id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0909.1623
Sudarshan Shinde
Sudarshan Shinde
Two channel paraunitary filter banks based on linear canonical transform
10 pages, IEEE format
null
10.1109/TSP.2010.2089681
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper a two channel paraunitary filter bank is proposed, which is based on linear canonical transform, instead of discrete Fourier transform. Input-output relation for such a filter bank are derived in terms of polyphase matrices and modulation matrices. It is shown that like conventional filter banks, the LCT based paraunitary filter banks need only one filter to be designed and rest of the filters can be obtained from it. It is also shown that LCT based paraunitary filter banks can be designed by using conventional power-symmetric filter design in Fourier domain.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 06:57:41 GMT" } ]
2016-11-17T00:00:00
[ [ "Shinde", "Sudarshan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1626
Massimiliano Sala Dr.
Eleonora Guerrini, Emmanuela Orsini, Massimiliano Sala
Computing the distance distribution of systematic non-linear codes
null
Journal of Algebra and its Applications, 2010, vol. 9, p. 241-256
null
null
cs.DM cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The most important families of non-linear codes are systematic. A brute-force check is the only known method to compute their weight distribution and distance distribution. On the other hand, it outputs also all closest word pairs in the code. In the black-box complexity model, the check is optimal among closest-pair algorithms. In this paper we provide a Groebner basis technique to compute the weight/distance distribution of any systematic non-linear code. Also our technique outputs all closest pairs. Unlike the check, our method can be extended to work on code families.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 05:47:23 GMT" } ]
2016-04-01T00:00:00
[ [ "Guerrini", "Eleonora", "" ], [ "Orsini", "Emmanuela", "" ], [ "Sala", "Massimiliano", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1638
Krishnan Prasad
K. Prasad and B. Sundar Rajan
Single-generation Network Coding for Networks with Delay
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A single-source network is said to be \textit{memory-free} if all of the internal nodes (those except the source and the sinks) do not employ memory but merely send linear combinations of the incoming symbols (received at their incoming edges) on their outgoing edges. Memory-free networks with delay using network coding are forced to do inter-generation network coding, as a result of which the problem of some or all sinks requiring a large amount of memory for decoding is faced. In this work, we address this problem by utilizing memory elements at the internal nodes of the network also, which results in the reduction of the number of memory elements used at the sinks. We give an algorithm which employs memory at the nodes to achieve single-generation network coding. For fixed latency, our algorithm reduces the total number of memory elements used in the network to achieve single-generation network coding. We also discuss the advantages of employing single-generation network coding together with convolutional network-error correction codes (CNECCs) for networks with unit-delay and illustrate the performance gain of CNECCs by using memory at the intermediate nodes using simulations on an example network under a probabilistic network error model.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 07:09:21 GMT" } ]
2009-09-10T00:00:00
[ [ "Prasad", "K.", "" ], [ "Rajan", "B. Sundar", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1639
Bela Genge
Genge Bela and Haller Piroska
Extending WS-Security to Implement Security Protocols for Web Services
null
Acta Universitatis Sapientiae - Electrical and Mechanical Engineering, Vol. 1, pp. 105-112, 2009 (ISSN 2065-5916)
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web services use tokens provided by the WS-Security standard to implement security protocols. We propose several extensions to the WS-Security standard, including name types, key and random number extensions. The extensions are used to implement existing protocols such as ISO9798, Kerberos or BAN-Lowe. The advantages of using these implementations rather than the existing, binary ones, are inherited from the advantages of using Web service technologies, such as extensibility and end-to-end security across multiple environments that do not support a connection-based communication.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 07:17:01 GMT" } ]
2009-09-10T00:00:00
[ [ "Bela", "Genge", "" ], [ "Piroska", "Haller", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1640
Bela Genge
Magyari Attila, Genge Bela and Haller Piroska
Certificate-based Single Sign-On Mechanism for Multi-Platform Distributed Systems
null
Acta Universitatis Sapientiae - Electrical and Mechanical Engineering, Vol. 1, pp. 113-123, 2009 (ISSN 2065-5916)
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a certificate-based single sign-on mechanism in distributed systems. The proposed security protocols and authentication mechanisms are integrated in a middleware. The novelty of our middleware lies on the use of XPCOM components, this way we provide a different services that can be used on every platform where Mozilla is available. The componen based architecture of the implemented services allows using the authentication components separately.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 07:20:05 GMT" } ]
2009-09-10T00:00:00
[ [ "Attila", "Magyari", "" ], [ "Bela", "Genge", "" ], [ "Piroska", "Haller", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1645
Krishnendu Chatterjee
Krishnendu Chatterjee, Laurent Doyen and Thomas A. Henzinger
Qualitative Analysis of Partially-observable Markov Decision Processes
null
null
10.1007/978-3-642-15155-2_24
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study observation-based strategies for partially-observable Markov decision processes (POMDPs) with omega-regular objectives. An observation-based strategy relies on partial information about the history of a play, namely, on the past sequence of observations. We consider the qualitative analysis problem: given a POMDP with an omega-regular objective, whether there is an observation-based strategy to achieve the objective with probability~1 (almost-sure winning), or with positive probability (positive winning). Our main results are twofold. First, we present a complete picture of the computational complexity of the qualitative analysis of POMDP s with parity objectives (a canonical form to express omega-regular objectives) and its subclasses. Our contribution consists in establishing several upper and lower bounds that were not known in literature. Second, we present optimal bounds (matching upper and lower bounds) on the memory required by pure and randomized observation-based strategies for the qualitative analysis of POMDP s with parity objectives and its subclasses.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 07:47:28 GMT" }, { "version": "v2", "created": "Mon, 25 Jan 2010 17:08:14 GMT" }, { "version": "v3", "created": "Wed, 9 Jun 2010 19:19:02 GMT" } ]
2015-05-14T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Doyen", "Laurent", "" ], [ "Henzinger", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.1647
Krishnendu Chatterjee
Krishnendu Chatterjee, Laurent Doyen and Thomas A. Henzinger
Probabilistic Weighted Automata
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nondeterministic weighted automata are finite automata with numerical weights on transitions. They define quantitative languages L that assign to each word w a real number L(w). The value of an infinite word w is computed as the maximal value of all runs over w, and the value of a run as the maximum, limsup, liminf, limit average, or discounted sum of the transition weights. We introduce probabilistic weighted automata, in which the transitions are chosen in a randomized (rather than nondeterministic) fashion. Under almost-sure semantics (resp. positive semantics), the value of a word w is the largest real v such that the runs over w have value at least v with probability 1 (resp. positive probability). We study the classical questions of automata theory for probabilistic weighted automata: emptiness and universality, expressiveness, and closure under various operations on languages. For quantitative languages, emptiness and universality are defined as whether the value of some (resp. every) word exceeds a given threshold. We prove some of these questions to be decidable, and others undecidable. Regarding expressive power, we show that probabilities allow us to define a wide variety of new classes of quantitative languages, except for discounted-sum automata, where probabilistic choice is no more expressive than nondeterminism. Finally, we give an almost complete picture of the closure of various classes of probabilistic weighted automata for the following pointwise operations on quantitative languages: max, min, sum, and numerical complement.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 08:12:39 GMT" } ]
2009-09-10T00:00:00
[ [ "Chatterjee", "Krishnendu", "" ], [ "Doyen", "Laurent", "" ], [ "Henzinger", "Thomas A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.1709
Ching-an Hsiao
Ching-an Hsiao
How does certainty enter into the mind?
7 pages, 1 figure, revised references
null
null
null
cs.OH
http://creativecommons.org/licenses/by-nc-sa/3.0/
Any problem is concerned with the mind, but what do minds make a decision on? Here we show that there are three conditions for the mind to make a certain answer. We found that some difficulties in physics and mathematics are in fact introduced by infinity, which can not be rightly expressed by minds. Based on this point, we suggest a general observation system, where we use region (a type of infinity) to substitute for infinitesimal (another type of infinity) and thus get a consistent image with the mind. Furthermore, we declare that without world pictures we can never have ideas to any expressive events, which is the primary condition for a wave function like mind to collapse to a series of numbers. A following observation by expanding algorithm brings the final collapse: classifying the numbers and coming up with a certain yes or no answer.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 13:51:38 GMT" }, { "version": "v2", "created": "Tue, 23 Mar 2010 13:39:57 GMT" } ]
2010-03-24T00:00:00
[ [ "Hsiao", "Ching-an", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.1713
Fabien Mathieu
Nidhi Hegde, Fabien Mathieu, Diego Perino (INRIA Rocquencourt)
Size Does Matter (in P2P Live Streaming)
null
null
null
RR-7032
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Optimal dissemination schemes have previously been studied for peer-to-peer live streaming applications. Live streaming being a delay-sensitive application, fine tuning of dissemination parameters is crucial. In this report, we investigate optimal sizing of chunks, the units of data exchange, and probe sets, the number peers a given node probes before transmitting chunks. Chunk size can have significant impact on diffusion rate (chunk miss ratio), diffusion delay, and overhead. The size of the probe set can also affect these metrics, primarily through the choices available for chunk dissemination. We perform extensive simulations on the so-called random-peer, latest-useful dissemination scheme. Our results show that size does matter, with the optimal size being not too small in both cases.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 14:22:55 GMT" } ]
2009-09-10T00:00:00
[ [ "Hegde", "Nidhi", "", "INRIA Rocquencourt" ], [ "Mathieu", "Fabien", "", "INRIA Rocquencourt" ], [ "Perino", "Diego", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1758
Nicolas Bruno
Nicolas Bruno (Microsoft)
Teaching an Old Elephant New Tricks
CIDR 2009
null
null
null
cs.DB cs.DS cs.PF
http://creativecommons.org/licenses/by/3.0/
In recent years, column stores (or C-stores for short) have emerged as a novel approach to deal with read-mostly data warehousing applications. Experimental evidence suggests that, for certain types of queries, the new features of C-stores result in orders of magnitude improvement over traditional relational engines. At the same time, some C-store proponents argue that C-stores are fundamentally different from traditional engines, and therefore their benefits cannot be incorporated into a relational engine short of a complete rewrite. In this paper we challenge this claim and show that many of the benefits of C-stores can indeed be simulated in traditional engines with no changes whatsoever. We then identify some limitations of our ?pure-simulation? approach for the case of more complex queries. Finally, we predict that traditional relational engines will eventually leverage most of the benefits of C-stores natively, as is currently happening in other domains such as XML data.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:00:21 GMT" } ]
2009-09-15T00:00:00
[ [ "Bruno", "Nicolas", "", "Microsoft" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.1759
Boon Thau Loo
William Marczak (University of Pennsylvania), David Zook (LogicBlox), Wenchao Zhou (University of Pennsylvania), Molham Aref (LogicBlox), Boon Thau Loo (U. Pennsylvania)
Declarative Reconfigurable Trust Management
CIDR 2009
null
null
null
cs.CR cs.DB
http://creativecommons.org/licenses/by/3.0/
In recent years, there has been a proliferation of declarative logic-based trust management languages and systems proposed to ease the description, configuration, and enforcement of security policies. These systems have different tradeoffs in expressiveness and complexity, depending on the security constructs (e.g. authentication, delegation, secrecy, etc.) that are supported, and the assumed trust level and scale of the execution environment. In this paper, we present LBTrust, a unified declarative system for reconfigurable trust management, where various security constructs can be customized and composed in a declarative fashion. We present an initial proof-of-concept implementation of LBTrust using LogicBlox, an emerging commercial Datalog-based platform for enterprise software systems. The LogicBlox language enhances Datalog in a variety of ways, including constraints and meta-programming, as well as support for programmer defined constraints which on the meta-model itself ? meta-constraints ? which act to restrict the set of allowable programs. LBTrust utilizes LogicBlox?s meta-programming and meta-constraints to enable customizable cryptographic, partitioning and distribution strategies based on the execution environment. We present uses cases of LBTrust based on three trust management systems (Binder, D1LP, and Secure Network Datalog), and provide a preliminary evaluation of a Binder-based trust management system.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:05:31 GMT" } ]
2009-09-15T00:00:00
[ [ "Marczak", "William", "", "University of Pennsylvania" ], [ "Zook", "David", "", "LogicBlox" ], [ "Zhou", "Wenchao", "", "University of Pennsylvania" ], [ "Aref", "Molham", "", "LogicBlox" ], [ "Loo", "Boon Thau", "", "U. Pennsylvania" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1760
Xiaodan Wang
Xiaodan Wang (Johns Hopkins University), Randal Burns (Johns Hopkins), Tanu Malik (Purdue University)
LifeRaft: Data-Driven, Batch Processing for the Exploration of Scientific Databases
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Workloads that comb through vast amounts of data are gaining importance in the sciences. These workloads consist of "needle in a haystack" queries that are long running and data intensive so that query throughput limits performance. To maximize throughput for data-intensive queries, we put forth LifeRaft: a query processing system that batches queries with overlapping data requirements. Rather than scheduling queries in arrival order, LifeRaft executes queries concurrently against an ordering of the data that maximizes data sharing among queries. This decreases I/O and increases cache utility. However, such batch processing can increase query response time by starving interactive workloads. LifeRaft addresses starvation using techniques inspired by head scheduling in disk drives. Depending upon the workload saturation and queuing times, the system adaptively and incrementally trades-off processing queries in arrival order and data-driven batch processing. Evaluating LifeRaft in the SkyQuery federation of astronomy databases reveals a two-fold improvement in query throughput.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:05:37 GMT" } ]
2009-09-15T00:00:00
[ [ "Wang", "Xiaodan", "", "Johns Hopkins University" ], [ "Burns", "Randal", "", "Johns Hopkins" ], [ "Malik", "Tanu", "", "Purdue University" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1763
Ragib Hasan
Ragib Hasan (University of Illinois), Radu Sion (Stony Brook University), Marianne Winslett (University of Illinois)
Remembrance: The Unbearable Sentience of Being Digital
CIDR 2009
null
null
null
cs.DB cs.OS
http://creativecommons.org/licenses/by/3.0/
We introduce a world vision in which data is endowed with memory. In this data-centric systems paradigm, data items can be enabled to retain all or some of their previous values. We call this ability "remembrance" and posit that it empowers significant leaps in the security, availability, and general operational dimensions of systems. With the explosion in cheap, fast memories and storage, large-scale remembrance will soon become practical. Here, we introduce and explore the advantages of such a paradigm and the challenges in making it a reality.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:06 GMT" } ]
2009-09-15T00:00:00
[ [ "Hasan", "Ragib", "", "University of Illinois" ], [ "Sion", "Radu", "", "Stony Brook\n University" ], [ "Winslett", "Marianne", "", "University of Illinois" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" } ]
0909.1764
Uwe Roehm
Uwe Roehm (University of Sydney), Jose Blakeley (Microsoft)
Data Management for High-Throughput Genomics
CIDR 2009
null
null
null
cs.DB q-bio.GN
http://creativecommons.org/licenses/by/3.0/
Today's sequencing technology allows sequencing an individual genome within a few weeks for a fraction of the costs of the original Human Genome project. Genomics labs are faced with dozens of TB of data per week that have to be automatically processed and made available to scientists for further analysis. This paper explores the potential and the limitations of using relational database systems as the data processing platform for high-throughput genomics. In particular, we are interested in the storage management for high-throughput sequence data and in leveraging SQL and user-defined functions for data analysis inside a database system. We give an overview of a database design for high-throughput genomics, how we used a SQL Server database in some unconventional ways to prototype this scenario, and we will discuss some initial findings about the scalability and performance of such a more database-centric approach.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:17 GMT" } ]
2009-09-15T00:00:00
[ [ "Roehm", "Uwe", "", "University of Sydney" ], [ "Blakeley", "Jose", "", "Microsoft" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Quantitative Biology", "code": "q-bio.GN", "description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.", "span": "(Genomics)" } ]
0909.1765
Arnab Nandi
Arnab Nandi (University of Michigan), H V Jagadish (University of Michigan)
Qunits: queried units in database search
CIDR 2009
null
null
null
cs.DB cs.IR
http://creativecommons.org/licenses/by/3.0/
Keyword search against structured databases has become a popular topic of investigation, since many users find structured queries too hard to express, and enjoy the freedom of a ``Google-like'' query box into which search terms can be entered. Attempts to address this problem face a fundamental dilemma. Database querying is based on the logic of predicate evaluation, with a precisely defined answer set for a given query. On the other hand, in an information retrieval approach, ranked query results have long been accepted as far superior to results based on boolean query evaluation. As a consequence, when keyword queries are attempted against databases, relatively ad-hoc ranking mechanisms are invented (if ranking is used at all), and there is little leverage from the large body of IR literature regarding how to rank query results. Our proposal is to create a clear separation between ranking and database querying. This divides the problem into two parts, and allows us to address these separately. The first task is to represent the database, conceptually, as a collection of independent ``queried units'', or ``qunits'', each of which represents the desired result for some query against the database. The second task is to evaluate keyword queries against a collection of qunits, which can be treated as independent documents for query purposes, thereby permitting the use of standard IR techniques. We provide insights that encourage the use of this query paradigm, and discuss preliminary investigations into the efficacy of a qunits-based framework based on a prototype implementation.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:23 GMT" } ]
2009-09-15T00:00:00
[ [ "Nandi", "Arnab", "", "University of Michigan" ], [ "Jagadish", "H V", "", "University of\n Michigan" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.1766
Yi Zhang
Yi Zhang (Duke University), Herodotos Herodotou, Jun Yang (Duke)
RIOT: I/O-Efficient Numerical Computing without SQL
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
R is a numerical computing environment that is widely popular for statistical data analysis. Like many such environments, R performs poorly for large datasets whose sizes exceed that of physical memory. We present our vision of RIOT (R with I/O Transparency), a system that makes R programs I/O-efficient in a way transparent to the users. We describe our experience with RIOT-DB, an initial prototype that uses a relational database system as a backend. Despite the overhead and inadequacy of generic database systems in handling array data and numerical computation, RIOT-DB significantly outperforms R in many large-data scenarios, thanks to a suite of high-level, inter-operation optimizations that integrate seamlessly into R. While many techniques in RIOT are inspired by databases (and, for RIOT-DB, realized by a database system), RIOT users are insulated from anything database related. Compared with previous approaches that require users to learn new languages and rewrite their programs to interface with a database, RIOT will, we believe, be easier to adopt by the majority of the R users.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:27 GMT" } ]
2009-09-15T00:00:00
[ [ "Zhang", "Yi", "", "Duke University" ], [ "Herodotou", "Herodotos", "", "Duke" ], [ "Yang", "Jun", "", "Duke" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1767
Jignesh Patel
Willis Lang (University of Wisconsin-Madiso), Jignesh Patel (Wisconsin)
Towards Eco-friendly Database Management Systems
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Database management systems (DBMSs) have largely ignored the task of managing the energy consumed during query processing. Both economical and environmental factors now require that DBMSs pay close attention to energy consumption. In this paper we approach this issue by considering energy consumption as a first-class performance goal for query processing in a DBMS. We present two concrete techniques that can be used by a DBMS to directly manage the energy consumption. Both techniques trade energy consumption for performance. The first technique, called PVC, leverages the ability of modern processors to execute at lower processor voltage and frequency. The second technique, called QED, uses query aggregation to leverage common components of queries in a workload. Using experiments run on a commercial DBMS and MySQL, we show that PVC can reduce the processor energy consumption by 49% of the original consumption while increasing the response time by only 3%. On MySQL, PVC can reduce energy consumption by 20% with a response time penalty of only 6%. For simple selection queries with no predicate overlap, we show that QED can be used to gracefully trade response time for energy, reducing energy consumption by 54% for a 43% increase in average response time. In this paper we also highlight some research issues in the emerging area of energy-efficient data processing.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:31 GMT" } ]
2009-09-15T00:00:00
[ [ "Lang", "Willis", "", "University of Wisconsin-Madiso" ], [ "Patel", "Jignesh", "", "Wisconsin" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1768
Alan Fekete
David Lomet (Microsoft Research), Alan Fekete (University of Sydney), Gerhard Weikum (Max Plank Institute), Mike Zwilling (Microsoft SQL Server)
Unbundling Transaction Services in the Cloud
CIDR 2009
null
null
null
cs.DB cs.DC
http://creativecommons.org/licenses/by/3.0/
The traditional architecture for a DBMS engine has the recovery, concurrency control and access method code tightly bound together in a storage engine for records. We propose a different approach, where the storage engine is factored into two layers (each of which might have multiple heterogeneous instances). A Transactional Component (TC) works at a logical level only: it knows about transactions and their "logical" concurrency control and undo/redo recovery, but it does not know about page layout, B-trees etc. A Data Component (DC) knows about the physical storage structure. It supports a record oriented interface that provides atomic operations, but it does not know about transactions. Providing atomic record operations may itself involve DC-local concurrency control and recovery, which can be implemented using system transactions. The interaction of the mechanisms in TC and DC leads to multi-level redo (unlike the repeat history paradigm for redo in integrated engines). This refactoring of the system architecture could allow easier deployment of application-specific physical structures and may also be helpful to exploit multi-core hardware. Particularly promising is its potential to enable flexible transactions in cloud database deployments. We describe the necessary principles for unbundled recovery, and discuss implementation issues.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:36 GMT" } ]
2009-09-15T00:00:00
[ [ "Lomet", "David", "", "Microsoft Research" ], [ "Fekete", "Alan", "", "University of Sydney" ], [ "Weikum", "Gerhard", "", "Max Plank Institute" ], [ "Zwilling", "Mike", "", "Microsoft SQL Server" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.1769
Zachary Ives
Zachary Ives (University Of Pennsylvania), Craig Knoblock (University of Southern California - Information Sciences Institute), Steve Minton (Fetch Technologies), Marie Jacob (University of Pennsylvania), Partha Talukdar (University of Pennsylvania), Rattapoom Tuchinda (University of Southern California - Information Sciences Institute), Jose Luis Ambite (University of Southern California - Information Sciences Institute), Maria Muslea (University of Southern California - Information Sciences Institute), Cenk Gazen (Fetch Technologies)
Interactive Data Integration through Smart Copy & Paste
CIDR 2009
null
null
null
cs.DB cs.AI
http://creativecommons.org/licenses/by/3.0/
In many scenarios, such as emergency response or ad hoc collaboration, it is critical to reduce the overhead in integrating data. Ideally, one could perform the entire process interactively under one unified interface: defining extractors and wrappers for sources, creating a mediated schema, and adding schema mappings ? while seeing how these impact the integrated view of the data, and refining the design accordingly. We propose a novel smart copy and paste (SCP) model and architecture for seamlessly combining the design-time and run-time aspects of data integration, and we describe an initial prototype, the CopyCat system. In CopyCat, the user does not need special tools for the different stages of integration: instead, the system watches as the user copies data from applications (including the Web browser) and pastes them into CopyCat?s spreadsheet-like workspace. CopyCat generalizes these actions and presents proposed auto-completions, each with an explanation in the form of provenance. The user provides feedback on these suggestions ? through either direct interactions or further copy-and-paste operations ? and the system learns from this feedback. This paper provides an overview of our prototype system, and identifies key research challenges in achieving SCP in its full generality.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:41 GMT" } ]
2009-09-15T00:00:00
[ [ "Ives", "Zachary", "", "University Of Pennsylvania" ], [ "Knoblock", "Craig", "", "University\n of Southern California - Information Sciences Institute" ], [ "Minton", "Steve", "", "Fetch\n Technologies" ], [ "Jacob", "Marie", "", "University of Pennsylvania" ], [ "Talukdar", "Partha", "", "University of Pennsylvania" ], [ "Tuchinda", "Rattapoom", "", "University of Southern\n California - Information Sciences Institute" ], [ "Ambite", "Jose Luis", "", "University of\n Southern California - Information Sciences Institute" ], [ "Muslea", "Maria", "", "University of Southern California - Information Sciences Institute" ], [ "Gazen", "Cenk", "", "Fetch Technologies" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.1770
Benjamin Sowell
Benjamin Sowell (Cornell University), Alan Demers (Cornell University), Johannes Gehrke (Cornell University), Nitin Gupta (Cornell University), Haoyuan Li (Cornell University), Walker White (Cornell University)
From Declarative Languages to Declarative Processing in Computer Games
CIDR 2009
null
null
null
cs.DB cs.MA
http://creativecommons.org/licenses/by/3.0/
Recent work has shown that we can dramatically improve the performance of computer games and simulations through declarative processing: Character AI can be written in an imperative scripting language which is then compiled to relational algebra and executed by a special games engine with features similar to a main memory database system. In this paper we lay out a challenging research agenda built on these ideas. We discuss several research ideas for novel language features to support atomic actions and reactive programming. We also explore challenges for main-memory query processing in games and simulations including adaptive query plan selection, support for parallel architectures, debugging simulation scripts, and extensions for multi-player games and virtual worlds. We believe that these research challenges will result in a dramatic change in the design of game engines over the next decade.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:44 GMT" } ]
2009-09-15T00:00:00
[ [ "Sowell", "Benjamin", "", "Cornell University" ], [ "Demers", "Alan", "", "Cornell\n University" ], [ "Gehrke", "Johannes", "", "Cornell University" ], [ "Gupta", "Nitin", "", "Cornell\n University" ], [ "Li", "Haoyuan", "", "Cornell University" ], [ "White", "Walker", "", "Cornell\n University" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0909.1771
Ken Smith
Ken Smith (MITRE), Michael Morse (MITRE), Peter Mork (MITRE), Maya Li (MITRE), Arnon Rosenthal, David Allen, Len Seligman, Chris Wolf (MITRE)
The Role of Schema Matching in Large Enterprises
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
To date, the principal use case for schema matching research has been as a precursor for code generation, i.e., constructing mappings between schema elements with the end goal of data transfer. In this paper, we argue that schema matching plays valuable roles independent of mapping construction, especially as schemata grow to industrial scales. Specifically, in large enterprises human decision makers and planners are often the immediate consumer of information derived from schema matchers, instead of schema mapping tools. We list a set of real application areas illustrating this role for schema matching, and then present our experiences tackling a customer problem in one of these areas. We describe the matcher used, where the tool was effective, where it fell short, and our lessons learned about how well current schema matching technology is suited for use in large enterprises. Finally, we suggest a new agenda for schema matching research based on these experiences.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:48 GMT" } ]
2009-09-15T00:00:00
[ [ "Smith", "Ken", "", "MITRE" ], [ "Morse", "Michael", "", "MITRE" ], [ "Mork", "Peter", "", "MITRE" ], [ "Li", "Maya", "", "MITRE" ], [ "Rosenthal", "Arnon", "", "MITRE" ], [ "Allen", "David", "", "MITRE" ], [ "Seligman", "Len", "", "MITRE" ], [ "Wolf", "Chris", "", "MITRE" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1772
Harumi Kuno
Goetz Graefe (HP), Harumi Kuno (Hewlett-Packard Co.), Janet Wiener (Hewlett-Packard, Co.)
Visualizing the robustness of query execution
CIDR 2009
null
null
null
cs.DB cs.PF
http://creativecommons.org/licenses/by/3.0/
In database query processing, actual run-time conditions (e.g., actual selectivities and actual available memory) very often differ from compile-time expectations of run-time conditions (e.g., estimated predicate selectivities and anticipated memory availability). Robustness of query processing can be defined as the ability to handle unexpected conditions. Robustness of query execution, specifically, can be defined as the ability to process a specific plan efficiently in an unexpected condition. We focus on query execution (run-time), ignoring query optimization (compile-time), in order to complement existing research and to explore untapped potential for improved robustness in database query processing. One of our initial steps has been to devise diagrams or maps that show how well plans perform in the face of varying run-time conditions and how gracefully a system's query architecture, operators, and their implementation degrade in the face of adverse conditions. In this paper, we show several kinds of diagrams with data from three real systems and report on what we have learned both about these visualization techniques and about the three database systems
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:52 GMT" } ]
2009-09-15T00:00:00
[ [ "Graefe", "Goetz", "", "HP" ], [ "Kuno", "Harumi", "", "Hewlett-Packard Co." ], [ "Wiener", "Janet", "", "Hewlett-Packard, Co." ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.1773
Fatma Ozcan
Andrey Balmin (IBM Almaden Research Center), Latha Colby (IBM Almaden Research Center), Emiran Curtmola (UC, San Diego), Quanzhong Li (IBM Almaden Research Center), Fatma Ozcan (IBM Almaden Research Center)
Search Driven Analysis of Heterogenous XML Data
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Analytical processing on XML repositories is usually enabled by designing complex data transformations that shred the documents into a common data warehousing schema. This can be very time-consuming and costly, especially if the underlying XML data has a lot of variety in structure, and only a subset of attributes constitutes meaningful dimensions and facts. Today, there is no tool to explore an XML data set, discover interesting attributes, dimensions and facts, and rapidly prototype an OLAP solution. In this paper, we propose a system, called SEDA that enables users to start with simple keyword-style querying, and interactively refine the query based on result summaries. SEDA then maps query results onto a set of known, or newly created, facts and dimensions, and derives a star schema and its instantiation to be fed into an off-the-shelf OLAP tool, for further analysis.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:09:55 GMT" } ]
2009-09-15T00:00:00
[ [ "Balmin", "Andrey", "", "IBM Almaden Research Center" ], [ "Colby", "Latha", "", "IBM Almaden\n Research Center" ], [ "Curtmola", "Emiran", "", "UC, San Diego" ], [ "Li", "Quanzhong", "", "IBM Almaden\n Research Center" ], [ "Ozcan", "Fatma", "", "IBM Almaden Research Center" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1774
Georgia Koutrika
Georgia Koutrika (Stanford University), Benjamin Bercovitz (Stanford University), Robert Ikeda (Stanford University), Filip Kaliszan (Stanford University), Henry Liou (Stanford University), Zahra Mohammadi Zadeh (Stanford University), Hector Garcia-Molina (Stanford University)
Social Systems: Can we Do More Than Just Poke Friends?
CIDR 2009
null
null
null
cs.DB cs.CY
http://creativecommons.org/licenses/by/3.0/
Social sites have become extremely popular among users but have they attracted equal attention from the research community? Are they good only for simple tasks, such as tagging and poking friends? Do they present any new or interesting research challenges? In this paper, we describe the insights we have obtained implementing CourseRank, a course evaluation and planning social system. We argue that more attention should be given to social sites like ours and that there are many challenges (though not the traditional DBMS ones) that should be addressed by our community.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:01 GMT" } ]
2009-09-15T00:00:00
[ [ "Koutrika", "Georgia", "", "Stanford University" ], [ "Bercovitz", "Benjamin", "", "Stanford\n University" ], [ "Ikeda", "Robert", "", "Stanford University" ], [ "Kaliszan", "Filip", "", "Stanford\n University" ], [ "Liou", "Henry", "", "Stanford University" ], [ "Zadeh", "Zahra Mohammadi", "", "Stanford University" ], [ "Garcia-Molina", "Hector", "", "Stanford University" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0909.1775
Michael Armbrust
Michael Armbrust (UC Berkeley), Armando Fox (UC Berkeley), David Patterson (UC Berkeley), Nick Lanham (UC Berkeley), Beth Trushkowsky (UC Berkeley), Jesse Trutna (UC Berkeley), Haruki Oh (UC Berkeley)
SCADS: Scale-Independent Storage for Social Computing Applications
CIDR 2009
null
null
null
cs.DB cs.DC
http://creativecommons.org/licenses/by/3.0/
Collaborative web applications such as Facebook, Flickr and Yelp present new challenges for storing and querying large amounts of data. As users and developers are focused more on performance than single copy consistency or the ability to perform ad-hoc queries, there exists an opportunity for a highly-scalable system tailored specifically for relaxed consistency and pre-computed queries. The Web 2.0 development model demands the ability to both rapidly deploy new features and automatically scale with the number of users. There have been many successful distributed key-value stores, but so far none provide as rich a query language as SQL. We propose a new architecture, SCADS, that allows the developer to declaratively state application specific consistency requirements, takes advantage of utility computing to provide cost effective scale-up and scale-down, and will use machine learning models to introspectively anticipate performance problems and predict the resource requirements of new queries before execution.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:04 GMT" } ]
2009-09-15T00:00:00
[ [ "Armbrust", "Michael", "", "UC Berkeley" ], [ "Fox", "Armando", "", "UC Berkeley" ], [ "Patterson", "David", "", "UC Berkeley" ], [ "Lanham", "Nick", "", "UC Berkeley" ], [ "Trushkowsky", "Beth", "", "UC\n Berkeley" ], [ "Trutna", "Jesse", "", "UC Berkeley" ], [ "Oh", "Haruki", "", "UC Berkeley" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.1776
Xin (Luna) Dong
Laure Berti-Equille (Universite de Rennes 1), Anish Das Sarma (Stanford University), Xin (Luna) Dong (AT&T Labs-Research), Amelie Marian (Rutgus University), Divesh Srivastava (ATT Labs-Research)
Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence
CIDR 2009
null
null
null
cs.DB cs.LG
http://creativecommons.org/licenses/by/3.0/
The Web has enabled the availability of a huge amount of useful information, but has also eased the ability to spread false information and rumors across multiple sources, making it hard to distinguish between what is true and what is not. Recent examples include the premature Steve Jobs obituary, the second bankruptcy of United airlines, the creation of Black Holes by the operation of the Large Hadron Collider, etc. Since it is important to permit the expression of dissenting and conflicting opinions, it would be a fallacy to try to ensure that the Web provides only consistent information. However, to help in separating the wheat from the chaff, it is essential to be able to determine dependence between sources. Given the huge number of data sources and the vast volume of conflicting data available on the Web, doing so in a scalable manner is extremely challenging and has not been addressed by existing work yet. In this paper, we present a set of research problems and propose some preliminary solutions on the issues involved in discovering dependence between sources. We also discuss how this knowledge can benefit a variety of technologies, such as data integration and Web 2.0, that help users manage and access the totality of the available information from various sources.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:07 GMT" } ]
2009-09-15T00:00:00
[ [ "Berti-Equille", "Laure", "", "Universite de Rennes 1" ], [ "Sarma", "Anish Das", "", "Stanford University" ], [ "Xin", "", "", "Luna" ], [ "Dong", "", "", "AT&T Labs-Research" ], [ "Marian", "Amelie", "", "Rutgus University" ], [ "Srivastava", "Divesh", "", "ATT Labs-Research" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0909.1777
Yanlei Diao
Yanlei Diao (U. Massachusetts-Amherst), Boduo Li (University of Massachusetts Amherst), Anna Liu (UMass Amherst), Liping Peng (UMass Amherst), Charles Sutton (UC Berkeley), Thanh Tran (UMass Amherst), Michael Zink
Capturing Data Uncertainty in High-Volume Stream Processing
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
We present the design and development of a data stream system that captures data uncertainty from data collection to query processing to final result generation. Our system focuses on data that is naturally modeled as continuous random variables. For such data, our system employs an approach grounded in probability and statistical theory to capture data uncertainty and integrates this approach into high-volume stream processing. The first component of our system captures uncertainty of raw data streams from sensing devices. Since such raw streams can be highly noisy and may not carry sufficient information for query processing, our system employs probabilistic models of the data generation process and stream-speed inference to transform raw data into a desired format with an uncertainty metric. The second component captures uncertainty as data propagates through query operators. To efficiently quantify result uncertainty of a query operator, we explore a variety of techniques based on probability and statistical theory to compute the result distribution at stream speed. We are currently working with a group of scientists to evaluate our system using traces collected from the domains of (and eventually in the real systems for) hazardous weather monitoring and object tracking and monitoring.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:11 GMT" } ]
2009-09-15T00:00:00
[ [ "Diao", "Yanlei", "", "U. Massachusetts-Amherst" ], [ "Li", "Boduo", "", "University of\n Massachusetts Amherst" ], [ "Liu", "Anna", "", "UMass Amherst" ], [ "Peng", "Liping", "", "UMass\n Amherst" ], [ "Sutton", "Charles", "", "UC Berkeley" ], [ "Tran", "Thanh", "", "UMass Amherst" ], [ "Zink", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1778
Nodira Khoussainova
Nodira Khoussainova (University of Washington), Magda Balazinska (U. Washington), Wolfgang Gatterbauer (University of Washington), YongChul Kwon (University of Washington), Dan Suciu (University of Washington)
A Case for A Collaborative Query Management System
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Over the past 40 years, database management systems (DBMSs) have evolved to provide a sophisticated variety of data management capabilities. At the same time, tools for managing queries over the data have remained relatively primitive. One reason for this is that queries are typically issued through applications. They are thus debugged once and re-used repeatedly. This mode of interaction, however, is changing. As scientists (and others) store and share increasingly large volumes of data in data centers, they need the ability to analyze the data by issuing exploratory queries. In this paper, we argue that, in these new settings, data management systems must provide powerful query management capabilities, from query browsing to automatic query recommendations. We first discuss the requirements for a collaborative query management system. We outline an early system architecture and discuss the many research challenges associated with building such an engine.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:16 GMT" } ]
2009-09-15T00:00:00
[ [ "Khoussainova", "Nodira", "", "University of Washington" ], [ "Balazinska", "Magda", "", "U.\n Washington" ], [ "Gatterbauer", "Wolfgang", "", "University of Washington" ], [ "Kwon", "YongChul", "", "University of Washington" ], [ "Suciu", "Dan", "", "University of Washington" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1779
Sam Madden
Philippe Cudre-Mauroux (MIT), Eugene Wu (MIT), Sam Madden (MIT)
The Case for RodentStore, an Adaptive, Declarative Storage System
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Recent excitement in the database community surrounding new applications?analytic, scientific, graph, geospatial, etc.?has led to an explosion in research on database storage systems. New storage systems are vital to the database community, as they are at the heart of making database systems perform well in new application domains. Unfortunately, each such system also represents a substantial engineering effort including a great deal of duplication of mechanisms for features such as transactions and caching. In this paper, we make the case for RodentStore, an adaptive and declarative storage system providing a high-level interface for describing the physical representation of data. Specifically, RodentStore uses a declarative storage algebra whereby administrators (or database design tools) specify how a logical schema should be grouped into collections of rows, columns, and/or arrays, and the order in which those groups should be laid out on disk. We describe the key operators and types of our algebra, outline the general architecture of RodentStore, which interprets algebraic expressions to generate a physical representation of the data, and describe the interface between RodentStore and other parts of a database system, such as the query optimizer and executor. We provide a case study of the potential use of RodentStore in representing dense geospatial data collected from a mobile sensor network, showing the ease with which different storage layouts can be expressed using some of our algebraic constructs and the potential performance gains that a RodentStore-built storage system can offer.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:20 GMT" } ]
2009-09-15T00:00:00
[ [ "Cudre-Mauroux", "Philippe", "", "MIT" ], [ "Wu", "Eugene", "", "MIT" ], [ "Madden", "Sam", "", "MIT" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1780
Luc Bouganim
Luc Bouganim (INRIA), Bj\"orn J\'onsson (Reykjav\'ik University), Philippe Bonnet (Department of Computer Science, University of Copenhagen)
uFLIP: Understanding Flash IO Patterns
CIDR 2009
null
null
null
cs.PF
http://creativecommons.org/licenses/by/3.0/
Does the advent of flash devices constitute a radical change for secondary storage? How should database systems adapt to this new form of secondary storage? Before we can answer these questions, we need to fully understand the performance characteristics of flash devices. More specifically, we want to establish what kind of IOs should be favored (or avoided) when designing algorithms and architectures for flash-based systems. In this paper, we focus on flash IO patterns, that capture relevant distribution of IOs in time and space, and our goal is to quantify their performance. We define uFLIP, a benchmark for measuring the response time of flash IO patterns. We also present a benchmarking methodology which takes into account the particular characteristics of flash devices. Finally, we present the results obtained by measuring eleven flash devices, and derive a set of design hints that should drive the development of flash-based systems on current devices.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:26 GMT" } ]
2009-09-15T00:00:00
[ [ "Bouganim", "Luc", "", "INRIA" ], [ "Jónsson", "Björn", "", "Reykjavík University" ], [ "Bonnet", "Philippe", "", "Department of Computer Science, University of Copenhagen" ] ]
[ { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.1781
Marcos Vieira
Abhishek Mitra (UC Riverside), Marcos Vieira (UCR), Petko Bakalov (ESRI), Walid Najjar (UCR), Vassilis Tsotras (UCR)
Boosting XML Filtering with a Scalable FPGA-based Architecture
CIDR 2009
null
null
null
cs.AR cs.DB
http://creativecommons.org/licenses/by/3.0/
The growing amount of XML encoded data exchanged over the Internet increases the importance of XML based publish-subscribe (pub-sub) and content based routing systems. The input in such systems typically consists of a stream of XML documents and a set of user subscriptions expressed as XML queries. The pub-sub system then filters the published documents and passes them to the subscribers. Pub-sub systems are characterized by very high input ratios, therefore the processing time is critical. In this paper we propose a "pure hardware" based solution, which utilizes XPath query blocks on FPGA to solve the filtering problem. By utilizing the high throughput that an FPGA provides for parallel processing, our approach achieves drastically better throughput than the existing software or mixed (hardware/software) architectures. The XPath queries (subscriptions) are translated to regular expressions which are then mapped to FPGA devices. By introducing stacks within the FPGA we are able to express and process a wide range of path queries very efficiently, on a scalable environment. Moreover, the fact that the parser and the filter processing are performed on the same FPGA chip, eliminates expensive communication costs (that a multi-core system would need) thus enabling very fast and efficient pipelining. Our experimental evaluation reveals more than one order of magnitude improvement compared to traditional pub/sub systems.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:30 GMT" } ]
2009-09-15T00:00:00
[ [ "Mitra", "Abhishek", "", "UC Riverside" ], [ "Vieira", "Marcos", "", "UCR" ], [ "Bakalov", "Petko", "", "ESRI" ], [ "Najjar", "Walid", "", "UCR" ], [ "Tsotras", "Vassilis", "", "UCR" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1782
Shel Finkelstein
Shel Finkelstein (SAP), Dean Jacobs (SAP), Rainer Brendle (SAP)
Principles for Inconsistency
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Data consistency is very desirable because strong semantic properties make it easier to write correct programs that perform as users expect. However, there are good reasons why consistency may have to be weakened to achieve other business goals. In this CIDR 2009 Perspectives paper, we present real-world reasons inconsistency may be necessary, offer principles for managing inconsistency coherently, and describe implementation approaches we are investigating for sustainably scalable systems that offer comprehensible user experiences despite inconsistency.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:33 GMT" } ]
2009-09-15T00:00:00
[ [ "Finkelstein", "Shel", "", "SAP" ], [ "Jacobs", "Dean", "", "SAP" ], [ "Brendle", "Rainer", "", "SAP" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1783
AnHai Doan
AnHai Doan (Univ of Wisconsin), Jeff Naughton (Wisconsin), Akanksha Baid (Wisconsin), Xiaoyong Chai (Wisconsin), Fei Chen (Wisconsin), Ting Chen (Wisconsin), Eric Chu (Wisconsin), Pedro DeRose (Wisconsin), Byron Gao (Wisconsin), Chaitanya Gokhale (Wisconsin), Jiansheng Huang (Wisconsin), Warren Shen (Wisconsin), Ba-Quy Vuong (Wisconsin)
The Case for a Structured Approach to Managing Unstructured Data
CIDR 2009
null
null
null
cs.DB cs.IR
http://creativecommons.org/licenses/by/3.0/
The challenge of managing unstructured data represents perhaps the largest data management opportunity for our community since managing relational data. And yet we are risking letting this opportunity go by, ceding the playing field to other players, ranging from communities such as AI, KDD, IR, Web, and Semantic Web, to industrial players such as Google, Yahoo, and Microsoft. In this essay we explore what we can do to improve upon this situation. Drawing on the lessons learned while managing relational data, we outline a structured approach to managing unstructured data. We conclude by discussing the potential implications of this approach to managing other kinds of non-relational data, and to the identify of our field.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:36 GMT" } ]
2009-09-15T00:00:00
[ [ "Doan", "AnHai", "", "Univ of Wisconsin" ], [ "Naughton", "Jeff", "", "Wisconsin" ], [ "Baid", "Akanksha", "", "Wisconsin" ], [ "Chai", "Xiaoyong", "", "Wisconsin" ], [ "Chen", "Fei", "", "Wisconsin" ], [ "Chen", "Ting", "", "Wisconsin" ], [ "Chu", "Eric", "", "Wisconsin" ], [ "DeRose", "Pedro", "", "Wisconsin" ], [ "Gao", "Byron", "", "Wisconsin" ], [ "Gokhale", "Chaitanya", "", "Wisconsin" ], [ "Huang", "Jiansheng", "", "Wisconsin" ], [ "Shen", "Warren", "", "Wisconsin" ], [ "Vuong", "Ba-Quy", "", "Wisconsin" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.1784
Stavros Harizopoulos
Stavros Harizopoulos (HP Labs), Mehul Shah, Justin Meza (UCLA), Parthasarathy Ranganathan (HP Labs)
Energy Efficiency: The New Holy Grail of Data Management Systems Research
CIDR 2009
null
null
null
cs.DB cs.PF
http://creativecommons.org/licenses/by/3.0/
Energy costs are quickly rising in large-scale data centers and are soon projected to overtake the cost of hardware. As a result, data center operators have recently started turning into using more energy-friendly hardware. Despite the growing body of research in power management techniques, there has been little work to date on energy efficiency from a data management software perspective. In this paper, we argue that hardware-only approaches are only part of the solution, and that data management software will be key in optimizing for energy efficiency. We discuss the problems arising from growing energy use in data centers and the trends that point to an increasing set of opportunities for software-level optimizations. Using two simple experiments, we illustrate the potential of such optimizations, and, motivated by these examples, we discuss general approaches for reducing energy waste. Lastly, we point out existing places within database systems that are promising for energy-efficiency optimizations and urge the data management systems community to shift focus from performance-oriented research to energy-efficient computing.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:39 GMT" } ]
2009-09-15T00:00:00
[ [ "Harizopoulos", "Stavros", "", "HP Labs" ], [ "Shah", "Mehul", "", "UCLA" ], [ "Meza", "Justin", "", "UCLA" ], [ "Ranganathan", "Parthasarathy", "", "HP Labs" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.1785
Jayant Madhavan
Jayant Madhavan (Google Inc.), Loredana Afanasiev (Universiteit van Amsterdam), Lyublena Antova (Cornell University), Alon Halevy (Google)
Harnessing the Deep Web: Present and Future
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
Over the past few years, we have built a system that has exposed large volumes of Deep-Web content to Google.com users. The content that our system exposes contributes to more than 1000 search queries per-second and spans over 50 languages and hundreds of domains. The Deep Web has long been acknowledged to be a major source of structured data on the web, and hence accessing Deep-Web content has long been a problem of interest in the data management community. In this paper, we report on where we believe the Deep Web provides value and where it does not. We contrast two very different approaches to exposing Deep-Web content -- the surfacing approach that we used, and the virtual integration approach that has often been pursued in the data management literature. We emphasize where the values of each of the two approaches lie and caution against potential pitfalls. We outline important areas of future research and, in particular, emphasize the value that can be derived from analyzing large collections of potentially disparate structured data on the web.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:42 GMT" } ]
2009-09-15T00:00:00
[ [ "Madhavan", "Jayant", "", "Google Inc." ], [ "Afanasiev", "Loredana", "", "Universiteit van\n Amsterdam" ], [ "Antova", "Lyublena", "", "Cornell University" ], [ "Halevy", "Alon", "", "Google" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.1786
Alkis Simitsis
Alkis Simitsis (HP Labs), Yannis Ioannidis
DBMSs Should Talk Back Too
CIDR 2009
null
null
null
cs.DB cs.HC
http://creativecommons.org/licenses/by/3.0/
Natural language user interfaces to database systems have been studied for several decades now. They have mainly focused on parsing and interpreting natural language queries to generate them in a formal database language. We envision the reverse functionality, where the system would be able to take the internal result of that translation, say in SQL form, translate it back into natural language, and show it to the initiator of the query for verification. Likewise, information extraction has received considerable attention in the past ten years or so, identifying structured information in free text so that it may then be stored appropriately and queried. Validation of the records stored with a backward translation into text would again be very powerful. Verification and validation of query and data input of a database system correspond to just one example of the many important applications that would benefit greatly from having mature techniques for translating such database constructs into free-flowing text. The problem appears to be deceivingly simple, as there are no ambiguities or other complications in interpreting internal database elements, so initially a straightforward translation appears adequate. Reality teaches us quite the opposite, however, as the resulting text should be expressive, i.e., accurate in capturing the underlying queries or data, and effective, i.e., allowing fast and unique interpretation of them. Achieving both of these qualities is very difficult and raises several technical challenges that need to be addressed. In this paper, we first expose the reader to several situations and applications that need translation into natural language, thereby, motivating the problem. We then outline, by example, the research problems that need to be solved, separately for data translations and query translations.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:46 GMT" } ]
2009-09-15T00:00:00
[ [ "Simitsis", "Alkis", "", "HP Labs" ], [ "Ioannidis", "Yannis", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.1788
Pat Helland
Pat Helland (Microsoft), David Campbell (Microsoft)
Building on Quicksand
CIDR 2009
null
null
null
cs.DC
http://creativecommons.org/licenses/by/3.0/
Reliable systems have always been built out of unreliable components. Early on, the reliable components were small such as mirrored disks or ECC (Error Correcting Codes) in core memory. These systems were designed such that failures of these small components were transparent to the application. Later, the size of the unreliable components grew larger and semantic challenges crept into the application when failures occurred. As the granularity of the unreliable component grows, the latency to communicate with a backup becomes unpalatable. This leads to a more relaxed model for fault tolerance. The primary system will acknowledge the work request and its actions without waiting to ensure that the backup is notified of the work. This improves the responsiveness of the system. There are two implications of asynchronous state capture: 1) Everything promised by the primary is probabilistic. There is always a chance that an untimely failure shortly after the promise results in a backup proceeding without knowledge of the commitment. Hence, nothing is guaranteed! 2) Applications must ensure eventual consistency. Since work may be stuck in the primary after a failure and reappear later, the processing order for work cannot be guaranteed. Platform designers are struggling to make this easier for their applications. Emerging patterns of eventual consistency and probabilistic execution may soon yield a way for applications to express requirements for a "looser" form of consistency while providing availability in the face of ever larger failures. This paper recounts portions of the evolution of these trends, attempts to show the patterns that span these changes, and talks about future directions as we continue to "build on quicksand".
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:10:57 GMT" } ]
2009-09-15T00:00:00
[ [ "Helland", "Pat", "", "Microsoft" ], [ "Campbell", "David", "", "Microsoft" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.1789
Fabien Mathieu
Fabien Mathieu, Diego Perino (INRIA Rocquencourt)
On Resource Aware Algorithms in Epidemic Live Streaming
null
null
null
RR-7031
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Epidemic-style diffusion schemes have been previously proposed for achieving peer-to-peer live streaming. Their performance trade-offs have been deeply analyzed for homogeneous systems, where all peers have the same upload capacity. However, epidemic schemes designed for heterogeneous systems have not been completely understood yet. In this report we focus on the peer selection process and propose a generic model that encompasses a large class of algorithms. The process is modeled as a combination of two functions, an aware one and an agnostic one. By means of simulations, we analyze the awareness-agnostism trade-offs on the peer selection process and the impact of the source distribution policy in non-homogeneous networks. We highlight that the early diffusion of a given chunk is crucial for its overall diffusion performance, and a fairness trade-off arises between the performance of heterogeneous peers, as a function of the level of awareness.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:16:43 GMT" } ]
2009-09-10T00:00:00
[ [ "Mathieu", "Fabien", "", "INRIA Rocquencourt" ], [ "Perino", "Diego", "", "INRIA Rocquencourt" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1792
Fabien Mathieu
Fabien Mathieu
Heterogeneity in Distributed Live Streaming: Blessing or Curse?
null
null
null
RR-OL-2009-09-001
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Distributed live streaming has brought a lot of interest in the past few years. In the homogeneous case (all nodes having the same capacity), many algorithms have been proposed, which have been proven almost optimal or optimal. On the other hand, the performance of heterogeneous systems is not completely understood yet. In this paper, we investigate the impact of heterogeneity on the achievable delay of chunk-based live streaming systems. We propose several models for taking the atomicity of a chunk into account. For all these models, when considering the transmission of a single chunk, heterogeneity is indeed a ``blessing'', in the sense that the achievable delay is always faster than an equivalent homogeneous system. But for a stream of chunks, we show that it can be a ``curse'': there is systems where the achievable delay can be arbitrary greater compared to equivalent homogeneous systems. However, if the system is slightly bandwidth-overprovisioned, optimal single chunk diffusion schemes can be adapted to a stream of chunks, leading to near-optimal, faster than homogeneous systems, heterogeneous live streaming systems.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 18:25:29 GMT" } ]
2009-09-10T00:00:00
[ [ "Mathieu", "Fabien", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1801
Vaibhav Srivastava
Vaibhav Srivastava, Kurt Plarre, Francesco Bullo
Randomized Sensor Selection in Sequential Hypothesis Testing
10 pages, 1 figure, Journal
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of sensor selection for time-optimal detection of a hypothesis. We consider a group of sensors transmitting their observations to a fusion center. The fusion center considers the output of only one randomly chosen sensor at the time, and performs a sequential hypothesis test. We consider the class of sequential tests which are easy to implement, asymptotically optimal, and computationally amenable. For three distinct performance metrics, we show that, for a generic set of sensors and binary hypothesis, the fusion center needs to consider at most two sensors. We also show that for the case of multiple hypothesis, the optimal policy needs at most as many sensors to be observed as the number of underlying hypotheses.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 19:56:32 GMT" } ]
2009-09-10T00:00:00
[ [ "Srivastava", "Vaibhav", "" ], [ "Plarre", "Kurt", "" ], [ "Bullo", "Francesco", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1817
Muryong Kim
Muryong Kim, Sae-Young Chung
Cooperative Transmission for a Vector Gaussian Parallel Relay Network
35 pages, 10 figures, submitted to IEEE Transactions on Information Theory
null
10.1109/TIT.2011.2162162
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a parallel relay network where two relays cooperatively help a source transmit to a destination. We assume the source and the destination nodes are equipped with multiple antennas. Three basic schemes and their achievable rates are studied: Decode-and-Forward (DF), Amplify-and-Forward (AF), and Compress-and-Forward (CF). For the DF scheme, the source transmits two private signals, one for each relay, where dirty paper coding (DPC) is used between the two private streams, and a common signal for both relays. The relays make efficient use of the common information to introduce a proper amount of correlation in the transmission to the destination. We show that the DF scheme achieves the capacity under certain conditions. We also show that the CF scheme is asymptotically optimal in the high relay power limit, regardless of channel ranks. It turns out that the AF scheme also achieves the asymptotic optimality but only when the relays-to-destination channel is full rank. The relative advantages of the three schemes are discussed with numerical results.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 15:30:18 GMT" } ]
2017-01-27T00:00:00
[ [ "Kim", "Muryong", "" ], [ "Chung", "Sae-Young", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.1830
Deniz Ustebay
Deniz Ustebay, Boris Oreshkin, Mark Coates, Michael Rabbat
Greedy Gossip with Eavesdropping
25 pages, 7 figures
null
10.1109/TSP.2010.2046593
null
cs.DC cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents greedy gossip with eavesdropping (GGE), a novel randomized gossip algorithm for distributed computation of the average consensus problem. In gossip algorithms, nodes in the network randomly communicate with their neighbors and exchange information iteratively. The algorithms are simple and decentralized, making them attractive for wireless network applications. In general, gossip algorithms are robust to unreliable wireless conditions and time varying network topologies. In this paper we introduce GGE and demonstrate that greedy updates lead to rapid convergence. We do not require nodes to have any location information. Instead, greedy updates are made possible by exploiting the broadcast nature of wireless communications. During the operation of GGE, when a node decides to gossip, instead of choosing one of its neighbors at random, it makes a greedy selection, choosing the node which has the value most different from its own. In order to make this selection, nodes need to know their neighbors' values. Therefore, we assume that all transmissions are wireless broadcasts and nodes keep track of their neighbors' values by eavesdropping on their communications. We show that the convergence of GGE is guaranteed for connected network topologies. We also study the rates of convergence and illustrate, through theoretical bounds and numerical simulations, that GGE consistently outperforms randomized gossip and performs comparably to geographic gossip on moderate-sized random geometric graph topologies.
[ { "version": "v1", "created": "Wed, 9 Sep 2009 21:04:32 GMT" } ]
2015-05-14T00:00:00
[ [ "Ustebay", "Deniz", "" ], [ "Oreshkin", "Boris", "" ], [ "Coates", "Mark", "" ], [ "Rabbat", "Michael", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.1858
Aldar C.-F. Chan
Aldar C-F. Chan
A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless SensorNetworks
null
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Finding an optimal key assignment (subject to given constraints) for a key predistribution scheme in wireless sensor networks is a difficult task. Hence, most of the practical schemes are based on probabilistic key assignment, which leads to sub-optimal schemes requiring key storage linear in the total number of nodes. A graph theoretic framework is introduced to study the fundamental tradeoffs between key storage, average key path length (directly related to the battery consumption) and resilience (to compromised nodes) of key predistribution schemes for wireless sensor networks. Based on the proposed framework, a lower bound on key storage is derived for a given average key path length. An upper bound on the compromising probability is also given. This framework also leads to the design of key assignment schemes with a storage complexity of the same order as the lower bound.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 02:21:32 GMT" } ]
2009-09-11T00:00:00
[ [ "Chan", "Aldar C-F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.1866
David Eppstein
David Eppstein
Optimally fast incremental Manhattan plane embedding and planar tight span construction
39 pages, 15 figures
Journal of Computational Geometry 2(1):144-182, 2011
10.20382/jocg.v2i1a8
null
cs.CG cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe a data structure, a rectangular complex, that can be used to represent hyperconvex metric spaces that have the same topology (although not necessarily the same distance function) as subsets of the plane. We show how to use this data structure to construct the tight span of a metric space given as an n x n distance matrix, when the tight span is homeomorphic to a subset of the plane, in time O(n^2), and to add a single point to a planar tight span in time O(n). As an application of this construction, we show how to test whether a given finite metric space embeds isometrically into the Manhattan plane in time O(n^2), and add a single point to the space and re-test whether it has such an embedding in time O(n).
[ { "version": "v1", "created": "Thu, 10 Sep 2009 03:26:48 GMT" }, { "version": "v2", "created": "Fri, 28 Oct 2011 00:30:42 GMT" } ]
2016-08-12T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1870
David Eppstein
David Eppstein
Paired approximation problems and incompatible inapproximabilities
13 pages, 3 figures. To appear at 21st ACM-SIAM Symp. Discrete Algorithms (SODA 2010)
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper considers pairs of optimization problems that are defined from a single input and for which it is desired to find a good approximation to either one of the problems. In many instances, it is possible to efficiently find an approximation of this type that is better than known inapproximability lower bounds for either of the two individual optimization problems forming the pair. In particular, we find either a $(1+\epsilon)$-approximation to $(1,2)$-TSP or a $1/\epsilon$-approximation to maximum independent set, from a given graph, in linear time. We show a similar paired approximation result for finding either a coloring or a long path. However, no such tradeoff exists in some other cases: for set cover and hitting set problems defined from a single set family, and for clique and independent set problems on the same graph, it is not possible to find an approximation when both problems are combined that is better than the best approximation for either problem on its own.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 05:23:43 GMT" } ]
2009-09-11T00:00:00
[ [ "Eppstein", "David", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.1876
Maurizio Martina
Maurizio Martina, Guido Masera
Turbo NOC: a framework for the design of Network On Chip based turbo decoder architectures
submitted to IEEE Trans. on Circuits and Systems I (submission date 27 may 2009)
null
10.1109/TCSI.2010.2046257
null
cs.AR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This work proposes a general framework for the design and simulation of network on chip based turbo decoder architectures. Several parameters in the design space are investigated, namely the network topology, the parallelism degree, the rate at which messages are sent by processing nodes over the network and the routing strategy. The main results of this analysis are: i) the most suited topologies to achieve high throughput with a limited complexity overhead are generalized de-Bruijn and generalized Kautz topologies; ii) depending on the throughput requirements different parallelism degrees, message injection rates and routing algorithms can be used to minimize the network area overhead.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 07:29:52 GMT" } ]
2016-11-18T00:00:00
[ [ "Martina", "Maurizio", "" ], [ "Masera", "Guido", "" ] ]
[ { "class": "Computer Science", "code": "cs.AR", "description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.", "span": "(Hardware Architecture)" } ]
0909.1933
Liva Ralaivola
Liva Ralaivola (LIF), Marie Szafranski (IBISC), Guillaume Stempfel (LIF)
Chromatic PAC-Bayes Bounds for Non-IID Data: Applications to Ranking and Stationary $\beta$-Mixing Processes
Long version of the AISTATS 09 paper: http://jmlr.csail.mit.edu/proceedings/papers/v5/ralaivola09a/ralaivola09a.pdf
null
null
null
cs.LG math.ST stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Pac-Bayes bounds are among the most accurate generalization bounds for classifiers learned from independently and identically distributed (IID) data, and it is particularly so for margin classifiers: there have been recent contributions showing how practical these bounds can be either to perform model selection (Ambroladze et al., 2007) or even to directly guide the learning of linear classifiers (Germain et al., 2009). However, there are many practical situations where the training data show some dependencies and where the traditional IID assumption does not hold. Stating generalization bounds for such frameworks is therefore of the utmost interest, both from theoretical and practical standpoints. In this work, we propose the first - to the best of our knowledge - Pac-Bayes generalization bounds for classifiers trained on data exhibiting interdependencies. The approach undertaken to establish our results is based on the decomposition of a so-called dependency graph that encodes the dependencies within the data, in sets of independent data, thanks to graph fractional covers. Our bounds are very general, since being able to find an upper bound on the fractional chromatic number of the dependency graph is sufficient to get new Pac-Bayes bounds for specific settings. We show how our results can be used to derive bounds for ranking statistics (such as Auc) and classifiers trained on data distributed according to a stationary {\ss}-mixing process. In the way, we show how our approach seemlessly allows us to deal with U-processes. As a side note, we also provide a Pac-Bayes generalization bound for classifiers learned on data from stationary $\varphi$-mixing distributions.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 11:51:10 GMT" }, { "version": "v2", "created": "Fri, 4 Jun 2010 08:43:38 GMT" } ]
2010-06-09T00:00:00
[ [ "Ralaivola", "Liva", "", "LIF" ], [ "Szafranski", "Marie", "", "IBISC" ], [ "Stempfel", "Guillaume", "", "LIF" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0909.1965
Manuel Kauers
Alin Bostan and Manuel Kauers
The complete Generating Function for Gessel Walks is Algebraic
null
null
null
null
math.CO cs.SC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Gessel walks are lattice walks in the quarter plane $\set N^2$ which start at the origin $(0,0)\in\set N^2$ and consist only of steps chosen from the set $\{\leftarrow,\swarrow,\nearrow,\to\}$. We prove that if $g(n;i,j)$ denotes the number of Gessel walks of length $n$ which end at the point $(i,j)\in\set N^2$, then the trivariate generating series $G(t;x,y)=\sum_{n,i,j\geq 0} g(n;i,j)x^i y^j t^n$ is an algebraic function.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 14:58:14 GMT" } ]
2009-09-12T00:00:00
[ [ "Bostan", "Alin", "" ], [ "Kauers", "Manuel", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" } ]
0909.1977
Fernando Alegre
Fernando Alegre, Eric Feron and Santosh Pande
Using Ellipsoidal Domains to Analyze Control Systems Software
17 pages
null
null
null
cs.PL cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a methodology for the automatic verification of safety properties of controllers based on dynamical systems, such as those typically used in avionics. In particular, our focus is on proving stability properties of software implementing linear and some non-linear controllers. We develop an abstract interpretation framework that follows closely the Lyapunov methods used in proofs at the model level and describe the corresponding abstract domains, which for linear systems consist of ellipsoidal constraints. These ellipsoidal domains provide abstractions for the values of state variables and must be combined with other domains that model the remaining variables in a program. Thus, the problem of automatically assigning the right type of abstract domain to each variable arises. We provide an algorithm that solves this classification problem in many practical cases and suggest how it could be generalized to more complicated cases. We then find a fixpoint by solving a matrix equation, which in the linear case is just the discrete Lyapunov equation. Contrary to most cases in software analysis, this fixpoint cannot be reached by the usual iterative method of propagating constraints until saturation and so numerical methods become essential. Finally, we illustrate our methodology with several examples.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 15:42:32 GMT" } ]
2009-09-11T00:00:00
[ [ "Alegre", "Fernando", "" ], [ "Feron", "Eric", "" ], [ "Pande", "Santosh", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.2000
Peter Krusche
Peter Krusche, Alexander Tiskin
Computing alignment plots efficiently
Presented at ParCo 2009
null
null
null
cs.DS cs.DC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Dot plots are a standard method for local comparison of biological sequences. In a dot plot, a substring to substring distance is computed for all pairs of fixed-size windows in the input strings. Commonly, the Hamming distance is used since it can be computed in linear time. However, the Hamming distance is a rather crude measure of string similarity, and using an alignment-based edit distance can greatly improve the sensitivity of the dot plot method. In this paper, we show how to compute alignment plots of the latter type efficiently. Given two strings of length m and n and a window size w, this problem consists in computing the edit distance between all pairs of substrings of length w, one from each input string. The problem can be solved by repeated application of the standard dynamic programming algorithm in time O(mnw^2). This paper gives an improved data-parallel algorithm, running in time $O(mnw/\gamma/p)$ using vector operations that work on $\gamma$ values in parallel and $p$ processors. We show experimental results from an implementation of this algorithm, which uses Intel's MMX/SSE instructions for vector parallelism and MPI for coarse-grained parallelism.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 17:40:15 GMT" } ]
2009-09-11T00:00:00
[ [ "Krusche", "Peter", "" ], [ "Tiskin", "Alexander", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.2005
Ofer Zeitouni
Uriel Feige, Ofer Zeitouni
Deterministic approximation for the cover time of trees
null
null
null
null
cs.DS math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a deterministic algorithm that given a tree T with n vertices, a starting vertex v and a slackness parameter epsilon > 0, estimates within an additive error of epsilon the cover and return time, namely, the expected time it takes a simple random walk that starts at v to visit all vertices of T and return to v. The running time of our algorithm is polynomial in n/epsilon, and hence remains polynomial in n also for epsilon = 1/n^{O(1)}. We also show how the algorithm can be extended to estimate the expected cover (without return) time on trees.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 17:59:36 GMT" } ]
2009-09-11T00:00:00
[ [ "Feige", "Uriel", "" ], [ "Zeitouni", "Ofer", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0909.2009
Claudio Weidmann
Claudio Weidmann and Gottfried Lechner
A Fresh Look at Coding for q-ary Symmetric Channels
12 pages, 6 figures; revision submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper studies coding schemes for the $q$-ary symmetric channel based on binary low-density parity-check (LDPC) codes that work for any alphabet size $q=2^m$, $m\in\mathbb{N}$, thus complementing some recently proposed packet-based schemes requiring large $q$. First, theoretical optimality of a simple layered scheme is shown, then a practical coding scheme based on a simple modification of standard binary LDPC decoding is proposed. The decoder is derived from first principles and using a factor-graph representation of a front-end that maps $q$-ary symbols to groups of $m$ bits connected to a binary code. The front-end can be processed with a complexity that is linear in $m=\log_2 q$. An extrinsic information transfer chart analysis is carried out and used for code optimization. Finally, it is shown how the same decoder structure can also be applied to a larger class of $q$-ary channels.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 18:17:30 GMT" }, { "version": "v2", "created": "Tue, 6 Dec 2011 15:52:39 GMT" } ]
2015-03-13T00:00:00
[ [ "Weidmann", "Claudio", "" ], [ "Lechner", "Gottfried", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2017
Laura Rebollo-Neira
James Bowley and Laura Rebollo-Neira
Sparsity and `Something Else': An Approach to Encrypted Image Folding
Revised manuscript- Software for implementing the Encrypted Image Folding proposed in this paper is available on http://www.nonlinear-approx.info/
IEEE Signal Processing Letters, Vol. 8 No 3, 189--192, 2011
10.1109/LSP.2011.2106496
null
cs.CV cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A property of sparse representations in relation to their capacity for information storage is discussed. It is shown that this feature can be used for an application that we term Encrypted Image Folding. The proposed procedure is realizable through any suitable transformation. In particular, in this paper we illustrate the approach by recourse to the Discrete Cosine Transform and a combination of redundant Cosine and Dirac dictionaries. The main advantage of the proposed technique is that both storage and encryption can be achieved simultaneously using simple processing steps.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 19:21:04 GMT" }, { "version": "v2", "created": "Tue, 26 Oct 2010 14:39:05 GMT" }, { "version": "v3", "created": "Fri, 11 Feb 2011 09:54:37 GMT" }, { "version": "v4", "created": "Wed, 1 Feb 2012 22:26:15 GMT" }, { "version": "v5", "created": "Wed, 12 Sep 2012 16:56:33 GMT" } ]
2012-09-13T00:00:00
[ [ "Bowley", "James", "" ], [ "Rebollo-Neira", "Laura", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2024
Chi Anh La
Chi-Anh La, Pietro Michiardi, Claudio Casetti, Carla-Fabiana Chiasserini, Marco Fiore
A Lightweight Distributed Solution to Content Replication in Mobile Networks
12 pages
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Facility location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a network can be cast as an uncapacitated facility location problem. The endeavour of this work is to design a distributed, lightweight solution to the above joint optimization problem, while taking into account the network dynamics. In particular, we devise a mechanism that lets nodes share the burden of storing and providing content, so as to achieve load balancing, and decide whether to replicate or drop the information so as to adapt to a dynamic content demand and time-varying topology. We evaluate our mechanism through simulation, by exploring a wide range of settings and studying realistic content access mechanisms that go beyond the traditional assumptionmatching demand points to their closest content replica. Results show that our mechanism, which uses local measurements only, is: (i) extremely precise in approximating an optimal solution to content placement and replication; (ii) robust against network mobility; (iii) flexible in accommodating various content access patterns, including variation in time and space of the content demand.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 19:43:30 GMT" } ]
2009-09-11T00:00:00
[ [ "La", "Chi-Anh", "" ], [ "Michiardi", "Pietro", "" ], [ "Casetti", "Claudio", "" ], [ "Chiasserini", "Carla-Fabiana", "" ], [ "Fiore", "Marco", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.2030
Gregory Valiant
Gregory Valiant and Paul Valiant
Size Bounds for Conjunctive Queries with General Functional Dependencies
22 pages, 2 figures
null
null
null
cs.DB cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper extends the work of Gottlob, Lee, and Valiant (PODS 2009)[GLV], and considers worst-case bounds for the size of the result Q(D) of a conjunctive query Q to a database D given an arbitrary set of functional dependencies. The bounds in [GLV] are based on a "coloring" of the query variables. In order to extend the previous bounds to the setting of arbitrary functional dependencies, we leverage tools from information theory to formalize the original intuition that each color used represents some possible entropy of that variable, and bound the maximum possible size increase via a linear program that seeks to maximize how much more entropy is in the result of the query than the input. This new view allows us to precisely characterize the entropy structure of worst-case instances for conjunctive queries with simple functional dependencies (keys), providing new insights into the results of [GLV]. We extend these results to the case of general functional dependencies, providing upper and lower bounds on the worst-case size increase. We identify the fundamental connection between the gap in these bounds and a central open question in information theory. Finally, we show that, while both the upper and lower bounds are given by exponentially large linear programs, one can distinguish in polynomial time whether the result of a query with an arbitrary set of functional dependencies can be any larger than the input database.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 20:28:20 GMT" }, { "version": "v2", "created": "Sat, 12 Dec 2009 08:00:21 GMT" } ]
2009-12-12T00:00:00
[ [ "Valiant", "Gregory", "" ], [ "Valiant", "Paul", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.2055
Erich Schikuta
Erich Schikuta, Thomas Weishaeupl, Flavia Donno, Heinz Stockinger, Elisabeth Vinek, Helmut Wanek, Christoph Witzany, Irfan Ul Haq
Business in the Grid
null
null
null
null
cs.DC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
From 2004 to 2007 the Business In the Grid (BIG) project took place and was driven by the following goals: Firstly, make business aware of Grid technology and, secondly, try to explore new business models. We disseminated Grid computing by mainly concentrating on the central European market and interviewed several companies in order to gain insights into the Grid acceptance in industrial environments. In this article we present the results of the project, elaborate on a critical discussion on business adaptations, and describe a novel dynamic authorization workflow for business processes in the Grid.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 21:48:34 GMT" } ]
2009-09-30T00:00:00
[ [ "Schikuta", "Erich", "" ], [ "Weishaeupl", "Thomas", "" ], [ "Donno", "Flavia", "" ], [ "Stockinger", "Heinz", "" ], [ "Vinek", "Elisabeth", "" ], [ "Wanek", "Helmut", "" ], [ "Witzany", "Christoph", "" ], [ "Haq", "Irfan Ul", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0909.2058
Sihem Amer-Yahia
Sihem Amer-Yahia (Yahoo! Research), Laks Lakshmanan (UBC), Cong Yu (Yahoo! Research)
SocialScope: Enabling Information Discovery on Social Content Sites
CIDR 2009
null
null
null
cs.DB cs.HC cs.IR cs.PL
http://creativecommons.org/licenses/by/3.0/
Recently, many content sites have started encouraging their users to engage in social activities such as adding buddies on Yahoo! Travel and sharing articles with their friends on New York Times. This has led to the emergence of {\em social content sites}, which is being facilitated by initiatives like OpenID (http://www.openid.net/) and OpenSocial (http://www.opensocial.org/). These community standards enable the open access to users' social profiles and connections by individual content sites and are bringing content-oriented sites and social networking sites ever closer. The integration of content and social information raises new challenges for {\em information management and discovery} over such sites. We propose a logical architecture, named \kw{SocialScope}, consisting of three layers, for tackling the challenges. The {\em content management} layer is responsible for integrating, maintaining and physically accessing the content and social data. The {\em information discovery} layer takes care of analyzing content to derive interesting new information, and interpreting and processing the user's information need to identify relevant information. Finally, the {\em information presentation} layer explores the discovered information and helps users better understand it in a principled way. We describe the challenges in each layer and propose solutions for some of those challenges. In particular, we propose a uniform algebraic framework, which can be leveraged to uniformly and flexibly specify many of the information discovery and analysis tasks and provide the foundation for the optimization of those tasks.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 22:08:17 GMT" } ]
2016-09-08T00:00:00
[ [ "Amer-Yahia", "Sihem", "", "Yahoo! Research" ], [ "Lakshmanan", "Laks", "", "UBC" ], [ "Yu", "Cong", "", "Yahoo! Research" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0909.2062
Rafael Fernandez-Moctezuma
Rafael Fern\'andez-Moctezuma (Portland State University), Kristin Tufte (Portland State University), Jin Li (Portland State University)
Inter-Operator Feedback in Data Stream Management Systems via Punctuation
CIDR 2009
null
null
null
cs.DB
http://creativecommons.org/licenses/by/3.0/
High-volume, high-speed data streams may overwhelm the capabilities of stream processing systems; techniques such as data prioritization, avoidance of unnecessary processing and on-demand result production may be necessary to reduce processing requirements. However, the dynamic nature of data streams, in terms of both rate and content, makes the application of such techniques challenging. Such techniques have been addressed in the context of static and centralized query optimization; however, they have not been fully addressed for data stream management systems. In this work, we present a comprehensive framework that supports prioritization, avoidance of unnecessary work, and on-demand result production over distributed, unreliable, bursty, disordered data sources, typical of many data streams. We propose a form of inter-operator feedback, which flows against the stream direction, to communicate the information needed to enable execution of these techniques. This feedback leverages punctuations to describe the subsets of interest. We identify potential sources of feedback information, characterize new types of punctuation to support feedback, and describe the roles of producers, exploiters, and relayers of feedback that query operators may implement. We present initial experimental observations using the NiagaraST data-stream system.
[ { "version": "v1", "created": "Thu, 10 Sep 2009 22:55:16 GMT" } ]
2010-02-23T00:00:00
[ [ "Fernández-Moctezuma", "Rafael", "", "Portland State University" ], [ "Tufte", "Kristin", "", "Portland State University" ], [ "Li", "Jin", "", "Portland State University" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.2074
V. Sreekanth Annapureddy
V. Sreekanth Annapureddy and Venugopal V. Veeravalli
Sum Capacity of MIMO Interference Channels in the Low Interference Regime
Submitted to IEEE Transactions on Information Theory, Sept. 2009, revised Oct. 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Using Gaussian inputs and treating interference as noise at the receivers has recently been shown to be sum capacity achieving for the two-user single-input single-output (SISO) Gaussian interference channel in a low interference regime, where the interference levels are below certain thresholds. In this paper, such a low interference regime is characterized for multiple-input multiple-output (MIMO) Gaussian interference channels. Conditions are provided on the direct and cross channel gain matrices under which using Gaussian inputs and treating interference as noise at the receivers is sum capacity achieving. For the special cases of the symmetric multiple-input single-output (MISO) and single-input multiple-output (SIMO) Gaussian interference channels, more explicit expressions for the low interference regime are derived. In particular, the threshold on the interference levels that characterize low interference regime is related to the input SNR and the angle between the direct and cross channel gain vectors. It is shown that the low interference regime can be quite significant for MIMO interference channels, with the low interference threshold being at least as large as the sine of the angle between the direct and cross channel gain vectors for the MISO and SIMO cases.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 01:28:52 GMT" }, { "version": "v2", "created": "Fri, 22 Oct 2010 18:57:21 GMT" } ]
2010-10-25T00:00:00
[ [ "Annapureddy", "V. Sreekanth", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2088
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Arithmetical meadows
14 pages; sections 4 and 5 permuted
null
null
PRG0909
math.RA cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An inversive meadow is a commutative ring with identity equipped with a multiplicative inverse operation made total by choosing 0 as its value at 0. Previously, inversive meadows were shortly called meadows. A divisive meadow is an inversive meadows with the multiplicative inverse operation replaced by a division operation. In the spirit of Peacock's arithmetical algebra, we introduce variants of inversive and divisive meadows without an additive identity element and an additive inverse operation. We give equational axiomatizations of several classes of such variants of inversive and divisive meadows as well as of several instances of them.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 05:44:54 GMT" }, { "version": "v2", "created": "Tue, 2 Nov 2010 16:09:04 GMT" } ]
2010-11-03T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Mathematics", "code": "math.RA", "description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups", "span": "(Rings and Algebras)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.2089
Kees Middelburg
J. A. Bergstra, C. A. Middelburg
Indirect jumps improve instruction sequence performance
10 pages, definition of maximal internal delay and theorem 1 are stated more precise; presentation improved
Scientific Annals of Computer Science, 22(2):253--265, 2012
10.7561/SACS.2012.2.253
PRG0910
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Instruction sequences with direct and indirect jump instructions are as expressive as instruction sequences with direct jump instructions only. We show that, in the case where the number of instructions is not bounded, we are faced with increases of the maximal internal delays of instruction sequences on execution that are not bounded by a linear function if we strive for acceptable increases of the lengths of instruction sequences on elimination of indirect jump instructions.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 05:51:09 GMT" }, { "version": "v2", "created": "Thu, 29 Dec 2011 13:19:53 GMT" }, { "version": "v3", "created": "Fri, 17 Aug 2012 15:06:20 GMT" } ]
2012-11-20T00:00:00
[ [ "Bergstra", "J. A.", "" ], [ "Middelburg", "C. A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0909.2090
Nevin Vunka Jungum
Marc Dalmau, Philippe Roose, Sophie Laplace
Context Aware Adaptable Applications - A global approach
International Journal of Computer Science Issues, Volume 1, pp13-25, August 2009
M. Dalmau, P. Roose and S. Laplace, "Context Aware Adaptable Applications - A global approach", International Journal of Computer Science Issues, Volume 1, pp13-25, August 2009
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Actual applications (mostly component based) requirements cannot be expressed without a ubiquitous and mobile part for end-users as well as for M2M applications (Machine to Machine). Such an evolution implies context management in order to evaluate the consequences of the mobility and corresponding mechanisms to adapt or to be adapted to the new environment. Applications are then qualified as context aware applications. This first part of this paper presents an overview of context and its management by application adaptation. This part starts by a definition and proposes a model for the context. It also presents various techniques to adapt applications to the context: from self-adaptation to supervised approached. The second part is an overview of architectures for adaptable applications. It focuses on platforms based solutions and shows information flows between application, platform and context. Finally it makes a synthesis proposition with a platform for adaptable context-aware applications called Kalimucho. Then we present implementations tools for software components and a dataflow models in order to implement the Kalimucho platform.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 06:19:01 GMT" } ]
2009-09-14T00:00:00
[ [ "Dalmau", "Marc", "" ], [ "Roose", "Philippe", "" ], [ "Laplace", "Sophie", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.2091
Denis Pallez
Hideyuki Takagi (I3S), Denis Pallez (I3S)
Paired Comparisons-based Interactive Differential Evolution
null
World Congress on Nature and Biologically Inspired Computing, Coimbatore : Inde (2009)
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose Interactive Differential Evolution (IDE) based on paired comparisons for reducing user fatigue and evaluate its convergence speed in comparison with Interactive Genetic Algorithms (IGA) and tournament IGA. User interface and convergence performance are two big keys for reducing Interactive Evolutionary Computation (IEC) user fatigue. Unlike IGA and conventional IDE, users of the proposed IDE and tournament IGA do not need to compare whole individuals each other but compare pairs of individuals, which largely decreases user fatigue. In this paper, we design a pseudo-IEC user and evaluate another factor, IEC convergence performance, using IEC simulators and show that our proposed IDE converges significantly faster than IGA and tournament IGA, i.e. our proposed one is superior to others from both user interface and convergence performance points of view.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 06:30:05 GMT" } ]
2010-04-21T00:00:00
[ [ "Takagi", "Hideyuki", "", "I3S" ], [ "Pallez", "Denis", "", "I3S" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.2103
Nevin Vunka Jungum
Samia Bouzefrane, Julien Cordry and Pierre Paradinas
MESURE Tool to benchmark Java Card platforms
International Journal of Computer Science Issues, Volume 1, pp49-57, August 2009
S. Bouzefrane, J. Cordry and P. Paradinas,"MESURE Tool to benchmark Java Card platforms", International Journal of Computer Science Issues, Volume 1, pp49-57, August 2009
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The advent of the Java Card standard has been a major turning point in smart card technology. With the growing acceptance of this standard, understanding the performance behavior of these platforms is becoming crucial. To meet this need, we present in this paper a novel benchmarking framework to test and evaluate the performance of Java Card platforms. MESURE tool is the first framework which accuracy and effectiveness are independent from the particular Java Card platform tested and CAD used.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 07:37:04 GMT" } ]
2009-09-14T00:00:00
[ [ "Bouzefrane", "Samia", "" ], [ "Cordry", "Julien", "" ], [ "Paradinas", "Pierre", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.2119
John Whitbeck
John Whitbeck, Vania Conan, and Marcelo Dias de Amorim
Performance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic Graphs
5 pages, 4 figures. Accepted for publication in IEEE Transactions on Communications
null
10.1109/TCOMM.2011.020811.090163
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Connectivity patterns in intermittently-connected mobile networks (ICMN) can be modeled as edge-Markovian dynamic graphs. We propose a new model for epidemic propagation on such graphs and calculate a closed-form expression that links the best achievable delivery ratio to common ICMN parameters such as message size, maximum tolerated delay, and link lifetime. These theoretical results are compared to those obtained by replaying a real-life contact trace.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 09:38:08 GMT" }, { "version": "v2", "created": "Tue, 10 Aug 2010 08:37:14 GMT" }, { "version": "v3", "created": "Thu, 25 Nov 2010 14:48:42 GMT" } ]
2016-11-17T00:00:00
[ [ "Whitbeck", "John", "" ], [ "Conan", "Vania", "" ], [ "de Amorim", "Marcelo Dias", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.2145
Laurent Romary
Samuel Cruz-Lara (INRIA Lorraine - LORIA), Patrice Bonhomme (INRIA Lorraine - LORIA), Christophe De Saint-Rat (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine - LORIA)
A general XML-based distributed software architecture for accessing and sharing ressources
Colloque avec actes et comit\'e de lecture
XML Finland'99, Helsinki : Finland (1999)
null
99-R-368 || cruz-lara99a
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a general xml-based distributed software architecture in the aim of accessing and sharing resources in an opened client/server environment. The paper is organized as follows : First, we introduce the idea of a "General Distributed Software Architecture". Second, we describe the general framework in which this architecture is used. Third, we describe the process of information exchange and we introduce some technical issues involved in the implementation of the proposed architecture. Finally, we present some projects which are currently using, or which should use, the proposed architecture.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 11:08:07 GMT" } ]
2009-09-14T00:00:00
[ [ "Cruz-Lara", "Samuel", "", "INRIA Lorraine - LORIA" ], [ "Bonhomme", "Patrice", "", "INRIA\n Lorraine - LORIA" ], [ "De Saint-Rat", "Christophe", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.2157
Maurice Margenstern
Maurice Margenstern
Navigation in tilings of the hyperbolic plane and possible applications
7 pages, 10 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper introduces a method of navigation in a large family of tilings of the hyperbolic plane and looks at the question of possible applications in the light of the few ones which were already obtained.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 12:39:22 GMT" } ]
2009-09-14T00:00:00
[ [ "Margenstern", "Maurice", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.2183
Nevin Vunka Jungum
Noha Ibrahim and Frederic Le Mouel
A Survey on Service Composition Middleware in Pervasive Environments
International Journal of Computer Science Issues, Volume 1, pp1-12, August 2009
N. Ibrahim and F.L. Mouel, " A Survey on Service Composition Middleware in Pervasive Environments",International Journal of Computer Science Issues, Volume 1, pp1-12, August 2009
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The development of pervasive computing has put the light on a challenging problem: how to dynamically compose services in heterogeneous and highly changing environments? We propose a survey that defines the service composition as a sequence of four steps: the translation, the generation, the evaluation, and finally the execution. With this powerful and simple model we describe the major service composition middleware. Then, a classification of these service composition middleware according to pervasive requirements - interoperability, discoverability, adaptability, context awareness, QoS management, security, spontaneous management, and autonomous management - is given. The classification highlights what has been done and what remains to do to develop the service composition in pervasive environments.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 14:43:54 GMT" } ]
2009-09-14T00:00:00
[ [ "Ibrahim", "Noha", "" ], [ "Mouel", "Frederic Le", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.2185
Nevin Vunka Jungum
Scott Carter and Laurent Denoue
SeeReader: An (Almost) Eyes-Free Mobile Rich Document Viewer
International Journal of Computer Science Issues, Volume 1, pp36-41, August 2009
S. Carter and L. Denoue, "SeeReader: An (Almost) Eyes-Free Mobile Rich Document Viewer ", International Journal of Computer Science Issues, Volume 1, pp36-41, August 2009
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Reading documents on mobile devices is challenging. Not only are screens small and difficult to read, but also navigating an environment using limited visual attention can be difficult and potentially dangerous. Reading content aloud using text-tospeech (TTS) processing can mitigate these problems, but only for content that does not include rich visual information. In this paper, we introduce a new technique, SeeReader, that combines TTS with automatic content recognition and document presentation control that allows users to listen to documents while also being notified of important visual content. Together, these services allow users to read rich documents on mobile devices while maintaining awareness of their visual environment.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 14:49:10 GMT" } ]
2009-09-14T00:00:00
[ [ "Carter", "Scott", "" ], [ "Denoue", "Laurent", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.2187
Nevin Vunka Jungum
Santiago J. Barro Torres and Carlos J. Escudero Cascon
Embedded Sensor System for Early Pathology Detection in Building Construction
International Journal of Computer Science Issues, Volume 1, pp26-35, August 2009
S.J. B. Torres and C. J. E. Cascon, " Embedded Sensor System for Early Pathology Detection in Building Construction", International Journal of Computer Science Issues, Volume 1, pp26-35, August 2009
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Structure pathology detection is an important security task in building construction, which is performed by an operator by looking manually for damages on the materials. This activity could be dangerous if the structure is hidden or difficult to reach. On the other hand, embedded devices and wireless sensor networks (WSN) are becoming popular and cheap, enabling the design of an alternative pathology detection system to monitor structures based on these technologies. This article introduces a ZigBee WSN system, intending to be autonomous, easy to use and with low power consumption. Its functional parts are fully discussed with diagrams, as well as the protocol used to collect samples from sensor nodes. Finally, several tests focused on range and power consumption of our prototype are shown, analysing whether the results obtained were as expected or not.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 14:54:08 GMT" } ]
2009-09-14T00:00:00
[ [ "Torres", "Santiago J. Barro", "" ], [ "Cascon", "Carlos J. Escudero", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.2194
Dominique Tschopp
Dominique Tschopp, Suhas Diggavi
Approximate Nearest Neighbor Search through Comparisons
19 pages, 4 figures
null
null
null
cs.DS cs.DB cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the problem of finding the nearest neighbor (or one of the R-nearest neighbors) of a query object q in a database of n objects. In contrast with most existing approaches, we can only access the ``hidden'' space in which the objects live through a similarity oracle. The oracle, given two reference objects and a query object, returns the reference object closest to the query object. The oracle attempts to model the behavior of human users, capable of making statements about similarity, but not of assigning meaningful numerical values to distances between objects.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 15:32:03 GMT" } ]
2009-09-14T00:00:00
[ [ "Tschopp", "Dominique", "" ], [ "Diggavi", "Suhas", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0909.2234
Jayakrishnan Unnikrishnan
Jayakrishnan Unnikrishnan, Dayu Huang, Sean Meyn, Amit Surana and Venugopal Veeravalli
Universal and Composite Hypothesis Testing via Mismatched Divergence
Accepted to IEEE Transactions on Information Theory, July 2010
null
10.1109/TIT.2011.2104670
null
cs.IT cs.LG math.IT math.ST stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
For the universal hypothesis testing problem, where the goal is to decide between the known null hypothesis distribution and some other unknown distribution, Hoeffding proposed a universal test in the nineteen sixties. Hoeffding's universal test statistic can be written in terms of Kullback-Leibler (K-L) divergence between the empirical distribution of the observations and the null hypothesis distribution. In this paper a modification of Hoeffding's test is considered based on a relaxation of the K-L divergence test statistic, referred to as the mismatched divergence. The resulting mismatched test is shown to be a generalized likelihood-ratio test (GLRT) for the case where the alternate distribution lies in a parametric family of the distributions characterized by a finite dimensional parameter, i.e., it is a solution to the corresponding composite hypothesis testing problem. For certain choices of the alternate distribution, it is shown that both the Hoeffding test and the mismatched test have the same asymptotic performance in terms of error exponents. A consequence of this result is that the GLRT is optimal in differentiating a particular distribution from others in an exponential family. It is also shown that the mismatched test has a significant advantage over the Hoeffding test in terms of finite sample size performance. This advantage is due to the difference in the asymptotic variances of the two test statistics under the null hypothesis. In particular, the variance of the K-L divergence grows linearly with the alphabet size, making the test impractical for applications involving large alphabet distributions. The variance of the mismatched divergence on the other hand grows linearly with the dimension of the parameter space, and can hence be controlled through a prudent choice of the function class defining the mismatched divergence.
[ { "version": "v1", "created": "Fri, 11 Sep 2009 18:35:52 GMT" }, { "version": "v2", "created": "Wed, 28 Apr 2010 16:49:01 GMT" }, { "version": "v3", "created": "Thu, 9 Sep 2010 06:56:44 GMT" } ]
2016-11-15T00:00:00
[ [ "Unnikrishnan", "Jayakrishnan", "" ], [ "Huang", "Dayu", "" ], [ "Meyn", "Sean", "" ], [ "Surana", "Amit", "" ], [ "Veeravalli", "Venugopal", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0909.2290
Tiancheng Li
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
Slicing: A New Approach to Privacy Preserving Data Publishing
null
null
null
null
cs.DB cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that generalization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi-identifying attributes and sensitive attributes. In this paper, we present a novel technique called slicing, which partitions the data both horizontally and vertically. We show that slicing preserves better data utility than generalization and can be used for membership disclosure protection. Another important advantage of slicing is that it can handle high-dimensional data. We show how slicing can be used for attribute disclosure protection and develop an efficient algorithm for computing the sliced data that obey the l-diversity requirement. Our workload experiments confirm that slicing preserves better utility than generalization and is more effective than bucketization in workloads involving the sensitive attribute. Our experiments also demonstrate that slicing can be used to prevent membership disclosure.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 01:42:55 GMT" } ]
2009-09-15T00:00:00
[ [ "Li", "Tiancheng", "" ], [ "Li", "Ninghui", "" ], [ "Zhang", "Jian", "" ], [ "Molloy", "Ian", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2292
Wei E.I. Sha
Xiao Z. Wang and Wei E.I. Sha
Random Sampling Using Shannon Interpolation and Poisson Summation Formulae
This is a preprint version of research report, which may submit to some conference or journal
null
null
null
cs.IT cs.CE math.IT math.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This report mainly focused on the basic concepts and the recovery methods for the random sampling. The recovery methods involve the orthogonal matching pursuit algorithm and the gradient-based total variation strategy. In particular, a fast and efficient observation matrix filling technique was implemented by the classic Shannon interpolation and Poisson summation formulae. The numerical results for the trigonometric signal, the Gaussian-modulated sinusoidal pulse, and the square wave were demonstrated and discussed. The work may give some help for future work in theoretical study and practical implementation of the random sampling.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 01:43:44 GMT" }, { "version": "v2", "created": "Wed, 30 Sep 2009 14:51:47 GMT" }, { "version": "v3", "created": "Thu, 1 Oct 2009 09:43:29 GMT" } ]
2016-09-08T00:00:00
[ [ "Wang", "Xiao Z.", "" ], [ "Sha", "Wei E. I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" } ]
0909.2297
Andias Wira-Alam T
Andias Wira-Alam
Simulation of Resource Usage in Parallel Evolutionary Peptide Optimization using JavaSpaces Technology
null
null
null
null
cs.DC cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Peptide Optimization is a highly complex problem and it takes very long time of computation. This optimization process uses many software applications in a cluster running GNU/Linux Operating System that perform special tasks. The application to organize the whole optimization process had been already developed, namely SEPP (System for Evolutionary Pareto Optimization of Peptides/Polymers). A single peptide optimization takes a lot of computation time to produce a certain number of individuals. However, it can be accelerated by increasing the degree of parallelism as well as the number of nodes (processors) in the cluster. In this master thesis, I build a model simulating the interplay of the programs so that the usage of each resource (processor) can be determined and also the approximated time needed for the overall optimization process. There are two Evolutionary Algorithms that could be used in the optimization, namely Generation-based and Steady-state Evolutionary Algorithm. The results of each Evolutionary Algorithm are shown based on the simulations. Moreover, the results are also compared by using different parameters (the degree of parallelism and the number of processors) in the simulation to give an overview of the advantages and the disadvantages of the algorithms in terms of computation time and resource usage. The model is built up using JavaSpaces Technology.
[ { "version": "v1", "created": "Sun, 13 Sep 2009 12:36:22 GMT" } ]
2009-12-05T00:00:00
[ [ "Wira-Alam", "Andias", "" ] ]
[ { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.2309
Jun Tanaka
Jun Tanaka
Logic with Verbs
null
null
null
null
cs.AI cs.LO
http://creativecommons.org/licenses/by-nc-sa/3.0/
The aim of this paper is to introduce a logic in which nouns and verbs are handled together as a deductive reasoning, and also to observe the relationship between nouns and verbs as well as between logics and conversations.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 07:49:36 GMT" }, { "version": "v2", "created": "Sat, 17 Oct 2009 00:49:38 GMT" }, { "version": "v3", "created": "Mon, 14 Dec 2009 10:54:13 GMT" } ]
2010-06-01T00:00:00
[ [ "Tanaka", "Jun", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.2318
Jocelyne Troccaz
Gr\'egoire Chevreau, Jocelyne Troccaz (TIMC), Pierre Conort, Rapha\"elle Renard-Penna, Alain Mallet, Michel Daudon (CRISTAL), Pierre Mozer
Estimation of urinary stone composition by automated processing of CT images
null
Urological Research (2009) epub ahead of print
10.1007/s00240-009-0195-3
null
physics.med-ph cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The objective of this article was developing an automated tool for routine clinical practice to estimate urinary stone composition from CT images based on the density of all constituent voxels. A total of 118 stones for which the composition had been determined by infrared spectroscopy were placed in a helical CT scanner. A standard acquisition, low-dose and high-dose acquisitions were performed. All voxels constituting each stone were automatically selected. A dissimilarity index evaluating variations of density around each voxel was created in order to minimize partial volume effects: stone composition was established on the basis of voxel density of homogeneous zones. Stone composition was determined in 52% of cases. Sensitivities for each compound were: uric acid: 65%, struvite: 19%, cystine: 78%, carbapatite: 33.5%, calcium oxalate dihydrate: 57%, calcium oxalate monohydrate: 66.5%, brushite: 75%. Low-dose acquisition did not lower the performances (P < 0.05). This entirely automated approach eliminates manual intervention on the images by the radiologist while providing identical performances including for low-dose protocols.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 09:57:08 GMT" } ]
2009-09-15T00:00:00
[ [ "Chevreau", "Grégoire", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ], [ "Conort", "Pierre", "", "CRISTAL" ], [ "Renard-Penna", "Raphaëlle", "", "CRISTAL" ], [ "Mallet", "Alain", "", "CRISTAL" ], [ "Daudon", "Michel", "", "CRISTAL" ], [ "Mozer", "Pierre", "" ] ]
[ { "class": "Physics", "code": "physics.med-ph", "description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.", "span": "(Medical Physics)" }, { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.2331
Jerome Kelleher
Jerome Kelleher and Barry O'Sullivan
Generating All Partitions: A Comparison Of Two Encodings
40 pages, 2 figures. Derived from J. Kelleher's Ph.D thesis, Encoding Partitions as Ascending Compositions, University College Cork, 2006. V2: corrected typos in RuleDesc algorithm
null
null
null
cs.DS cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Integer partitions may be encoded as either ascending or descending compositions for the purposes of systematic generation. Many algorithms exist to generate all descending compositions, yet none have previously been published to generate all ascending compositions. We develop three new algorithms to generate all ascending compositions and compare these with descending composition generators from the literature. We analyse the new algorithms and provide new and more precise analyses for the descending composition generators. In each case, the ascending composition generation algorithm is substantially more efficient than its descending composition counterpart. We develop a new formula for the partition function p(n) as part of our analysis of the lexicographic succession rule for ascending compositions.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 13:29:56 GMT" }, { "version": "v2", "created": "Fri, 2 May 2014 09:02:35 GMT" } ]
2014-05-05T00:00:00
[ [ "Kelleher", "Jerome", "" ], [ "O'Sullivan", "Barry", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0909.2336
Hamed Owladeghaffari O.Ghaffari
Hamed .O.Ghaffari
Two-Phase Flow in Heterogeneous Media
This paper has been withdrawn by the author due to repetition of some parts in other publications
null
null
null
cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this study, we investigate the appeared complexity of two-phase flow (air-water) in a heterogeneous soil where the supposed porous media is non-deformable media which is under the time-dependent gas pressure. After obtaining of governing equations and considering the capillary pressure-saturation and permeability functions, the evolution of the models unknown parameters were obtained. In this way, using COMSOL (FEMLAB) and fluid flow-script Module, the role of heterogeneity in intrinsic permeability was analysed. Also, the evolution of relative permeability of wetting and non-wetting fluid, capillary pressure and other parameters were elicited.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 13:51:59 GMT" }, { "version": "v2", "created": "Wed, 19 May 2010 13:37:06 GMT" } ]
2010-05-20T00:00:00
[ [ "Ghaffari", "Hamed . O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0909.2339
\^Hamed \"Owladeghaffari O.Ghaffari
H. Owladeghaffari, H. Aghababaei
Back analysis based on SOM-RST system
10th. International Symposium on Landslides and Engineering and. Engineered Slopes, Xi'an, China
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper describes application of information granulation theory, on the back analysis of Jeffrey mine southeast wall Quebec. In this manner, using a combining of Self Organizing Map (SOM) and rough set theory (RST), crisp and rough granules are obtained. Balancing of crisp granules and sub rough granules is rendered in close-open iteration. Combining of hard and soft computing, namely finite difference method (FDM) and computational intelligence and taking in to account missing information are two main benefits of the proposed method. As a practical example, reverse analysis on the failure of the southeast wall Jeffrey mine is accomplished.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 14:03:04 GMT" } ]
2009-09-15T00:00:00
[ [ "Owladeghaffari", "H.", "" ], [ "Aghababaei", "H.", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.2345
Andri Mirzal M.Sc.
Andri Mirzal
Weblog Clustering in Multilinear Algebra Perspective
16 pages, 7 figures
International Journal of Information Technology, Vol. 15 No. 1, 2009
null
null
cs.IR
http://creativecommons.org/licenses/by-nc-sa/3.0/
This paper describes a clustering method to group the most similar and important weblogs with their descriptive shared words by using a technique from multilinear algebra known as PARAFAC tensor decomposition. The proposed method first creates labeled-link network representation of the weblog datasets, where the nodes are the blogs and the labels are the shared words. Then, 3-way adjacency tensor is extracted from the network and the PARAFAC decomposition is applied to the tensor to get pairs of node lists and label lists with scores attached to each list as the indication of the degree of importance. The clustering is done by sorting the lists in decreasing order and taking the pairs of top ranked blogs and words. Thus, unlike standard co-clustering methods, this method not only groups the similar blogs with their descriptive words but also tends to produce clusters of important blogs and descriptive words.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 15:53:33 GMT" } ]
2009-09-15T00:00:00
[ [ "Mirzal", "Andri", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.2358
Lenka Zdeborova
Lenka Zdeborov\'a, Scott Backhaus, Michael Chertkov
Message Passing for Integrating and Assessing Renewable Generation in a Redundant Power Grid
10 pages, accepted for HICSS-43
43rd Hawaii International Conference on System Sciences (HICSS), 1-10 (2010)
10.1109/HICSS.2010.272
null
physics.soc-ph cond-mat.stat-mech cs.CE physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simplified model of a redundant power grid is used to study integration of fluctuating renewable generation. The grid consists of large number of generator and consumer nodes. The net power consumption is determined by the difference between the gross consumption and the level of renewable generation. The gross consumption is drawn from a narrow distribution representing the predictability of aggregated loads, and we consider two different distributions representing wind and solar resources. Each generator is connected to D consumers, and redundancy is built in by connecting R of these consumers to other generators. The lines are switchable so that at any instance each consumer is connected to a single generator. We explore the capacity of the renewable generation by determining the level of "firm" generation capacity that can be displaced for different levels of redundancy R. We also develop message-passing control algorithm for finding switch settings where no generator is overloaded.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 19:42:03 GMT" } ]
2023-10-06T00:00:00
[ [ "Zdeborová", "Lenka", "" ], [ "Backhaus", "Scott", "" ], [ "Chertkov", "Michael", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0909.2363
Nevin Vunka Jungum
Md. Rabiul Islam and Md. Fayzur Rahman
Improvement of Text Dependent Speaker Identification System Using Neuro-Genetic Hybrid Algorithm in Office Environmental Conditions
International Journal of Computer Science Issues (IJCSI), Volume 1, pp42-48, August 2009
R. Islam and F. Rahman," International Journal of Computer Science Issues (IJCSI), Volume 1, pp42-48,August 2009"
null
null
cs.SD
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, an improved strategy for automated text dependent speaker identification system has been proposed in noisy environment. The identification process incorporates the Neuro- Genetic hybrid algorithm with cepstral based features. To remove the background noise from the source utterance, wiener filter has been used. Different speech pre-processing techniques such as start-end point detection algorithm, pre-emphasis filtering, frame blocking and windowing have been used to process the speech utterances. RCC, MFCC, MFCC, MFCC, LPC and LPCC have been used to extract the features. After feature extraction of the speech, Neuro-Genetic hybrid algorithm has been used in the learning and identification purposes. Features are extracted by using different techniques to optimize the performance of the identification. According to the VALID speech database, the highest speaker identification rate of 100.000 percent for studio environment and 82.33 percent for office environmental conditions have been achieved in the close set text dependent speaker identification system.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 20:36:35 GMT" } ]
2009-09-15T00:00:00
[ [ "Islam", "Md. Rabiul", "" ], [ "Rahman", "Md. Fayzur", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" } ]
0909.2365
Nevin Vunka Jungum
Markus Schatten, Miroslav Baca and Mirko Cubrilo
Towards a General Definition of Biometric Systems
International Journal of Computer Science Issues (IJCSI), Volume 1, pp1-7, August 2009
M. Schatten, M. Baca and M. Cubrilo, " Towards a General Definition of Biometric Systems", International Journal of Computer Science Issues (IJCSI), Volume 1, pp1-7, August 2009
null
null
cs.OH q-bio.QM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A foundation for closing the gap between biometrics in the narrower and the broader perspective is presented trough a conceptualization of biometric systems in both perspectives. A clear distinction between verification, identification and classification systems is made as well as shown that there are additional classes of biometric systems. In the end a Unified Modeling Language model is developed showing the connections between the two perspectives.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 20:52:25 GMT" } ]
2009-09-15T00:00:00
[ [ "Schatten", "Markus", "" ], [ "Baca", "Miroslav", "" ], [ "Cubrilo", "Mirko", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" }, { "class": "Quantitative Biology", "code": "q-bio.QM", "description": "All experimental, numerical, statistical and mathematical contributions of value to biology", "span": "(Quantitative Methods)" } ]
0909.2366
Nevin Vunka Jungum
Maisa Halloush and Mai Sharif
Global Heuristic Search on Encrypted Data (GHSED)
International Journal of Computer Science Issues (IJCSI), Volume 1, pp13-17, August 2009
M. Halloush and M. Sharif,"Global Heuristic Search on Encrypted Data (GHSED) ", International Journal of Computer Science Issues (IJCSI), Volume 1, pp13-17, August 2009
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Important document are being kept encrypted in remote servers. In order to retrieve these encrypted data, efficient search methods needed to enable the retrieval of the document without knowing the content of the documents In this paper a technique called a global heuristic search on encrypted data (GHSED) technique will be described for search in an encrypted files using public key encryption stored on an untrusted server and retrieve the files that satisfy a certain search pattern without revealing any information about the original files. GHSED technique would satisfy the following: (1) Provably secure, the untrusted server cannot learn anything about the plaintext given only the cipher text. (2) Provide controlled searching, so that the untrusted server cannot search for a word without the user's authorization. (3) Support hidden queries, so that the user may ask the untrusted server to search for a secret word without revealing the word to the server. (4) Support query isolation, so the untrusted server learns nothing more than the search result about the plaintext.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 20:55:35 GMT" } ]
2009-09-15T00:00:00
[ [ "Halloush", "Maisa", "" ], [ "Sharif", "Mai", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2367
Nevin Vunka Jungum
M Atif Qureshi, Arjumand Younus and Arslan Ahmed Khan
Philosophical Survey of Passwords
International Journal of Computer Science Issues (IJCSI), Volume 1, pp8-12, August 2009
M . Qureshi, A.Younus and A. A. Khan,"Philosophical Survey of Passwords", International Journal of Computer Science Issues (IJCSI), Volume 1, pp8-12, August 2009
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Over the years security experts in the field of Information Technology have had a tough time in making passwords secure. This paper studies and takes a careful look at this issue from the angle of philosophy and cognitive science. We have studied the process of passwords to rank its strengths and weaknesses in order to establish a quality metric for passwords. Finally we related the process to human senses which enables us to propose a constitutional scheme for the process of password. The basic proposition is to exploit relationship between human senses and password to ensure improvement in authentication while keeping it an enjoyable activity.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 20:59:09 GMT" } ]
2009-09-15T00:00:00
[ [ "Qureshi", "M Atif", "" ], [ "Younus", "Arjumand", "" ], [ "Khan", "Arslan Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2368
Nevin Vunka Jungum
Kelly D. Lewis andjames E. Lewis
Web Single Sign-On Authentication using SAML
International Journal of Computer Science Issues (IJCSI), Volume 1, pp41-48, August 2009
K. D. LEWIS andJ. E. LEWIS, " Web Single Sign-On Authentication using SAML", International Journal of Computer Science Issues (IJCSI), Volume 1, pp41-48, August 2009
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Companies have increasingly turned to application service providers (ASPs) or Software as a Service (SaaS) vendors to offer specialized web-based services that will cut costs and provide specific and focused applications to users. The complexity of designing, installing, configuring, deploying, and supporting the system with internal resources can be eliminated with this type of methodology, providing great benefit to organizations. However, these models can present an authentication problem for corporations with a large number of external service providers. This paper describes the implementation of Security Assertion Markup Language (SAML) and its capabilities to provide secure single sign-on (SSO) solutions for externally hosted applications.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 21:01:57 GMT" } ]
2012-08-27T00:00:00
[ [ "Lewis", "Kelly D. Lewis andjames E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2369
Nevin Vunka Jungum
Zine El Abidine Alaoui Ismaili and Ahmed Moussa
Self-Partial and Dynamic Reconfiguration Implementation for AES using FPGA
International Journal of Computer Science Issues (IJCSI), Volume 1, pp33-40, August 2009
Z. El. ALAOUI ISMAILI and A. MOUSSA, " Self-Partial and Dynamic Reconfiguration Implementation for AES using FPGA", International Journal of Computer Science Issues (IJCSI), Volume 1, pp33-40, August 2009
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses efficient hardware/software implementation approaches for the AES (Advanced Encryption Standard) algorithm and describes the design and performance testing algorithm for embedded system. Also, with the spread of reconfigurable hardware such as FPGAs (Field Programmable Gate Array) embedded cryptographic hardware became cost-effective. Nevertheless, it is worthy to note that nowadays, even hardwired cryptographic algorithms are not so safe. From another side, the self-reconfiguring platform is reported that enables an FPGA to dynamically reconfigure itself under the control of an embedded microprocessor. Hardware acceleration significantly increases the performance of embedded systems built on programmable logic. Allowing a FPGA-based MicroBlaze processor to self-select the coprocessors uses can help reduce area requirements and increase a system's versatility. The architecture proposed in this paper is an optimal hardware implementation algorithm and takes dynamic partially reconfigurable of FPGA. This implementation is good solution to preserve confidentiality and accessibility to the information in the numeric communication.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 21:04:49 GMT" } ]
2009-09-15T00:00:00
[ [ "Ismaili", "Zine El Abidine Alaoui", "" ], [ "Moussa", "Ahmed", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2370
Nevin Vunka Jungum
Jacques Saraydaryan, Fatiha Benali and Stephane Ubeda
Comprehensive Security Framework for Global Threads Analysis
International Journal of Computer Science Issues (IJCSI), Volume 1, pp18-32, August 2009
J. SARAYDARYAN, F.BENALI and S. UBEDA, "Comprehensive Security Framework for Global Threads Analysis ", International Journal of Computer Science Issues (IJCSI), Volume 1, pp18-32, August 2009
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cyber criminality activities are changing and becoming more and more professional. With the growth of financial flows through the Internet and the Information System (IS), new kinds of thread arise involving complex scenarios spread within multiple IS components. The IS information modeling and Behavioral Analysis are becoming new solutions to normalize the IS information and counter these new threads. This paper presents a framework which details the principal and necessary steps for monitoring an IS. We present the architecture of the framework, i.e. an ontology of activities carried out within an IS to model security information and User Behavioral analysis. The results of the performed experiments on real data show that the modeling is effective to reduce the amount of events by 91%. The User Behavioral Analysis on uniform modeled data is also effective, detecting more than 80% of legitimate actions of attack scenarios.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 21:07:19 GMT" } ]
2009-09-15T00:00:00
[ [ "Saraydaryan", "Jacques", "" ], [ "Benali", "Fatiha", "" ], [ "Ubeda", "Stephane", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2371
Nevin Vunka Jungum
Payal N. Raj and Prashant B. Swadas
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet
International Journal of Computer Science Issues (IJCSI), Volume 1, pp54-59, August 2009
P. N. Raj and P. B. Swadas, "DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET", International Journal of Computer Science Issues (IJCSI), Volume 1, pp54-59, August 2009
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a multifence security solution that achieves both broad protection and desirable network performance. MANETs are vulnerable to various attacks, blackhole, is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply. By doing this, the malicious node can deprive the traffic from the source node. It can be used as a denial-of-service attack where it can drop the packets later. In this paper, we proposed a DPRAODV (Detection, Prevention and Reactive AODV) to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently improves the overall performance of (normal) AODV in presence of black hole attack.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 21:10:41 GMT" } ]
2009-09-15T00:00:00
[ [ "Raj", "Payal N.", "" ], [ "Swadas", "Prashant B.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.2373
Nevin Vunka Jungum
M. Nageshkumar, P.K. Mahesh and M.N.S. Swamy
An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image
International Journal of Computer Science Issues (IJCSI), Volume 1, pp49-53, August 2009
M.Nageshkumar,P.K.Mahesh and M.N.S.Swamy, "An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image", International Journal of Computer Science Issues (IJCSI), Volume 1, pp49-53, August 2009
null
null
cs.CV cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Biometrics based personal identification is regarded as an effective method for automatically recognizing, with a high confidence a person's identity. A multimodal biometric systems consolidate the evidence presented by multiple biometric sources and typically better recognition performance compare to system based on a single biometric modality. This paper proposes an authentication method for a multimodal biometric system identification using two traits i.e. face and palmprint. The proposed system is designed for application where the training data contains a face and palmprint. Integrating the palmprint and face features increases robustness of the person authentication. The final decision is made by fusion at matching score level architecture in which features vectors are created independently for query measures and are then compared to the enrolment template, which are stored during database preparation. Multimodal biometric system is developed through fusion of face and palmprint recognition.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 21:31:22 GMT" } ]
2009-09-15T00:00:00
[ [ "Nageshkumar", "M.", "" ], [ "Mahesh", "P. K.", "" ], [ "Swamy", "M. N. S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2375
Nevin Vunka Jungum
Mashud Kabir
Similarity Matching Techniques for Fault Diagnosis in Automotive Infotainment Electronics
International Journal of Computer Science Issues(IJCSI), Volume 3, pp14-19, August 2009
M. Kabir, " SIMILARITY MATCHING TECHNIQUES FOR FAULT DIAGNOSIS IN AUTOMOTIVE INFOTAINMENT ELECTRONICS", International Journal of Computer Science Issues(IJCSI), Volume 3, pp14-19, August 2009
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fault diagnosis has become a very important area of research during the last decade due to the advancement of mechanical and electrical systems in industries. The automobile is a crucial field where fault diagnosis is given a special attention. Due to the increasing complexity and newly added features in vehicles, a comprehensive study has to be performed in order to achieve an appropriate diagnosis model. A diagnosis system is capable of identifying the faults of a system by investigating the observable effects (or symptoms). The system categorizes the fault into a diagnosis class and identifies a probable cause based on the supplied fault symptoms. Fault categorization and identification are done using similarity matching techniques. The development of diagnosis classes is done by making use of previous experience, knowledge or information within an application area. The necessary information used may come from several sources of knowledge, such as from system analysis. In this paper similarity matching techniques for fault diagnosis in automotive infotainment applications are discussed.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 22:06:05 GMT" } ]
2009-09-15T00:00:00
[ [ "Kabir", "Mashud", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.2376
Nevin Vunka Jungum
Alexis Lazanas
Performing Hybrid Recommendation in Intermodal Transportation-the FTMarket System's Recommendation Module
International Journal of Computer Science Issues (IJCSI), Volume 3, pp24-34, August 2009
A. Lazanas"Performing Hybrid Recommendation in Intermodal Transportation-the FTMarket System's Recommendation Module ",International Journal of Computer Science Issues (IJCSI), Volume 3, pp24-34, August 2009
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Diverse recommendation techniques have been already proposed and encapsulated into several e-business applications, aiming to perform a more accurate evaluation of the existing information and accordingly augment the assistance provided to the users involved. This paper reports on the development and integration of a recommendation module in an agent-based transportation transactions management system. The module is built according to a novel hybrid recommendation technique, which combines the advantages of collaborative filtering and knowledge-based approaches. The proposed technique and supporting module assist customers in considering in detail alternative transportation transactions that satisfy their requests, as well as in evaluating completed transactions. The related services are invoked through a software agent that constructs the appropriate knowledge rules and performs a synthesis of the recommendation policy.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 22:21:12 GMT" } ]
2009-09-15T00:00:00
[ [ "Lazanas", "Alexis", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.2377
Nevin Vunka Jungum
Soumaya Zirari, Philippe Canalda and Francois Spies
Geometric and Signal Strength Dilution of Precision (DoP)Wi-Fi
International Journal of Computer Science Issues (IJCSI), Volume 3, pp35-44, August 2009
S.Zirari,P. Canalda and F.Spies, " Geometric and Signal Strength Dilution of Precision (DoP)Wi-Fi", International Journal of Computer Science Issues (IJCSI), Volume 3, pp35-44, August 2009
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The democratization of wireless networks combined to the emergence of mobile devices increasingly autonomous and efficient lead to new services. Positioning services become overcrowded. Accuracy is the main quality criteria in positioning. But to better appreciate this one a coefficient is needed. In this paper we present Geometric and Signal Strength Dilution of Precision (DOP) for positioning systems based on Wi-Fi and Signal Strength measurements.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 22:24:52 GMT" } ]
2009-09-15T00:00:00
[ [ "Zirari", "Soumaya", "" ], [ "Canalda", "Philippe", "" ], [ "Spies", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.2379
Nevin Vunka Jungum
Priyanka Gupta and Vishal Goyal
Implementation of Rule Based Algorithm for Sandhi-Vicheda Of Compound Hindi Words
International Journal of Computer Science Issues (IJCSI), Volume 3, pp45-49, August 2009
P.Gupta and V.Goyal, " Implementation of Rule Based Algorithm for Sandhi-Vicheda Of Compound Hindi Words", International Journal of Computer Science Issues (IJCSI), Volume 3, pp45-49, August 2009
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Sandhi means to join two or more words to coin new word. Sandhi literally means `putting together' or combining (of sounds), It denotes all combinatory sound-changes effected (spontaneously) for ease of pronunciation. Sandhi-vicheda describes [5] the process by which one letter (whether single or cojoined) is broken to form two words. Part of the broken letter remains as the last letter of the first word and part of the letter forms the first letter of the next letter. Sandhi- Vicheda is an easy and interesting way that can give entirely new dimension that add new way to traditional approach to Hindi Teaching. In this paper using the Rule based algorithm we have reported an accuracy of 60-80% depending upon the number of rules to be implemented.
[ { "version": "v1", "created": "Sat, 12 Sep 2009 22:27:57 GMT" } ]
2009-09-15T00:00:00
[ [ "Gupta", "Priyanka", "" ], [ "Goyal", "Vishal", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.2408
Paul Cuff
Paul Cuff (Princeton University), Haim Permuter (Ben-Gurion University) and Thomas Cover (Stanford University)
Coordination Capacity
Accepted to IEEE Trans. on Info. Theory, 25 pages, 23 eps figure, uses IEEEtran.cls
IEEE Trans. on Info. Theory, vol.56, no.9, pp.4181-4206, Sept. 2010
10.1109/TIT.2010.2054651
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop elements of a theory of cooperation and coordination in networks. Rather than considering a communication network as a means of distributing information, or of reconstructing random processes at remote nodes, we ask what dependence can be established among the nodes given the communication constraints. Specifically, in a network with communication rates {R_{i,j}} between the nodes, we ask what is the set of all achievable joint distributions p(x1, ..., xm) of actions at the nodes of the network. Several networks are solved, including arbitrarily large cascade networks. Distributed cooperation can be the solution to many problems such as distributed games, distributed control, and establishing mutual information bounds on the influence of one part of a physical system on another.
[ { "version": "v1", "created": "Sun, 13 Sep 2009 09:13:36 GMT" }, { "version": "v2", "created": "Wed, 26 May 2010 04:31:25 GMT" } ]
2011-04-04T00:00:00
[ [ "Cuff", "Paul", "", "Princeton University" ], [ "Permuter", "Haim", "", "Ben-Gurion\n University" ], [ "Cover", "Thomas", "", "Stanford University" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2450
Tamara Broderick
Tamara Broderick and David John Cameron MacKay
Fast and flexible selection with a single switch
14 pages, 5 figures, 1 table, presented at NIPS 2009 Mini-symposia
PLoS ONE 4(10): e7481, 2009
10.1371/journal.pone.0007481
null
cs.HC
http://creativecommons.org/licenses/by/3.0/
Selection methods that require only a single-switch input, such as a button click or blink, are potentially useful for individuals with motor impairments, mobile technology users, and individuals wishing to transmit information securely. We present a single-switch selection method, "Nomon," that is general and efficient. Existing single-switch selection methods require selectable options to be arranged in ways that limit potential applications. By contrast, traditional operating systems, web browsers, and free-form applications (such as drawing) place options at arbitrary points on the screen. Nomon, however, has the flexibility to select any point on a screen. Nomon adapts automatically to an individual's clicking ability; it allows a person who clicks precisely to make a selection quickly and allows a person who clicks imprecisely more time to make a selection without error. Nomon reaps gains in information rate by allowing the specification of beliefs (priors) about option selection probabilities and by avoiding tree-based selection schemes in favor of direct (posterior) inference. We have developed both a Nomon-based writing application and a drawing application. To evaluate Nomon's performance, we compared the writing application with a popular existing method for single-switch writing (row-column scanning). Novice users wrote 35% faster with the Nomon interface than with the scanning interface. An experienced user (author TB, with > 10 hours practice) wrote at speeds of 9.3 words per minute with Nomon, using 1.2 clicks per character and making no errors in the final text.
[ { "version": "v1", "created": "Sun, 13 Sep 2009 21:39:55 GMT" }, { "version": "v2", "created": "Wed, 20 Jan 2010 16:59:54 GMT" } ]
2010-01-20T00:00:00
[ [ "Broderick", "Tamara", "" ], [ "MacKay", "David John Cameron", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.2452
Grenville Croll
Susan Allan
Excel Modelling - Transparency, Auditing and Business Use
7 Pages, 6 Colour Figures
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 9-16 ISBN 978-1-905617-89-0
null
null
cs.SE cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Within Lloyds Banking Group the heritage HBOS Corporate division deals with Corporate loans, and is required to assess these loans for risk in accordance with the Basle Accord regulations. Statistical Risk Rating models are developed by the risk analysts to assess the obligors credit worthiness. It is necessary then to provide the bankers who originated the loan ('Relationship Managers' or RMs) with an assessment tool to generate the loan rating upon which they base their lending decisions. Heritage HBoS Corporate required a new model build system for holding its Risk Rating models in 2006 as a result of more complex models being created to comply with the Basle Accord. The use of Excel was promoted by the IT department for a number of reasons; the Excel solution now in use is reviewed in this paper.
[ { "version": "v1", "created": "Sun, 13 Sep 2009 22:36:08 GMT" } ]
2009-09-15T00:00:00
[ [ "Allan", "Susan", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.2455
Grenville Croll
Andrew McGeady, Joseph McGouran
End User Computing in AIB Capital Markets: A Management Summary
7 Pages. Referenced & submitted by GJC in Sept 2009
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 25-31 ISBN 978-905617-69-2
null
null
cs.HC cs.CY
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper is a management summary of how the area of End User Computing (EUC) has been addressed by AIB Capital Markets. The development of an effective policy is described, as well as the process by which a register of critical EUC applications was assembled and how those applications were brought into a controlled environment. A number of findings are included as well as recommendations for others who would seek to run a similar project.
[ { "version": "v1", "created": "Sun, 13 Sep 2009 23:51:59 GMT" } ]
2009-09-15T00:00:00
[ [ "McGeady", "Andrew", "" ], [ "McGouran", "Joseph", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" } ]
0909.2476
Jocelyne Troccaz
Nikolai Hungr (TIMC), Jocelyne Troccaz (TIMC), Nabil Zemiti (TIMC), Nathanael Tripodi (TIMC)
Design of an ultrasound-guided robotic brachytherapy needle insertion system
null
31th International Conference of the Engineering in Medicine and Biology Society, Minneapolis : France (2009)
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe a new robotic brachytherapy needle-insertion system that is designed to replace the template used in the manual technique. After a brief review of existing robotic systems, we describe the requirements that we based our design upon. A detailed description of the proposed system follows. Our design is capable of positioning and inclining a needle within the same workspace as the manual template. To help improve accuracy, the needle can be rotated about its axis during insertion into the prostate. The system can be mounted on existing steppers and also easily accommodates existing seed dispensers, such as the Mick Applicator.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 06:39:27 GMT" } ]
2009-09-15T00:00:00
[ [ "Hungr", "Nikolai", "", "TIMC" ], [ "Troccaz", "Jocelyne", "", "TIMC" ], [ "Zemiti", "Nabil", "", "TIMC" ], [ "Tripodi", "Nathanael", "", "TIMC" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]