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.1903
Vahan Mkrtchyan
V. V. Mkrtchyan, V. L. Musoyan, A. V. Tserunyan
On Edge-Disjoint Pairs Of Matchings
8 pages, 2 figures, Submitted to Discrete Mathematics
Discrete Mathematics, 2008, Vol 308/23 pp 5823-5828
10.1016/j.disc.2007.09.061
null
cs.DM
null
For a graph G, consider the pairs of edge-disjoint matchings whose union consists of as many edges as possible. Let H be the largest matching among such pairs. Let M be a maximum matching of G. We show that 5/4 is a tight upper bound for |M|/|H|.
[ { "version": "v1", "created": "Tue, 14 Aug 2007 14:38:47 GMT" } ]
2008-10-09T00:00:00
[ [ "Mkrtchyan", "V. V.", "" ], [ "Musoyan", "V. L.", "" ], [ "Tserunyan", "A. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0708.1909
Maike Buchin
Kevin Buchin and Maike Buchin
Lower Bounds for the Complexity of the Voronoi Diagram of Polygonal Curves under the Discrete Frechet Distance
6 pages, 2 figures
null
null
null
cs.CG cs.CC
null
We give lower bounds for the combinatorial complexity of the Voronoi diagram of polygonal curves under the discrete Frechet distance. We show that the Voronoi diagram of n curves in R^d with k vertices each, has complexity Omega(n^{dk}) for dimension d=1,2 and Omega(n^{d(k-1)+2}) for d>2.
[ { "version": "v1", "created": "Tue, 14 Aug 2007 14:53:44 GMT" } ]
2007-08-15T00:00:00
[ [ "Buchin", "Kevin", "" ], [ "Buchin", "Maike", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0708.1962
Mihai Oltean
Mihai Oltean, Oana Muntean
Exact Cover with light
20 pages, 4 figures, New Generation Computing, accepted, 2007
New Generation Computing, Springer-Verlag, Vol. 26, Issue 4, pp. 327-344, 2008
10.1007/s00354-008-0049-5
null
cs.AR cs.DC
null
We suggest a new optical solution for solving the YES/NO version of the Exact Cover problem by using the massive parallelism of light. The idea is to build an optical device which can generate all possible solutions of the problem and then to pick the correct one. In our case the device has a graph-like representation and the light is traversing it by following the routes given by the connections between nodes. The nodes are connected by arcs in a special way which lets us to generate all possible covers (exact or not) of the given set. For selecting the correct solution we assign to each item, from the set to be covered, a special integer number. These numbers will actually represent delays induced to light when it passes through arcs. The solution is represented as a subray arriving at a certain moment in the destination node. This will tell us if an exact cover does exist or not.
[ { "version": "v1", "created": "Tue, 14 Aug 2007 21:41:55 GMT" } ]
2009-02-07T00:00:00
[ [ "Oltean", "Mihai", "" ], [ "Muntean", "Oana", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.1964
Mihai Oltean
Mihai Oltean, Oana Muntean
Solving the subset-sum problem with a light-based device
14 pages, 6 figures, Natural Computing, 2007
Natural Computing, Springer-Verlag, Vol 8, Issue 2, pp. 321-331, 2009
10.1007/s11047-007-9059-3
null
cs.AR cs.AI cs.DC
null
We propose a special computational device which uses light rays for solving the subset-sum problem. The device has a graph-like representation and the light is traversing it by following the routes given by the connections between nodes. The nodes are connected by arcs in a special way which lets us to generate all possible subsets of the given set. To each arc we assign either a number from the given set or a predefined constant. When the light is passing through an arc it is delayed by the amount of time indicated by the number placed in that arc. At the destination node we will check if there is a ray whose total delay is equal to the target value of the subset sum problem (plus some constants).
[ { "version": "v1", "created": "Tue, 14 Aug 2007 21:46:32 GMT" } ]
2015-09-11T00:00:00
[ [ "Oltean", "Mihai", "" ], [ "Muntean", "Oana", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0708.2021
Juan J. Merelo Pr.
Juan J. Merelo and Carlos Cotta
Who is the best connected EC researcher? Centrality analysis of the complex network of authors in evolutionary computation
Abstract accepted as poster to the GECCO 2007 conference
null
null
null
cs.CY cs.NE
null
Co-authorship graphs (that is, the graph of authors linked by co-authorship of papers) are complex networks, which expresses the dynamics of a complex system. Only recently its study has started to draw interest from the EC community, the first paper dealing with it having been published two years ago. In this paper we will study the co-authorship network of EC at a microscopic level. Our objective is ascertaining which are the most relevant nodes (i.e. authors) in it. For this purpose, we examine several metrics defined in the complex-network literature, and analyze them both in isolation and combined within a Pareto-dominance approach. The result of our analysis indicates that there are some well-known researchers that appear systematically in top rankings. This also provides some hints on the social behavior of our community.
[ { "version": "v1", "created": "Wed, 15 Aug 2007 10:13:03 GMT" } ]
2007-08-16T00:00:00
[ [ "Merelo", "Juan J.", "" ], [ "Cotta", "Carlos", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0708.2023
Lyubov Positselskaya
Lyubov N. Positselskaya
Nonantagonistic noisy duels of discrete type with an arbitrary number of actions
LaTeX 2e, 22 pages; replaced to correct TeXnical mistakes and typos
null
null
null
math.OC cs.GT math.PR
null
We study a nonzero-sum game of two players which is a generalization of the antagonistic noisy duel of discrete type. The game is considered from the point of view of various criterions of optimality. We prove existence of epsilon-equilibrium situations and show that the epsilon-equilibrium strategies that we have found are epsilon-maxmin. Conditions under which the equilibrium plays are Pareto-optimal are given. Keywords: noisy duel, payoff function, strategy, equilibrium situation, Pareto optimality, the value of a game.
[ { "version": "v1", "created": "Wed, 15 Aug 2007 10:42:27 GMT" }, { "version": "v2", "created": "Sat, 18 Aug 2007 14:17:25 GMT" } ]
2007-08-18T00:00:00
[ [ "Positselskaya", "Lyubov N.", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0708.2026
Albert Guill\'en i F\`abregas
Albert Guillen I Fabregas and Alfonso Martinez
Derivative of BICM Mutual Information
submitted to the IET Electronics Letters. 4 pages, 1 figure
null
null
null
cs.IT math.IT
null
In this letter we determine the derivative of the mutual information corresponding to bit-interleaved coded modulation systems. The derivative follows as a linear combination of minimum-mean-squared error functions of coded modulation sets. The result finds applications to the analysis of communications systems in the wideband regime and to the design of power allocation over parallel channels.
[ { "version": "v1", "created": "Wed, 15 Aug 2007 10:38:01 GMT" } ]
2007-08-16T00:00:00
[ [ "Fabregas", "Albert Guillen I", "" ], [ "Martinez", "Alfonso", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.2076
Loreto Bravo
Loreto Bravo, James Cheney and Irini Fundulaki
Repairing Inconsistent XML Write-Access Control Policies
25 pages. To appear in Proceedings of DBPL 2007
null
null
null
cs.DB
null
XML access control policies involving updates may contain security flaws, here called inconsistencies, in which a forbidden operation may be simulated by performing a sequence of allowed operations. This paper investigates the problem of deciding whether a policy is consistent, and if not, how its inconsistencies can be repaired. We consider policies expressed in terms of annotated DTDs defining which operations are allowed or denied for the XML trees that are instances of the DTD. We show that consistency is decidable in PTIME for such policies and that consistent partial policies can be extended to unique "least-privilege" consistent total policies. We also consider repair problems based on deleting privileges to restore consistency, show that finding minimal repairs is NP-complete, and give heuristics for finding repairs.
[ { "version": "v1", "created": "Wed, 15 Aug 2007 18:31:48 GMT" } ]
2007-08-16T00:00:00
[ [ "Bravo", "Loreto", "" ], [ "Cheney", "James", "" ], [ "Fundulaki", "Irini", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0708.2078
Viktor Levandovskyy
Viktor Levandovskyy and Eva Zerz
Obstructions to Genericity in Study of Parametric Problems in Control Theory
20 pages
null
null
null
math.OC cs.SC math.RA
null
We investigate systems of equations, involving parameters from the point of view of both control theory and computer algebra. The equations might involve linear operators such as partial (q-)differentiation, (q-)shift, (q-)difference as well as more complicated ones, which act trivially on the parameters. Such a system can be identified algebraically with a certain left module over a non-commutative algebra, where the operators commute with the parameters. We develop, implement and use in practice the algorithm for revealing all the expressions in parameters, for which e.g. homological properties of a system differ from the generic properties. We use Groebner bases and Groebner basics in rings of solvable type as main tools. In particular, we demonstrate an optimized algorithm for computing the left inverse of a matrix over a ring of solvable type. We illustrate the article with interesting examples. In particular, we provide a complete solution to the "two pendula, mounted on a cart" problem from the classical book of Polderman and Willems, including the case, where the friction at the joints is essential . To the best of our knowledge, the latter example has not been solved before in a complete way.
[ { "version": "v1", "created": "Wed, 15 Aug 2007 19:12:15 GMT" } ]
2010-03-22T00:00:00
[ [ "Levandovskyy", "Viktor", "" ], [ "Zerz", "Eva", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" } ]
0708.2084
Travis Gagie
Travis Gagie
Empirical entropy in context
A survey of some results related to empirical entropy, written in the spring of 2007 as part of an introduction to a PhD thesis
null
null
null
cs.IT math.IT
null
We trace the history of empirical entropy, touching briefly on its relation to Markov processes, normal numbers, Shannon entropy, the Chomsky hierarchy, Kolmogorov complexity, Ziv-Lempel compression, de Bruijn sequences and stochastic complexity.
[ { "version": "v1", "created": "Wed, 15 Aug 2007 19:00:10 GMT" } ]
2007-08-16T00:00:00
[ [ "Gagie", "Travis", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.2105
Nicholas Pippenger
Krzysztof Majewski and Nicholas Pippenger
Attribute Estimation and Testing Quasi-Symmetry
null
null
null
null
cs.CC
null
A Boolean function is symmetric if it is invariant under all permutations of its arguments; it is quasi-symmetric if it is symmetric with respect to the arguments on which it actually depends. We present a test that accepts every quasi-symmetric function and, except with an error probability at most delta>0, rejects every function that differs from every quasi-symmetric function on at least a fraction epsilon>0 of the inputs. For a function of n arguments, the test probes the function at O((n/epsilon)\log(n/delta)) inputs. Our quasi-symmetry test acquires information concerning the arguments on which the function actually depends. To do this, it employs a generalization of the property testing paradigm that we call attribute estimation. Like property testing, attribute estimation uses random sampling to obtain results that have only "one-sided'' errors and that are close to accurate with high probability.
[ { "version": "v1", "created": "Wed, 15 Aug 2007 20:56:22 GMT" } ]
2007-08-17T00:00:00
[ [ "Majewski", "Krzysztof", "" ], [ "Pippenger", "Nicholas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0708.2173
James Cheney
James Cheney, Amal Ahmed, and Umut Acar
Provenance as Dependency Analysis
Long version of paper in 2007 Symposium on Database Programming Languages; revised November 2009
null
null
null
cs.DB cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings; however, although many design points have been explored, the mathematical or semantic foundations of data provenance have received comparatively little attention. In this paper, we argue that dependency analysis techniques familiar from program analysis and program slicing provide a formal foundation for forms of provenance that are intended to show how (part of) the output of a query depends on (parts of) its input. We introduce a semantic characterization of such dependency provenance, show that this form of provenance is not computable, and provide dynamic and static approximation techniques.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 11:11:43 GMT" }, { "version": "v2", "created": "Tue, 22 Dec 2009 15:25:13 GMT" } ]
2009-12-22T00:00:00
[ [ "Cheney", "James", "" ], [ "Ahmed", "Amal", "" ], [ "Acar", "Umut", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0708.2213
Luai Jaff
Lua\"i Jaff (LIPN), G\'erard H.E. Duchamp (LIPN), Hatem Hadj Kacem, Cyrille Bertelle (LITIS)
Moderate Growth Time Series for Dynamic Combinatorics Modelisation
null
ECELM-2, Tirgu-Mures : Roumanie (2006)
null
null
cs.SC cs.MA math.CO
null
Here, we present a family of time series with a simple growth constraint. This family can be the basis of a model to apply to emerging computation in business and micro-economy where global functions can be expressed from local rules. We explicit a double statistics on these series which allows to establish a one-to-one correspondence between three other ballot-like strunctures.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 14:58:35 GMT" } ]
2007-08-17T00:00:00
[ [ "Jaff", "Luaï", "", "LIPN" ], [ "Duchamp", "Gérard H. E.", "", "LIPN" ], [ "Kacem", "Hatem Hadj", "", "LITIS" ], [ "Bertelle", "Cyrille", "", "LITIS" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0708.2230
Dale Miller
Dale Miller (INRIA Futurs)
Collection analysis for Horn clause programs
null
Dans International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (2006)
null
null
cs.LO
null
We consider approximating data structures with collections of the items that they contain. For examples, lists, binary trees, tuples, etc, can be approximated by sets or multisets of the items within them. Such approximations can be used to provide partial correctness properties of logic programs. For example, one might wish to specify than whenever the atom $sort(t,s)$ is proved then the two lists $t$ and $s$ contain the same multiset of items (that is, $s$ is a permutation of $t$). If sorting removes duplicates, then one would like to infer that the sets of items underlying $t$ and $s$ are the same. Such results could be useful to have if they can be determined statically and automatically. We present a scheme by which such collection analysis can be structured and automated. Central to this scheme is the use of linear logic as a omputational logic underlying the logic of Horn clauses.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 15:45:06 GMT" } ]
2007-08-17T00:00:00
[ [ "Miller", "Dale", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0708.2252
Dale Miller
Chuck Liang, Dale Miller (INRIA Futurs)
Focusing and Polarization in Intuitionistic Logic
null
Dans Computer Science Logic (2007)
null
null
cs.LO
null
A focused proof system provides a normal form to cut-free proofs that structures the application of invertible and non-invertible inference rules. The focused proof system of Andreoli for linear logic has been applied to both the proof search and the proof normalization approaches to computation. Various proof systems in literature exhibit characteristics of focusing to one degree or another. We present a new, focused proof system for intuitionistic logic, called LJF, and show how other proof systems can be mapped into the new system by inserting logical connectives that prematurely stop focusing. We also use LJF to design a focused proof system for classical logic. Our approach to the design and analysis of these systems is based on the completeness of focusing in linear logic and on the notion of polarity that appears in Girard's LC and LU proof systems.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 17:36:28 GMT" } ]
2007-08-17T00:00:00
[ [ "Liang", "Chuck", "", "INRIA Futurs" ], [ "Miller", "Dale", "", "INRIA Futurs" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0708.2255
Jeremy Siek
Jeremy G. Siek and Andrew Lumsdaine
A Language for Generic Programming in the Large
50 pages
null
null
null
cs.PL cs.SE
null
Generic programming is an effective methodology for developing reusable software libraries. Many programming languages provide generics and have features for describing interfaces, but none completely support the idioms used in generic programming. To address this need we developed the language G. The central feature of G is the concept, a mechanism for organizing constraints on generics that is inspired by the needs of modern C++ libraries. G provides modular type checking and separate compilation (even of generics). These characteristics support modular software development, especially the smooth integration of independently developed components. In this article we present the rationale for the design of G and demonstrate the expressiveness of G with two case studies: porting the Standard Template Library and the Boost Graph Library from C++ to G. The design of G shares much in common with the concept extension proposed for the next C++ Standard (the authors participated in its design) but there are important differences described in this article.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 18:06:18 GMT" } ]
2007-08-17T00:00:00
[ [ "Siek", "Jeremy G.", "" ], [ "Lumsdaine", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0708.2266
Kai Pan
Pan Kai, Tan Yue and Jiang Sheng
The study of a new gerrymandering methodology
23 pages,15 figures, 2007 American mathematical modeling contest "Meritorious Winner"
null
null
null
cs.CY
null
This paper is to obtain a simple dividing-diagram of the congressional districts, where the only limit is that each district should contain the same population if possibly. In order to solve this problem, we introduce three different standards of the "simple" shape. The first standard is that the final shape of the congressional districts should be of a simplest figure and we apply a modified "shortest split line algorithm" where the factor of the same population is considered only. The second standard is that the gerrymandering should ensure the integrity of the current administrative area as the convenience for management. Thus we combine the factor of the administrative area with the first standard, and generate an improved model resulting in the new diagram in which the perimeters of the districts are along the boundaries of some current counties. Moreover, the gerrymandering should consider the geographic features.The third standard is introduced to describe this situation. Finally, it can be proved that the difference between the supporting ratio of a certain party in each district and the average supporting ratio of that particular party in the whole state obeys the Chi-square distribution approximately. Consequently, we can obtain an archetypal formula to check whether the gerrymandering we propose is fair.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 18:44:53 GMT" } ]
2007-08-17T00:00:00
[ [ "Kai", "Pan", "" ], [ "Yue", "Tan", "" ], [ "Sheng", "Jiang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0708.2270
Tan Wong
Saravanan Vijayakumaran, Tan F. Wong and Tat M. Lok
Capacity of the Degraded Half-Duplex Relay Channel
10 pages, 2 figures
null
null
null
cs.IT math.IT
null
A discrete memoryless half-duplex relay channel is constructed from a broadcast channel from the source to the relay and destination and a multiple access channel from the source and relay to the destination. When the relay listens, the channel operates in the broadcast mode. The channel switches to the multiple access mode when the relay transmits. If the broadcast component channel is physically degraded, the half-duplex relay channel will also be referred to as physically degraded. The capacity of this degraded half-duplex relay channel is examined. It is shown that the block Markov coding suggested in the seminal paper by Cover and El Gamal can be modified to achieve capacity for the degraded half-duplex relay channel. In the code construction, the listen-transmit schedule of the relay is made to depend on the message to be sent and hence the schedule carries information itself. If the schedule is restricted to be deterministic, it is shown that the capacity can be achieved by a simple management of information flows across the broadcast and multiple access component channels.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 19:36:03 GMT" } ]
2007-08-17T00:00:00
[ [ "Vijayakumaran", "Saravanan", "" ], [ "Wong", "Tan F.", "" ], [ "Lok", "Tat M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.2273
Ozgur Oyman
Ozgur Oyman
Opportunism in Multiuser Relay Channels: Scheduling, Routing and Spectrum Reuse
5 pages
IEEE International Symposium on Information Theory (ISIT), Nice, France, June 2007
10.1109/ISIT.2007.4557240
null
cs.IT math.IT
null
In order to understand the key merits of multiuser diversity techniques in relay-assisted cellular multihop networks, this paper analyzes the spectral efficiency of opportunistic (i.e., channel-aware) scheduling algorithms over a fading multiuser relay channel with $K$ users in the asymptotic regime of large (but finite) number of users. Using tools from extreme-value theory, we characterize the limiting distribution of spectral efficiency focusing on Type I convergence and utilize it in investigating the large system behavior of the multiuser relay channel as a function of the number of users and physical channel signal-to-noise ratios (SNRs). Our analysis results in very accurate formulas in the large (but finite) $K$ regime, provides insights on the potential performance enhancements from multihop routing and spectrum reuse policies in the presence of multiuser diversity gains from opportunistic scheduling and helps to identify the regimes and conditions in which relay-assisted multiuser communication provides a clear advantage over direct multiuser communication.
[ { "version": "v1", "created": "Thu, 16 Aug 2007 21:44:43 GMT" } ]
2016-11-15T00:00:00
[ [ "Oyman", "Ozgur", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.2303
W Saba
Walid S. Saba
Compositional Semantics Grounded in Commonsense Metaphysics
null
null
null
null
cs.AI cs.CL
null
We argue for a compositional semantics grounded in a strongly typed ontology that reflects our commonsense view of the world and the way we talk about it in ordinary language. Assuming the existence of such a structure, we show that the semantics of various natural language phenomena may become nearly trivial.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 01:15:11 GMT" }, { "version": "v2", "created": "Fri, 31 Aug 2007 17:48:14 GMT" } ]
2009-09-29T00:00:00
[ [ "Saba", "Walid S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0708.2309
Dmitri Krioukov
Dmitri Krioukov, kc claffy, Kevin Fall, Arthur Brady
On Compact Routing for the Internet
This is a significantly revised, journal version of cs/0508021
ACM SIGCOMM Computer Communication Review (CCR), v.37, n.3, p.41-52, 2007
10.1145/1273445.1273450
null
cs.NI
null
While there exist compact routing schemes designed for grids, trees, and Internet-like topologies that offer routing tables of sizes that scale logarithmically with the network size, we demonstrate in this paper that in view of recent results in compact routing research, such logarithmic scaling on Internet-like topologies is fundamentally impossible in the presence of topology dynamics or topology-independent (flat) addressing. We use analytic arguments to show that the number of routing control messages per topology change cannot scale better than linearly on Internet-like topologies. We also employ simulations to confirm that logarithmic routing table size scaling gets broken by topology-independent addressing, a cornerstone of popular locator-identifier split proposals aiming at improving routing scaling in the presence of network topology dynamics or host mobility. These pessimistic findings lead us to the conclusion that a fundamental re-examination of assumptions behind routing models and abstractions is needed in order to find a routing architecture that would be able to scale ``indefinitely.''
[ { "version": "v1", "created": "Fri, 17 Aug 2007 02:37:20 GMT" } ]
2008-04-16T00:00:00
[ [ "Krioukov", "Dmitri", "" ], [ "claffy", "kc", "" ], [ "Fall", "Kevin", "" ], [ "Brady", "Arthur", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0708.2310
Lav Varshney
Lav R. Varshney and Vivek K. Goyal
Benefiting from Disorder: Source Coding for Unordered Data
35 pages
null
null
null
cs.IT math.IT
null
The order of letters is not always relevant in a communication task. This paper discusses the implications of order irrelevance on source coding, presenting results in several major branches of source coding theory: lossless coding, universal lossless coding, rate-distortion, high-rate quantization, and universal lossy coding. The main conclusions demonstrate that there is a significant rate savings when order is irrelevant. In particular, lossless coding of n letters from a finite alphabet requires Theta(log n) bits and universal lossless coding requires n + o(n) bits for many countable alphabet sources. However, there are no universal schemes that can drive a strong redundancy measure to zero. Results for lossy coding include distribution-free expressions for the rate savings from order irrelevance in various high-rate quantization schemes. Rate-distortion bounds are given, and it is shown that the analogue of the Shannon lower bound is loose at all finite rates.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 03:13:26 GMT" } ]
2007-08-20T00:00:00
[ [ "Varshney", "Lav R.", "" ], [ "Goyal", "Vivek K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0708.2319
Marcus Hutter
Marcus Hutter and Andrej Muchnik
On Semimeasures Predicting Martin-Loef Random Sequences
21 LaTeX pages
Theoretical Computer Science, 382 (2007) 247-261
null
null
cs.IT cs.LG math.IT math.PR
null
Solomonoff's central result on induction is that the posterior of a universal semimeasure M converges rapidly and with probability 1 to the true sequence generating posterior mu, if the latter is computable. Hence, M is eligible as a universal sequence predictor in case of unknown mu. Despite some nearby results and proofs in the literature, the stronger result of convergence for all (Martin-Loef) random sequences remained open. Such a convergence result would be particularly interesting and natural, since randomness can be defined in terms of M itself. We show that there are universal semimeasures M which do not converge for all random sequences, i.e. we give a partial negative answer to the open problem. We also provide a positive answer for some non-universal semimeasures. We define the incomputable measure D as a mixture over all computable measures and the enumerable semimeasure W as a mixture over all enumerable nearly-measures. We show that W converges to D and D to mu on all random sequences. The Hellinger distance measuring closeness of two distributions plays a central role.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 06:39:11 GMT" } ]
2007-08-20T00:00:00
[ [ "Hutter", "Marcus", "" ], [ "Muchnik", "Andrej", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0708.2336
Dominik Scheder
Dominik Scheder
Unsatisfiable Linear k-CNFs Exist, for every k
11 pages
null
null
null
cs.DM cs.CC cs.LO
null
We call a CNF formula linear if any two clauses have at most one variable in common. Let Linear k-SAT be the problem of deciding whether a given linear k-CNF formula is satisfiable. Here, a k-CNF formula is a CNF formula in which every clause has size exactly k. It was known that for k >= 3, Linear k-SAT is NP-complete if and only if an unsatisfiable linear k-CNF formula exists, and that they do exist for k >= 4. We prove that unsatisfiable linear k-CNF formulas exist for every k. Let f(k) be the minimum number of clauses in an unsatisfiable linear k-CNF formula. We show that f(k) is Omega(k2^k) and O(4^k*k^4), i.e., minimum size unsatisfiable linear k-CNF formulas are significantly larger than minimum size unsatisfiable k-CNF formulas. Finally, we prove that, surprisingly, linear k-CNF formulas do not allow for a larger fraction of clauses to be satisfied than general k-CNF formulas.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 09:44:21 GMT" } ]
2007-08-20T00:00:00
[ [ "Scheder", "Dominik", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0708.2351
Judit Nagy-Gy\"orgy
Judit Nagy-Gy\"orgy
Randomized algorithm for the k-server problem on decomposable spaces
11 pages
null
null
null
cs.DS cs.DM
null
We study the randomized k-server problem on metric spaces consisting of widely separated subspaces. We give a method which extends existing algorithms to larger spaces with the growth rate of the competitive quotients being at most O(log k). This method yields o(k)-competitive algorithms solving the randomized k-server problem, for some special underlying metric spaces, e.g. HSTs of "small" height (but unbounded degree). HSTs are important tools for probabilistic approximation of metric spaces.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 11:54:44 GMT" } ]
2007-08-20T00:00:00
[ [ "Nagy-György", "Judit", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0708.2353
Vladimir Vovk
Vladimir Vovk
Continuous and randomized defensive forecasting: unified view
10 pages. The new version: (1) relaxes the assumption that the outcome space is finite, and now it is only assumed to be compact; (2) shows that in the case where the outcome space is finite of cardinality C, the randomized forecasts can be chosen concentrated on a finite set of cardinality at most C
null
null
null
cs.LG
null
Defensive forecasting is a method of transforming laws of probability (stated in game-theoretic terms as strategies for Sceptic) into forecasting algorithms. There are two known varieties of defensive forecasting: "continuous", in which Sceptic's moves are assumed to depend on the forecasts in a (semi)continuous manner and which produces deterministic forecasts, and "randomized", in which the dependence of Sceptic's moves on the forecasts is arbitrary and Forecaster's moves are allowed to be randomized. This note shows that the randomized variety can be obtained from the continuous variety by smearing Sceptic's moves to make them continuous.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 12:18:24 GMT" }, { "version": "v2", "created": "Thu, 23 Aug 2007 12:44:34 GMT" } ]
2007-08-23T00:00:00
[ [ "Vovk", "Vladimir", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0708.2363
Vahan Mkrtchyan
R. R. Kamalian, V. V. Mkrtchyan
On a constructive characterization of a class of trees related to pairs of disjoint matchings
22 pages, 17 figures
null
null
null
cs.DM
null
For a graph consider the pairs of disjoint matchings which union contains as many edges as possible, and define a parameter $\alpha$ which eqauls the cardinality of the largest matching in those pairs. Also, define $\betta$ to be the cardinality of a maximum matching of the graph. We give a constructive characterization of trees which satisfy the $\alpha$=$\betta$ equality. The proof of our main theorem is based on a new decomposition algorithm obtained for trees.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 13:19:49 GMT" } ]
2009-09-29T00:00:00
[ [ "Kamalian", "R. R.", "" ], [ "Mkrtchyan", "V. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0708.2395
Milton Chowdhury
M. M. Chowdhury
Key Agreement and Authentication Schemes Using Non-Commutative Semigroups
null
null
null
null
cs.CR
null
We give a new two-pass authentication scheme, whichis a generalisation of an authentication scheme of Sibert-Dehornoy-Girault based on the Diffie-Hellman conjugacy problem. Compared to the above scheme, for some parameters it is more efficient with respect to multiplications. We sketch a proof that our authentication scheme is secure. We give a new key agreement protocols.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 16:38:43 GMT" }, { "version": "v2", "created": "Mon, 20 Aug 2007 00:15:01 GMT" } ]
2007-08-20T00:00:00
[ [ "Chowdhury", "M. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0708.2397
Milton Chowdhury
M. M. Chowdhury
On the AAGL Protocol
This version differs from the first version because a new attack is given
null
null
null
cs.CR
null
Recently the AAGL (Anshel-Anshel-Goldfeld-Lemieux) has been proposed which can be used for RFID tags. We give algorithms for the problem (we call the MSCSPv) on which the security of the AAGL protocol is based upon. Hence we give various attacks for general parameters on the recent AAGL protocol proposed. One of our attacks is a deterministic algorithm which has space complexity and time complexity both atleast exponentialin the worst case. In a better case using a probabilistic algorithm the time complexity canbe O(|XSS(ui')^L5*(n^(1+e)) and the space complexity can be O(|XSS(ui')|^L6), where the element ui' is part of a public key, n is the index of braid group, XSS is a summit type set and e is a constant in a limit. The above shows the AAGL protocol is potentially not significantly more secure as using key agreement protocols based on the conjugacy problem such as the AAG (Anshel-Anshel-Goldfeld) protocol because both protocols can be broken with complexity which do not significantly differ. We think our attacks can be improved.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 16:48:13 GMT" }, { "version": "v2", "created": "Tue, 21 Aug 2007 00:44:02 GMT" }, { "version": "v3", "created": "Mon, 1 Oct 2007 10:26:48 GMT" }, { "version": "v4", "created": "Mon, 19 Nov 2007 16:11:45 GMT" }, { "version": "v5", "created": "Thu, 22 Nov 2007 22:27:48 GMT" } ]
2007-11-23T00:00:00
[ [ "Chowdhury", "M. M.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0708.2414
Kristina Lerman
Kristina Lerman
User Participation in Social Media: Digg Study
Workshops of 2007 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 07)
null
10.1109/WI-IATW.2007.68
null
cs.CY
null
The social news aggregator Digg allows users to submit and moderate stories by voting on (digging) them. As is true of most social sites, user participation on Digg is non-uniformly distributed, with few users contributing a disproportionate fraction of content. We studied user participation on Digg, to see whether it is motivated by competition, fueled by user ranking, or social factors, such as community acceptance. For our study we collected activity data of the top users weekly over the course of a year. We computed the number of stories users submitted, dugg or commented on weekly. We report a spike in user activity in September 2006, followed by a gradual decline, which seems unaffected by the elimination of user ranking. The spike can be explained by a controversy that broke out at the beginning of September 2006. We believe that the lasting acrimony that this incident has created led to a decline of top user participation on Digg.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 18:46:55 GMT" } ]
2016-11-18T00:00:00
[ [ "Lerman", "Kristina", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0708.2432
Oliver Knill
Oliver Knill and Jose Ramirez-Herran
A structure from motion inequality
15 pages, 22 figures
null
null
null
cs.CV cs.AI
null
We state an elementary inequality for the structure from motion problem for m cameras and n points. This structure from motion inequality relates space dimension, camera parameter dimension, the number of cameras and number points and global symmetry properties and provides a rigorous criterion for which reconstruction is not possible with probability 1. Mathematically the inequality is based on Frobenius theorem which is a geometric incarnation of the fundamental theorem of linear algebra. The paper also provides a general mathematical formalism for the structure from motion problem. It includes the situation the points can move while the camera takes the pictures.
[ { "version": "v1", "created": "Sat, 18 Aug 2007 14:36:28 GMT" } ]
2007-08-21T00:00:00
[ [ "Knill", "Oliver", "" ], [ "Ramirez-Herran", "Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0708.2438
Oliver Knill
Oliver Knill and Jose Ramirez-Herran
On Ullman's theorem in computer vision
16 pages, 13 figures
null
null
null
cs.CV cs.AI
null
Both in the plane and in space, we invert the nonlinear Ullman transformation for 3 points and 3 orthographic cameras. While Ullman's theorem assures a unique reconstruction modulo a reflection for 3 cameras and 4 points, we find a locally unique reconstruction for 3 cameras and 3 points. Explicit reconstruction formulas allow to decide whether picture data of three cameras seeing three points can be realized as a point-camera configuration.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 21:36:08 GMT" } ]
2007-08-21T00:00:00
[ [ "Knill", "Oliver", "" ], [ "Ramirez-Herran", "Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0708.2442
Oliver Knill
Oliver Knill and Jose Ramirez-Herran
Space and camera path reconstruction for omni-directional vision
null
null
null
null
cs.CV cs.AI
null
In this paper, we address the inverse problem of reconstructing a scene as well as the camera motion from the image sequence taken by an omni-directional camera. Our structure from motion results give sharp conditions under which the reconstruction is unique. For example, if there are three points in general position and three omni-directional cameras in general position, a unique reconstruction is possible up to a similarity. We then look at the reconstruction problem with m cameras and n points, where n and m can be large and the over-determined system is solved by least square methods. The reconstruction is robust and generalizes to the case of a dynamic environment where landmarks can move during the movie capture. Possible applications of the result are computer assisted scene reconstruction, 3D scanning, autonomous robot navigation, medical tomography and city reconstructions.
[ { "version": "v1", "created": "Fri, 17 Aug 2007 21:53:41 GMT" } ]
2007-08-21T00:00:00
[ [ "Knill", "Oliver", "" ], [ "Ramirez-Herran", "Jose", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0708.2456
Jiyou Li
Jiyou Li and Daqing Wan
On the subset sum problem over finite fields
16 pages
null
null
null
math.NT cs.IT math.IT
null
The subset sum problem over finite fields is a well-known {\bf NP}-complete problem. It arises naturally from decoding generalized Reed-Solomon codes. In this paper, we study the number of solutions of the subset sum problem from a mathematical point of view. In several interesting cases, we obtain explicit or asymptotic formulas for the solution number. As a consequence, we obtain some results on the decoding problem of Reed-Solomon codes.
[ { "version": "v1", "created": "Sat, 18 Aug 2007 02:13:00 GMT" } ]
2007-08-21T00:00:00
[ [ "Li", "Jiyou", "" ], [ "Wan", "Daqing", "" ] ]
[ { "class": "Mathematics", "code": "math.NT", "description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory", "span": "(Number Theory)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]