id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
sequencelengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0708.0353 | Dariusz Grech | D. Grech, G. Pamu{\l}a (University of Wroclaw, ITP) | The Local Fractal Properties of the Financial Time Series on the Polish
Stock Exchange Market | LaTeX, 14 pages, 12 figures included | null | null | null | q-fin.ST cs.CE physics.data-an | null | We investigate the local fractal properties of the financial time series
based on the evolution of the Warsaw Stock Exchange Index (WIG) connected with
the largest developing financial market in Europe. Calculating the local Hurst
exponent for the WIG time series we find an interesting dependence between the
behavior of the local fractal properties of the WIG time series and the crashes
appearance on the financial market.
| [
{
"version": "v1",
"created": "Thu, 2 Aug 2007 14:22:30 GMT"
}
] | 2008-12-02T00:00:00 | [
[
"Grech",
"D.",
"",
"University of Wroclaw, ITP"
],
[
"Pamuła",
"G.",
"",
"University of Wroclaw, ITP"
]
] | [
{
"class": "Quantitative Finance",
"code": "q-fin.ST",
"description": "Statistical, econometric and econophysics analyses with applications to financial markets and economic data",
"span": "(Statistical Finance)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0708.0361 | Grigoriev Evgeniy | Evgeniy Grigoriev | Why the relational data model can be considered as a formal basis for
group operations in object-oriented systems | 10 pages | null | null | null | cs.DB | null | Relational data model defines a specification of a type "relation". However,
its simplicity does not mean that the system implementing this model must
operate with structures having the same simplicity. We consider two principles
allowing create a system which combines object-oriented paradigm (OOP) and
relational data model (RDM) in one framework. The first principle -- "complex
data in encapsulated domains" -- is well known from The Third Manifesto by Date
and Darwen. The second principle --"data complexity in names"-- is the basis
for a system where data are described as complex objects and uniquely
represented as a set of relations. Names of these relations and names of their
attributes are combinations of names entered in specifications of the complex
objects. Below, we consider the main properties of such a system.
| [
{
"version": "v1",
"created": "Thu, 2 Aug 2007 15:24:29 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Aug 2007 06:11:33 GMT"
},
{
"version": "v3",
"created": "Sun, 5 Aug 2007 22:38:53 GMT"
},
{
"version": "v4",
"created": "Tue, 7 Aug 2007 21:39:14 GMT"
},
{
"version": "v5",
"created": "Thu, 9 Aug 2007 04:56:59 GMT"
},
{
"version": "v6",
"created": "Thu, 9 Aug 2007 22:15:20 GMT"
},
{
"version": "v7",
"created": "Wed, 5 Sep 2007 20:18:51 GMT"
}
] | 2007-09-05T00:00:00 | [
[
"Grigoriev",
"Evgeniy",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0708.0386 | Sheng Yang | Sheng Yang and Jean-Claude Belfiore | Diversity of MIMO Multihop Relay Channels | 62 pages, 10 figures, submitted to the IEEE transactions on
Information Theory. Updated version of "Diversity of MIMO Multihop Relay
Channels - Part I: Amplify-and-Forward" | null | null | null | cs.IT math.IT | null | We consider slow fading relay channels with a single multi-antenna
source-destination terminal pair. The source signal arrives at the destination
via N hops through N-1 layers of relays. We analyze the diversity of such
channels with fixed network size at high SNR. In the clustered case where the
relays within the same layer can have full cooperation, the cooperative
decode-and-forward (DF) scheme is shown to be optimal in terms of the
diversity-multiplexing tradeoff (DMT). The upper bound on the DMT, the cut-set
bound, is attained. In the non-clustered case, we show that the naive
amplify-and-forward (AF) scheme has the maximum multiplexing gain of the
channel but is suboptimal in diversity, as compared to the cut-set bound. To
improve the diversity, space-time relay processing is introduced through the
parallel partition of the multihop channel. The idea is to let the source
signal go through K different "AF paths" in the multihop channel. This parallel
AF scheme creates a parallel channel in the time domain and has the maximum
diversity if the partition is properly designed. Since this scheme does not
achieve the maximum multiplexing gain in general, we propose a flip-and-forward
(FF) scheme that is built from the parallel AF scheme. It is shown that the FF
scheme achieves both the maximum diversity and multiplexing gains in a
distributed multihop channel of arbitrary size. In order to realize the DMT
promised by the relaying strategies, approximately universal coding schemes are
also proposed.
| [
{
"version": "v1",
"created": "Thu, 2 Aug 2007 16:59:21 GMT"
}
] | 2007-08-03T00:00:00 | [
[
"Yang",
"Sheng",
""
],
[
"Belfiore",
"Jean-Claude",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0495 | Damien Chablat | Philippe D\'epinc\'e (IRCCyN), Damien Chablat (IRCCyN), Peer-Oliver
Woelk (IFW) | Virtual Manufacturing : Tools for improving Design and Production | null | Dans International Design Seminar - CIRP International Design
Seminar, Caire : \'Egypte (2004) | null | null | cs.RO physics.class-ph | null | The research area "Virtual Manufacturing" can be defined as an integrated
manufacturing environment which can enhance one or several levels of decision
and control in manufacturing process. Several domains can be addressed: Product
and Process Design, Process and Production Planning, Machine Tool, Robot and
Manufacturing System. As automation technologies such as CAD/CAM have
substantially shortened the time required to design products, Virtual
Manufacturing will have a similar effect on the manufacturing phase thanks to
the modelling, simulation and optimisation of the product and the processes
involved in its fabrication.
| [
{
"version": "v1",
"created": "Fri, 3 Aug 2007 11:15:21 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Dépincé",
"Philippe",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Woelk",
"Peer-Oliver",
"",
"IFW"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
},
{
"class": "Physics",
"code": "physics.class-ph",
"description": "Newtonian and relativistic dynamics; many particle systems; planetary motions; chaos in classical dynamics. Maxwell's equations and dynamics of charged systems and electromagnetic forces in materials. Vibrating systems such as membranes and cantilevers; optomechanics. Classical waves, including acoustics and elasticity; physics of music and musical instruments. Classical thermodynamics and heat flow problems.",
"span": "(Classical Physics)"
}
] |
0708.0505 | Luca Di Gaspero PhD | Luca Di Gaspero, Andrea Roli | A preliminary analysis on metaheuristics methods applied to the
Haplotype Inference Problem | 22 pages, 4 figures Technical Report: DEIS - Alma Mater Studiorum,
University of Bologna no. DEIS-LIA-006-07 | null | null | DEIS-LIA-006-07 | cs.AI cs.CE cs.DM q-bio.QM | null | Haplotype Inference is a challenging problem in bioinformatics that consists
in inferring the basic genetic constitution of diploid organisms on the basis
of their genotype. This information allows researchers to perform association
studies for the genetic variants involved in diseases and the individual
responses to therapeutic agents.
A notable approach to the problem is to encode it as a combinatorial problem
(under certain hypotheses, such as the pure parsimony criterion) and to solve
it using off-the-shelf combinatorial optimization techniques. The main methods
applied to Haplotype Inference are either simple greedy heuristic or exact
methods (Integer Linear Programming, Semidefinite Programming, SAT encoding)
that, at present, are adequate only for moderate size instances.
We believe that metaheuristic and hybrid approaches could provide a better
scalability. Moreover, metaheuristics can be very easily combined with problem
specific heuristics and they can also be integrated with tree-based search
techniques, thus providing a promising framework for hybrid systems in which a
good trade-off between effectiveness and efficiency can be reached.
In this paper we illustrate a feasibility study of the approach and discuss
some relevant design issues, such as modeling and design of approximate solvers
that combine constructive heuristics, local search-based improvement strategies
and learning mechanisms. Besides the relevance of the Haplotype Inference
problem itself, this preliminary analysis is also an interesting case study
because the formulation of the problem poses some challenges in modeling and
hybrid metaheuristic solver design that can be generalized to other problems.
| [
{
"version": "v1",
"created": "Fri, 3 Aug 2007 12:49:21 GMT"
}
] | 2007-08-06T00:00:00 | [
[
"Di Gaspero",
"Luca",
""
],
[
"Roli",
"Andrea",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0708.0522 | Konstantin Avrachenkov | Konstantin Avrachenkov (INRIA Sophia Antipolis), Vivek Borkar, Danil
Nemirovsky (INRIA Sophia Antipolis) | Quasi-stationary distributions as centrality measures of reducible
graphs | null | null | null | null | cs.NI | null | Random walk can be used as a centrality measure of a directed graph. However,
if the graph is reducible the random walk will be absorbed in some subset of
nodes and will never visit the rest of the graph. In Google PageRank the
problem was solved by introduction of uniform random jumps with some
probability. Up to the present, there is no clear criterion for the choice this
parameter. We propose to use parameter-free centrality measure which is based
on the notion of quasi-stationary distribution. Specifically we suggest four
quasi-stationary based centrality measures, analyze them and conclude that they
produce approximately the same ranking. The new centrality measures can be
applied in spam detection to detect ``link farms'' and in image search to find
photo albums.
| [
{
"version": "v1",
"created": "Fri, 3 Aug 2007 14:19:21 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Aug 2007 08:32:44 GMT"
}
] | 2009-04-17T00:00:00 | [
[
"Avrachenkov",
"Konstantin",
"",
"INRIA Sophia Antipolis"
],
[
"Borkar",
"Vivek",
"",
"INRIA Sophia Antipolis"
],
[
"Nemirovsky",
"Danil",
"",
"INRIA Sophia Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.0580 | David Pritchard | David Pritchard | Efficient Divide-and-Conquer Implementations Of Symmetric FSAs | null | Journal of Cellular Automata 5(6) (special issue for Automata
2007, H. Fuks & A. T. Lawniczak, eds), pages 481-490, 2010 | null | null | cs.FL cs.DM | http://creativecommons.org/licenses/by/3.0/ | A deterministic finite-state automaton (FSA) is an abstract sequential
machine that reads the symbols comprising an input word one at a time. An FSA
is symmetric if its output is independent of the order in which the input
symbols are read, i.e., if the output is invariant under permutations of the
input. We show how to convert a symmetric FSA A into an automaton-like
divide-and-conquer process whose intermediate results are no larger than the
size of A's memory. In comparison, a similar result for general FSA's has been
long known via functional composition, but entails an exponential increase in
memory size. The new result has applications to parallel processing and
symmetric FSA networks.
| [
{
"version": "v1",
"created": "Fri, 3 Aug 2007 20:21:36 GMT"
},
{
"version": "v2",
"created": "Mon, 31 Mar 2008 15:48:20 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Aug 2010 09:18:56 GMT"
}
] | 2010-08-06T00:00:00 | [
[
"Pritchard",
"David",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.0598 | Matthew McCool Dr | Matthew McCool | An Application of Chromatic Prototypes | This paper has been withdrawn | null | null | null | cs.HC cs.MM | null | This paper has been withdrawn.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 02:38:19 GMT"
},
{
"version": "v2",
"created": "Sun, 3 Feb 2008 19:41:44 GMT"
}
] | 2008-02-03T00:00:00 | [
[
"McCool",
"Matthew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0708.0600 | Michael Lee | Michael J. Lee | Complementary algorithms for graphs and percolation | 5 pages, 3 figures, poster version presented at statphys23 (2007) | null | 10.1103/PhysRevE.76.027702 | null | cs.DS | null | A pair of complementary algorithms are presented. One of the pair is a fast
method for connecting graphs with an edge. The other is a fast method for
removing edges from a graph. Both algorithms employ the same tree based graph
representation and so, in concert, can arbitrarily modify any graph. Since the
clusters of a percolation model may be described as simple connected graphs, an
efficient Monte Carlo scheme can be constructed that uses the algorithms to
sweep the occupation probability back and forth between two turning points.
This approach concentrates computational sampling time within a region of
interest. A high precision value of pc = 0.59274603(9) was thus obtained, by
Mersenne twister, for the two dimensional square site percolation threshold.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 02:56:13 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Lee",
"Michael J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0708.0603 | L.T. Handoko | Z. Akbar, Slamet, B. I. Ajinagoro, G.I. Ohara, I. Firmansyah, B.
Hermanto and L.T. Handoko | Public Cluster : parallel machine with multi-block approach | 4 pages, Proceeding of the International Conference on Electrical
Engineering and Informatics 2007 | null | null | FISIKALIPI-07002 | cs.DC cs.CY | null | We introduce a new approach to enable an open and public parallel machine
which is accessible for multi users with multi jobs belong to different blocks
running at the same time. The concept is required especially for parallel
machines which are dedicated for public use as implemented at the LIPI Public
Cluster. We have deployed the simplest technique by running multi daemons of
parallel processing engine with different configuration files specified for
each user assigned to access the system, and also developed an integrated
system to fully control and monitor the whole system over web. A brief
performance analysis is also given for Message Parsing Interface (MPI) engine.
It is shown that the proposed approach is quite reliable and affect the whole
performances only slightly.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 05:18:21 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Akbar",
"Z.",
""
],
[
"Slamet",
"",
""
],
[
"Ajinagoro",
"B. I.",
""
],
[
"Ohara",
"G. I.",
""
],
[
"Firmansyah",
"I.",
""
],
[
"Hermanto",
"B.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0708.0604 | L.T. Handoko | T.B. Waluyo and L.T. Handoko | Introducing OPTO : Portal for Optical Communities in Indonesia | 3 pages, Proceeding of the 2nd International Conf. on Optics and
Laser Applications 2007 | null | null | FISIKALIPI-07006 | cs.CY | null | Since January 1, 2005 we have launched "OPTO" Portal, a website dedicated to
optical communities in Indonesia. The address of this portal is
http://www.opto.lipi.go.id and is self-supporting managed and not for
commercial purposes. Our aims in launching this portal are to benefit Internet
facility in increasing the communities' scientific activity; to provide an
online reference in Indonesian language for optics-based science and technology
subjects; as well as to pioneer the communities' online activities with real
impacts and benefits for our society. We will describe in the paper the
features of this portal that can be utilized by all individuals or members of
optical communities to store and share information and to build networks or
partnership as well. We realized that this portal is still not popular and most
of our aims are still not reached. This conference should be a good place for
all of us to collaborate to properly utilize this portal for the advantages to
the optical communities in Indonesia and our society at large.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 05:16:10 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Waluyo",
"T. B.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0708.0605 | L.T. Handoko | Z. Akbar, Slamet, B. I. Ajinagoro, G.I. Ohara, I. Firmansyah, B.
Hermanto and L.T. Handoko | Open and Free Cluster for Public | 4 pages, Proceeding of the International Conference on Rural
Information and Communication Technology 2007 | null | null | FISIKALIPI-07003 | cs.DC cs.CY | null | We introduce the LIPI Public Cluster, the first parallel machine facility
fully open for public and for free in Indonesia and surrounding countries. In
this paper, we focus on explaining our globally new concept on open cluster,
and how to realize and manage it to meet the users needs. We show that after 2
years trial running and several upgradings, the Public Cluster performs well
and is able to fulfil all requirements as expected.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 05:17:34 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Akbar",
"Z.",
""
],
[
"Slamet",
"",
""
],
[
"Ajinagoro",
"B. I.",
""
],
[
"Ohara",
"G. I.",
""
],
[
"Firmansyah",
"I.",
""
],
[
"Hermanto",
"B.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0708.0607 | L.T. Handoko | I. Firmansyah, B. Hermanto, Hadiyanto and L.T. Handoko | Real-time control and monitoring system for LIPI's Public Cluster | 4 pages, Proceeding of the International Conference on
Instrumentation, Communication and Information Technology 2007 | null | null | FISIKALIPI-07004 | cs.DC cs.RO | null | We have developed a monitoring and control system for LIPI's Public Cluster.
The system consists of microcontrollers and full web-based user interfaces for
daily operation. It is argued that, due to its special natures, the cluster
requires fully dedicated and self developed control and monitoring system. We
discuss the implementation of using parallel port and dedicated
micro-controller for this purpose. We also show that integrating such systems
enables an autonomous control system based on the real time monitoring, for
instance an autonomous power supply control based on the actual temperature,
etc.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 05:16:43 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Firmansyah",
"I.",
""
],
[
"Hermanto",
"B.",
""
],
[
"Hadiyanto",
"",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.0608 | L.T. Handoko | Z. Akbar and L.T. Handoko | Resource Allocation in Public Cluster with Extended Optimization
Algorithm | 4 pages, Proceeding of the International Conference on
Instrumentation, Communication and Information Technology 2007 | null | null | FISIKALIPI-07005 | cs.DC | null | We introduce an optimization algorithm for resource allocation in the LIPI
Public Cluster to optimize its usage according to incoming requests from users.
The tool is an extended and modified genetic algorithm developed to match
specific natures of public cluster. We present a detail analysis of
optimization, and compare the results with the exact calculation. We show that
it would be very useful and could realize an automatic decision making system
for public clusters.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 05:15:05 GMT"
},
{
"version": "v2",
"created": "Thu, 9 Aug 2007 00:36:19 GMT"
}
] | 2007-08-09T00:00:00 | [
[
"Akbar",
"Z.",
""
],
[
"Handoko",
"L. T.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.0624 | Matthias Brust R. | Christian Hutter, Matthias R. Brust, Steffen Rothkugel | ADS-Directory Services for Mobile Ad-Hoc Networks Based on an
Information Market Model | 9 pages, in the 1st International Workshop on Ubiquitous Computing
(IWUC-2004) held in conjunction with the 6th International Conference on
Enterprise Information Systems (ICEIS 2004) | null | null | null | cs.NI cs.DC | null | Ubiquitous computing based on small mobile devices using wireless
communication links is becoming very attractive. The computational power and
storage capacities provided allow the execution of sophisticated applications.
Due to the fact that sharing of information is a central problem for
distributed applications, the development of self organizing middleware
services providing high level interfaces for information managing is essential.
ADS is a directory service for mobile ad-hoc networks dealing with local and
nearby information as well as providing access to distant information. The
approach discussed throughout this paper is based upon the concept of
information markets.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 13:21:55 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Hutter",
"Christian",
""
],
[
"Brust",
"Matthias R.",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.0627 | Matthias Brust R. | Matthias R. Brust, Daniel Goergen, Christian Hutter, Steffen Rothkugel | ADS as Information Management Service in an M-Learning Environment | 8th International Conference on Knowledge-Based Intelligent
Information & Engineering Systems (KES2004) | null | null | null | cs.NI cs.DC | null | Leveraging the potential power of even small handheld devices able to
communicate wirelessly requires dedicated support. In particular, collaborative
applications need sophisticated assistance in terms of querying and exchanging
different kinds of data. Using a concrete example from the domain of mobile
learning, the general need for information dissemination is motivated.
Subsequently, and driven by infrastructural conditions, realization strategies
of an appropriate middleware service are discussed.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 13:32:07 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Brust",
"Matthias R.",
""
],
[
"Goergen",
"Daniel",
""
],
[
"Hutter",
"Christian",
""
],
[
"Rothkugel",
"Steffen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.0648 | Zhu Han | Jianwei Huang, Zhu Han, Mung Chiang, and H. Vincent Poor | Auction-Based Distributed Resource Allocation for Cooperation
Transmission in Wireless Networks | To appear in the Proceedings of the IEEE IEEE Global Communications
Conference (GLOBECOM), Washington, DC, November 26 - 30, 2007 | null | 10.1109/GLOCOM.2007.912 | null | cs.IT math.IT | null | Cooperative transmission can greatly improve communication system performance
by taking advantage of the broadcast nature of wireless channels. Most previous
work on resource allocation for cooperation transmission is based on
centralized control. In this paper, we propose two share auction mechanisms,
the SNR auction and the power auction, to distributively coordinate the
resource allocation among users. We prove the existence, uniqueness and
effectiveness of the auction results. In particular, the SNR auction leads to a
fair resource allocation among users, and the power auction achieves a solution
that is close to the efficient allocation.
| [
{
"version": "v1",
"created": "Sat, 4 Aug 2007 21:33:18 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Huang",
"Jianwei",
""
],
[
"Han",
"Zhu",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0654 | James P. Crutchfield | Susanne Still, James P. Crutchfield | Structure or Noise? | 6 pages, 2 figures;
http://cse.ucdavis.edu/~cmg/compmech/pubs/son.html | null | null | null | physics.data-an cond-mat.stat-mech cs.IT cs.LG math-ph math.IT math.MP math.ST nlin.CD stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We show how rate-distortion theory provides a mechanism for automated theory
building by naturally distinguishing between regularity and randomness. We
start from the simple principle that model variables should, as much as
possible, render the future and past conditionally independent. From this, we
construct an objective function for model making whose extrema embody the
trade-off between a model's structural complexity and its predictive power. The
solutions correspond to a hierarchy of models that, at each level of
complexity, achieve optimal predictive power at minimal cost. In the limit of
maximal prediction the resulting optimal model identifies a process's intrinsic
organization by extracting the underlying causal states. In this limit, the
model's complexity is given by the statistical complexity, which is known to be
minimal for achieving maximum prediction. Examples show how theory building can
profit from analyzing a process's causal compressibility, which is reflected in
the optimal models' rate-distortion curve--the process's characteristic for
optimally balancing structure and noise at different levels of representation.
| [
{
"version": "v1",
"created": "Sun, 5 Aug 2007 01:37:53 GMT"
},
{
"version": "v2",
"created": "Sun, 29 Jun 2008 23:52:26 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Still",
"Susanne",
""
],
[
"Crutchfield",
"James P.",
""
]
] | [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "nlin.CD",
"description": "Dynamical systems, chaos, quantum chaos, topological dynamics, cycle expansions, turbulence, propagation",
"span": "(Chaotic Dynamics)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0708.0660 | Guanrong Chen | Zhisheng Duan, Chao Liu and Guanrong Chen | Network synchronizability analysis: the theory of subgraphs and
complementary graphs | 13 pages, 7 figures | null | 10.1016/j.physd.2007.12.003 | null | cs.NI cs.GR | null | In this paper, subgraphs and complementary graphs are used to analyze the
network synchronizability. Some sharp and attainable bounds are provided for
the eigenratio of the network structural matrix, which characterizes the
network synchronizability, especially when the network's corresponding graph
has cycles, chains, bipartite graphs or product graphs as its subgraphs.
| [
{
"version": "v1",
"created": "Sun, 5 Aug 2007 05:25:45 GMT"
}
] | 2009-11-13T00:00:00 | [
[
"Duan",
"Zhisheng",
""
],
[
"Liu",
"Chao",
""
],
[
"Chen",
"Guanrong",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0708.0694 | Maurice H. T. Ling | Maurice HT Ling, Christophe Lefevre, Kevin R. Nicholas, and Feng Lin | Reconstruction of Protein-Protein Interaction Pathways by Mining
Subject-Verb-Objects Intermediates | 2nd IAPR Workshop on Pattern Recognition in Bioinformatics (PRIB
2007). 14 pages, 4 figures | Ling, Maurice HT, Lefevre, Christophe, Nicholas, Kevin R, Lin,
Feng. 2007. In J.C. Ragapakse, B. Schmidt, and G. Volkert (Eds.), PRIB 2007.
Lecture Notes in Bioinformatics 4774: 286-299. Springer-Verlag. | null | null | cs.IR cs.CL cs.DL | null | The exponential increase in publication rate of new articles is limiting
access of researchers to relevant literature. This has prompted the use of text
mining tools to extract key biological information. Previous studies have
reported extensive modification of existing generic text processors to process
biological text. However, this requirement for modification had not been
examined. In this study, we have constructed Muscorian, using MontyLingua, a
generic text processor. It uses a two-layered generalization-specialization
paradigm previously proposed where text was generically processed to a suitable
intermediate format before domain-specific data extraction techniques are
applied at the specialization layer. Evaluation using a corpus and experts
indicated 86-90% precision and approximately 30% recall in extracting
protein-protein interactions, which was comparable to previous studies using
either specialized biological text processing tools or modified existing tools.
Our study had also demonstrated the flexibility of the two-layered
generalization-specialization paradigm by using the same generalization layer
for two specialized information extraction tasks.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2007 01:22:46 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Ling",
"Maurice HT",
""
],
[
"Lefevre",
"Christophe",
""
],
[
"Nicholas",
"Kevin R.",
""
],
[
"Lin",
"Feng",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
0708.0712 | Stephanie Gerbaud | St\'ephanie Gerbaud (IRISA), Nicolas Mollet (IRISA), Bruno Arnaldi
(IRISA) | Virtual Environments for Training: From Individual Learning to
Collaboration with Humanoids | null | Dans Edutainment (2007) | null | null | cs.GR | null | The next generation of virtual environments for training is oriented towards
collaborative aspects. Therefore, we have decided to enhance our platform for
virtual training environments, adding collaboration opportunities and
integrating humanoids. In this paper we put forward a model of humanoid that
suits both virtual humans and representations of real users, according to
collaborative training activities. We suggest adaptations to the scenario model
of our platform making it possible to write collaborative procedures. We
introduce a mechanism of action selection made up of a global repartition and
an individual choice. These models are currently being integrated and validated
in GVT, a virtual training tool for maintenance of military equipments,
developed in collaboration with the French company NEXTER-Group.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2007 07:42:56 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Gerbaud",
"Stéphanie",
"",
"IRISA"
],
[
"Mollet",
"Nicolas",
"",
"IRISA"
],
[
"Arnaldi",
"Bruno",
"",
"IRISA"
]
] | [
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0708.0713 | Radu Grigore | Radu Grigore and Micha{\l} Moskal | Edit and verify | null | null | null | null | cs.LO | null | Automated theorem provers are used in extended static checking, where they
are the performance bottleneck. Extended static checkers are run typically
after incremental changes to the code. We propose to exploit this usage pattern
to improve performance. We present two approaches of how to do so and a full
solution.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2007 07:47:34 GMT"
}
] | 2007-08-07T00:00:00 | [
[
"Grigore",
"Radu",
""
],
[
"Moskal",
"Michał",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.0741 | Shi Zhou Dr. | Shi Zhou, Ingemar Cox and Vaclav Petricek | Characterising Web Site Link Structure | To appear at IEEE/WSE07 | null | 10.1109/WSE.2007.4380247 | null | cs.IR | null | The topological structures of the Internet and the Web have received
considerable attention. However, there has been little research on the
topological properties of individual web sites. In this paper, we consider
whether web sites (as opposed to the entire Web) exhibit structural
similarities. To do so, we exhaustively crawled 18 web sites as diverse as
governmental departments, commercial companies and university departments in
different countries. These web sites consisted of as little as a few thousand
pages to millions of pages. Statistical analysis of these 18 sites revealed
that the internal link structure of the web sites are significantly different
when measured with first and second-order topological properties, i.e.
properties based on the connectivity of an individual or a pairs of nodes.
However, examination of a third-order topological property that consider the
connectivity between three nodes that form a triangle, revealed a strong
correspondence across web sites, suggestive of an invariant. Comparison with
the Web, the AS Internet, and a citation network, showed that this third-order
property is not shared across other types of networks. Nor is the property
exhibited in generative network models such as that of Barabasi and Albert.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2007 11:00:58 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Zhou",
"Shi",
""
],
[
"Cox",
"Ingemar",
""
],
[
"Petricek",
"Vaclav",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0708.0805 | Lun Dong | Lun Dong, Athina P. Petropulu and H. Vincent Poor | Cooperative Beamforming for Wireless Ad Hoc Networks | 5 pages, 4 figures. To appear in the Proceedings of the IEEE Global
Communications Conference (GLOBECOM), Washington, DC, November 26 - 30, 2007 | null | 10.1109/GLOCOM.2007.560 | null | cs.IT math.IT | null | Via collaborative beamforming, nodes in a wireless network are able to
transmit a common message over long distances in an energy efficient fashion.
However, the process of making available the same message to all collaborating
nodes introduces delays. In this paper, a MAC-PHY cross-layer scheme is
proposed that enables collaborative beamforming at significantly reduced
collaboration overhead. It consists of two phases. In the first phase, nodes
transmit locally in a random access time-slotted fashion. Simultaneous
transmissions from multiple source nodes are viewed as linear mixtures of all
transmitted packets. In the second phase, a set of collaborating nodes, acting
as a distributed antenna system, beamform the received analog waveform to one
or more faraway destinations. This step requires multiplication of the received
analog waveform by a complex weight, which is independently computed by each
cooperating node, and which allows packets bound to the same destination to add
coherently at the destination node. Assuming that each node has access to
location information, the proposed scheme can achieve high throughput, which in
certain cases exceeds one. An analysis of the symbol error probability
corresponding to the proposed scheme is provided.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2007 17:45:21 GMT"
}
] | 2016-11-17T00:00:00 | [
[
"Dong",
"Lun",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Poor",
"H. Vincent",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0846 | Amir Leshem | Amir Leshem and Ephi Zehavi | Cooperative game theory and the Gaussian interference channel | null | null | null | null | cs.IT cs.GT math.IT | null | In this paper we discuss the use of cooperative game theory for analyzing
interference channels. We extend our previous work, to games with N players as
well as frequency selective channels and joint TDM/FDM strategies.
We show that the Nash bargaining solution can be computed using convex
optimization techniques. We also show that the same results are applicable to
interference channels where only statistical knowledge of the channel is
available. Moreover, for the special case of two players $2\times K$ frequency
selective channel (with K frequency bins) we provide an $O(K \log_2 K)$
complexity algorithm for computing the Nash bargaining solution under mask
constraint and using joint FDM/TDM strategies. Simulation results are also
provided.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2007 21:47:10 GMT"
}
] | 2007-08-08T00:00:00 | [
[
"Leshem",
"Amir",
""
],
[
"Zehavi",
"Ephi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0850 | Neri Merhav | Neri Merhav | Relations between random coding exponents and the statistical physics of
random codes | 26 pages, 2 figures, submitted to IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | null | The partition function pertaining to finite--temperature decoding of a
(typical) randomly chosen code is known to have three types of behavior,
corresponding to three phases in the plane of rate vs. temperature: the {\it
ferromagnetic phase}, corresponding to correct decoding, the {\it paramagnetic
phase}, of complete disorder, which is dominated by exponentially many
incorrect codewords, and the {\it glassy phase} (or the condensed phase), where
the system is frozen at minimum energy and dominated by subexponentially many
incorrect codewords. We show that the statistical physics associated with the
two latter phases are intimately related to random coding exponents. In
particular, the exponent associated with the probability of correct decoding at
rates above capacity is directly related to the free energy in the glassy
phase, and the exponent associated with probability of error (the error
exponent) at rates below capacity, is strongly related to the free energy in
the paramagnetic phase. In fact, we derive alternative expressions of these
exponents in terms of the corresponding free energies, and make an attempt to
obtain some insights from these expressions. Finally, as a side result, we also
compare the phase diagram associated with a simple finite-temperature universal
decoder for discrete memoryless channels, to that of the finite--temperature
decoder that is aware of the channel statistics.
| [
{
"version": "v1",
"created": "Mon, 6 Aug 2007 22:33:04 GMT"
}
] | 2007-08-08T00:00:00 | [
[
"Merhav",
"Neri",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0877 | Vita Hinze-Hoare | V. Hinze-Hoare | A Portal Analysis for the Design of a Collaborative Research Environment
for Students and Supervisors (CRESS) within the CSCR Domain | null | null | null | null | cs.HC | null | In a previous paper the CSCR domain was defined. Here this is taken to the
next stage where we consider the design of a particular Collaborative Research
Environment to support Students and Supervisors CRESS. Following the CSCR
structure a preliminary design for CRESS has been established and a portal
framework analysis is undertaken in order to determine the most appropriate set
of tools for its implementation.
| [
{
"version": "v1",
"created": "Tue, 7 Aug 2007 19:53:24 GMT"
}
] | 2007-08-08T00:00:00 | [
[
"Hinze-Hoare",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.0905 | Thorsten Hehn | Thorsten Hehn, Olgica Milenkovic, Stefan Laendner, Johannes B. Huber | Permutation Decoding and the Stopping Redundancy Hierarchy of Cyclic and
Extended Cyclic Codes | 40 pages, 6 figures, 10 tables, submitted to IEEE Transactions on
Information Theory | null | 10.1109/TIT.2008.2006456 | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce the notion of the stopping redundancy hierarchy of a linear
block code as a measure of the trade-off between performance and complexity of
iterative decoding for the binary erasure channel. We derive lower and upper
bounds for the stopping redundancy hierarchy via Lovasz's Local Lemma and
Bonferroni-type inequalities, and specialize them for codes with cyclic
parity-check matrices. Based on the observed properties of parity-check
matrices with good stopping redundancy characteristics, we develop a novel
decoding technique, termed automorphism group decoding, that combines iterative
message passing and permutation decoding. We also present bounds on the
smallest number of permutations of an automorphism group decoder needed to
correct any set of erasures up to a prescribed size. Simulation results
demonstrate that for a large number of algebraic codes, the performance of the
new decoding method is close to that of maximum likelihood decoding.
| [
{
"version": "v1",
"created": "Tue, 7 Aug 2007 09:55:31 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Jan 2008 19:05:58 GMT"
},
{
"version": "v3",
"created": "Thu, 3 Jul 2008 15:38:55 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Hehn",
"Thorsten",
""
],
[
"Milenkovic",
"Olgica",
""
],
[
"Laendner",
"Stefan",
""
],
[
"Huber",
"Johannes B.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.0909 | Sebastien Tixeuil | L\'elia Blin (IBISC), Maria Gradinariu Potop-Butucaru (INRIA
Rocquencourt, LIP6), S\'ebastien Tixeuil (INRIA Futurs, LRI) | On the Self-stabilization of Mobile Robots in Graphs | null | null | null | null | cs.DS cs.DC | null | Self-stabilization is a versatile technique to withstand any transient fault
in a distributed system. Mobile robots (or agents) are one of the emerging
trends in distributed computing as they mimic autonomous biologic entities. The
contribution of this paper is threefold. First, we present a new model for
studying mobile entities in networks subject to transient faults. Our model
differs from the classical robot model because robots have constraints about
the paths they are allowed to follow, and from the classical agent model
because the number of agents remains fixed throughout the execution of the
protocol. Second, in this model, we study the possibility of designing
self-stabilizing algorithms when those algorithms are run by mobile robots (or
agents) evolving on a graph. We concentrate on the core building blocks of
robot and agents problems: naming and leader election. Not surprisingly, when
no constraints are given on the network graph topology and local execution
model, both problems are impossible to solve. Finally, using minimal hypothesis
with respect to impossibility results, we provide deterministic and
probabilistic solutions to both problems, and show equivalence of these
problems by an algorithmic reduction mechanism.
| [
{
"version": "v1",
"created": "Tue, 7 Aug 2007 09:34:14 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Aug 2007 09:11:22 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Blin",
"Lélia",
"",
"IBISC"
],
[
"Potop-Butucaru",
"Maria Gradinariu",
"",
"INRIA\n Rocquencourt, LIP6"
],
[
"Tixeuil",
"Sébastien",
"",
"INRIA Futurs, LRI"
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.0927 | Emanuel Diamant | Emanuel Diamant | Modeling Visual Information Processing in Brain: A Computer Vision Point
of View and Approach | That is a journal version of a paper that in 2007 has been submitted
to 15 computer vision conferences and was discarded by 11 of them | Signal Processing: Image Communication, vol. 22, issue 6, pp.
583-590, July 2007 | null | null | cs.AI cs.CV | null | We live in the Information Age, and information has become a critically
important component of our life. The success of the Internet made huge amounts
of it easily available and accessible to everyone. To keep the flow of this
information manageable, means for its faultless circulation and effective
handling have become urgently required. Considerable research efforts are
dedicated today to address this necessity, but they are seriously hampered by
the lack of a common agreement about "What is information?" In particular, what
is "visual information" - human's primary input from the surrounding world. The
problem is further aggravated by a long-lasting stance borrowed from the
biological vision research that assumes human-like information processing as an
enigmatic mix of perceptual and cognitive vision faculties. I am trying to find
a remedy for this bizarre situation. Relying on a new definition of
"information", which can be derived from Kolmogorov's compexity theory and
Chaitin's notion of algorithmic information, I propose a unifying framework for
visual information processing, which explicitly accounts for the perceptual and
cognitive image processing peculiarities. I believe that this framework will be
useful to overcome the difficulties that are impeding our attempts to develop
the right model of human-like intelligent image processing.
| [
{
"version": "v1",
"created": "Tue, 7 Aug 2007 11:16:15 GMT"
}
] | 2007-08-08T00:00:00 | [
[
"Diamant",
"Emanuel",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0708.0964 | Colm \'O D\'unlaing | Colm O Dunlaing | Nodally 3-connected planar graphs and convex combination mappings | 27 pages Latex, 11 postscript figures | null | null | TCDMATH 06-16 | cs.CG | null | A convex combination mapping of a planar graph is a plane mapping in which
the external vertices are mapped to the corners of a convex polygon and every
internal vertex is a proper weighted average of its neighbours. If a planar
graph is nodally 3-connected or triangulated then every such mapping is an
embedding (Tutte, Floater).
We give a simple characterisation of nodally 3-connected planar graphs, and
generalise the above result to any planar graph which admits any convex
embedding.
| [
{
"version": "v1",
"created": "Tue, 7 Aug 2007 14:32:38 GMT"
}
] | 2007-08-08T00:00:00 | [
[
"Dunlaing",
"Colm O",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0708.0975 | Cedric Adjih | C\'edric Adjih (INRIA Rocquencourt), Song Yean Cho (INRIA
Rocquencourt), Philippe Jacquet (INRIA Rocquencourt) | Near Optimal Broadcast with Network Coding in Large Sensor Networks | Dans First International Workshop on Information Theory for Sensor
Netwoks (WITS 2007) (2007) | null | null | null | cs.NI | null | We study efficient broadcasting for wireless sensor networks, with network
coding. We address this issue for homogeneous sensor networks in the plane. Our
results are based on a simple principle (IREN/IRON), which sets the same rate
on most of the nodes (wireless links) of the network. With this rate selection,
we give a value of the maximum achievable broadcast rate of the source: our
central result is a proof of the value of the min-cut for such networks, viewed
as hypergraphs. Our metric for efficiency is the number of transmissions
necessary to transmit one packet from the source to every destination: we show
that IREN/IRON achieves near optimality for large networks; that is,
asymptotically, nearly every transmission brings new information from the
source to the receiver. As a consequence, network coding asymptotically
outperforms any scheme that does not use network coding.
| [
{
"version": "v1",
"created": "Tue, 7 Aug 2007 15:13:17 GMT"
}
] | 2009-04-16T00:00:00 | [
[
"Adjih",
"Cédric",
"",
"INRIA Rocquencourt"
],
[
"Cho",
"Song Yean",
"",
"INRIA\n Rocquencourt"
],
[
"Jacquet",
"Philippe",
"",
"INRIA Rocquencourt"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.0977 | Valerio Lucarini | Valerio Lucarini | From symmetry break to Poisson point process in 2D Voronoi
tessellations: the generic nature of hexagons | 14 pages, 4 figures | J. Stat. Phys., 130, 1047-1062 (2008) | 10.1007/s10955-007-9475-x | null | cond-mat.stat-mech cond-mat.dis-nn cs.CG math-ph math.MP physics.data-an | null | We bridge the properties of the regular square and honeycomb Voronoi
tessellations of the plane to those of the Poisson-Voronoi case, thus analyzing
in a common framework symmetry-break processes and the approach to uniformly
random distributions of tessellation-generating points. We consider ensemble
simulations of tessellations generated by points whose regular positions are
perturbed through a Gaussian noise controlled by the parameter alpha. We study
the number of sides, the area, and the perimeter of the Voronoi cells. For
alpha>0, hexagons are the most common class of cells, and 2-parameter gamma
distributions describe well the statistics of the geometrical characteristics.
The symmetry break due to noise destroys the square tessellation, whereas the
honeycomb hexagonal tessellation is very stable and all Voronoi cells are
hexagon for small but finite noise with alpha<0.1. For a moderate amount of
Gaussian noise, memory of the specific unperturbed tessellation is lost,
because the statistics of the two perturbed tessellations is indistinguishable.
When alpha>2, results converge to those of Poisson-Voronoi tessellations. The
properties of n-sided cells change with alpha until the Poisson-Voronoi limit
is reached for alpha>2. The Desch law for perimeters is confirmed to be not
valid and a square root dependence on n is established. The ensemble mean of
the cells area and perimeter restricted to the hexagonal cells coincides with
the full ensemble mean; this might imply that the number of sides acts as a
thermodynamic state variable fluctuating about n=6; this reinforces the idea
that hexagons, beyond their ubiquitous numerical prominence, can be taken as
generic polygons in 2D Voronoi tessellations.
| [
{
"version": "v1",
"created": "Tue, 7 Aug 2007 15:23:31 GMT"
}
] | 2011-10-11T00:00:00 | [
[
"Lucarini",
"Valerio",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Physics",
"code": "math-ph",
"description": "Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Mathematics",
"code": "math.MP",
"description": "math.MP is an alias for math-ph. Articles in this category focus on areas of research that illustrate the application of mathematics to problems in physics, develop mathematical methods for such applications, or provide mathematically rigorous formulations of existing physical theories. Submissions to math-ph should be of interest to both physically oriented mathematicians and mathematically oriented physicists; submissions which are primarily of interest to theoretical physicists or to mathematicians should probably be directed to the respective physics/math categories",
"span": "(Mathematical Physics)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0708.1037 | Yoichiro Watanabe | Yoichiro Watanabe and Koichi Kamoi | A Formulation of the Channel Capacity of Multiple-Access Channel | This paper has been submitted to IEEE Transactions on Information
Theory in March, 2007. 10 pages, 4 figures | null | null | Proc. 2002 IEEE Int'l Sym. on Information Theory, Lausanne, p.308,
2002 | cs.IT math.IT | null | The necessary and sufficient condition of the channel capacity is rigorously
formulated for the N-user discrete memoryless multiple-access channel (MAC).
The essence of the formulation is to invoke an {\em elementary} MAC where sizes
of input alphabets are not greater than the size of output alphabet. The main
objective is to demonstrate that the channel capacity of an MAC is achieved by
an elementary MAC included in the original MAC. The proof is quite
straightforward by the very definition of the elementary MAC. Moreover it is
proved that the Kuhn-Tucker conditions of the elementary MAC are strictly
sufficient and obviously necessary for the channel capacity. The latter proof
requires some steps such that for the elementary MAC every solution of the
Kuhn-Tucker conditions reveals itself as local maximum on the domain of all
possible input probability distributions and then it achieves the channel
capacity. As a result, in respect of the channel capacity, the MAC in general
can be regarded as an aggregate of a finite number of elementary MAC's.
| [
{
"version": "v1",
"created": "Wed, 8 Aug 2007 02:28:27 GMT"
}
] | 2007-08-09T00:00:00 | [
[
"Watanabe",
"Yoichiro",
""
],
[
"Kamoi",
"Koichi",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.1049 | Damien Chablat | Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN), F\'elix Majou
(IRCCyN), Jean-Pierre Merlet (INRIA Sophia-Antipolis) | An Interval Analysis Based Study for the Design and the Comparison of
3-DOF Parallel Kinematic Machines | null | International Journal of Robotics Research 23, 6 (2004) 615-624 | null | null | cs.RO | null | This paper addresses an interval analysis based study that is applied to the
design and the comparison of 3-DOF parallel kinematic machines. Two design
criteria are used, (i) a regular workspace shape and, (ii) a kinetostatic
performance index that needs to be as homogeneous as possible throughout the
workspace. The interval analysis based method takes these two criteria into
account: on the basis of prescribed kinetostatic performances, the workspace is
analysed to find out the largest regular dextrous workspace enclosed in the
Cartesian workspace. An algorithm describing this method is introduced. Two
3-DOF translational parallel mechanisms designed for machining applications are
compared using this method. The first machine features three fixed linear
joints which are mounted orthogonally and the second one features three linear
joints which are mounted in parallel. In both cases, the mobile platform moves
in the Cartesian x-y-z space with fixed orientation.
| [
{
"version": "v1",
"created": "Wed, 8 Aug 2007 07:06:48 GMT"
}
] | 2007-08-09T00:00:00 | [
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
],
[
"Majou",
"Félix",
"",
"IRCCyN"
],
[
"Merlet",
"Jean-Pierre",
"",
"INRIA Sophia-Antipolis"
]
] | [
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0708.1078 | Jianwen Zhang | Marc A. Armand, Jianwen Zhang | Nearly MDS expander codes with reduced alphabet size | null | null | null | null | cs.IT math.IT | null | Recently, Roth and Skachek proposed two methods for constructing nearly
maximum-distance separable (MDS) expander codes. We show that through the
simple modification of using mixed-alphabet codes derived from MDS codes as
constituent codes in their code designs, one can obtain nearly MDS codes of
significantly smaller alphabet size, albeit at the expense of a (very slight)
reduction in code rate.
| [
{
"version": "v1",
"created": "Wed, 8 Aug 2007 10:45:51 GMT"
}
] | 2007-08-09T00:00:00 | [
[
"Armand",
"Marc A.",
""
],
[
"Zhang",
"Jianwen",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.1116 | Florian Simatos | Florian Simatos | A variant of the Recoil Growth algorithm to generate multi-polymer
systems | Title changed | null | null | null | cs.CE cond-mat.stat-mech | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | The Recoil Growth algorithm, proposed in 1999 by Consta et al., is one of the
most efficient algorithm available in the literature to sample from a
multi-polymer system. Such problems are closely related to the generation of
self-avoiding paths. In this paper, we study a variant of the original Recoil
Growth algorithm, where we constrain the generation of a new polymer to take
place on a specific class of graphs. This makes it possible to make a fine
trade-off between computational cost and success rate. We moreover give a
simple proof for a lower bound on the irreducibility of this new algorithm,
which applies to the original algorithm as well.
| [
{
"version": "v1",
"created": "Wed, 8 Aug 2007 15:07:53 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Sep 2008 10:02:19 GMT"
},
{
"version": "v3",
"created": "Thu, 2 Jul 2009 12:31:15 GMT"
}
] | 2009-07-02T00:00:00 | [
[
"Simatos",
"Florian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
}
] |
0708.1150 | Marko Antonio Rodriguez | Marko A. Rodriguez, Johah Bollen, Herbert Van de Sompel | A Practical Ontology for the Large-Scale Modeling of Scholarly Artifacts
and their Usage | null | Proceedings of the IEEE/ACM Joint Conference on Digital Libraries
(JCDL'07), pp. 278-287, 2007 | 10.1145/1255175.1255229 | null | cs.DL cs.AI | null | The large-scale analysis of scholarly artifact usage is constrained primarily
by current practices in usage data archiving, privacy issues concerned with the
dissemination of usage data, and the lack of a practical ontology for modeling
the usage domain. As a remedy to the third constraint, this article presents a
scholarly ontology that was engineered to represent those classes for which
large-scale bibliographic and usage data exists, supports usage research, and
whose instantiation is scalable to the order of 50 million articles along with
their associated artifacts (e.g. authors and journals) and an accompanying 1
billion usage events. The real world instantiation of the presented abstract
ontology is a semantic network model of the scholarly community which lends the
scholarly process to statistical analysis and computational support. We present
the ontology, discuss its instantiation, and provide some example inference
rules for calculating various scholarly artifact metrics.
| [
{
"version": "v1",
"created": "Wed, 8 Aug 2007 17:06:55 GMT"
}
] | 2007-08-09T00:00:00 | [
[
"Rodriguez",
"Marko A.",
""
],
[
"Bollen",
"Johah",
""
],
[
"Van de Sompel",
"Herbert",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0708.1179 | Shuangqing Wei | Shuangqing Wei | Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in
Wireless Networks | null | null | null | null | cs.IT math.IT | null | Synchronization of relay nodes is an important and critical issue in
exploiting cooperative diversity in wireless networks. In this paper, two
asynchronous cooperative diversity schemes are proposed, namely, distributed
delay diversity and asynchronous space-time coded cooperative diversity
schemes. In terms of the overall diversity-multiplexing (DM) tradeoff function,
we show that the proposed independent coding based distributed delay diversity
and asynchronous space-time coded cooperative diversity schemes achieve the
same performance as the synchronous space-time coded approach which requires an
accurate symbol-level timing synchronization to ensure signals arriving at the
destination from different relay nodes are perfectly synchronized. This
demonstrates diversity order is maintained even at the presence of asynchronism
between relay node. Moreover, when all relay nodes succeed in decoding the
source information, the asynchronous space-time coded approach is capable of
achieving better DM-tradeoff than synchronous schemes and performs equivalently
to transmitting information through a parallel fading channel as far as the
DM-tradeoff is concerned. Our results suggest the benefits of fully exploiting
the space-time degrees of freedom in multiple antenna systems by employing
asynchronous space-time codes even in a frequency flat fading channel. In
addition, it is shown asynchronous space-time coded systems are able to achieve
higher mutual information than synchronous space-time coded systems for any
finite signal-to-noise-ratio (SNR) when properly selected baseband waveforms
are employed.
| [
{
"version": "v1",
"created": "Wed, 8 Aug 2007 21:25:08 GMT"
}
] | 2007-08-10T00:00:00 | [
[
"Wei",
"Shuangqing",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.1211 | Mark Iwen | M. A. Iwen | A Deterministic Sub-linear Time Sparse Fourier Algorithm via
Non-adaptive Compressed Sensing Methods | 16 pages total, 10 in paper, 6 in appended | null | null | null | cs.DM cs.NA | null | We study the problem of estimating the best B term Fourier representation for
a given frequency-sparse signal (i.e., vector) $\textbf{A}$ of length $N \gg
B$. More explicitly, we investigate how to deterministically identify B of the
largest magnitude frequencies of $\hat{\textbf{A}}$, and estimate their
coefficients, in polynomial$(B,\log N)$ time. Randomized sub-linear time
algorithms which have a small (controllable) probability of failure for each
processed signal exist for solving this problem. However, for failure
intolerant applications such as those involving mission-critical hardware
designed to process many signals over a long lifetime, deterministic algorithms
with no probability of failure are highly desirable. In this paper we build on
the deterministic Compressed Sensing results of Cormode and Muthukrishnan (CM)
\cite{CMDetCS3,CMDetCS1,CMDetCS2} in order to develop the first known
deterministic sub-linear time sparse Fourier Transform algorithm suitable for
failure intolerant applications. Furthermore, in the process of developing our
new Fourier algorithm, we present a simplified deterministic Compressed Sensing
algorithm which improves on CM's algebraic compressibility results while
simultaneously maintaining their results concerning exponential decay.
| [
{
"version": "v1",
"created": "Thu, 9 Aug 2007 04:07:06 GMT"
}
] | 2007-08-10T00:00:00 | [
[
"Iwen",
"M. A.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0708.1242 | Christos Dimitrakakis | Christos Dimitrakakis and Christian Savu-Krohn | Cost-minimising strategies for data labelling : optimal stopping and
active learning | 17 pages, 4 figures. Corrected some errors and changed the flow of
the text | null | null | null | cs.LG | null | Supervised learning deals with the inference of a distribution over an output
or label space $\CY$ conditioned on points in an observation space $\CX$, given
a training dataset $D$ of pairs in $\CX \times \CY$. However, in a lot of
applications of interest, acquisition of large amounts of observations is easy,
while the process of generating labels is time-consuming or costly. One way to
deal with this problem is {\em active} learning, where points to be labelled
are selected with the aim of creating a model with better performance than that
of an model trained on an equal number of randomly sampled points. In this
paper, we instead propose to deal with the labelling cost directly: The
learning goal is defined as the minimisation of a cost which is a function of
the expected model performance and the total cost of the labels used. This
allows the development of general strategies and specific algorithms for (a)
optimal stopping, where the expected cost dictates whether label acquisition
should continue (b) empirical evaluation, where the cost is used as a
performance metric for a given combination of inference, stopping and sampling
methods. Though the main focus of the paper is optimal stopping, we also aim to
provide the background for further developments and discussion in the related
field of active learning.
| [
{
"version": "v1",
"created": "Thu, 9 Aug 2007 10:21:34 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Aug 2007 22:05:57 GMT"
},
{
"version": "v3",
"created": "Thu, 15 Nov 2007 16:37:51 GMT"
}
] | 2007-11-15T00:00:00 | [
[
"Dimitrakakis",
"Christos",
""
],
[
"Savu-Krohn",
"Christian",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0708.1343 | Heide Gluesing-Luerssen | Heide Gluesing-Luerssen, Fai-Lung Tsang | A Matrix Ring Description for Cyclic Convolutional Codes | null | null | null | null | cs.IT math.IT math.RA | null | In this paper, we study convolutional codes with a specific cyclic structure.
By definition, these codes are left ideals in a certain skew polynomial ring.
Using that the skew polynomial ring is isomorphic to a matrix ring we can
describe the algebraic parameters of the codes in a more accessible way. We
show that the existence of such codes with given algebraic parameters can be
reduced to the solvability of a modified rook problem. It is our strong belief
that the rook problem is always solvable, and we present solutions in
particular cases.
| [
{
"version": "v1",
"created": "Thu, 9 Aug 2007 21:35:15 GMT"
}
] | 2007-08-13T00:00:00 | [
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Tsang",
"Fai-Lung",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0708.1362 | David Wolpert | David H. Wolpert | Physical limits of inference | 43 pages, updated version of Physica D version, which originally
appeared in 2007 CNLS conference on unconventional computation | PhysicaD237:1257-1281,2008 | 10.1016/j.physd.2008.03.040 | null | cond-mat.stat-mech cs.CC cs.IT gr-qc math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | I show that physical devices that perform observation, prediction, or
recollection share an underlying mathematical structure. I call devices with
that structure "inference devices". I present a set of existence and
impossibility results concerning inference devices. These results hold
independent of the precise physical laws governing our universe. In a limited
sense, the impossibility results establish that Laplace was wrong to claim that
even in a classical, non-chaotic universe the future can be unerringly
predicted, given sufficient knowledge of the present. Alternatively, these
impossibility results can be viewed as a non-quantum mechanical "uncertainty
principle". Next I explore the close connections between the mathematics of
inference devices and of Turing Machines. In particular, the impossibility
results for inference devices are similar to the Halting theorem for TM's.
Furthermore, one can define an analog of Universal TM's (UTM's) for inference
devices. I call those analogs "strong inference devices". I use strong
inference devices to define the "inference complexity" of an inference task,
which is the analog of the Kolmogorov complexity of computing a string. However
no universe can contain more than one strong inference device. So whereas the
Kolmogorov complexity of a string is arbitrary up to specification of the UTM,
there is no such arbitrariness in the inference complexity of an inference
task. I end by discussing the philosophical implications of these results,
e.g., for whether the universe "is" a computer.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 03:19:38 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Oct 2008 22:11:34 GMT"
}
] | 2008-11-26T00:00:00 | [
[
"Wolpert",
"David H.",
""
]
] | [
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "gr-qc",
"description": "General Relativity and Quantum Cosmology Areas of gravitational physics, including experiments and observations related to the detection and interpretation of gravitational waves, experimental tests of gravitational theories, computational general relativity, relativistic astrophysics, solutions to Einstein's equations and their properties, alternative theories of gravity, classical and quantum cosmology, and quantum gravity.",
"span": "(General Relativity and Quantum Cosmology)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.1411 | Sajad Sadough | Sajad Sadough (LSS), Pablo Piantanida (LSS), Pierre Duhamel (LSS) | Achievable Outage Rates with Improved Decoding of Bicm Multiband Ofdm
Under Channel Estimation Errors | null | Dans 40th Asilomar Conference on Signals, Systems, and Computers -
40th Asilomar Conference on Signals, Systems, and Computers, Monterey :
\'Etats-Unis d'Am\'erique (2007) | null | null | cs.NI | null | We consider the decoding of bit interleaved coded modulation (BICM) applied
to multiband OFDM for practical scenarios where only a noisy (possibly very
bad) estimate of the channel is available at the receiver. First, a decoding
metric based on the channel it a posteriori probability density, conditioned on
the channel estimate is derived and used for decoding BICM multiband OFDM.
Then, we characterize the limits of reliable information rates in terms of the
maximal achievable outage rates associated to the proposed metric. We also
compare our results with the outage rates of a system using a theoretical
decoder. Our results are useful for designing a communication system where a
prescribed quality of service (QoS), in terms of achievable target rates with
small error probability, must be satisfied even in the presence of imperfect
channel estimation. Numerical results over both realistic UWB and theoretical
Rayleigh fading channels show that the proposed method provides significant
gain in terms of BER and outage rates compared to the classical mismatched
detector, without introducing any additional complexity.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 12:13:51 GMT"
}
] | 2007-08-13T00:00:00 | [
[
"Sadough",
"Sajad",
"",
"LSS"
],
[
"Piantanida",
"Pablo",
"",
"LSS"
],
[
"Duhamel",
"Pierre",
"",
"LSS"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.1413 | Sajad Sadough | Sajad Sadough (LSS), Pierre Duhamel (LSS) | On Optimal Turbo Decoding of Wideband MIMO-OFDM Systems Under Imperfect
Channel State Information | null | COST2100 Meeting, Lisbon : Portugal (2007) | null | null | cs.NI | null | We consider the decoding of bit interleaved coded modulation (BICM) applied
to both multiband and MIMO OFDM systems for typical scenarios where only a
noisy (possibly very bad) estimate of the channel is provided by sending a
limited number of pilot symbols. First, by using a Bayesian framework involving
the channel a posteriori density, we adopt a practical decoding metric that is
robust to the presence of channel estimation errors. Then this metric is used
in the demapping part of BICM multiband and MIMO OFDM receivers. We also
compare our results with the performance of a mismatched decoder that replaces
the channel by its estimate in the decoding metric. Numerical results over both
realistic UWB and theoretical Rayleigh fading channels show that the proposed
method provides significant gain in terms of bit error rate compared to the
classical mismatched detector, without introducing any additional complexity.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 12:16:55 GMT"
}
] | 2007-08-13T00:00:00 | [
[
"Sadough",
"Sajad",
"",
"LSS"
],
[
"Duhamel",
"Pierre",
"",
"LSS"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.1414 | Sajad Sadough | Sajad Sadough (LSS), Mahieddine Ichir (LSS), Emmanuel Jaffrot, Pierre
Duhamel (LSS) | Wavelet Based Semi-blind Channel Estimation For Multiband OFDM | null | Dans European Wireless - European Wireless, Paris : France (2007) | null | null | cs.NI | null | This paper introduces an expectation-maximization (EM) algorithm within a
wavelet domain Bayesian framework for semi-blind channel estimation of
multiband OFDM based UWB communications. A prior distribution is chosen for the
wavelet coefficients of the unknown channel impulse response in order to model
a sparseness property of the wavelet representation. This prior yields, in
maximum a posteriori estimation, a thresholding rule within the EM algorithm.
We particularly focus on reducing the number of estimated parameters by
iteratively discarding ``unsignificant'' wavelet coefficients from the
estimation process. Simulation results using UWB channels issued from both
models and measurements show that under sparsity conditions, the proposed
algorithm outperforms pilot based channel estimation in terms of mean square
error and bit error rate and enhances the estimation accuracy with less
computational complexity than traditional semi-blind methods.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 12:18:36 GMT"
}
] | 2007-08-13T00:00:00 | [
[
"Sadough",
"Sajad",
"",
"LSS"
],
[
"Ichir",
"Mahieddine",
"",
"LSS"
],
[
"Jaffrot",
"Emmanuel",
"",
"LSS"
],
[
"Duhamel",
"Pierre",
"",
"LSS"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.1416 | Sajad Sadough | Sajad Sadough (LSS), Pablo Piantanida (LSS), Pierre Duhamel (LSS) | MIMO-OFDM Optimal Decoding and Achievable Information Rates Under
Imperfect Channel Estimation | null | Dans The VIII IEEE Workshop on Signal Processing Advances in
Wireless Communications - The VIII IEEE Workshop on Signal Processing
Advances in Wireless Communications, Finlande (2007) | null | null | cs.NI | null | Optimal decoding of bit interleaved coded modulation (BICM) MIMO-OFDM where
an imperfect channel estimate is available at the receiver is investigated.
First, by using a Bayesian approach involving the channel a posteriori density,
we derive a practical decoding metric for general memoryless channels that is
robust to the presence of channel estimation errors. Then, we evaluate the
outage rates achieved by a decoder that uses our proposed metric. The
performance of the proposed decoder is compared to the classical mismatched
decoder and a theoretical decoder defined as the best decoder in the presence
of imperfect channel estimation. Numerical results over Rayleigh block fading
MIMO-OFDM channels show that the proposed decoder outperforms mismatched
decoding in terms of bit error rate and outage capacity without introducing any
additional complexity.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 12:40:08 GMT"
}
] | 2007-08-13T00:00:00 | [
[
"Sadough",
"Sajad",
"",
"LSS"
],
[
"Piantanida",
"Pablo",
"",
"LSS"
],
[
"Duhamel",
"Pierre",
"",
"LSS"
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.1480 | Jean-Louis Krivine | Jean-Louis Krivine (PPS), Yves Legrandg\'erard (PPS) | Valid formulas, games and network protocols | 12 pages | null | null | null | cs.LO | null | We describe a remarkable relation between the notion of valid formula of
predicate logic and the specification of network protocols. We give several
examples such as the acknowledgement of one packet or of a sequence of packets.
We show how to specify the composition of protocols.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 16:17:00 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Nov 2007 20:03:26 GMT"
}
] | 2007-11-14T00:00:00 | [
[
"Krivine",
"Jean-Louis",
"",
"PPS"
],
[
"Legrandgérard",
"Yves",
"",
"PPS"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.1491 | Jean-Luc Marichal | Jean-Luc Marichal | On perfect, amicable, and sociable chains | 10 pages | null | null | null | math.CO cs.DM math.NT | null | Let $x = (x_0,...,x_{n-1})$ be an n-chain, i.e., an n-tuple of non-negative
integers $< n$. Consider the operator $s: x \mapsto x' = (x'_0,...,x'_{n-1})$,
where x'_j represents the number of $j$'s appearing among the components of x.
An n-chain x is said to be perfect if $s(x) = x$. For example, (2,1,2,0,0) is a
perfect 5-chain. Analogously to the theory of perfect, amicable, and sociable
numbers, one can define from the operator s the concepts of amicable pair and
sociable group of chains. In this paper we give an exhaustive list of all the
perfect, amicable, and sociable chains.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 17:45:38 GMT"
}
] | 2010-11-19T00:00:00 | [
[
"Marichal",
"Jean-Luc",
""
]
] | [
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
}
] |
0708.1496 | Mihai Oltean | Mihai Oltean | A Light-Based Device for Solving the Hamiltonian Path Problem | 11 pages, Unconventional Computation conference, 2006 | LNCS 4135, Unconventional Computation conference, pp. 217-227,
2006 | 10.1007/11839132 | null | cs.AR cs.DC | null | In this paper we suggest the use of light for performing useful computations.
Namely, we propose a special device which uses light rays for solving the
Hamiltonian path problem on a directed graph. The device has a graph-like
representation and the light is traversing it following the routes given by the
connections between nodes. In each node the rays are uniquely marked so that
they can be easily identified. At the destination node we will search only for
particular rays that have passed only once through each node. We show that the
proposed device can solve small and medium instances of the problem in
reasonable time.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 18:12:52 GMT"
}
] | 2007-08-13T00:00:00 | [
[
"Oltean",
"Mihai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.1503 | Vladimir Vovk | Vladimir Vovk | Defensive forecasting for optimal prediction with expert advice | 14 pages | null | null | null | cs.LG | null | The method of defensive forecasting is applied to the problem of prediction
with expert advice for binary outcomes. It turns out that defensive forecasting
is not only competitive with the Aggregating Algorithm but also handles the
case of "second-guessing" experts, whose advice depends on the learner's
prediction; this paper assumes that the dependence on the learner's prediction
is continuous.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 19:19:54 GMT"
}
] | 2007-08-13T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0708.1512 | Mihai Oltean | Mihai Oltean | Solving the Hamiltonian path problem with a light-based computer | 17 pages, Natural Computing journal | Natural Computing, Springer, Vol 6, 2007 | 10.1007/s11047-007-9042-z | null | cs.AR cs.DC | null | In this paper we propose a special computational device which uses light rays
for solving the Hamiltonian path problem on a directed graph. The device has a
graph-like representation and the light is traversing it by following the
routes given by the connections between nodes. In each node the rays are
uniquely marked so that they can be easily identified. At the destination node
we will search only for particular rays that have passed only once through each
node. We show that the proposed device can solve small and medium instances of
the problem in reasonable time.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 20:01:24 GMT"
}
] | 2007-08-14T00:00:00 | [
[
"Oltean",
"Mihai",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.1527 | Stasinos Konstantopoulos | Stasinos Konstantopoulos | A Data-Parallel Version of Aleph | Proceedings of Parallel and Distributed Computing for Machine
Learning workshop, held in conjunction with the 14th European Conference on
Machine Learning. Cavtat, Croatia, 2003 | null | null | null | cs.AI cs.DC | null | This is to present work on modifying the Aleph ILP system so that it
evaluates the hypothesised clauses in parallel by distributing the data-set
among the nodes of a parallel or distributed machine. The paper briefly
discusses MPI, the interface used to access message- passing libraries for
parallel computers and clusters. It then proceeds to describe an extension of
YAP Prolog with an MPI interface and an implementation of data-parallel clause
evaluation for Aleph through this interface. The paper concludes by testing the
data-parallel Aleph on artificially constructed data-sets.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 23:32:16 GMT"
}
] | 2007-08-14T00:00:00 | [
[
"Konstantopoulos",
"Stasinos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.1529 | Iddo Tzameret | Ran Raz, Iddo Tzameret | Resolution over Linear Equations and Multilinear Proofs | 44 pages | Annals of Pure and Applied Logic , 155(3):194-224, 2008; | 10.1016/j.apal.2008.04.001 | null | cs.CC cs.LO | null | We develop and study the complexity of propositional proof systems of varying
strength extending resolution by allowing it to operate with disjunctions of
linear equations instead of clauses. We demonstrate polynomial-size refutations
for hard tautologies like the pigeonhole principle, Tseitin graph tautologies
and the clique-coloring tautologies in these proof systems. Using the
(monotone) interpolation by a communication game technique we establish an
exponential-size lower bound on refutations in a certain, considerably strong,
fragment of resolution over linear equations, as well as a general polynomial
upper bound on (non-monotone) interpolants in this fragment.
We then apply these results to extend and improve previous results on
multilinear proofs (over fields of characteristic 0), as studied in
[RazTzameret06]. Specifically, we show the following:
1. Proofs operating with depth-3 multilinear formulas polynomially simulate a
certain, considerably strong, fragment of resolution over linear equations.
2. Proofs operating with depth-3 multilinear formulas admit polynomial-size
refutations of the pigeonhole principle and Tseitin graph tautologies. The
former improve over a previous result that established small multilinear proofs
only for the \emph{functional} pigeonhole principle. The latter are different
than previous proofs, and apply to multilinear proofs of Tseitin mod p graph
tautologies over any field of characteristic 0.
We conclude by connecting resolution over linear equations with extensions of
the cutting planes proof system.
| [
{
"version": "v1",
"created": "Fri, 10 Aug 2007 23:23:10 GMT"
}
] | 2010-04-19T00:00:00 | [
[
"Raz",
"Ran",
""
],
[
"Tzameret",
"Iddo",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.1558 | Luca Giuzzi | A. Aguglia, L. Giuzzi | Construction of a 3-Dimensional MDS code | 8 Pages Minor typesetting changes; dedication | Contributions to Discrete Mathematics 3 no. 1: 39-46 (2007) | null | null | cs.IT math.IT | null | In this paper, we describe a procedure for constructing $q$--ary
$[N,3,N-2]$--MDS codes, of length $N\leq q+1$ (for $q$ odd) or $N\leq q+2$ (for
$q$ even), using a set of non--degenerate Hermitian forms in $PG(2,q^2)$.
| [
{
"version": "v1",
"created": "Sat, 11 Aug 2007 10:26:31 GMT"
},
{
"version": "v2",
"created": "Tue, 18 Sep 2007 13:45:26 GMT"
}
] | 2009-07-19T00:00:00 | [
[
"Aguglia",
"A.",
""
],
[
"Giuzzi",
"L.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.1564 | Stasinos Konstantopoulos | Stasinos Konstantopoulos | Learning Phonotactics Using ILP | null | Special Issue of the WEB-SLS Journal: The Language Sections of the
ESSLLI-01 Student Session. 2002 | null | null | cs.CL | null | This paper describes experiments on learning Dutch phonotactic rules using
Inductive Logic Programming, a machine learning discipline based on inductive
logical operators. Two different ways of approaching the problem are
experimented with, and compared against each other as well as with related work
on the task. The results show a direct correspondence between the quality and
informedness of the background knowledge and the constructed theory,
demonstrating the ability of ILP to take good advantage of the prior domain
knowledge available. Further research is outlined.
| [
{
"version": "v1",
"created": "Sat, 11 Aug 2007 13:09:27 GMT"
}
] | 2007-08-14T00:00:00 | [
[
"Konstantopoulos",
"Stasinos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0708.1579 | Vicen\c{c} G\'omez Cerd\`a | Andreas Kaltenbrunner, Vicen\c{c} G\'omez, Ayman Moghnieh, Rodrigo
Meza, Josep Blat, Vicente L\'opez | Homogeneous temporal activity patterns in a large online communication
space | 17 pages, 10 figures, to be published in International Journal on
WWW/Internet | null | null | null | cs.NI | null | The many-to-many social communication activity on the popular technology-news
website Slashdot has been studied. We have concentrated on the dynamics of
message production without considering semantic relations and have found
regular temporal patterns in the reaction time of the community to a news-post
as well as in single user behavior. The statistics of these activities follow
log-normal distributions. Daily and weekly oscillatory cycles, which cause
slight variations of this simple behavior, are identified. A superposition of
two log-normal distributions can account for these variations. The findings are
remarkable since the distribution of the number of comments per users, which is
also analyzed, indicates a great amount of heterogeneity in the community. The
reader may find surprising that only a few parameters allow a detailed
description, or even prediction, of social many-to-many information exchange in
this kind of popular public spaces.
| [
{
"version": "v1",
"created": "Sun, 12 Aug 2007 00:29:03 GMT"
}
] | 2007-08-14T00:00:00 | [
[
"Kaltenbrunner",
"Andreas",
""
],
[
"Gómez",
"Vicenç",
""
],
[
"Moghnieh",
"Ayman",
""
],
[
"Meza",
"Rodrigo",
""
],
[
"Blat",
"Josep",
""
],
[
"López",
"Vicente",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.1580 | James P. Crutchfield | Susanne Still, James P. Crutchfield, Christopher J. Ellison | Optimal Causal Inference: Estimating Stored Information and
Approximating Causal Architecture | 14 pages, 13 figures;
http://cse.ucdavis.edu/~cmg/compmech/pubs/oci.htm; Updated figures and
citations; added corrections and clarifications | null | null | null | cs.IT cond-mat.stat-mech cs.LG math.IT math.ST stat.TH | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We introduce an approach to inferring the causal architecture of stochastic
dynamical systems that extends rate distortion theory to use causal
shielding---a natural principle of learning. We study two distinct cases of
causal inference: optimal causal filtering and optimal causal estimation.
Filtering corresponds to the ideal case in which the probability distribution
of measurement sequences is known, giving a principled method to approximate a
system's causal structure at a desired level of representation. We show that,
in the limit in which a model complexity constraint is relaxed, filtering finds
the exact causal architecture of a stochastic dynamical system, known as the
causal-state partition. From this, one can estimate the amount of historical
information the process stores. More generally, causal filtering finds a graded
model-complexity hierarchy of approximations to the causal architecture. Abrupt
changes in the hierarchy, as a function of approximation, capture distinct
scales of structural organization.
For nonideal cases with finite data, we show how the correct number of
underlying causal states can be found by optimal causal estimation. A
previously derived model complexity control term allows us to correct for the
effect of statistical fluctuations in probability estimates and thereby avoid
over-fitting.
| [
{
"version": "v1",
"created": "Sat, 11 Aug 2007 19:13:29 GMT"
},
{
"version": "v2",
"created": "Thu, 19 Aug 2010 23:46:24 GMT"
}
] | 2010-08-23T00:00:00 | [
[
"Still",
"Susanne",
""
],
[
"Crutchfield",
"James P.",
""
],
[
"Ellison",
"Christopher J.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0708.1593 | Adom Giffin | Adom Giffin and Ariel Caticha | Updating Probabilities with Data and Moments | Presented at the 27th International Workshop on Bayesian Inference
and Maximum Entropy Methods in Science and Engineering, Saratoga Springs, NY,
July 8-13, 2007. 10 pages, 1 figure V2 has a small typo in the end of the
appendix that was fixed. aj=mj+1 is now aj=m(k-j)+1 | null | 10.1063/1.2821302 | null | physics.data-an cs.IT math.IT math.ST physics.comp-ph physics.pop-ph stat.AP stat.CO stat.ME stat.TH | null | We use the method of Maximum (relative) Entropy to process information in the
form of observed data and moment constraints. The generic "canonical" form of
the posterior distribution for the problem of simultaneous updating with data
and moments is obtained. We discuss the general problem of non-commuting
constraints, when they should be processed sequentially and when
simultaneously. As an illustration, the multinomial example of die tosses is
solved in detail for two superficially similar but actually very different
problems.
| [
{
"version": "v1",
"created": "Mon, 13 Aug 2007 19:25:41 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Aug 2007 20:23:25 GMT"
}
] | 2016-09-08T00:00:00 | [
[
"Giffin",
"Adom",
""
],
[
"Caticha",
"Ariel",
""
]
] | [
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.comp-ph",
"description": "All aspects of computational science applied to physics.",
"span": "(Computational Physics)"
},
{
"class": "Physics",
"code": "physics.pop-ph",
"description": "Description coming soon",
"span": "(Popular Physics)"
},
{
"class": "Statistics",
"code": "stat.AP",
"description": "Biology, Education, Epidemiology, Engineering, Environmental Sciences, Medical, Physical Sciences, Quality Control, Social Sciences",
"span": "(Applications)"
},
{
"class": "Statistics",
"code": "stat.CO",
"description": "Algorithms, Simulation, Visualization",
"span": "(Computation)"
},
{
"class": "Statistics",
"code": "stat.ME",
"description": "Design, Surveys, Model Selection, Multiple Testing, Multivariate Methods, Signal and Image Processing, Time Series, Smoothing, Spatial Statistics, Survival Analysis, Nonparametric and Semiparametric Methods",
"span": "(Methodology)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0708.1624 | Vita Hinze-Hoare | V. Hinze-Hoare | Designing a Collaborative Research Environment for Students and their
Supervisors (CRESS) | null | null | null | null | cs.HC | null | In a previous paper the CSCR domain was defined. Here this is taken to the
next stage where the design of a particular Collaborative Research Environment
to support Students and Supervisors (CRESS) is considered. Following the CSCR
structure this paper deals with an analysis of 13 collaborative working
environments to determine a preliminary design for CRESS in order to discover
the most appropriate set of tools for its implementation.
| [
{
"version": "v1",
"created": "Sun, 12 Aug 2007 19:58:37 GMT"
}
] | 2007-08-14T00:00:00 | [
[
"Hinze-Hoare",
"V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.1723 | Volker Weber | Volker Weber | Hybrid Branching-Time Logics | An extended abstract of this paper was presented at the International
Workshop on Hybrid Logics (HyLo 2007) | null | null | null | cs.LO cs.CC | null | Hybrid branching-time logics are introduced as extensions of CTL-like logics
with state variables and the downarrow-binder. Following recent work in the
linear framework, only logics with a single variable are considered. The
expressive power and the complexity of satisfiability of the resulting logics
is investigated.
As main result, the satisfiability problem for the hybrid versions of several
branching-time logics is proved to be 2EXPTIME-complete. These branching-time
logics range from strict fragments of CTL to extensions of CTL that can talk
about the past and express fairness-properties. The complexity gap relative to
CTL is explained by a corresponding succinctness result.
To prove the upper bound, the automata-theoretic approach to branching-time
logics is extended to hybrid logics, showing that non-emptiness of alternating
one-pebble Buchi tree automata is 2EXPTIME-complete.
| [
{
"version": "v1",
"created": "Mon, 13 Aug 2007 15:04:12 GMT"
}
] | 2007-08-14T00:00:00 | [
[
"Weber",
"Volker",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.1725 | Willemien Visser | Willemien Visser (LTCI) | Design: One, but in different forms | null | Design Studies 30, 3 (2009) 187-223 | 10.1016/j.destud.2008.11.004 | null | cs.HC | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | This overview paper defends an augmented cognitively oriented generic-design
hypothesis: there are both significant similarities between the design
activities implemented in different situations and crucial differences between
these and other cognitive activities; yet, characteristics of a design
situation (related to the design process, the designers, and the artefact)
introduce specificities in the corresponding cognitive activities and
structures that are used, and in the resulting designs. We thus augment the
classical generic-design hypothesis with that of different forms of designing.
We review the data available in the cognitive design research literature and
propose a series of candidates underlying such forms of design, outlining a
number of directions requiring further elaboration.
| [
{
"version": "v1",
"created": "Mon, 13 Aug 2007 15:00:37 GMT"
},
{
"version": "v2",
"created": "Thu, 20 Aug 2009 14:55:41 GMT"
}
] | 2009-08-20T00:00:00 | [
[
"Visser",
"Willemien",
"",
"LTCI"
]
] | [
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0708.1768 | Alexander Ushakov | Jonathan Longrigg and Alexander Ushakov | Cryptanalysis of shifted conjugacy authentication protocol | 8 pages | null | null | null | math.GR cs.CR | null | In this paper we present the first practical attack on the shifted
conjugacy-based authentication protocol proposed by P. Dehornoy. We discuss the
weaknesses of that primitive and propose ways to improve the protocol.
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 19:11:59 GMT"
}
] | 2007-08-15T00:00:00 | [
[
"Longrigg",
"Jonathan",
""
],
[
"Ushakov",
"Alexander",
""
]
] | [
{
"class": "Mathematics",
"code": "math.GR",
"description": "Finite groups, topological groups, representation theory, cohomology, classification and structure",
"span": "(Group Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.1818 | Francoise Heres-Renzetti | L.-V. Bochkareva, M.-V. Kireitseu, G. R. Tomlinson, H. Altenbach, V.
Kompis, D. Hui | Computational Simulation and 3D Virtual Reality Engineering Tools for
Dynamical Modeling and Imaging of Composite Nanomaterials | Submitted on behalf of TIMA Editions
(http://irevues.inist.fr/tima-editions) | Dans European Nano Systems Worshop - ENS 2005, Paris : France
(2005) | null | null | cs.CE cond-mat.other | null | An adventure at engineering design and modeling is possible with a Virtual
Reality Environment (VRE) that uses multiple computer-generated media to let a
user experience situations that are temporally and spatially prohibiting. In
this paper, an approach to developing some advanced architecture and modeling
tools is presented to allow multiple frameworks work together while being
shielded from the application program. This architecture is being developed in
a framework of workbench interactive tools for next generation
nanoparticle-reinforced damping/dynamic systems. Through the use of system, an
engineer/programmer can respectively concentrate on tailoring an engineering
design concept of novel system and the application software design while using
existing databases/software outputs.
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 08:17:45 GMT"
}
] | 2007-08-15T00:00:00 | [
[
"Bochkareva",
"L. -V.",
""
],
[
"Kireitseu",
"M. -V.",
""
],
[
"Tomlinson",
"G. R.",
""
],
[
"Altenbach",
"H.",
""
],
[
"Kompis",
"V.",
""
],
[
"Hui",
"D.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "cond-mat.other",
"description": "Work in condensed matter that does not fit into the other cond-mat classifications",
"span": "(Other Condensed Matter)"
}
] |
0708.1859 | Jan Ostergaard | Jan Ostergaard and Ram Zamir | Multiple-Description Coding by Dithered Delta-Sigma Quantization | Revised, restructured, significantly shortened and minor typos has
been fixed. Accepted for publication in the IEEE Transactions on Information
Theory | null | null | null | cs.IT math.IT | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | We address the connection between the multiple-description (MD) problem and
Delta-Sigma quantization. The inherent redundancy due to oversampling in
Delta-Sigma quantization, and the simple linear-additive noise model resulting
from dithered lattice quantization, allow us to construct a symmetric and
time-invariant MD coding scheme. We show that the use of a noise shaping filter
makes it possible to trade off central distortion for side distortion.
Asymptotically as the dimension of the lattice vector quantizer and order of
the noise shaping filter approach infinity, the entropy rate of the dithered
Delta-Sigma quantization scheme approaches the symmetric two-channel MD
rate-distortion function for a memoryless Gaussian source and MSE fidelity
criterion, at any side-to-central distortion ratio and any resolution. In the
optimal scheme, the infinite-order noise shaping filter must be minimum phase
and have a piece-wise flat power spectrum with a single jump discontinuity. An
important advantage of the proposed design is that it is symmetric in rate and
distortion by construction, so the coding rates of the descriptions are
identical and there is therefore no need for source splitting.
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 10:23:25 GMT"
},
{
"version": "v2",
"created": "Wed, 15 Jul 2009 13:29:49 GMT"
}
] | 2009-07-15T00:00:00 | [
[
"Ostergaard",
"Jan",
""
],
[
"Zamir",
"Ram",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.1877 | Travis Gagie | Travis Gagie | A nearly tight memory-redundancy trade-off for one-pass compression | null | null | null | null | cs.IT math.IT | null | Let $s$ be a string of length $n$ over an alphabet of constant size $\sigma$
and let $c$ and $\epsilon$ be constants with (1 \geq c \geq 0) and (\epsilon >
0). Using (O (n)) time, (O (n^c)) bits of memory and one pass we can always
encode $s$ in (n H_k (s) + O (\sigma^k n^{1 - c + \epsilon})) bits for all
integers (k \geq 0) simultaneously. On the other hand, even with unlimited
time, using (O (n^c)) bits of memory and one pass we cannot always encode $s$
in (O (n H_k (s) + \sigma^k n^{1 - c - \epsilon})) bits for, e.g., (k = \lceil
(c + \epsilon / 2) \log_\sigma n \rceil).
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 12:50:41 GMT"
}
] | 2007-08-15T00:00:00 | [
[
"Gagie",
"Travis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.1903 | Vahan Mkrtchyan | V. V. Mkrtchyan, V. L. Musoyan, A. V. Tserunyan | On Edge-Disjoint Pairs Of Matchings | 8 pages, 2 figures, Submitted to Discrete Mathematics | Discrete Mathematics, 2008, Vol 308/23 pp 5823-5828 | 10.1016/j.disc.2007.09.061 | null | cs.DM | null | For a graph G, consider the pairs of edge-disjoint matchings whose union
consists of as many edges as possible. Let H be the largest matching among such
pairs. Let M be a maximum matching of G. We show that 5/4 is a tight upper
bound for |M|/|H|.
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 14:38:47 GMT"
}
] | 2008-10-09T00:00:00 | [
[
"Mkrtchyan",
"V. V.",
""
],
[
"Musoyan",
"V. L.",
""
],
[
"Tserunyan",
"A. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.1909 | Maike Buchin | Kevin Buchin and Maike Buchin | Lower Bounds for the Complexity of the Voronoi Diagram of Polygonal
Curves under the Discrete Frechet Distance | 6 pages, 2 figures | null | null | null | cs.CG cs.CC | null | We give lower bounds for the combinatorial complexity of the Voronoi diagram
of polygonal curves under the discrete Frechet distance. We show that the
Voronoi diagram of n curves in R^d with k vertices each, has complexity
Omega(n^{dk}) for dimension d=1,2 and Omega(n^{d(k-1)+2}) for d>2.
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 14:53:44 GMT"
}
] | 2007-08-15T00:00:00 | [
[
"Buchin",
"Kevin",
""
],
[
"Buchin",
"Maike",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.1962 | Mihai Oltean | Mihai Oltean, Oana Muntean | Exact Cover with light | 20 pages, 4 figures, New Generation Computing, accepted, 2007 | New Generation Computing, Springer-Verlag, Vol. 26, Issue 4, pp.
327-344, 2008 | 10.1007/s00354-008-0049-5 | null | cs.AR cs.DC | null | We suggest a new optical solution for solving the YES/NO version of the Exact
Cover problem by using the massive parallelism of light. The idea is to build
an optical device which can generate all possible solutions of the problem and
then to pick the correct one. In our case the device has a graph-like
representation and the light is traversing it by following the routes given by
the connections between nodes. The nodes are connected by arcs in a special way
which lets us to generate all possible covers (exact or not) of the given set.
For selecting the correct solution we assign to each item, from the set to be
covered, a special integer number. These numbers will actually represent delays
induced to light when it passes through arcs. The solution is represented as a
subray arriving at a certain moment in the destination node. This will tell us
if an exact cover does exist or not.
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 21:41:55 GMT"
}
] | 2009-02-07T00:00:00 | [
[
"Oltean",
"Mihai",
""
],
[
"Muntean",
"Oana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.1964 | Mihai Oltean | Mihai Oltean, Oana Muntean | Solving the subset-sum problem with a light-based device | 14 pages, 6 figures, Natural Computing, 2007 | Natural Computing, Springer-Verlag, Vol 8, Issue 2, pp. 321-331,
2009 | 10.1007/s11047-007-9059-3 | null | cs.AR cs.AI cs.DC | null | We propose a special computational device which uses light rays for solving
the subset-sum problem. The device has a graph-like representation and the
light is traversing it by following the routes given by the connections between
nodes. The nodes are connected by arcs in a special way which lets us to
generate all possible subsets of the given set. To each arc we assign either a
number from the given set or a predefined constant. When the light is passing
through an arc it is delayed by the amount of time indicated by the number
placed in that arc. At the destination node we will check if there is a ray
whose total delay is equal to the target value of the subset sum problem (plus
some constants).
| [
{
"version": "v1",
"created": "Tue, 14 Aug 2007 21:46:32 GMT"
}
] | 2015-09-11T00:00:00 | [
[
"Oltean",
"Mihai",
""
],
[
"Muntean",
"Oana",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0708.2021 | Juan J. Merelo Pr. | Juan J. Merelo and Carlos Cotta | Who is the best connected EC researcher? Centrality analysis of the
complex network of authors in evolutionary computation | Abstract accepted as poster to the GECCO 2007 conference | null | null | null | cs.CY cs.NE | null | Co-authorship graphs (that is, the graph of authors linked by co-authorship
of papers) are complex networks, which expresses the dynamics of a complex
system. Only recently its study has started to draw interest from the EC
community, the first paper dealing with it having been published two years ago.
In this paper we will study the co-authorship network of EC at a microscopic
level. Our objective is ascertaining which are the most relevant nodes (i.e.
authors) in it. For this purpose, we examine several metrics defined in the
complex-network literature, and analyze them both in isolation and combined
within a Pareto-dominance approach. The result of our analysis indicates that
there are some well-known researchers that appear systematically in top
rankings. This also provides some hints on the social behavior of our
community.
| [
{
"version": "v1",
"created": "Wed, 15 Aug 2007 10:13:03 GMT"
}
] | 2007-08-16T00:00:00 | [
[
"Merelo",
"Juan J.",
""
],
[
"Cotta",
"Carlos",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0708.2023 | Lyubov Positselskaya | Lyubov N. Positselskaya | Nonantagonistic noisy duels of discrete type with an arbitrary number of
actions | LaTeX 2e, 22 pages; replaced to correct TeXnical mistakes and typos | null | null | null | math.OC cs.GT math.PR | null | We study a nonzero-sum game of two players which is a generalization of the
antagonistic noisy duel of discrete type. The game is considered from the point
of view of various criterions of optimality. We prove existence of
epsilon-equilibrium situations and show that the epsilon-equilibrium strategies
that we have found are epsilon-maxmin. Conditions under which the equilibrium
plays are Pareto-optimal are given.
Keywords: noisy duel, payoff function, strategy, equilibrium situation,
Pareto optimality, the value of a game.
| [
{
"version": "v1",
"created": "Wed, 15 Aug 2007 10:42:27 GMT"
},
{
"version": "v2",
"created": "Sat, 18 Aug 2007 14:17:25 GMT"
}
] | 2007-08-18T00:00:00 | [
[
"Positselskaya",
"Lyubov N.",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0708.2026 | Albert Guill\'en i F\`abregas | Albert Guillen I Fabregas and Alfonso Martinez | Derivative of BICM Mutual Information | submitted to the IET Electronics Letters. 4 pages, 1 figure | null | null | null | cs.IT math.IT | null | In this letter we determine the derivative of the mutual information
corresponding to bit-interleaved coded modulation systems. The derivative
follows as a linear combination of minimum-mean-squared error functions of
coded modulation sets. The result finds applications to the analysis of
communications systems in the wideband regime and to the design of power
allocation over parallel channels.
| [
{
"version": "v1",
"created": "Wed, 15 Aug 2007 10:38:01 GMT"
}
] | 2007-08-16T00:00:00 | [
[
"Fabregas",
"Albert Guillen I",
""
],
[
"Martinez",
"Alfonso",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2076 | Loreto Bravo | Loreto Bravo, James Cheney and Irini Fundulaki | Repairing Inconsistent XML Write-Access Control Policies | 25 pages. To appear in Proceedings of DBPL 2007 | null | null | null | cs.DB | null | XML access control policies involving updates may contain security flaws,
here called inconsistencies, in which a forbidden operation may be simulated by
performing a sequence of allowed operations. This paper investigates the
problem of deciding whether a policy is consistent, and if not, how its
inconsistencies can be repaired. We consider policies expressed in terms of
annotated DTDs defining which operations are allowed or denied for the XML
trees that are instances of the DTD. We show that consistency is decidable in
PTIME for such policies and that consistent partial policies can be extended to
unique "least-privilege" consistent total policies. We also consider repair
problems based on deleting privileges to restore consistency, show that finding
minimal repairs is NP-complete, and give heuristics for finding repairs.
| [
{
"version": "v1",
"created": "Wed, 15 Aug 2007 18:31:48 GMT"
}
] | 2007-08-16T00:00:00 | [
[
"Bravo",
"Loreto",
""
],
[
"Cheney",
"James",
""
],
[
"Fundulaki",
"Irini",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0708.2078 | Viktor Levandovskyy | Viktor Levandovskyy and Eva Zerz | Obstructions to Genericity in Study of Parametric Problems in Control
Theory | 20 pages | null | null | null | math.OC cs.SC math.RA | null | We investigate systems of equations, involving parameters from the point of
view of both control theory and computer algebra. The equations might involve
linear operators such as partial (q-)differentiation, (q-)shift, (q-)difference
as well as more complicated ones, which act trivially on the parameters. Such a
system can be identified algebraically with a certain left module over a
non-commutative algebra, where the operators commute with the parameters. We
develop, implement and use in practice the algorithm for revealing all the
expressions in parameters, for which e.g. homological properties of a system
differ from the generic properties. We use Groebner bases and Groebner basics
in rings of solvable type as main tools. In particular, we demonstrate an
optimized algorithm for computing the left inverse of a matrix over a ring of
solvable type. We illustrate the article with interesting examples. In
particular, we provide a complete solution to the "two pendula, mounted on a
cart" problem from the classical book of Polderman and Willems, including the
case, where the friction at the joints is essential . To the best of our
knowledge, the latter example has not been solved before in a complete way.
| [
{
"version": "v1",
"created": "Wed, 15 Aug 2007 19:12:15 GMT"
}
] | 2010-03-22T00:00:00 | [
[
"Levandovskyy",
"Viktor",
""
],
[
"Zerz",
"Eva",
""
]
] | [
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
}
] |
0708.2084 | Travis Gagie | Travis Gagie | Empirical entropy in context | A survey of some results related to empirical entropy, written in the
spring of 2007 as part of an introduction to a PhD thesis | null | null | null | cs.IT math.IT | null | We trace the history of empirical entropy, touching briefly on its relation
to Markov processes, normal numbers, Shannon entropy, the Chomsky hierarchy,
Kolmogorov complexity, Ziv-Lempel compression, de Bruijn sequences and
stochastic complexity.
| [
{
"version": "v1",
"created": "Wed, 15 Aug 2007 19:00:10 GMT"
}
] | 2007-08-16T00:00:00 | [
[
"Gagie",
"Travis",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2105 | Nicholas Pippenger | Krzysztof Majewski and Nicholas Pippenger | Attribute Estimation and Testing Quasi-Symmetry | null | null | null | null | cs.CC | null | A Boolean function is symmetric if it is invariant under all permutations of
its arguments; it is quasi-symmetric if it is symmetric with respect to the
arguments on which it actually depends. We present a test that accepts every
quasi-symmetric function and, except with an error probability at most delta>0,
rejects every function that differs from every quasi-symmetric function on at
least a fraction epsilon>0 of the inputs. For a function of n arguments, the
test probes the function at O((n/epsilon)\log(n/delta)) inputs. Our
quasi-symmetry test acquires information concerning the arguments on which the
function actually depends. To do this, it employs a generalization of the
property testing paradigm that we call attribute estimation. Like property
testing, attribute estimation uses random sampling to obtain results that have
only "one-sided'' errors and that are close to accurate with high probability.
| [
{
"version": "v1",
"created": "Wed, 15 Aug 2007 20:56:22 GMT"
}
] | 2007-08-17T00:00:00 | [
[
"Majewski",
"Krzysztof",
""
],
[
"Pippenger",
"Nicholas",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0708.2173 | James Cheney | James Cheney, Amal Ahmed, and Umut Acar | Provenance as Dependency Analysis | Long version of paper in 2007 Symposium on Database Programming
Languages; revised November 2009 | null | null | null | cs.DB cs.PL | http://arxiv.org/licenses/nonexclusive-distrib/1.0/ | Provenance is information recording the source, derivation, or history of
some information. Provenance tracking has been studied in a variety of
settings; however, although many design points have been explored, the
mathematical or semantic foundations of data provenance have received
comparatively little attention. In this paper, we argue that dependency
analysis techniques familiar from program analysis and program slicing provide
a formal foundation for forms of provenance that are intended to show how (part
of) the output of a query depends on (parts of) its input. We introduce a
semantic characterization of such dependency provenance, show that this form of
provenance is not computable, and provide dynamic and static approximation
techniques.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 11:11:43 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Dec 2009 15:25:13 GMT"
}
] | 2009-12-22T00:00:00 | [
[
"Cheney",
"James",
""
],
[
"Ahmed",
"Amal",
""
],
[
"Acar",
"Umut",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0708.2213 | Luai Jaff | Lua\"i Jaff (LIPN), G\'erard H.E. Duchamp (LIPN), Hatem Hadj Kacem,
Cyrille Bertelle (LITIS) | Moderate Growth Time Series for Dynamic Combinatorics Modelisation | null | ECELM-2, Tirgu-Mures : Roumanie (2006) | null | null | cs.SC cs.MA math.CO | null | Here, we present a family of time series with a simple growth constraint.
This family can be the basis of a model to apply to emerging computation in
business and micro-economy where global functions can be expressed from local
rules. We explicit a double statistics on these series which allows to
establish a one-to-one correspondence between three other ballot-like
strunctures.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 14:58:35 GMT"
}
] | 2007-08-17T00:00:00 | [
[
"Jaff",
"Luaï",
"",
"LIPN"
],
[
"Duchamp",
"Gérard H. E.",
"",
"LIPN"
],
[
"Kacem",
"Hatem Hadj",
"",
"LITIS"
],
[
"Bertelle",
"Cyrille",
"",
"LITIS"
]
] | [
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0708.2230 | Dale Miller | Dale Miller (INRIA Futurs) | Collection analysis for Horn clause programs | null | Dans International ACM SIGPLAN Conference on Principles and
Practice of Declarative Programming (2006) | null | null | cs.LO | null | We consider approximating data structures with collections of the items that
they contain. For examples, lists, binary trees, tuples, etc, can be
approximated by sets or multisets of the items within them. Such approximations
can be used to provide partial correctness properties of logic programs. For
example, one might wish to specify than whenever the atom $sort(t,s)$ is proved
then the two lists $t$ and $s$ contain the same multiset of items (that is, $s$
is a permutation of $t$). If sorting removes duplicates, then one would like to
infer that the sets of items underlying $t$ and $s$ are the same. Such results
could be useful to have if they can be determined statically and automatically.
We present a scheme by which such collection analysis can be structured and
automated. Central to this scheme is the use of linear logic as a omputational
logic underlying the logic of Horn clauses.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 15:45:06 GMT"
}
] | 2007-08-17T00:00:00 | [
[
"Miller",
"Dale",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.2252 | Dale Miller | Chuck Liang, Dale Miller (INRIA Futurs) | Focusing and Polarization in Intuitionistic Logic | null | Dans Computer Science Logic (2007) | null | null | cs.LO | null | A focused proof system provides a normal form to cut-free proofs that
structures the application of invertible and non-invertible inference rules.
The focused proof system of Andreoli for linear logic has been applied to both
the proof search and the proof normalization approaches to computation. Various
proof systems in literature exhibit characteristics of focusing to one degree
or another. We present a new, focused proof system for intuitionistic logic,
called LJF, and show how other proof systems can be mapped into the new system
by inserting logical connectives that prematurely stop focusing. We also use
LJF to design a focused proof system for classical logic. Our approach to the
design and analysis of these systems is based on the completeness of focusing
in linear logic and on the notion of polarity that appears in Girard's LC and
LU proof systems.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 17:36:28 GMT"
}
] | 2007-08-17T00:00:00 | [
[
"Liang",
"Chuck",
"",
"INRIA Futurs"
],
[
"Miller",
"Dale",
"",
"INRIA Futurs"
]
] | [
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.2255 | Jeremy Siek | Jeremy G. Siek and Andrew Lumsdaine | A Language for Generic Programming in the Large | 50 pages | null | null | null | cs.PL cs.SE | null | Generic programming is an effective methodology for developing reusable
software libraries. Many programming languages provide generics and have
features for describing interfaces, but none completely support the idioms used
in generic programming. To address this need we developed the language G. The
central feature of G is the concept, a mechanism for organizing constraints on
generics that is inspired by the needs of modern C++ libraries. G provides
modular type checking and separate compilation (even of generics). These
characteristics support modular software development, especially the smooth
integration of independently developed components. In this article we present
the rationale for the design of G and demonstrate the expressiveness of G with
two case studies: porting the Standard Template Library and the Boost Graph
Library from C++ to G. The design of G shares much in common with the concept
extension proposed for the next C++ Standard (the authors participated in its
design) but there are important differences described in this article.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 18:06:18 GMT"
}
] | 2007-08-17T00:00:00 | [
[
"Siek",
"Jeremy G.",
""
],
[
"Lumsdaine",
"Andrew",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0708.2266 | Kai Pan | Pan Kai, Tan Yue and Jiang Sheng | The study of a new gerrymandering methodology | 23 pages,15 figures, 2007 American mathematical modeling contest
"Meritorious Winner" | null | null | null | cs.CY | null | This paper is to obtain a simple dividing-diagram of the congressional
districts, where the only limit is that each district should contain the same
population if possibly. In order to solve this problem, we introduce three
different standards of the "simple" shape. The first standard is that the final
shape of the congressional districts should be of a simplest figure and we
apply a modified "shortest split line algorithm" where the factor of the same
population is considered only. The second standard is that the gerrymandering
should ensure the integrity of the current administrative area as the
convenience for management. Thus we combine the factor of the administrative
area with the first standard, and generate an improved model resulting in the
new diagram in which the perimeters of the districts are along the boundaries
of some current counties. Moreover, the gerrymandering should consider the
geographic features.The third standard is introduced to describe this
situation. Finally, it can be proved that the difference between the supporting
ratio of a certain party in each district and the average supporting ratio of
that particular party in the whole state obeys the Chi-square distribution
approximately. Consequently, we can obtain an archetypal formula to check
whether the gerrymandering we propose is fair.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 18:44:53 GMT"
}
] | 2007-08-17T00:00:00 | [
[
"Kai",
"Pan",
""
],
[
"Yue",
"Tan",
""
],
[
"Sheng",
"Jiang",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0708.2270 | Tan Wong | Saravanan Vijayakumaran, Tan F. Wong and Tat M. Lok | Capacity of the Degraded Half-Duplex Relay Channel | 10 pages, 2 figures | null | null | null | cs.IT math.IT | null | A discrete memoryless half-duplex relay channel is constructed from a
broadcast channel from the source to the relay and destination and a multiple
access channel from the source and relay to the destination. When the relay
listens, the channel operates in the broadcast mode. The channel switches to
the multiple access mode when the relay transmits. If the broadcast component
channel is physically degraded, the half-duplex relay channel will also be
referred to as physically degraded. The capacity of this degraded half-duplex
relay channel is examined. It is shown that the block Markov coding suggested
in the seminal paper by Cover and El Gamal can be modified to achieve capacity
for the degraded half-duplex relay channel. In the code construction, the
listen-transmit schedule of the relay is made to depend on the message to be
sent and hence the schedule carries information itself. If the schedule is
restricted to be deterministic, it is shown that the capacity can be achieved
by a simple management of information flows across the broadcast and multiple
access component channels.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 19:36:03 GMT"
}
] | 2007-08-17T00:00:00 | [
[
"Vijayakumaran",
"Saravanan",
""
],
[
"Wong",
"Tan F.",
""
],
[
"Lok",
"Tat M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2273 | Ozgur Oyman | Ozgur Oyman | Opportunism in Multiuser Relay Channels: Scheduling, Routing and
Spectrum Reuse | 5 pages | IEEE International Symposium on Information Theory (ISIT), Nice,
France, June 2007 | 10.1109/ISIT.2007.4557240 | null | cs.IT math.IT | null | In order to understand the key merits of multiuser diversity techniques in
relay-assisted cellular multihop networks, this paper analyzes the spectral
efficiency of opportunistic (i.e., channel-aware) scheduling algorithms over a
fading multiuser relay channel with $K$ users in the asymptotic regime of large
(but finite) number of users. Using tools from extreme-value theory, we
characterize the limiting distribution of spectral efficiency focusing on Type
I convergence and utilize it in investigating the large system behavior of the
multiuser relay channel as a function of the number of users and physical
channel signal-to-noise ratios (SNRs). Our analysis results in very accurate
formulas in the large (but finite) $K$ regime, provides insights on the
potential performance enhancements from multihop routing and spectrum reuse
policies in the presence of multiuser diversity gains from opportunistic
scheduling and helps to identify the regimes and conditions in which
relay-assisted multiuser communication provides a clear advantage over direct
multiuser communication.
| [
{
"version": "v1",
"created": "Thu, 16 Aug 2007 21:44:43 GMT"
}
] | 2016-11-15T00:00:00 | [
[
"Oyman",
"Ozgur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2303 | W Saba | Walid S. Saba | Compositional Semantics Grounded in Commonsense Metaphysics | null | null | null | null | cs.AI cs.CL | null | We argue for a compositional semantics grounded in a strongly typed ontology
that reflects our commonsense view of the world and the way we talk about it in
ordinary language. Assuming the existence of such a structure, we show that the
semantics of various natural language phenomena may become nearly trivial.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 01:15:11 GMT"
},
{
"version": "v2",
"created": "Fri, 31 Aug 2007 17:48:14 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Saba",
"Walid S.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0708.2309 | Dmitri Krioukov | Dmitri Krioukov, kc claffy, Kevin Fall, Arthur Brady | On Compact Routing for the Internet | This is a significantly revised, journal version of cs/0508021 | ACM SIGCOMM Computer Communication Review (CCR), v.37, n.3,
p.41-52, 2007 | 10.1145/1273445.1273450 | null | cs.NI | null | While there exist compact routing schemes designed for grids, trees, and
Internet-like topologies that offer routing tables of sizes that scale
logarithmically with the network size, we demonstrate in this paper that in
view of recent results in compact routing research, such logarithmic scaling on
Internet-like topologies is fundamentally impossible in the presence of
topology dynamics or topology-independent (flat) addressing. We use analytic
arguments to show that the number of routing control messages per topology
change cannot scale better than linearly on Internet-like topologies. We also
employ simulations to confirm that logarithmic routing table size scaling gets
broken by topology-independent addressing, a cornerstone of popular
locator-identifier split proposals aiming at improving routing scaling in the
presence of network topology dynamics or host mobility. These pessimistic
findings lead us to the conclusion that a fundamental re-examination of
assumptions behind routing models and abstractions is needed in order to find a
routing architecture that would be able to scale ``indefinitely.''
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 02:37:20 GMT"
}
] | 2008-04-16T00:00:00 | [
[
"Krioukov",
"Dmitri",
""
],
[
"claffy",
"kc",
""
],
[
"Fall",
"Kevin",
""
],
[
"Brady",
"Arthur",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0708.2310 | Lav Varshney | Lav R. Varshney and Vivek K. Goyal | Benefiting from Disorder: Source Coding for Unordered Data | 35 pages | null | null | null | cs.IT math.IT | null | The order of letters is not always relevant in a communication task. This
paper discusses the implications of order irrelevance on source coding,
presenting results in several major branches of source coding theory: lossless
coding, universal lossless coding, rate-distortion, high-rate quantization, and
universal lossy coding. The main conclusions demonstrate that there is a
significant rate savings when order is irrelevant. In particular, lossless
coding of n letters from a finite alphabet requires Theta(log n) bits and
universal lossless coding requires n + o(n) bits for many countable alphabet
sources. However, there are no universal schemes that can drive a strong
redundancy measure to zero. Results for lossy coding include distribution-free
expressions for the rate savings from order irrelevance in various high-rate
quantization schemes. Rate-distortion bounds are given, and it is shown that
the analogue of the Shannon lower bound is loose at all finite rates.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 03:13:26 GMT"
}
] | 2007-08-20T00:00:00 | [
[
"Varshney",
"Lav R.",
""
],
[
"Goyal",
"Vivek K.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0708.2319 | Marcus Hutter | Marcus Hutter and Andrej Muchnik | On Semimeasures Predicting Martin-Loef Random Sequences | 21 LaTeX pages | Theoretical Computer Science, 382 (2007) 247-261 | null | null | cs.IT cs.LG math.IT math.PR | null | Solomonoff's central result on induction is that the posterior of a universal
semimeasure M converges rapidly and with probability 1 to the true sequence
generating posterior mu, if the latter is computable. Hence, M is eligible as a
universal sequence predictor in case of unknown mu. Despite some nearby results
and proofs in the literature, the stronger result of convergence for all
(Martin-Loef) random sequences remained open. Such a convergence result would
be particularly interesting and natural, since randomness can be defined in
terms of M itself. We show that there are universal semimeasures M which do not
converge for all random sequences, i.e. we give a partial negative answer to
the open problem. We also provide a positive answer for some non-universal
semimeasures. We define the incomputable measure D as a mixture over all
computable measures and the enumerable semimeasure W as a mixture over all
enumerable nearly-measures. We show that W converges to D and D to mu on all
random sequences. The Hellinger distance measuring closeness of two
distributions plays a central role.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 06:39:11 GMT"
}
] | 2007-08-20T00:00:00 | [
[
"Hutter",
"Marcus",
""
],
[
"Muchnik",
"Andrej",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0708.2336 | Dominik Scheder | Dominik Scheder | Unsatisfiable Linear k-CNFs Exist, for every k | 11 pages | null | null | null | cs.DM cs.CC cs.LO | null | We call a CNF formula linear if any two clauses have at most one variable in
common. Let Linear k-SAT be the problem of deciding whether a given linear
k-CNF formula is satisfiable. Here, a k-CNF formula is a CNF formula in which
every clause has size exactly k. It was known that for k >= 3, Linear k-SAT is
NP-complete if and only if an unsatisfiable linear k-CNF formula exists, and
that they do exist for k >= 4. We prove that unsatisfiable linear k-CNF
formulas exist for every k. Let f(k) be the minimum number of clauses in an
unsatisfiable linear k-CNF formula. We show that f(k) is Omega(k2^k) and
O(4^k*k^4), i.e., minimum size unsatisfiable linear k-CNF formulas are
significantly larger than minimum size unsatisfiable k-CNF formulas. Finally,
we prove that, surprisingly, linear k-CNF formulas do not allow for a larger
fraction of clauses to be satisfied than general k-CNF formulas.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 09:44:21 GMT"
}
] | 2007-08-20T00:00:00 | [
[
"Scheder",
"Dominik",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0708.2351 | Judit Nagy-Gy\"orgy | Judit Nagy-Gy\"orgy | Randomized algorithm for the k-server problem on decomposable spaces | 11 pages | null | null | null | cs.DS cs.DM | null | We study the randomized k-server problem on metric spaces consisting of
widely separated subspaces. We give a method which extends existing algorithms
to larger spaces with the growth rate of the competitive quotients being at
most O(log k). This method yields o(k)-competitive algorithms solving the
randomized k-server problem, for some special underlying metric spaces, e.g.
HSTs of "small" height (but unbounded degree). HSTs are important tools for
probabilistic approximation of metric spaces.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 11:54:44 GMT"
}
] | 2007-08-20T00:00:00 | [
[
"Nagy-György",
"Judit",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.2353 | Vladimir Vovk | Vladimir Vovk | Continuous and randomized defensive forecasting: unified view | 10 pages. The new version: (1) relaxes the assumption that the
outcome space is finite, and now it is only assumed to be compact; (2) shows
that in the case where the outcome space is finite of cardinality C, the
randomized forecasts can be chosen concentrated on a finite set of
cardinality at most C | null | null | null | cs.LG | null | Defensive forecasting is a method of transforming laws of probability (stated
in game-theoretic terms as strategies for Sceptic) into forecasting algorithms.
There are two known varieties of defensive forecasting: "continuous", in which
Sceptic's moves are assumed to depend on the forecasts in a (semi)continuous
manner and which produces deterministic forecasts, and "randomized", in which
the dependence of Sceptic's moves on the forecasts is arbitrary and
Forecaster's moves are allowed to be randomized. This note shows that the
randomized variety can be obtained from the continuous variety by smearing
Sceptic's moves to make them continuous.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 12:18:24 GMT"
},
{
"version": "v2",
"created": "Thu, 23 Aug 2007 12:44:34 GMT"
}
] | 2007-08-23T00:00:00 | [
[
"Vovk",
"Vladimir",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0708.2363 | Vahan Mkrtchyan | R. R. Kamalian, V. V. Mkrtchyan | On a constructive characterization of a class of trees related to pairs
of disjoint matchings | 22 pages, 17 figures | null | null | null | cs.DM | null | For a graph consider the pairs of disjoint matchings which union contains as
many edges as possible, and define a parameter $\alpha$ which eqauls the
cardinality of the largest matching in those pairs. Also, define $\betta$ to be
the cardinality of a maximum matching of the graph.
We give a constructive characterization of trees which satisfy the
$\alpha$=$\betta$ equality. The proof of our main theorem is based on a new
decomposition algorithm obtained for trees.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 13:19:49 GMT"
}
] | 2009-09-29T00:00:00 | [
[
"Kamalian",
"R. R.",
""
],
[
"Mkrtchyan",
"V. V.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0708.2395 | Milton Chowdhury | M. M. Chowdhury | Key Agreement and Authentication Schemes Using Non-Commutative
Semigroups | null | null | null | null | cs.CR | null | We give a new two-pass authentication scheme, whichis a generalisation of an
authentication scheme of Sibert-Dehornoy-Girault based on the Diffie-Hellman
conjugacy problem. Compared to the above scheme, for some parameters it is more
efficient with respect to multiplications. We sketch a proof that our
authentication scheme is secure. We give a new key agreement protocols.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 16:38:43 GMT"
},
{
"version": "v2",
"created": "Mon, 20 Aug 2007 00:15:01 GMT"
}
] | 2007-08-20T00:00:00 | [
[
"Chowdhury",
"M. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.2397 | Milton Chowdhury | M. M. Chowdhury | On the AAGL Protocol | This version differs from the first version because a new attack is
given | null | null | null | cs.CR | null | Recently the AAGL (Anshel-Anshel-Goldfeld-Lemieux) has been proposed which
can be used for RFID tags. We give algorithms for the problem (we call the
MSCSPv) on which the security of the AAGL protocol is based upon. Hence we give
various attacks for general parameters on the recent AAGL protocol proposed.
One of our attacks is a deterministic algorithm which has space complexity and
time complexity both atleast exponentialin the worst case. In a better case
using a probabilistic algorithm the time complexity canbe
O(|XSS(ui')^L5*(n^(1+e)) and the space complexity can be O(|XSS(ui')|^L6),
where the element ui' is part of a public key, n is the index of braid group,
XSS is a summit type set and e is a constant in a limit. The above shows the
AAGL protocol is potentially not significantly more secure as using key
agreement protocols based on the conjugacy problem such as the AAG
(Anshel-Anshel-Goldfeld) protocol because both protocols can be broken with
complexity which do not significantly differ. We think our attacks can be
improved.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 16:48:13 GMT"
},
{
"version": "v2",
"created": "Tue, 21 Aug 2007 00:44:02 GMT"
},
{
"version": "v3",
"created": "Mon, 1 Oct 2007 10:26:48 GMT"
},
{
"version": "v4",
"created": "Mon, 19 Nov 2007 16:11:45 GMT"
},
{
"version": "v5",
"created": "Thu, 22 Nov 2007 22:27:48 GMT"
}
] | 2007-11-23T00:00:00 | [
[
"Chowdhury",
"M. M.",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0708.2414 | Kristina Lerman | Kristina Lerman | User Participation in Social Media: Digg Study | Workshops of 2007 IEEE/WIC/ACM International Conference on Web
Intelligence and Intelligent Agent Technology (WI-IAT 07) | null | 10.1109/WI-IATW.2007.68 | null | cs.CY | null | The social news aggregator Digg allows users to submit and moderate stories
by voting on (digging) them. As is true of most social sites, user
participation on Digg is non-uniformly distributed, with few users contributing
a disproportionate fraction of content. We studied user participation on Digg,
to see whether it is motivated by competition, fueled by user ranking, or
social factors, such as community acceptance.
For our study we collected activity data of the top users weekly over the
course of a year. We computed the number of stories users submitted, dugg or
commented on weekly. We report a spike in user activity in September 2006,
followed by a gradual decline, which seems unaffected by the elimination of
user ranking. The spike can be explained by a controversy that broke out at the
beginning of September 2006. We believe that the lasting acrimony that this
incident has created led to a decline of top user participation on Digg.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 18:46:55 GMT"
}
] | 2016-11-18T00:00:00 | [
[
"Lerman",
"Kristina",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0708.2432 | Oliver Knill | Oliver Knill and Jose Ramirez-Herran | A structure from motion inequality | 15 pages, 22 figures | null | null | null | cs.CV cs.AI | null | We state an elementary inequality for the structure from motion problem for m
cameras and n points. This structure from motion inequality relates space
dimension, camera parameter dimension, the number of cameras and number points
and global symmetry properties and provides a rigorous criterion for which
reconstruction is not possible with probability 1. Mathematically the
inequality is based on Frobenius theorem which is a geometric incarnation of
the fundamental theorem of linear algebra. The paper also provides a general
mathematical formalism for the structure from motion problem. It includes the
situation the points can move while the camera takes the pictures.
| [
{
"version": "v1",
"created": "Sat, 18 Aug 2007 14:36:28 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Knill",
"Oliver",
""
],
[
"Ramirez-Herran",
"Jose",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0708.2438 | Oliver Knill | Oliver Knill and Jose Ramirez-Herran | On Ullman's theorem in computer vision | 16 pages, 13 figures | null | null | null | cs.CV cs.AI | null | Both in the plane and in space, we invert the nonlinear Ullman transformation
for 3 points and 3 orthographic cameras. While Ullman's theorem assures a
unique reconstruction modulo a reflection for 3 cameras and 4 points, we find a
locally unique reconstruction for 3 cameras and 3 points. Explicit
reconstruction formulas allow to decide whether picture data of three cameras
seeing three points can be realized as a point-camera configuration.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 21:36:08 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Knill",
"Oliver",
""
],
[
"Ramirez-Herran",
"Jose",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0708.2442 | Oliver Knill | Oliver Knill and Jose Ramirez-Herran | Space and camera path reconstruction for omni-directional vision | null | null | null | null | cs.CV cs.AI | null | In this paper, we address the inverse problem of reconstructing a scene as
well as the camera motion from the image sequence taken by an omni-directional
camera. Our structure from motion results give sharp conditions under which the
reconstruction is unique. For example, if there are three points in general
position and three omni-directional cameras in general position, a unique
reconstruction is possible up to a similarity. We then look at the
reconstruction problem with m cameras and n points, where n and m can be large
and the over-determined system is solved by least square methods. The
reconstruction is robust and generalizes to the case of a dynamic environment
where landmarks can move during the movie capture. Possible applications of the
result are computer assisted scene reconstruction, 3D scanning, autonomous
robot navigation, medical tomography and city reconstructions.
| [
{
"version": "v1",
"created": "Fri, 17 Aug 2007 21:53:41 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Knill",
"Oliver",
""
],
[
"Ramirez-Herran",
"Jose",
""
]
] | [
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0708.2456 | Jiyou Li | Jiyou Li and Daqing Wan | On the subset sum problem over finite fields | 16 pages | null | null | null | math.NT cs.IT math.IT | null | The subset sum problem over finite fields is a well-known {\bf NP}-complete
problem. It arises naturally from decoding generalized Reed-Solomon codes. In
this paper, we study the number of solutions of the subset sum problem from a
mathematical point of view. In several interesting cases, we obtain explicit or
asymptotic formulas for the solution number. As a consequence, we obtain some
results on the decoding problem of Reed-Solomon codes.
| [
{
"version": "v1",
"created": "Sat, 18 Aug 2007 02:13:00 GMT"
}
] | 2007-08-21T00:00:00 | [
[
"Li",
"Jiyou",
""
],
[
"Wan",
"Daqing",
""
]
] | [
{
"class": "Mathematics",
"code": "math.NT",
"description": "Prime numbers, diophantine equations, analytic number theory, algebraic number theory, arithmetic geometry, Galois theory",
"span": "(Number Theory)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
Subsets and Splits