id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0909.1623
|
Sudarshan Shinde
|
Sudarshan Shinde
|
Two channel paraunitary filter banks based on linear canonical transform
|
10 pages, IEEE format
| null |
10.1109/TSP.2010.2089681
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper a two channel paraunitary filter bank is proposed, which is
based on linear canonical transform, instead of discrete Fourier transform.
Input-output relation for such a filter bank are derived in terms of polyphase
matrices and modulation matrices. It is shown that like conventional filter
banks, the LCT based paraunitary filter banks need only one filter to be
designed and rest of the filters can be obtained from it. It is also shown that
LCT based paraunitary filter banks can be designed by using conventional
power-symmetric filter design in Fourier domain.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 06:57:41 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Shinde",
"Sudarshan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1626
|
Massimiliano Sala Dr.
|
Eleonora Guerrini, Emmanuela Orsini, Massimiliano Sala
|
Computing the distance distribution of systematic non-linear codes
| null |
Journal of Algebra and its Applications, 2010, vol. 9, p. 241-256
| null | null |
cs.DM cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The most important families of non-linear codes are systematic. A brute-force
check is the only known method to compute their weight distribution and
distance distribution. On the other hand, it outputs also all closest word
pairs in the code. In the black-box complexity model, the check is optimal
among closest-pair algorithms. In this paper we provide a Groebner basis
technique to compute the weight/distance distribution of any systematic
non-linear code. Also our technique outputs all closest pairs. Unlike the
check, our method can be extended to work on code families.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 05:47:23 GMT"
}
] | 2016-04-01T00:00:00 |
[
[
"Guerrini",
"Eleonora",
""
],
[
"Orsini",
"Emmanuela",
""
],
[
"Sala",
"Massimiliano",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1638
|
Krishnan Prasad
|
K. Prasad and B. Sundar Rajan
|
Single-generation Network Coding for Networks with Delay
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A single-source network is said to be \textit{memory-free} if all of the
internal nodes (those except the source and the sinks) do not employ memory but
merely send linear combinations of the incoming symbols (received at their
incoming edges) on their outgoing edges. Memory-free networks with delay using
network coding are forced to do inter-generation network coding, as a result of
which the problem of some or all sinks requiring a large amount of memory for
decoding is faced. In this work, we address this problem by utilizing memory
elements at the internal nodes of the network also, which results in the
reduction of the number of memory elements used at the sinks. We give an
algorithm which employs memory at the nodes to achieve single-generation
network coding. For fixed latency, our algorithm reduces the total number of
memory elements used in the network to achieve single-generation network
coding. We also discuss the advantages of employing single-generation network
coding together with convolutional network-error correction codes (CNECCs) for
networks with unit-delay and illustrate the performance gain of CNECCs by using
memory at the intermediate nodes using simulations on an example network under
a probabilistic network error model.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 07:09:21 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Prasad",
"K.",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1639
|
Bela Genge
|
Genge Bela and Haller Piroska
|
Extending WS-Security to Implement Security Protocols for Web Services
| null |
Acta Universitatis Sapientiae - Electrical and Mechanical
Engineering, Vol. 1, pp. 105-112, 2009 (ISSN 2065-5916)
| null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web services use tokens provided by the WS-Security standard to implement
security protocols. We propose several extensions to the WS-Security standard,
including name types, key and random number extensions. The extensions are used
to implement existing protocols such as ISO9798, Kerberos or BAN-Lowe. The
advantages of using these implementations rather than the existing, binary
ones, are inherited from the advantages of using Web service technologies, such
as extensibility and end-to-end security across multiple environments that do
not support a connection-based communication.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 07:17:01 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Bela",
"Genge",
""
],
[
"Piroska",
"Haller",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1640
|
Bela Genge
|
Magyari Attila, Genge Bela and Haller Piroska
|
Certificate-based Single Sign-On Mechanism for Multi-Platform
Distributed Systems
| null |
Acta Universitatis Sapientiae - Electrical and Mechanical
Engineering, Vol. 1, pp. 113-123, 2009 (ISSN 2065-5916)
| null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a certificate-based single sign-on mechanism in distributed
systems. The proposed security protocols and authentication mechanisms are
integrated in a middleware. The novelty of our middleware lies on the use of
XPCOM components, this way we provide a different services that can be used on
every platform where Mozilla is available. The componen based architecture of
the implemented services allows using the authentication components separately.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 07:20:05 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Attila",
"Magyari",
""
],
[
"Bela",
"Genge",
""
],
[
"Piroska",
"Haller",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1645
|
Krishnendu Chatterjee
|
Krishnendu Chatterjee, Laurent Doyen and Thomas A. Henzinger
|
Qualitative Analysis of Partially-observable Markov Decision Processes
| null | null |
10.1007/978-3-642-15155-2_24
| null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study observation-based strategies for partially-observable Markov
decision processes (POMDPs) with omega-regular objectives. An observation-based
strategy relies on partial information about the history of a play, namely, on
the past sequence of observations. We consider the qualitative analysis
problem: given a POMDP with an omega-regular objective, whether there is an
observation-based strategy to achieve the objective with probability~1
(almost-sure winning), or with positive probability (positive winning). Our
main results are twofold. First, we present a complete picture of the
computational complexity of the qualitative analysis of POMDP s with parity
objectives (a canonical form to express omega-regular objectives) and its
subclasses. Our contribution consists in establishing several upper and lower
bounds that were not known in literature. Second, we present optimal bounds
(matching upper and lower bounds) on the memory required by pure and randomized
observation-based strategies for the qualitative analysis of POMDP s with
parity objectives and its subclasses.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 07:47:28 GMT"
},
{
"version": "v2",
"created": "Mon, 25 Jan 2010 17:08:14 GMT"
},
{
"version": "v3",
"created": "Wed, 9 Jun 2010 19:19:02 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Chatterjee",
"Krishnendu",
""
],
[
"Doyen",
"Laurent",
""
],
[
"Henzinger",
"Thomas A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.1647
|
Krishnendu Chatterjee
|
Krishnendu Chatterjee, Laurent Doyen and Thomas A. Henzinger
|
Probabilistic Weighted Automata
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nondeterministic weighted automata are finite automata with numerical weights
on transitions. They define quantitative languages L that assign to each word w
a real number L(w). The value of an infinite word w is computed as the maximal
value of all runs over w, and the value of a run as the maximum, limsup,
liminf, limit average, or discounted sum of the transition weights. We
introduce probabilistic weighted automata, in which the transitions are chosen
in a randomized (rather than nondeterministic) fashion. Under almost-sure
semantics (resp. positive semantics), the value of a word w is the largest real
v such that the runs over w have value at least v with probability 1 (resp.
positive probability).
We study the classical questions of automata theory for probabilistic
weighted automata: emptiness and universality, expressiveness, and closure
under various operations on languages. For quantitative languages, emptiness
and universality are defined as whether the value of some (resp. every) word
exceeds a given threshold. We prove some of these questions to be decidable,
and others undecidable. Regarding expressive power, we show that probabilities
allow us to define a wide variety of new classes of quantitative languages,
except for discounted-sum automata, where probabilistic choice is no more
expressive than nondeterminism. Finally, we give an almost complete picture of
the closure of various classes of probabilistic weighted automata for the
following pointwise operations on quantitative languages: max, min, sum, and
numerical complement.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 08:12:39 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Chatterjee",
"Krishnendu",
""
],
[
"Doyen",
"Laurent",
""
],
[
"Henzinger",
"Thomas A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.1709
|
Ching-an Hsiao
|
Ching-an Hsiao
|
How does certainty enter into the mind?
|
7 pages, 1 figure, revised references
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
Any problem is concerned with the mind, but what do minds make a decision on?
Here we show that there are three conditions for the mind to make a certain
answer. We found that some difficulties in physics and mathematics are in fact
introduced by infinity, which can not be rightly expressed by minds. Based on
this point, we suggest a general observation system, where we use region (a
type of infinity) to substitute for infinitesimal (another type of infinity)
and thus get a consistent image with the mind. Furthermore, we declare that
without world pictures we can never have ideas to any expressive events, which
is the primary condition for a wave function like mind to collapse to a series
of numbers. A following observation by expanding algorithm brings the final
collapse: classifying the numbers and coming up with a certain yes or no
answer.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 13:51:38 GMT"
},
{
"version": "v2",
"created": "Tue, 23 Mar 2010 13:39:57 GMT"
}
] | 2010-03-24T00:00:00 |
[
[
"Hsiao",
"Ching-an",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.1713
|
Fabien Mathieu
|
Nidhi Hegde, Fabien Mathieu, Diego Perino (INRIA Rocquencourt)
|
Size Does Matter (in P2P Live Streaming)
| null | null | null |
RR-7032
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Optimal dissemination schemes have previously been studied for peer-to-peer
live streaming applications. Live streaming being a delay-sensitive
application, fine tuning of dissemination parameters is crucial. In this
report, we investigate optimal sizing of chunks, the units of data exchange,
and probe sets, the number peers a given node probes before transmitting
chunks. Chunk size can have significant impact on diffusion rate (chunk miss
ratio), diffusion delay, and overhead. The size of the probe set can also
affect these metrics, primarily through the choices available for chunk
dissemination. We perform extensive simulations on the so-called random-peer,
latest-useful dissemination scheme. Our results show that size does matter,
with the optimal size being not too small in both cases.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 14:22:55 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Hegde",
"Nidhi",
"",
"INRIA Rocquencourt"
],
[
"Mathieu",
"Fabien",
"",
"INRIA Rocquencourt"
],
[
"Perino",
"Diego",
"",
"INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1758
|
Nicolas Bruno
|
Nicolas Bruno (Microsoft)
|
Teaching an Old Elephant New Tricks
|
CIDR 2009
| null | null | null |
cs.DB cs.DS cs.PF
|
http://creativecommons.org/licenses/by/3.0/
|
In recent years, column stores (or C-stores for short) have emerged as a
novel approach to deal with read-mostly data warehousing applications.
Experimental evidence suggests that, for certain types of queries, the new
features of C-stores result in orders of magnitude improvement over traditional
relational engines. At the same time, some C-store proponents argue that
C-stores are fundamentally different from traditional engines, and therefore
their benefits cannot be incorporated into a relational engine short of a
complete rewrite. In this paper we challenge this claim and show that many of
the benefits of C-stores can indeed be simulated in traditional engines with no
changes whatsoever. We then identify some limitations of our ?pure-simulation?
approach for the case of more complex queries. Finally, we predict that
traditional relational engines will eventually leverage most of the benefits of
C-stores natively, as is currently happening in other domains such as XML data.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:00:21 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Bruno",
"Nicolas",
"",
"Microsoft"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.1759
|
Boon Thau Loo
|
William Marczak (University of Pennsylvania), David Zook (LogicBlox),
Wenchao Zhou (University of Pennsylvania), Molham Aref (LogicBlox), Boon Thau
Loo (U. Pennsylvania)
|
Declarative Reconfigurable Trust Management
|
CIDR 2009
| null | null | null |
cs.CR cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
In recent years, there has been a proliferation of declarative logic-based
trust management languages and systems proposed to ease the description,
configuration, and enforcement of security policies. These systems have
different tradeoffs in expressiveness and complexity, depending on the security
constructs (e.g. authentication, delegation, secrecy, etc.) that are supported,
and the assumed trust level and scale of the execution environment. In this
paper, we present LBTrust, a unified declarative system for reconfigurable
trust management, where various security constructs can be customized and
composed in a declarative fashion. We present an initial proof-of-concept
implementation of LBTrust using LogicBlox, an emerging commercial Datalog-based
platform for enterprise software systems. The LogicBlox language enhances
Datalog in a variety of ways, including constraints and meta-programming, as
well as support for programmer defined constraints which on the meta-model
itself ? meta-constraints ? which act to restrict the set of allowable
programs. LBTrust utilizes LogicBlox?s meta-programming and meta-constraints to
enable customizable cryptographic, partitioning and distribution strategies
based on the execution environment. We present uses cases of LBTrust based on
three trust management systems (Binder, D1LP, and Secure Network Datalog), and
provide a preliminary evaluation of a Binder-based trust management system.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:05:31 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Marczak",
"William",
"",
"University of Pennsylvania"
],
[
"Zook",
"David",
"",
"LogicBlox"
],
[
"Zhou",
"Wenchao",
"",
"University of Pennsylvania"
],
[
"Aref",
"Molham",
"",
"LogicBlox"
],
[
"Loo",
"Boon Thau",
"",
"U. Pennsylvania"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1760
|
Xiaodan Wang
|
Xiaodan Wang (Johns Hopkins University), Randal Burns (Johns Hopkins),
Tanu Malik (Purdue University)
|
LifeRaft: Data-Driven, Batch Processing for the Exploration of
Scientific Databases
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
Workloads that comb through vast amounts of data are gaining importance in
the sciences. These workloads consist of "needle in a haystack" queries that
are long running and data intensive so that query throughput limits
performance. To maximize throughput for data-intensive queries, we put forth
LifeRaft: a query processing system that batches queries with overlapping data
requirements. Rather than scheduling queries in arrival order, LifeRaft
executes queries concurrently against an ordering of the data that maximizes
data sharing among queries. This decreases I/O and increases cache utility.
However, such batch processing can increase query response time by starving
interactive workloads. LifeRaft addresses starvation using techniques inspired
by head scheduling in disk drives. Depending upon the workload saturation and
queuing times, the system adaptively and incrementally trades-off processing
queries in arrival order and data-driven batch processing. Evaluating LifeRaft
in the SkyQuery federation of astronomy databases reveals a two-fold
improvement in query throughput.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:05:37 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Wang",
"Xiaodan",
"",
"Johns Hopkins University"
],
[
"Burns",
"Randal",
"",
"Johns Hopkins"
],
[
"Malik",
"Tanu",
"",
"Purdue University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1763
|
Ragib Hasan
|
Ragib Hasan (University of Illinois), Radu Sion (Stony Brook
University), Marianne Winslett (University of Illinois)
|
Remembrance: The Unbearable Sentience of Being Digital
|
CIDR 2009
| null | null | null |
cs.DB cs.OS
|
http://creativecommons.org/licenses/by/3.0/
|
We introduce a world vision in which data is endowed with memory. In this
data-centric systems paradigm, data items can be enabled to retain all or some
of their previous values. We call this ability "remembrance" and posit that it
empowers significant leaps in the security, availability, and general
operational dimensions of systems. With the explosion in cheap, fast memories
and storage, large-scale remembrance will soon become practical. Here, we
introduce and explore the advantages of such a paradigm and the challenges in
making it a reality.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:06 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Hasan",
"Ragib",
"",
"University of Illinois"
],
[
"Sion",
"Radu",
"",
"Stony Brook\n University"
],
[
"Winslett",
"Marianne",
"",
"University of Illinois"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
}
] |
0909.1764
|
Uwe Roehm
|
Uwe Roehm (University of Sydney), Jose Blakeley (Microsoft)
|
Data Management for High-Throughput Genomics
|
CIDR 2009
| null | null | null |
cs.DB q-bio.GN
|
http://creativecommons.org/licenses/by/3.0/
|
Today's sequencing technology allows sequencing an individual genome within a
few weeks for a fraction of the costs of the original Human Genome project.
Genomics labs are faced with dozens of TB of data per week that have to be
automatically processed and made available to scientists for further analysis.
This paper explores the potential and the limitations of using relational
database systems as the data processing platform for high-throughput genomics.
In particular, we are interested in the storage management for high-throughput
sequence data and in leveraging SQL and user-defined functions for data
analysis inside a database system. We give an overview of a database design for
high-throughput genomics, how we used a SQL Server database in some
unconventional ways to prototype this scenario, and we will discuss some
initial findings about the scalability and performance of such a more
database-centric approach.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:17 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Roehm",
"Uwe",
"",
"University of Sydney"
],
[
"Blakeley",
"Jose",
"",
"Microsoft"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.GN",
"description": "DNA sequencing and assembly; gene and motif finding; RNA editing and alternative splicing; genomic structure and processes (replication, transcription, methylation, etc); mutational processes.",
"span": "(Genomics)"
}
] |
0909.1765
|
Arnab Nandi
|
Arnab Nandi (University of Michigan), H V Jagadish (University of
Michigan)
|
Qunits: queried units in database search
|
CIDR 2009
| null | null | null |
cs.DB cs.IR
|
http://creativecommons.org/licenses/by/3.0/
|
Keyword search against structured databases has become a popular topic of
investigation, since many users find structured queries too hard to express,
and enjoy the freedom of a ``Google-like'' query box into which search terms
can be entered. Attempts to address this problem face a fundamental dilemma.
Database querying is based on the logic of predicate evaluation, with a
precisely defined answer set for a given query. On the other hand, in an
information retrieval approach, ranked query results have long been accepted as
far superior to results based on boolean query evaluation. As a consequence,
when keyword queries are attempted against databases, relatively ad-hoc ranking
mechanisms are invented (if ranking is used at all), and there is little
leverage from the large body of IR literature regarding how to rank query
results.
Our proposal is to create a clear separation between ranking and database
querying. This divides the problem into two parts, and allows us to address
these separately. The first task is to represent the database, conceptually, as
a collection of independent ``queried units'', or ``qunits'', each of which
represents the desired result for some query against the database. The second
task is to evaluate keyword queries against a collection of qunits, which can
be treated as independent documents for query purposes, thereby permitting the
use of standard IR techniques. We provide insights that encourage the use of
this query paradigm, and discuss preliminary investigations into the efficacy
of a qunits-based framework based on a prototype implementation.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:23 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Nandi",
"Arnab",
"",
"University of Michigan"
],
[
"Jagadish",
"H V",
"",
"University of\n Michigan"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.1766
|
Yi Zhang
|
Yi Zhang (Duke University), Herodotos Herodotou, Jun Yang (Duke)
|
RIOT: I/O-Efficient Numerical Computing without SQL
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
R is a numerical computing environment that is widely popular for statistical
data analysis. Like many such environments, R performs poorly for large
datasets whose sizes exceed that of physical memory. We present our vision of
RIOT (R with I/O Transparency), a system that makes R programs I/O-efficient in
a way transparent to the users. We describe our experience with RIOT-DB, an
initial prototype that uses a relational database system as a backend. Despite
the overhead and inadequacy of generic database systems in handling array data
and numerical computation, RIOT-DB significantly outperforms R in many
large-data scenarios, thanks to a suite of high-level, inter-operation
optimizations that integrate seamlessly into R. While many techniques in RIOT
are inspired by databases (and, for RIOT-DB, realized by a database system),
RIOT users are insulated from anything database related. Compared with previous
approaches that require users to learn new languages and rewrite their programs
to interface with a database, RIOT will, we believe, be easier to adopt by the
majority of the R users.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:27 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Zhang",
"Yi",
"",
"Duke University"
],
[
"Herodotou",
"Herodotos",
"",
"Duke"
],
[
"Yang",
"Jun",
"",
"Duke"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1767
|
Jignesh Patel
|
Willis Lang (University of Wisconsin-Madiso), Jignesh Patel
(Wisconsin)
|
Towards Eco-friendly Database Management Systems
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
Database management systems (DBMSs) have largely ignored the task of managing
the energy consumed during query processing. Both economical and environmental
factors now require that DBMSs pay close attention to energy consumption. In
this paper we approach this issue by considering energy consumption as a
first-class performance goal for query processing in a DBMS. We present two
concrete techniques that can be used by a DBMS to directly manage the energy
consumption. Both techniques trade energy consumption for performance. The
first technique, called PVC, leverages the ability of modern processors to
execute at lower processor voltage and frequency. The second technique, called
QED, uses query aggregation to leverage common components of queries in a
workload. Using experiments run on a commercial DBMS and MySQL, we show that
PVC can reduce the processor energy consumption by 49% of the original
consumption while increasing the response time by only 3%. On MySQL, PVC can
reduce energy consumption by 20% with a response time penalty of only 6%. For
simple selection queries with no predicate overlap, we show that QED can be
used to gracefully trade response time for energy, reducing energy consumption
by 54% for a 43% increase in average response time. In this paper we also
highlight some research issues in the emerging area of energy-efficient data
processing.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:31 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Lang",
"Willis",
"",
"University of Wisconsin-Madiso"
],
[
"Patel",
"Jignesh",
"",
"Wisconsin"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1768
|
Alan Fekete
|
David Lomet (Microsoft Research), Alan Fekete (University of Sydney),
Gerhard Weikum (Max Plank Institute), Mike Zwilling (Microsoft SQL Server)
|
Unbundling Transaction Services in the Cloud
|
CIDR 2009
| null | null | null |
cs.DB cs.DC
|
http://creativecommons.org/licenses/by/3.0/
|
The traditional architecture for a DBMS engine has the recovery, concurrency
control and access method code tightly bound together in a storage engine for
records. We propose a different approach, where the storage engine is factored
into two layers (each of which might have multiple heterogeneous instances). A
Transactional Component (TC) works at a logical level only: it knows about
transactions and their "logical" concurrency control and undo/redo recovery,
but it does not know about page layout, B-trees etc. A Data Component (DC)
knows about the physical storage structure. It supports a record oriented
interface that provides atomic operations, but it does not know about
transactions. Providing atomic record operations may itself involve DC-local
concurrency control and recovery, which can be implemented using system
transactions. The interaction of the mechanisms in TC and DC leads to
multi-level redo (unlike the repeat history paradigm for redo in integrated
engines). This refactoring of the system architecture could allow easier
deployment of application-specific physical structures and may also be helpful
to exploit multi-core hardware. Particularly promising is its potential to
enable flexible transactions in cloud database deployments. We describe the
necessary principles for unbundled recovery, and discuss implementation issues.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:36 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Lomet",
"David",
"",
"Microsoft Research"
],
[
"Fekete",
"Alan",
"",
"University of Sydney"
],
[
"Weikum",
"Gerhard",
"",
"Max Plank Institute"
],
[
"Zwilling",
"Mike",
"",
"Microsoft SQL Server"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.1769
|
Zachary Ives
|
Zachary Ives (University Of Pennsylvania), Craig Knoblock (University
of Southern California - Information Sciences Institute), Steve Minton (Fetch
Technologies), Marie Jacob (University of Pennsylvania), Partha Talukdar
(University of Pennsylvania), Rattapoom Tuchinda (University of Southern
California - Information Sciences Institute), Jose Luis Ambite (University of
Southern California - Information Sciences Institute), Maria Muslea
(University of Southern California - Information Sciences Institute), Cenk
Gazen (Fetch Technologies)
|
Interactive Data Integration through Smart Copy & Paste
|
CIDR 2009
| null | null | null |
cs.DB cs.AI
|
http://creativecommons.org/licenses/by/3.0/
|
In many scenarios, such as emergency response or ad hoc collaboration, it is
critical to reduce the overhead in integrating data. Ideally, one could perform
the entire process interactively under one unified interface: defining
extractors and wrappers for sources, creating a mediated schema, and adding
schema mappings ? while seeing how these impact the integrated view of the
data, and refining the design accordingly.
We propose a novel smart copy and paste (SCP) model and architecture for
seamlessly combining the design-time and run-time aspects of data integration,
and we describe an initial prototype, the CopyCat system. In CopyCat, the user
does not need special tools for the different stages of integration: instead,
the system watches as the user copies data from applications (including the Web
browser) and pastes them into CopyCat?s spreadsheet-like workspace. CopyCat
generalizes these actions and presents proposed auto-completions, each with an
explanation in the form of provenance. The user provides feedback on these
suggestions ? through either direct interactions or further copy-and-paste
operations ? and the system learns from this feedback. This paper provides an
overview of our prototype system, and identifies key research challenges in
achieving SCP in its full generality.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:41 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Ives",
"Zachary",
"",
"University Of Pennsylvania"
],
[
"Knoblock",
"Craig",
"",
"University\n of Southern California - Information Sciences Institute"
],
[
"Minton",
"Steve",
"",
"Fetch\n Technologies"
],
[
"Jacob",
"Marie",
"",
"University of Pennsylvania"
],
[
"Talukdar",
"Partha",
"",
"University of Pennsylvania"
],
[
"Tuchinda",
"Rattapoom",
"",
"University of Southern\n California - Information Sciences Institute"
],
[
"Ambite",
"Jose Luis",
"",
"University of\n Southern California - Information Sciences Institute"
],
[
"Muslea",
"Maria",
"",
"University of Southern California - Information Sciences Institute"
],
[
"Gazen",
"Cenk",
"",
"Fetch Technologies"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.1770
|
Benjamin Sowell
|
Benjamin Sowell (Cornell University), Alan Demers (Cornell
University), Johannes Gehrke (Cornell University), Nitin Gupta (Cornell
University), Haoyuan Li (Cornell University), Walker White (Cornell
University)
|
From Declarative Languages to Declarative Processing in Computer Games
|
CIDR 2009
| null | null | null |
cs.DB cs.MA
|
http://creativecommons.org/licenses/by/3.0/
|
Recent work has shown that we can dramatically improve the performance of
computer games and simulations through declarative processing: Character AI can
be written in an imperative scripting language which is then compiled to
relational algebra and executed by a special games engine with features similar
to a main memory database system. In this paper we lay out a challenging
research agenda built on these ideas.
We discuss several research ideas for novel language features to support
atomic actions and reactive programming. We also explore challenges for
main-memory query processing in games and simulations including adaptive query
plan selection, support for parallel architectures, debugging simulation
scripts, and extensions for multi-player games and virtual worlds. We believe
that these research challenges will result in a dramatic change in the design
of game engines over the next decade.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:44 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Sowell",
"Benjamin",
"",
"Cornell University"
],
[
"Demers",
"Alan",
"",
"Cornell\n University"
],
[
"Gehrke",
"Johannes",
"",
"Cornell University"
],
[
"Gupta",
"Nitin",
"",
"Cornell\n University"
],
[
"Li",
"Haoyuan",
"",
"Cornell University"
],
[
"White",
"Walker",
"",
"Cornell\n University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0909.1771
|
Ken Smith
|
Ken Smith (MITRE), Michael Morse (MITRE), Peter Mork (MITRE), Maya Li
(MITRE), Arnon Rosenthal, David Allen, Len Seligman, Chris Wolf (MITRE)
|
The Role of Schema Matching in Large Enterprises
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
To date, the principal use case for schema matching research has been as a
precursor for code generation, i.e., constructing mappings between schema
elements with the end goal of data transfer. In this paper, we argue that
schema matching plays valuable roles independent of mapping construction,
especially as schemata grow to industrial scales. Specifically, in large
enterprises human decision makers and planners are often the immediate consumer
of information derived from schema matchers, instead of schema mapping tools.
We list a set of real application areas illustrating this role for schema
matching, and then present our experiences tackling a customer problem in one
of these areas. We describe the matcher used, where the tool was effective,
where it fell short, and our lessons learned about how well current schema
matching technology is suited for use in large enterprises. Finally, we suggest
a new agenda for schema matching research based on these experiences.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:48 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Smith",
"Ken",
"",
"MITRE"
],
[
"Morse",
"Michael",
"",
"MITRE"
],
[
"Mork",
"Peter",
"",
"MITRE"
],
[
"Li",
"Maya",
"",
"MITRE"
],
[
"Rosenthal",
"Arnon",
"",
"MITRE"
],
[
"Allen",
"David",
"",
"MITRE"
],
[
"Seligman",
"Len",
"",
"MITRE"
],
[
"Wolf",
"Chris",
"",
"MITRE"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1772
|
Harumi Kuno
|
Goetz Graefe (HP), Harumi Kuno (Hewlett-Packard Co.), Janet Wiener
(Hewlett-Packard, Co.)
|
Visualizing the robustness of query execution
|
CIDR 2009
| null | null | null |
cs.DB cs.PF
|
http://creativecommons.org/licenses/by/3.0/
|
In database query processing, actual run-time conditions (e.g., actual
selectivities and actual available memory) very often differ from compile-time
expectations of run-time conditions (e.g., estimated predicate selectivities
and anticipated memory availability). Robustness of query processing can be
defined as the ability to handle unexpected conditions. Robustness of query
execution, specifically, can be defined as the ability to process a specific
plan efficiently in an unexpected condition. We focus on query execution
(run-time), ignoring query optimization (compile-time), in order to complement
existing research and to explore untapped potential for improved robustness in
database query processing.
One of our initial steps has been to devise diagrams or maps that show how
well plans perform in the face of varying run-time conditions and how
gracefully a system's query architecture, operators, and their implementation
degrade in the face of adverse conditions. In this paper, we show several kinds
of diagrams with data from three real systems and report on what we have
learned both about these visualization techniques and about the three database
systems
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:52 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Graefe",
"Goetz",
"",
"HP"
],
[
"Kuno",
"Harumi",
"",
"Hewlett-Packard Co."
],
[
"Wiener",
"Janet",
"",
"Hewlett-Packard, Co."
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.1773
|
Fatma Ozcan
|
Andrey Balmin (IBM Almaden Research Center), Latha Colby (IBM Almaden
Research Center), Emiran Curtmola (UC, San Diego), Quanzhong Li (IBM Almaden
Research Center), Fatma Ozcan (IBM Almaden Research Center)
|
Search Driven Analysis of Heterogenous XML Data
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
Analytical processing on XML repositories is usually enabled by designing
complex data transformations that shred the documents into a common data
warehousing schema. This can be very time-consuming and costly, especially if
the underlying XML data has a lot of variety in structure, and only a subset of
attributes constitutes meaningful dimensions and facts. Today, there is no tool
to explore an XML data set, discover interesting attributes, dimensions and
facts, and rapidly prototype an OLAP solution.
In this paper, we propose a system, called SEDA that enables users to start
with simple keyword-style querying, and interactively refine the query based on
result summaries. SEDA then maps query results onto a set of known, or newly
created, facts and dimensions, and derives a star schema and its instantiation
to be fed into an off-the-shelf OLAP tool, for further analysis.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:09:55 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Balmin",
"Andrey",
"",
"IBM Almaden Research Center"
],
[
"Colby",
"Latha",
"",
"IBM Almaden\n Research Center"
],
[
"Curtmola",
"Emiran",
"",
"UC, San Diego"
],
[
"Li",
"Quanzhong",
"",
"IBM Almaden\n Research Center"
],
[
"Ozcan",
"Fatma",
"",
"IBM Almaden Research Center"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1774
|
Georgia Koutrika
|
Georgia Koutrika (Stanford University), Benjamin Bercovitz (Stanford
University), Robert Ikeda (Stanford University), Filip Kaliszan (Stanford
University), Henry Liou (Stanford University), Zahra Mohammadi Zadeh
(Stanford University), Hector Garcia-Molina (Stanford University)
|
Social Systems: Can we Do More Than Just Poke Friends?
|
CIDR 2009
| null | null | null |
cs.DB cs.CY
|
http://creativecommons.org/licenses/by/3.0/
|
Social sites have become extremely popular among users but have they
attracted equal attention from the research community? Are they good only for
simple tasks, such as tagging and poking friends? Do they present any new or
interesting research challenges? In this paper, we describe the insights we
have obtained implementing CourseRank, a course evaluation and planning social
system. We argue that more attention should be given to social sites like ours
and that there are many challenges (though not the traditional DBMS ones) that
should be addressed by our community.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:01 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Koutrika",
"Georgia",
"",
"Stanford University"
],
[
"Bercovitz",
"Benjamin",
"",
"Stanford\n University"
],
[
"Ikeda",
"Robert",
"",
"Stanford University"
],
[
"Kaliszan",
"Filip",
"",
"Stanford\n University"
],
[
"Liou",
"Henry",
"",
"Stanford University"
],
[
"Zadeh",
"Zahra Mohammadi",
"",
"Stanford University"
],
[
"Garcia-Molina",
"Hector",
"",
"Stanford University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0909.1775
|
Michael Armbrust
|
Michael Armbrust (UC Berkeley), Armando Fox (UC Berkeley), David
Patterson (UC Berkeley), Nick Lanham (UC Berkeley), Beth Trushkowsky (UC
Berkeley), Jesse Trutna (UC Berkeley), Haruki Oh (UC Berkeley)
|
SCADS: Scale-Independent Storage for Social Computing Applications
|
CIDR 2009
| null | null | null |
cs.DB cs.DC
|
http://creativecommons.org/licenses/by/3.0/
|
Collaborative web applications such as Facebook, Flickr and Yelp present new
challenges for storing and querying large amounts of data. As users and
developers are focused more on performance than single copy consistency or the
ability to perform ad-hoc queries, there exists an opportunity for a
highly-scalable system tailored specifically for relaxed consistency and
pre-computed queries. The Web 2.0 development model demands the ability to both
rapidly deploy new features and automatically scale with the number of users.
There have been many successful distributed key-value stores, but so far none
provide as rich a query language as SQL. We propose a new architecture, SCADS,
that allows the developer to declaratively state application specific
consistency requirements, takes advantage of utility computing to provide cost
effective scale-up and scale-down, and will use machine learning models to
introspectively anticipate performance problems and predict the resource
requirements of new queries before execution.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:04 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Armbrust",
"Michael",
"",
"UC Berkeley"
],
[
"Fox",
"Armando",
"",
"UC Berkeley"
],
[
"Patterson",
"David",
"",
"UC Berkeley"
],
[
"Lanham",
"Nick",
"",
"UC Berkeley"
],
[
"Trushkowsky",
"Beth",
"",
"UC\n Berkeley"
],
[
"Trutna",
"Jesse",
"",
"UC Berkeley"
],
[
"Oh",
"Haruki",
"",
"UC Berkeley"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.1776
|
Xin (Luna) Dong
|
Laure Berti-Equille (Universite de Rennes 1), Anish Das Sarma
(Stanford University), Xin (Luna) Dong (AT&T Labs-Research), Amelie Marian
(Rutgus University), Divesh Srivastava (ATT Labs-Research)
|
Sailing the Information Ocean with Awareness of Currents: Discovery and
Application of Source Dependence
|
CIDR 2009
| null | null | null |
cs.DB cs.LG
|
http://creativecommons.org/licenses/by/3.0/
|
The Web has enabled the availability of a huge amount of useful information,
but has also eased the ability to spread false information and rumors across
multiple sources, making it hard to distinguish between what is true and what
is not. Recent examples include the premature Steve Jobs obituary, the second
bankruptcy of United airlines, the creation of Black Holes by the operation of
the Large Hadron Collider, etc. Since it is important to permit the expression
of dissenting and conflicting opinions, it would be a fallacy to try to ensure
that the Web provides only consistent information. However, to help in
separating the wheat from the chaff, it is essential to be able to determine
dependence between sources. Given the huge number of data sources and the vast
volume of conflicting data available on the Web, doing so in a scalable manner
is extremely challenging and has not been addressed by existing work yet.
In this paper, we present a set of research problems and propose some
preliminary solutions on the issues involved in discovering dependence between
sources. We also discuss how this knowledge can benefit a variety of
technologies, such as data integration and Web 2.0, that help users manage and
access the totality of the available information from various sources.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:07 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Berti-Equille",
"Laure",
"",
"Universite de Rennes 1"
],
[
"Sarma",
"Anish Das",
"",
"Stanford University"
],
[
"Xin",
"",
"",
"Luna"
],
[
"Dong",
"",
"",
"AT&T Labs-Research"
],
[
"Marian",
"Amelie",
"",
"Rutgus University"
],
[
"Srivastava",
"Divesh",
"",
"ATT Labs-Research"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0909.1777
|
Yanlei Diao
|
Yanlei Diao (U. Massachusetts-Amherst), Boduo Li (University of
Massachusetts Amherst), Anna Liu (UMass Amherst), Liping Peng (UMass
Amherst), Charles Sutton (UC Berkeley), Thanh Tran (UMass Amherst), Michael
Zink
|
Capturing Data Uncertainty in High-Volume Stream Processing
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
We present the design and development of a data stream system that captures
data uncertainty from data collection to query processing to final result
generation. Our system focuses on data that is naturally modeled as continuous
random variables. For such data, our system employs an approach grounded in
probability and statistical theory to capture data uncertainty and integrates
this approach into high-volume stream processing. The first component of our
system captures uncertainty of raw data streams from sensing devices. Since
such raw streams can be highly noisy and may not carry sufficient information
for query processing, our system employs probabilistic models of the data
generation process and stream-speed inference to transform raw data into a
desired format with an uncertainty metric. The second component captures
uncertainty as data propagates through query operators. To efficiently quantify
result uncertainty of a query operator, we explore a variety of techniques
based on probability and statistical theory to compute the result distribution
at stream speed. We are currently working with a group of scientists to
evaluate our system using traces collected from the domains of (and eventually
in the real systems for) hazardous weather monitoring and object tracking and
monitoring.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:11 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Diao",
"Yanlei",
"",
"U. Massachusetts-Amherst"
],
[
"Li",
"Boduo",
"",
"University of\n Massachusetts Amherst"
],
[
"Liu",
"Anna",
"",
"UMass Amherst"
],
[
"Peng",
"Liping",
"",
"UMass\n Amherst"
],
[
"Sutton",
"Charles",
"",
"UC Berkeley"
],
[
"Tran",
"Thanh",
"",
"UMass Amherst"
],
[
"Zink",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1778
|
Nodira Khoussainova
|
Nodira Khoussainova (University of Washington), Magda Balazinska (U.
Washington), Wolfgang Gatterbauer (University of Washington), YongChul Kwon
(University of Washington), Dan Suciu (University of Washington)
|
A Case for A Collaborative Query Management System
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
Over the past 40 years, database management systems (DBMSs) have evolved to
provide a sophisticated variety of data management capabilities. At the same
time, tools for managing queries over the data have remained relatively
primitive. One reason for this is that queries are typically issued through
applications. They are thus debugged once and re-used repeatedly. This mode of
interaction, however, is changing. As scientists (and others) store and share
increasingly large volumes of data in data centers, they need the ability to
analyze the data by issuing exploratory queries. In this paper, we argue that,
in these new settings, data management systems must provide powerful query
management capabilities, from query browsing to automatic query
recommendations. We first discuss the requirements for a collaborative query
management system. We outline an early system architecture and discuss the many
research challenges associated with building such an engine.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:16 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Khoussainova",
"Nodira",
"",
"University of Washington"
],
[
"Balazinska",
"Magda",
"",
"U.\n Washington"
],
[
"Gatterbauer",
"Wolfgang",
"",
"University of Washington"
],
[
"Kwon",
"YongChul",
"",
"University of Washington"
],
[
"Suciu",
"Dan",
"",
"University of Washington"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1779
|
Sam Madden
|
Philippe Cudre-Mauroux (MIT), Eugene Wu (MIT), Sam Madden (MIT)
|
The Case for RodentStore, an Adaptive, Declarative Storage System
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
Recent excitement in the database community surrounding new
applications?analytic, scientific, graph, geospatial, etc.?has led to an
explosion in research on database storage systems. New storage systems are
vital to the database community, as they are at the heart of making database
systems perform well in new application domains. Unfortunately, each such
system also represents a substantial engineering effort including a great deal
of duplication of mechanisms for features such as transactions and caching. In
this paper, we make the case for RodentStore, an adaptive and declarative
storage system providing a high-level interface for describing the physical
representation of data. Specifically, RodentStore uses a declarative storage
algebra whereby administrators (or database design tools) specify how a logical
schema should be grouped into collections of rows, columns, and/or arrays, and
the order in which those groups should be laid out on disk. We describe the key
operators and types of our algebra, outline the general architecture of
RodentStore, which interprets algebraic expressions to generate a physical
representation of the data, and describe the interface between RodentStore and
other parts of a database system, such as the query optimizer and executor. We
provide a case study of the potential use of RodentStore in representing dense
geospatial data collected from a mobile sensor network, showing the ease with
which different storage layouts can be expressed using some of our algebraic
constructs and the potential performance gains that a RodentStore-built storage
system can offer.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:20 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Cudre-Mauroux",
"Philippe",
"",
"MIT"
],
[
"Wu",
"Eugene",
"",
"MIT"
],
[
"Madden",
"Sam",
"",
"MIT"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1780
|
Luc Bouganim
|
Luc Bouganim (INRIA), Bj\"orn J\'onsson (Reykjav\'ik University),
Philippe Bonnet (Department of Computer Science, University of Copenhagen)
|
uFLIP: Understanding Flash IO Patterns
|
CIDR 2009
| null | null | null |
cs.PF
|
http://creativecommons.org/licenses/by/3.0/
|
Does the advent of flash devices constitute a radical change for secondary
storage? How should database systems adapt to this new form of secondary
storage? Before we can answer these questions, we need to fully understand the
performance characteristics of flash devices. More specifically, we want to
establish what kind of IOs should be favored (or avoided) when designing
algorithms and architectures for flash-based systems. In this paper, we focus
on flash IO patterns, that capture relevant distribution of IOs in time and
space, and our goal is to quantify their performance. We define uFLIP, a
benchmark for measuring the response time of flash IO patterns. We also present
a benchmarking methodology which takes into account the particular
characteristics of flash devices. Finally, we present the results obtained by
measuring eleven flash devices, and derive a set of design hints that should
drive the development of flash-based systems on current devices.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:26 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Bouganim",
"Luc",
"",
"INRIA"
],
[
"Jónsson",
"Björn",
"",
"Reykjavík University"
],
[
"Bonnet",
"Philippe",
"",
"Department of Computer Science, University of Copenhagen"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.1781
|
Marcos Vieira
|
Abhishek Mitra (UC Riverside), Marcos Vieira (UCR), Petko Bakalov
(ESRI), Walid Najjar (UCR), Vassilis Tsotras (UCR)
|
Boosting XML Filtering with a Scalable FPGA-based Architecture
|
CIDR 2009
| null | null | null |
cs.AR cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
The growing amount of XML encoded data exchanged over the Internet increases
the importance of XML based publish-subscribe (pub-sub) and content based
routing systems. The input in such systems typically consists of a stream of
XML documents and a set of user subscriptions expressed as XML queries. The
pub-sub system then filters the published documents and passes them to the
subscribers. Pub-sub systems are characterized by very high input ratios,
therefore the processing time is critical. In this paper we propose a "pure
hardware" based solution, which utilizes XPath query blocks on FPGA to solve
the filtering problem. By utilizing the high throughput that an FPGA provides
for parallel processing, our approach achieves drastically better throughput
than the existing software or mixed (hardware/software) architectures. The
XPath queries (subscriptions) are translated to regular expressions which are
then mapped to FPGA devices. By introducing stacks within the FPGA we are able
to express and process a wide range of path queries very efficiently, on a
scalable environment. Moreover, the fact that the parser and the filter
processing are performed on the same FPGA chip, eliminates expensive
communication costs (that a multi-core system would need) thus enabling very
fast and efficient pipelining. Our experimental evaluation reveals more than
one order of magnitude improvement compared to traditional pub/sub systems.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:30 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Mitra",
"Abhishek",
"",
"UC Riverside"
],
[
"Vieira",
"Marcos",
"",
"UCR"
],
[
"Bakalov",
"Petko",
"",
"ESRI"
],
[
"Najjar",
"Walid",
"",
"UCR"
],
[
"Tsotras",
"Vassilis",
"",
"UCR"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1782
|
Shel Finkelstein
|
Shel Finkelstein (SAP), Dean Jacobs (SAP), Rainer Brendle (SAP)
|
Principles for Inconsistency
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
Data consistency is very desirable because strong semantic properties make it
easier to write correct programs that perform as users expect. However, there
are good reasons why consistency may have to be weakened to achieve other
business goals. In this CIDR 2009 Perspectives paper, we present real-world
reasons inconsistency may be necessary, offer principles for managing
inconsistency coherently, and describe implementation approaches we are
investigating for sustainably scalable systems that offer comprehensible user
experiences despite inconsistency.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:33 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Finkelstein",
"Shel",
"",
"SAP"
],
[
"Jacobs",
"Dean",
"",
"SAP"
],
[
"Brendle",
"Rainer",
"",
"SAP"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1783
|
AnHai Doan
|
AnHai Doan (Univ of Wisconsin), Jeff Naughton (Wisconsin), Akanksha
Baid (Wisconsin), Xiaoyong Chai (Wisconsin), Fei Chen (Wisconsin), Ting Chen
(Wisconsin), Eric Chu (Wisconsin), Pedro DeRose (Wisconsin), Byron Gao
(Wisconsin), Chaitanya Gokhale (Wisconsin), Jiansheng Huang (Wisconsin),
Warren Shen (Wisconsin), Ba-Quy Vuong (Wisconsin)
|
The Case for a Structured Approach to Managing Unstructured Data
|
CIDR 2009
| null | null | null |
cs.DB cs.IR
|
http://creativecommons.org/licenses/by/3.0/
|
The challenge of managing unstructured data represents perhaps the largest
data management opportunity for our community since managing relational data.
And yet we are risking letting this opportunity go by, ceding the playing field
to other players, ranging from communities such as AI, KDD, IR, Web, and
Semantic Web, to industrial players such as Google, Yahoo, and Microsoft. In
this essay we explore what we can do to improve upon this situation. Drawing on
the lessons learned while managing relational data, we outline a structured
approach to managing unstructured data. We conclude by discussing the potential
implications of this approach to managing other kinds of non-relational data,
and to the identify of our field.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:36 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Doan",
"AnHai",
"",
"Univ of Wisconsin"
],
[
"Naughton",
"Jeff",
"",
"Wisconsin"
],
[
"Baid",
"Akanksha",
"",
"Wisconsin"
],
[
"Chai",
"Xiaoyong",
"",
"Wisconsin"
],
[
"Chen",
"Fei",
"",
"Wisconsin"
],
[
"Chen",
"Ting",
"",
"Wisconsin"
],
[
"Chu",
"Eric",
"",
"Wisconsin"
],
[
"DeRose",
"Pedro",
"",
"Wisconsin"
],
[
"Gao",
"Byron",
"",
"Wisconsin"
],
[
"Gokhale",
"Chaitanya",
"",
"Wisconsin"
],
[
"Huang",
"Jiansheng",
"",
"Wisconsin"
],
[
"Shen",
"Warren",
"",
"Wisconsin"
],
[
"Vuong",
"Ba-Quy",
"",
"Wisconsin"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.1784
|
Stavros Harizopoulos
|
Stavros Harizopoulos (HP Labs), Mehul Shah, Justin Meza (UCLA),
Parthasarathy Ranganathan (HP Labs)
|
Energy Efficiency: The New Holy Grail of Data Management Systems
Research
|
CIDR 2009
| null | null | null |
cs.DB cs.PF
|
http://creativecommons.org/licenses/by/3.0/
|
Energy costs are quickly rising in large-scale data centers and are soon
projected to overtake the cost of hardware. As a result, data center operators
have recently started turning into using more energy-friendly hardware. Despite
the growing body of research in power management techniques, there has been
little work to date on energy efficiency from a data management software
perspective.
In this paper, we argue that hardware-only approaches are only part of the
solution, and that data management software will be key in optimizing for
energy efficiency. We discuss the problems arising from growing energy use in
data centers and the trends that point to an increasing set of opportunities
for software-level optimizations. Using two simple experiments, we illustrate
the potential of such optimizations, and, motivated by these examples, we
discuss general approaches for reducing energy waste. Lastly, we point out
existing places within database systems that are promising for
energy-efficiency optimizations and urge the data management systems community
to shift focus from performance-oriented research to energy-efficient
computing.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:39 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Harizopoulos",
"Stavros",
"",
"HP Labs"
],
[
"Shah",
"Mehul",
"",
"UCLA"
],
[
"Meza",
"Justin",
"",
"UCLA"
],
[
"Ranganathan",
"Parthasarathy",
"",
"HP Labs"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.1785
|
Jayant Madhavan
|
Jayant Madhavan (Google Inc.), Loredana Afanasiev (Universiteit van
Amsterdam), Lyublena Antova (Cornell University), Alon Halevy (Google)
|
Harnessing the Deep Web: Present and Future
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
Over the past few years, we have built a system that has exposed large
volumes of Deep-Web content to Google.com users. The content that our system
exposes contributes to more than 1000 search queries per-second and spans over
50 languages and hundreds of domains. The Deep Web has long been acknowledged
to be a major source of structured data on the web, and hence accessing
Deep-Web content has long been a problem of interest in the data management
community. In this paper, we report on where we believe the Deep Web provides
value and where it does not. We contrast two very different approaches to
exposing Deep-Web content -- the surfacing approach that we used, and the
virtual integration approach that has often been pursued in the data management
literature. We emphasize where the values of each of the two approaches lie and
caution against potential pitfalls. We outline important areas of future
research and, in particular, emphasize the value that can be derived from
analyzing large collections of potentially disparate structured data on the
web.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:42 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Madhavan",
"Jayant",
"",
"Google Inc."
],
[
"Afanasiev",
"Loredana",
"",
"Universiteit van\n Amsterdam"
],
[
"Antova",
"Lyublena",
"",
"Cornell University"
],
[
"Halevy",
"Alon",
"",
"Google"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.1786
|
Alkis Simitsis
|
Alkis Simitsis (HP Labs), Yannis Ioannidis
|
DBMSs Should Talk Back Too
|
CIDR 2009
| null | null | null |
cs.DB cs.HC
|
http://creativecommons.org/licenses/by/3.0/
|
Natural language user interfaces to database systems have been studied for
several decades now. They have mainly focused on parsing and interpreting
natural language queries to generate them in a formal database language. We
envision the reverse functionality, where the system would be able to take the
internal result of that translation, say in SQL form, translate it back into
natural language, and show it to the initiator of the query for verification.
Likewise, information extraction has received considerable attention in the
past ten years or so, identifying structured information in free text so that
it may then be stored appropriately and queried. Validation of the records
stored with a backward translation into text would again be very powerful.
Verification and validation of query and data input of a database system
correspond to just one example of the many important applications that would
benefit greatly from having mature techniques for translating such database
constructs into free-flowing text. The problem appears to be deceivingly
simple, as there are no ambiguities or other complications in interpreting
internal database elements, so initially a straightforward translation appears
adequate. Reality teaches us quite the opposite, however, as the resulting text
should be expressive, i.e., accurate in capturing the underlying queries or
data, and effective, i.e., allowing fast and unique interpretation of them.
Achieving both of these qualities is very difficult and raises several
technical challenges that need to be addressed. In this paper, we first expose
the reader to several situations and applications that need translation into
natural language, thereby, motivating the problem. We then outline, by example,
the research problems that need to be solved, separately for data translations
and query translations.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:46 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Simitsis",
"Alkis",
"",
"HP Labs"
],
[
"Ioannidis",
"Yannis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.1788
|
Pat Helland
|
Pat Helland (Microsoft), David Campbell (Microsoft)
|
Building on Quicksand
|
CIDR 2009
| null | null | null |
cs.DC
|
http://creativecommons.org/licenses/by/3.0/
|
Reliable systems have always been built out of unreliable components. Early
on, the reliable components were small such as mirrored disks or ECC (Error
Correcting Codes) in core memory. These systems were designed such that
failures of these small components were transparent to the application. Later,
the size of the unreliable components grew larger and semantic challenges crept
into the application when failures occurred.
As the granularity of the unreliable component grows, the latency to
communicate with a backup becomes unpalatable. This leads to a more relaxed
model for fault tolerance. The primary system will acknowledge the work request
and its actions without waiting to ensure that the backup is notified of the
work. This improves the responsiveness of the system.
There are two implications of asynchronous state capture: 1) Everything
promised by the primary is probabilistic. There is always a chance that an
untimely failure shortly after the promise results in a backup proceeding
without knowledge of the commitment. Hence, nothing is guaranteed! 2)
Applications must ensure eventual consistency. Since work may be stuck in the
primary after a failure and reappear later, the processing order for work
cannot be guaranteed.
Platform designers are struggling to make this easier for their applications.
Emerging patterns of eventual consistency and probabilistic execution may soon
yield a way for applications to express requirements for a "looser" form of
consistency while providing availability in the face of ever larger failures.
This paper recounts portions of the evolution of these trends, attempts to
show the patterns that span these changes, and talks about future directions as
we continue to "build on quicksand".
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:10:57 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Helland",
"Pat",
"",
"Microsoft"
],
[
"Campbell",
"David",
"",
"Microsoft"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.1789
|
Fabien Mathieu
|
Fabien Mathieu, Diego Perino (INRIA Rocquencourt)
|
On Resource Aware Algorithms in Epidemic Live Streaming
| null | null | null |
RR-7031
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Epidemic-style diffusion schemes have been previously proposed for achieving
peer-to-peer live streaming. Their performance trade-offs have been deeply
analyzed for homogeneous systems, where all peers have the same upload
capacity. However, epidemic schemes designed for heterogeneous systems have not
been completely understood yet. In this report we focus on the peer selection
process and propose a generic model that encompasses a large class of
algorithms. The process is modeled as a combination of two functions, an aware
one and an agnostic one. By means of simulations, we analyze the
awareness-agnostism trade-offs on the peer selection process and the impact of
the source distribution policy in non-homogeneous networks. We highlight that
the early diffusion of a given chunk is crucial for its overall diffusion
performance, and a fairness trade-off arises between the performance of
heterogeneous peers, as a function of the level of awareness.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:16:43 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Mathieu",
"Fabien",
"",
"INRIA Rocquencourt"
],
[
"Perino",
"Diego",
"",
"INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1792
|
Fabien Mathieu
|
Fabien Mathieu
|
Heterogeneity in Distributed Live Streaming: Blessing or Curse?
| null | null | null |
RR-OL-2009-09-001
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Distributed live streaming has brought a lot of interest in the past few
years. In the homogeneous case (all nodes having the same capacity), many
algorithms have been proposed, which have been proven almost optimal or
optimal. On the other hand, the performance of heterogeneous systems is not
completely understood yet. In this paper, we investigate the impact of
heterogeneity on the achievable delay of chunk-based live streaming systems. We
propose several models for taking the atomicity of a chunk into account. For
all these models, when considering the transmission of a single chunk,
heterogeneity is indeed a ``blessing'', in the sense that the achievable delay
is always faster than an equivalent homogeneous system. But for a stream of
chunks, we show that it can be a ``curse'': there is systems where the
achievable delay can be arbitrary greater compared to equivalent homogeneous
systems. However, if the system is slightly bandwidth-overprovisioned, optimal
single chunk diffusion schemes can be adapted to a stream of chunks, leading to
near-optimal, faster than homogeneous systems, heterogeneous live streaming
systems.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 18:25:29 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Mathieu",
"Fabien",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1801
|
Vaibhav Srivastava
|
Vaibhav Srivastava, Kurt Plarre, Francesco Bullo
|
Randomized Sensor Selection in Sequential Hypothesis Testing
|
10 pages, 1 figure, Journal
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of sensor selection for time-optimal detection of a
hypothesis. We consider a group of sensors transmitting their observations to a
fusion center. The fusion center considers the output of only one randomly
chosen sensor at the time, and performs a sequential hypothesis test. We
consider the class of sequential tests which are easy to implement,
asymptotically optimal, and computationally amenable. For three distinct
performance metrics, we show that, for a generic set of sensors and binary
hypothesis, the fusion center needs to consider at most two sensors. We also
show that for the case of multiple hypothesis, the optimal policy needs at most
as many sensors to be observed as the number of underlying hypotheses.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 19:56:32 GMT"
}
] | 2009-09-10T00:00:00 |
[
[
"Srivastava",
"Vaibhav",
""
],
[
"Plarre",
"Kurt",
""
],
[
"Bullo",
"Francesco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1817
|
Muryong Kim
|
Muryong Kim, Sae-Young Chung
|
Cooperative Transmission for a Vector Gaussian Parallel Relay Network
|
35 pages, 10 figures, submitted to IEEE Transactions on Information
Theory
| null |
10.1109/TIT.2011.2162162
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider a parallel relay network where two relays
cooperatively help a source transmit to a destination. We assume the source and
the destination nodes are equipped with multiple antennas. Three basic schemes
and their achievable rates are studied: Decode-and-Forward (DF),
Amplify-and-Forward (AF), and Compress-and-Forward (CF). For the DF scheme, the
source transmits two private signals, one for each relay, where dirty paper
coding (DPC) is used between the two private streams, and a common signal for
both relays. The relays make efficient use of the common information to
introduce a proper amount of correlation in the transmission to the
destination. We show that the DF scheme achieves the capacity under certain
conditions. We also show that the CF scheme is asymptotically optimal in the
high relay power limit, regardless of channel ranks. It turns out that the AF
scheme also achieves the asymptotic optimality but only when the
relays-to-destination channel is full rank. The relative advantages of the
three schemes are discussed with numerical results.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 15:30:18 GMT"
}
] | 2017-01-27T00:00:00 |
[
[
"Kim",
"Muryong",
""
],
[
"Chung",
"Sae-Young",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.1830
|
Deniz Ustebay
|
Deniz Ustebay, Boris Oreshkin, Mark Coates, Michael Rabbat
|
Greedy Gossip with Eavesdropping
|
25 pages, 7 figures
| null |
10.1109/TSP.2010.2046593
| null |
cs.DC cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents greedy gossip with eavesdropping (GGE), a novel
randomized gossip algorithm for distributed computation of the average
consensus problem. In gossip algorithms, nodes in the network randomly
communicate with their neighbors and exchange information iteratively. The
algorithms are simple and decentralized, making them attractive for wireless
network applications. In general, gossip algorithms are robust to unreliable
wireless conditions and time varying network topologies. In this paper we
introduce GGE and demonstrate that greedy updates lead to rapid convergence. We
do not require nodes to have any location information. Instead, greedy updates
are made possible by exploiting the broadcast nature of wireless
communications. During the operation of GGE, when a node decides to gossip,
instead of choosing one of its neighbors at random, it makes a greedy
selection, choosing the node which has the value most different from its own.
In order to make this selection, nodes need to know their neighbors' values.
Therefore, we assume that all transmissions are wireless broadcasts and nodes
keep track of their neighbors' values by eavesdropping on their communications.
We show that the convergence of GGE is guaranteed for connected network
topologies. We also study the rates of convergence and illustrate, through
theoretical bounds and numerical simulations, that GGE consistently outperforms
randomized gossip and performs comparably to geographic gossip on
moderate-sized random geometric graph topologies.
|
[
{
"version": "v1",
"created": "Wed, 9 Sep 2009 21:04:32 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Ustebay",
"Deniz",
""
],
[
"Oreshkin",
"Boris",
""
],
[
"Coates",
"Mark",
""
],
[
"Rabbat",
"Michael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.1858
|
Aldar C.-F. Chan
|
Aldar C-F. Chan
|
A Graph Theoretic Approach for Optimizing Key Pre-distribution in
Wireless SensorNetworks
| null | null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Finding an optimal key assignment (subject to given constraints) for a key
predistribution scheme in wireless sensor networks is a difficult task. Hence,
most of the practical schemes are based on probabilistic key assignment, which
leads to sub-optimal schemes requiring key storage linear in the total number
of nodes. A graph theoretic framework is introduced to study the fundamental
tradeoffs between key storage, average key path length (directly related to the
battery consumption) and resilience (to compromised nodes) of key
predistribution schemes for wireless sensor networks. Based on the proposed
framework, a lower bound on key storage is derived for a given average key path
length. An upper bound on the compromising probability is also given. This
framework also leads to the design of key assignment schemes with a storage
complexity of the same order as the lower bound.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 02:21:32 GMT"
}
] | 2009-09-11T00:00:00 |
[
[
"Chan",
"Aldar C-F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.1866
|
David Eppstein
|
David Eppstein
|
Optimally fast incremental Manhattan plane embedding and planar tight
span construction
|
39 pages, 15 figures
|
Journal of Computational Geometry 2(1):144-182, 2011
|
10.20382/jocg.v2i1a8
| null |
cs.CG cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe a data structure, a rectangular complex, that can be used to
represent hyperconvex metric spaces that have the same topology (although not
necessarily the same distance function) as subsets of the plane. We show how to
use this data structure to construct the tight span of a metric space given as
an n x n distance matrix, when the tight span is homeomorphic to a subset of
the plane, in time O(n^2), and to add a single point to a planar tight span in
time O(n). As an application of this construction, we show how to test whether
a given finite metric space embeds isometrically into the Manhattan plane in
time O(n^2), and add a single point to the space and re-test whether it has
such an embedding in time O(n).
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 03:26:48 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Oct 2011 00:30:42 GMT"
}
] | 2016-08-12T00:00:00 |
[
[
"Eppstein",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1870
|
David Eppstein
|
David Eppstein
|
Paired approximation problems and incompatible inapproximabilities
|
13 pages, 3 figures. To appear at 21st ACM-SIAM Symp. Discrete
Algorithms (SODA 2010)
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper considers pairs of optimization problems that are defined from a
single input and for which it is desired to find a good approximation to either
one of the problems. In many instances, it is possible to efficiently find an
approximation of this type that is better than known inapproximability lower
bounds for either of the two individual optimization problems forming the pair.
In particular, we find either a $(1+\epsilon)$-approximation to $(1,2)$-TSP or
a $1/\epsilon$-approximation to maximum independent set, from a given graph, in
linear time. We show a similar paired approximation result for finding either a
coloring or a long path. However, no such tradeoff exists in some other cases:
for set cover and hitting set problems defined from a single set family, and
for clique and independent set problems on the same graph, it is not possible
to find an approximation when both problems are combined that is better than
the best approximation for either problem on its own.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 05:23:43 GMT"
}
] | 2009-09-11T00:00:00 |
[
[
"Eppstein",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.1876
|
Maurizio Martina
|
Maurizio Martina, Guido Masera
|
Turbo NOC: a framework for the design of Network On Chip based turbo
decoder architectures
|
submitted to IEEE Trans. on Circuits and Systems I (submission date
27 may 2009)
| null |
10.1109/TCSI.2010.2046257
| null |
cs.AR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This work proposes a general framework for the design and simulation of
network on chip based turbo decoder architectures. Several parameters in the
design space are investigated, namely the network topology, the parallelism
degree, the rate at which messages are sent by processing nodes over the
network and the routing strategy. The main results of this analysis are: i) the
most suited topologies to achieve high throughput with a limited complexity
overhead are generalized de-Bruijn and generalized Kautz topologies; ii)
depending on the throughput requirements different parallelism degrees, message
injection rates and routing algorithms can be used to minimize the network area
overhead.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 07:29:52 GMT"
}
] | 2016-11-18T00:00:00 |
[
[
"Martina",
"Maurizio",
""
],
[
"Masera",
"Guido",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
0909.1933
|
Liva Ralaivola
|
Liva Ralaivola (LIF), Marie Szafranski (IBISC), Guillaume Stempfel
(LIF)
|
Chromatic PAC-Bayes Bounds for Non-IID Data: Applications to Ranking and
Stationary $\beta$-Mixing Processes
|
Long version of the AISTATS 09 paper:
http://jmlr.csail.mit.edu/proceedings/papers/v5/ralaivola09a/ralaivola09a.pdf
| null | null | null |
cs.LG math.ST stat.ML stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Pac-Bayes bounds are among the most accurate generalization bounds for
classifiers learned from independently and identically distributed (IID) data,
and it is particularly so for margin classifiers: there have been recent
contributions showing how practical these bounds can be either to perform model
selection (Ambroladze et al., 2007) or even to directly guide the learning of
linear classifiers (Germain et al., 2009). However, there are many practical
situations where the training data show some dependencies and where the
traditional IID assumption does not hold. Stating generalization bounds for
such frameworks is therefore of the utmost interest, both from theoretical and
practical standpoints. In this work, we propose the first - to the best of our
knowledge - Pac-Bayes generalization bounds for classifiers trained on data
exhibiting interdependencies. The approach undertaken to establish our results
is based on the decomposition of a so-called dependency graph that encodes the
dependencies within the data, in sets of independent data, thanks to graph
fractional covers. Our bounds are very general, since being able to find an
upper bound on the fractional chromatic number of the dependency graph is
sufficient to get new Pac-Bayes bounds for specific settings. We show how our
results can be used to derive bounds for ranking statistics (such as Auc) and
classifiers trained on data distributed according to a stationary {\ss}-mixing
process. In the way, we show how our approach seemlessly allows us to deal with
U-processes. As a side note, we also provide a Pac-Bayes generalization bound
for classifiers learned on data from stationary $\varphi$-mixing distributions.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 11:51:10 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jun 2010 08:43:38 GMT"
}
] | 2010-06-09T00:00:00 |
[
[
"Ralaivola",
"Liva",
"",
"LIF"
],
[
"Szafranski",
"Marie",
"",
"IBISC"
],
[
"Stempfel",
"Guillaume",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0909.1965
|
Manuel Kauers
|
Alin Bostan and Manuel Kauers
|
The complete Generating Function for Gessel Walks is Algebraic
| null | null | null | null |
math.CO cs.SC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Gessel walks are lattice walks in the quarter plane $\set N^2$ which start at
the origin $(0,0)\in\set N^2$ and consist only of steps chosen from the set
$\{\leftarrow,\swarrow,\nearrow,\to\}$. We prove that if $g(n;i,j)$ denotes the
number of Gessel walks of length $n$ which end at the point $(i,j)\in\set N^2$,
then the trivariate generating series $G(t;x,y)=\sum_{n,i,j\geq 0} g(n;i,j)x^i
y^j t^n$ is an algebraic function.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 14:58:14 GMT"
}
] | 2009-09-12T00:00:00 |
[
[
"Bostan",
"Alin",
""
],
[
"Kauers",
"Manuel",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
0909.1977
|
Fernando Alegre
|
Fernando Alegre, Eric Feron and Santosh Pande
|
Using Ellipsoidal Domains to Analyze Control Systems Software
|
17 pages
| null | null | null |
cs.PL cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a methodology for the automatic verification of safety properties
of controllers based on dynamical systems, such as those typically used in
avionics. In particular, our focus is on proving stability properties of
software implementing linear and some non-linear controllers. We develop an
abstract interpretation framework that follows closely the Lyapunov methods
used in proofs at the model level and describe the corresponding abstract
domains, which for linear systems consist of ellipsoidal constraints. These
ellipsoidal domains provide abstractions for the values of state variables and
must be combined with other domains that model the remaining variables in a
program. Thus, the problem of automatically assigning the right type of
abstract domain to each variable arises. We provide an algorithm that solves
this classification problem in many practical cases and suggest how it could be
generalized to more complicated cases. We then find a fixpoint by solving a
matrix equation, which in the linear case is just the discrete Lyapunov
equation. Contrary to most cases in software analysis, this fixpoint cannot be
reached by the usual iterative method of propagating constraints until
saturation and so numerical methods become essential. Finally, we illustrate
our methodology with several examples.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 15:42:32 GMT"
}
] | 2009-09-11T00:00:00 |
[
[
"Alegre",
"Fernando",
""
],
[
"Feron",
"Eric",
""
],
[
"Pande",
"Santosh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.2000
|
Peter Krusche
|
Peter Krusche, Alexander Tiskin
|
Computing alignment plots efficiently
|
Presented at ParCo 2009
| null | null | null |
cs.DS cs.DC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Dot plots are a standard method for local comparison of biological sequences.
In a dot plot, a substring to substring distance is computed for all pairs of
fixed-size windows in the input strings. Commonly, the Hamming distance is used
since it can be computed in linear time. However, the Hamming distance is a
rather crude measure of string similarity, and using an alignment-based edit
distance can greatly improve the sensitivity of the dot plot method. In this
paper, we show how to compute alignment plots of the latter type efficiently.
Given two strings of length m and n and a window size w, this problem consists
in computing the edit distance between all pairs of substrings of length w, one
from each input string. The problem can be solved by repeated application of
the standard dynamic programming algorithm in time O(mnw^2). This paper gives
an improved data-parallel algorithm, running in time $O(mnw/\gamma/p)$ using
vector operations that work on $\gamma$ values in parallel and $p$ processors.
We show experimental results from an implementation of this algorithm, which
uses Intel's MMX/SSE instructions for vector parallelism and MPI for
coarse-grained parallelism.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 17:40:15 GMT"
}
] | 2009-09-11T00:00:00 |
[
[
"Krusche",
"Peter",
""
],
[
"Tiskin",
"Alexander",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.2005
|
Ofer Zeitouni
|
Uriel Feige, Ofer Zeitouni
|
Deterministic approximation for the cover time of trees
| null | null | null | null |
cs.DS math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a deterministic algorithm that given a tree T with n vertices, a
starting vertex v and a slackness parameter epsilon > 0, estimates within an
additive error of epsilon the cover and return time, namely, the expected time
it takes a simple random walk that starts at v to visit all vertices of T and
return to v. The running time of our algorithm is polynomial in n/epsilon, and
hence remains polynomial in n also for epsilon = 1/n^{O(1)}. We also show how
the algorithm can be extended to estimate the expected cover (without return)
time on trees.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 17:59:36 GMT"
}
] | 2009-09-11T00:00:00 |
[
[
"Feige",
"Uriel",
""
],
[
"Zeitouni",
"Ofer",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0909.2009
|
Claudio Weidmann
|
Claudio Weidmann and Gottfried Lechner
|
A Fresh Look at Coding for q-ary Symmetric Channels
|
12 pages, 6 figures; revision submitted to IEEE Trans. Inform. Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper studies coding schemes for the $q$-ary symmetric channel based on
binary low-density parity-check (LDPC) codes that work for any alphabet size
$q=2^m$, $m\in\mathbb{N}$, thus complementing some recently proposed
packet-based schemes requiring large $q$. First, theoretical optimality of a
simple layered scheme is shown, then a practical coding scheme based on a
simple modification of standard binary LDPC decoding is proposed. The decoder
is derived from first principles and using a factor-graph representation of a
front-end that maps $q$-ary symbols to groups of $m$ bits connected to a binary
code. The front-end can be processed with a complexity that is linear in
$m=\log_2 q$. An extrinsic information transfer chart analysis is carried out
and used for code optimization. Finally, it is shown how the same decoder
structure can also be applied to a larger class of $q$-ary channels.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 18:17:30 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Dec 2011 15:52:39 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Weidmann",
"Claudio",
""
],
[
"Lechner",
"Gottfried",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2017
|
Laura Rebollo-Neira
|
James Bowley and Laura Rebollo-Neira
|
Sparsity and `Something Else': An Approach to Encrypted Image Folding
|
Revised manuscript- Software for implementing the Encrypted Image
Folding proposed in this paper is available on
http://www.nonlinear-approx.info/
|
IEEE Signal Processing Letters, Vol. 8 No 3, 189--192, 2011
|
10.1109/LSP.2011.2106496
| null |
cs.CV cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A property of sparse representations in relation to their capacity for
information storage is discussed. It is shown that this feature can be used for
an application that we term Encrypted Image Folding. The proposed procedure is
realizable through any suitable transformation. In particular, in this paper we
illustrate the approach by recourse to the Discrete Cosine Transform and a
combination of redundant Cosine and Dirac dictionaries. The main advantage of
the proposed technique is that both storage and encryption can be achieved
simultaneously using simple processing steps.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 19:21:04 GMT"
},
{
"version": "v2",
"created": "Tue, 26 Oct 2010 14:39:05 GMT"
},
{
"version": "v3",
"created": "Fri, 11 Feb 2011 09:54:37 GMT"
},
{
"version": "v4",
"created": "Wed, 1 Feb 2012 22:26:15 GMT"
},
{
"version": "v5",
"created": "Wed, 12 Sep 2012 16:56:33 GMT"
}
] | 2012-09-13T00:00:00 |
[
[
"Bowley",
"James",
""
],
[
"Rebollo-Neira",
"Laura",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2024
|
Chi Anh La
|
Chi-Anh La, Pietro Michiardi, Claudio Casetti, Carla-Fabiana
Chiasserini, Marco Fiore
|
A Lightweight Distributed Solution to Content Replication in Mobile
Networks
|
12 pages
| null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Performance and reliability of content access in mobile networks is
conditioned by the number and location of content replicas deployed at the
network nodes. Facility location theory has been the traditional, centralized
approach to study content replication: computing the number and placement of
replicas in a network can be cast as an uncapacitated facility location
problem. The endeavour of this work is to design a distributed, lightweight
solution to the above joint optimization problem, while taking into account the
network dynamics. In particular, we devise a mechanism that lets nodes share
the burden of storing and providing content, so as to achieve load balancing,
and decide whether to replicate or drop the information so as to adapt to a
dynamic content demand and time-varying topology. We evaluate our mechanism
through simulation, by exploring a wide range of settings and studying
realistic content access mechanisms that go beyond the traditional
assumptionmatching demand points to their closest content replica. Results show
that our mechanism, which uses local measurements only, is: (i) extremely
precise in approximating an optimal solution to content placement and
replication; (ii) robust against network mobility; (iii) flexible in
accommodating various content access patterns, including variation in time and
space of the content demand.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 19:43:30 GMT"
}
] | 2009-09-11T00:00:00 |
[
[
"La",
"Chi-Anh",
""
],
[
"Michiardi",
"Pietro",
""
],
[
"Casetti",
"Claudio",
""
],
[
"Chiasserini",
"Carla-Fabiana",
""
],
[
"Fiore",
"Marco",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.2030
|
Gregory Valiant
|
Gregory Valiant and Paul Valiant
|
Size Bounds for Conjunctive Queries with General Functional Dependencies
|
22 pages, 2 figures
| null | null | null |
cs.DB cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper extends the work of Gottlob, Lee, and Valiant (PODS 2009)[GLV],
and considers worst-case bounds for the size of the result Q(D) of a
conjunctive query Q to a database D given an arbitrary set of functional
dependencies. The bounds in [GLV] are based on a "coloring" of the query
variables. In order to extend the previous bounds to the setting of arbitrary
functional dependencies, we leverage tools from information theory to formalize
the original intuition that each color used represents some possible entropy of
that variable, and bound the maximum possible size increase via a linear
program that seeks to maximize how much more entropy is in the result of the
query than the input. This new view allows us to precisely characterize the
entropy structure of worst-case instances for conjunctive queries with simple
functional dependencies (keys), providing new insights into the results of
[GLV]. We extend these results to the case of general functional dependencies,
providing upper and lower bounds on the worst-case size increase. We identify
the fundamental connection between the gap in these bounds and a central open
question in information theory.
Finally, we show that, while both the upper and lower bounds are given by
exponentially large linear programs, one can distinguish in polynomial time
whether the result of a query with an arbitrary set of functional dependencies
can be any larger than the input database.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 20:28:20 GMT"
},
{
"version": "v2",
"created": "Sat, 12 Dec 2009 08:00:21 GMT"
}
] | 2009-12-12T00:00:00 |
[
[
"Valiant",
"Gregory",
""
],
[
"Valiant",
"Paul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.2055
|
Erich Schikuta
|
Erich Schikuta, Thomas Weishaeupl, Flavia Donno, Heinz Stockinger,
Elisabeth Vinek, Helmut Wanek, Christoph Witzany, Irfan Ul Haq
|
Business in the Grid
| null | null | null | null |
cs.DC cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
From 2004 to 2007 the Business In the Grid (BIG) project took place and was
driven by the following goals: Firstly, make business aware of Grid technology
and, secondly, try to explore new business models. We disseminated Grid
computing by mainly concentrating on the central European market and
interviewed several companies in order to gain insights into the Grid
acceptance in industrial environments. In this article we present the results
of the project, elaborate on a critical discussion on business adaptations, and
describe a novel dynamic authorization workflow for business processes in the
Grid.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 21:48:34 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Schikuta",
"Erich",
""
],
[
"Weishaeupl",
"Thomas",
""
],
[
"Donno",
"Flavia",
""
],
[
"Stockinger",
"Heinz",
""
],
[
"Vinek",
"Elisabeth",
""
],
[
"Wanek",
"Helmut",
""
],
[
"Witzany",
"Christoph",
""
],
[
"Haq",
"Irfan Ul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0909.2058
|
Sihem Amer-Yahia
|
Sihem Amer-Yahia (Yahoo! Research), Laks Lakshmanan (UBC), Cong Yu
(Yahoo! Research)
|
SocialScope: Enabling Information Discovery on Social Content Sites
|
CIDR 2009
| null | null | null |
cs.DB cs.HC cs.IR cs.PL
|
http://creativecommons.org/licenses/by/3.0/
|
Recently, many content sites have started encouraging their users to engage
in social activities such as adding buddies on Yahoo! Travel and sharing
articles with their friends on New York Times. This has led to the emergence of
{\em social content sites}, which is being facilitated by initiatives like
OpenID (http://www.openid.net/) and OpenSocial (http://www.opensocial.org/).
These community standards enable the open access to users' social profiles and
connections by individual content sites and are bringing content-oriented sites
and social networking sites ever closer. The integration of content and social
information raises new challenges for {\em information management and
discovery} over such sites. We propose a logical architecture, named
\kw{SocialScope}, consisting of three layers, for tackling the challenges. The
{\em content management} layer is responsible for integrating, maintaining and
physically accessing the content and social data. The {\em information
discovery} layer takes care of analyzing content to derive interesting new
information, and interpreting and processing the user's information need to
identify relevant information. Finally, the {\em information presentation}
layer explores the discovered information and helps users better understand it
in a principled way. We describe the challenges in each layer and propose
solutions for some of those challenges. In particular, we propose a uniform
algebraic framework, which can be leveraged to uniformly and flexibly specify
many of the information discovery and analysis tasks and provide the foundation
for the optimization of those tasks.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 22:08:17 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Amer-Yahia",
"Sihem",
"",
"Yahoo! Research"
],
[
"Lakshmanan",
"Laks",
"",
"UBC"
],
[
"Yu",
"Cong",
"",
"Yahoo! Research"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0909.2062
|
Rafael Fernandez-Moctezuma
|
Rafael Fern\'andez-Moctezuma (Portland State University), Kristin
Tufte (Portland State University), Jin Li (Portland State University)
|
Inter-Operator Feedback in Data Stream Management Systems via
Punctuation
|
CIDR 2009
| null | null | null |
cs.DB
|
http://creativecommons.org/licenses/by/3.0/
|
High-volume, high-speed data streams may overwhelm the capabilities of stream
processing systems; techniques such as data prioritization, avoidance of
unnecessary processing and on-demand result production may be necessary to
reduce processing requirements. However, the dynamic nature of data streams, in
terms of both rate and content, makes the application of such techniques
challenging. Such techniques have been addressed in the context of static and
centralized query optimization; however, they have not been fully addressed for
data stream management systems. In this work, we present a comprehensive
framework that supports prioritization, avoidance of unnecessary work, and
on-demand result production over distributed, unreliable, bursty, disordered
data sources, typical of many data streams. We propose a form of inter-operator
feedback, which flows against the stream direction, to communicate the
information needed to enable execution of these techniques. This feedback
leverages punctuations to describe the subsets of interest. We identify
potential sources of feedback information, characterize new types of
punctuation to support feedback, and describe the roles of producers,
exploiters, and relayers of feedback that query operators may implement. We
present initial experimental observations using the NiagaraST data-stream
system.
|
[
{
"version": "v1",
"created": "Thu, 10 Sep 2009 22:55:16 GMT"
}
] | 2010-02-23T00:00:00 |
[
[
"Fernández-Moctezuma",
"Rafael",
"",
"Portland State University"
],
[
"Tufte",
"Kristin",
"",
"Portland State University"
],
[
"Li",
"Jin",
"",
"Portland State University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.2074
|
V. Sreekanth Annapureddy
|
V. Sreekanth Annapureddy and Venugopal V. Veeravalli
|
Sum Capacity of MIMO Interference Channels in the Low Interference
Regime
|
Submitted to IEEE Transactions on Information Theory, Sept. 2009,
revised Oct. 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Using Gaussian inputs and treating interference as noise at the receivers has
recently been shown to be sum capacity achieving for the two-user single-input
single-output (SISO) Gaussian interference channel in a low interference
regime, where the interference levels are below certain thresholds. In this
paper, such a low interference regime is characterized for multiple-input
multiple-output (MIMO) Gaussian interference channels. Conditions are provided
on the direct and cross channel gain matrices under which using Gaussian inputs
and treating interference as noise at the receivers is sum capacity achieving.
For the special cases of the symmetric multiple-input single-output (MISO) and
single-input multiple-output (SIMO) Gaussian interference channels, more
explicit expressions for the low interference regime are derived. In
particular, the threshold on the interference levels that characterize low
interference regime is related to the input SNR and the angle between the
direct and cross channel gain vectors. It is shown that the low interference
regime can be quite significant for MIMO interference channels, with the low
interference threshold being at least as large as the sine of the angle between
the direct and cross channel gain vectors for the MISO and SIMO cases.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 01:28:52 GMT"
},
{
"version": "v2",
"created": "Fri, 22 Oct 2010 18:57:21 GMT"
}
] | 2010-10-25T00:00:00 |
[
[
"Annapureddy",
"V. Sreekanth",
""
],
[
"Veeravalli",
"Venugopal V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2088
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Arithmetical meadows
|
14 pages; sections 4 and 5 permuted
| null | null |
PRG0909
|
math.RA cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An inversive meadow is a commutative ring with identity equipped with a
multiplicative inverse operation made total by choosing 0 as its value at 0.
Previously, inversive meadows were shortly called meadows. A divisive meadow is
an inversive meadows with the multiplicative inverse operation replaced by a
division operation. In the spirit of Peacock's arithmetical algebra, we
introduce variants of inversive and divisive meadows without an additive
identity element and an additive inverse operation. We give equational
axiomatizations of several classes of such variants of inversive and divisive
meadows as well as of several instances of them.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 05:44:54 GMT"
},
{
"version": "v2",
"created": "Tue, 2 Nov 2010 16:09:04 GMT"
}
] | 2010-11-03T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.RA",
"description": "Non-commutative rings and algebras, non-associative algebras, universal algebra and lattice theory, linear algebra, semigroups",
"span": "(Rings and Algebras)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.2089
|
Kees Middelburg
|
J. A. Bergstra, C. A. Middelburg
|
Indirect jumps improve instruction sequence performance
|
10 pages, definition of maximal internal delay and theorem 1 are
stated more precise; presentation improved
|
Scientific Annals of Computer Science, 22(2):253--265, 2012
|
10.7561/SACS.2012.2.253
|
PRG0910
|
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Instruction sequences with direct and indirect jump instructions are as
expressive as instruction sequences with direct jump instructions only. We show
that, in the case where the number of instructions is not bounded, we are faced
with increases of the maximal internal delays of instruction sequences on
execution that are not bounded by a linear function if we strive for acceptable
increases of the lengths of instruction sequences on elimination of indirect
jump instructions.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 05:51:09 GMT"
},
{
"version": "v2",
"created": "Thu, 29 Dec 2011 13:19:53 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Aug 2012 15:06:20 GMT"
}
] | 2012-11-20T00:00:00 |
[
[
"Bergstra",
"J. A.",
""
],
[
"Middelburg",
"C. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0909.2090
|
Nevin Vunka Jungum
|
Marc Dalmau, Philippe Roose, Sophie Laplace
|
Context Aware Adaptable Applications - A global approach
|
International Journal of Computer Science Issues, Volume 1, pp13-25,
August 2009
|
M. Dalmau, P. Roose and S. Laplace, "Context Aware Adaptable
Applications - A global approach", International Journal of Computer Science
Issues, Volume 1, pp13-25, August 2009
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Actual applications (mostly component based) requirements cannot be expressed
without a ubiquitous and mobile part for end-users as well as for M2M
applications (Machine to Machine). Such an evolution implies context management
in order to evaluate the consequences of the mobility and corresponding
mechanisms to adapt or to be adapted to the new environment. Applications are
then qualified as context aware applications. This first part of this paper
presents an overview of context and its management by application adaptation.
This part starts by a definition and proposes a model for the context. It also
presents various techniques to adapt applications to the context: from
self-adaptation to supervised approached. The second part is an overview of
architectures for adaptable applications. It focuses on platforms based
solutions and shows information flows between application, platform and
context. Finally it makes a synthesis proposition with a platform for adaptable
context-aware applications called Kalimucho. Then we present implementations
tools for software components and a dataflow models in order to implement the
Kalimucho platform.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 06:19:01 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Dalmau",
"Marc",
""
],
[
"Roose",
"Philippe",
""
],
[
"Laplace",
"Sophie",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.2091
|
Denis Pallez
|
Hideyuki Takagi (I3S), Denis Pallez (I3S)
|
Paired Comparisons-based Interactive Differential Evolution
| null |
World Congress on Nature and Biologically Inspired Computing,
Coimbatore : Inde (2009)
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose Interactive Differential Evolution (IDE) based on paired
comparisons for reducing user fatigue and evaluate its convergence speed in
comparison with Interactive Genetic Algorithms (IGA) and tournament IGA. User
interface and convergence performance are two big keys for reducing Interactive
Evolutionary Computation (IEC) user fatigue. Unlike IGA and conventional IDE,
users of the proposed IDE and tournament IGA do not need to compare whole
individuals each other but compare pairs of individuals, which largely
decreases user fatigue. In this paper, we design a pseudo-IEC user and evaluate
another factor, IEC convergence performance, using IEC simulators and show that
our proposed IDE converges significantly faster than IGA and tournament IGA,
i.e. our proposed one is superior to others from both user interface and
convergence performance points of view.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 06:30:05 GMT"
}
] | 2010-04-21T00:00:00 |
[
[
"Takagi",
"Hideyuki",
"",
"I3S"
],
[
"Pallez",
"Denis",
"",
"I3S"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.2103
|
Nevin Vunka Jungum
|
Samia Bouzefrane, Julien Cordry and Pierre Paradinas
|
MESURE Tool to benchmark Java Card platforms
|
International Journal of Computer Science Issues, Volume 1, pp49-57,
August 2009
|
S. Bouzefrane, J. Cordry and P. Paradinas,"MESURE Tool to
benchmark Java Card platforms", International Journal of Computer Science
Issues, Volume 1, pp49-57, August 2009
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The advent of the Java Card standard has been a major turning point in smart
card technology. With the growing acceptance of this standard, understanding
the performance behavior of these platforms is becoming crucial. To meet this
need, we present in this paper a novel benchmarking framework to test and
evaluate the performance of Java Card platforms. MESURE tool is the first
framework which accuracy and effectiveness are independent from the particular
Java Card platform tested and CAD used.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 07:37:04 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Bouzefrane",
"Samia",
""
],
[
"Cordry",
"Julien",
""
],
[
"Paradinas",
"Pierre",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.2119
|
John Whitbeck
|
John Whitbeck, Vania Conan, and Marcelo Dias de Amorim
|
Performance of Opportunistic Epidemic Routing on Edge-Markovian Dynamic
Graphs
|
5 pages, 4 figures. Accepted for publication in IEEE Transactions on
Communications
| null |
10.1109/TCOMM.2011.020811.090163
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Connectivity patterns in intermittently-connected mobile networks (ICMN) can
be modeled as edge-Markovian dynamic graphs. We propose a new model for
epidemic propagation on such graphs and calculate a closed-form expression that
links the best achievable delivery ratio to common ICMN parameters such as
message size, maximum tolerated delay, and link lifetime. These theoretical
results are compared to those obtained by replaying a real-life contact trace.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 09:38:08 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Aug 2010 08:37:14 GMT"
},
{
"version": "v3",
"created": "Thu, 25 Nov 2010 14:48:42 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Whitbeck",
"John",
""
],
[
"Conan",
"Vania",
""
],
[
"de Amorim",
"Marcelo Dias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.2145
|
Laurent Romary
|
Samuel Cruz-Lara (INRIA Lorraine - LORIA), Patrice Bonhomme (INRIA
Lorraine - LORIA), Christophe De Saint-Rat (INRIA Lorraine - LORIA), Laurent
Romary (INRIA Lorraine - LORIA)
|
A general XML-based distributed software architecture for accessing and
sharing ressources
|
Colloque avec actes et comit\'e de lecture
|
XML Finland'99, Helsinki : Finland (1999)
| null |
99-R-368 || cruz-lara99a
|
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a general xml-based distributed software architecture in
the aim of accessing and sharing resources in an opened client/server
environment. The paper is organized as follows : First, we introduce the idea
of a "General Distributed Software Architecture". Second, we describe the
general framework in which this architecture is used. Third, we describe the
process of information exchange and we introduce some technical issues involved
in the implementation of the proposed architecture. Finally, we present some
projects which are currently using, or which should use, the proposed
architecture.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 11:08:07 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Cruz-Lara",
"Samuel",
"",
"INRIA Lorraine - LORIA"
],
[
"Bonhomme",
"Patrice",
"",
"INRIA\n Lorraine - LORIA"
],
[
"De Saint-Rat",
"Christophe",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.2157
|
Maurice Margenstern
|
Maurice Margenstern
|
Navigation in tilings of the hyperbolic plane and possible applications
|
7 pages, 10 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper introduces a method of navigation in a large family of tilings of
the hyperbolic plane and looks at the question of possible applications in the
light of the few ones which were already obtained.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 12:39:22 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.2183
|
Nevin Vunka Jungum
|
Noha Ibrahim and Frederic Le Mouel
|
A Survey on Service Composition Middleware in Pervasive Environments
|
International Journal of Computer Science Issues, Volume 1, pp1-12,
August 2009
|
N. Ibrahim and F.L. Mouel, " A Survey on Service Composition
Middleware in Pervasive Environments",International Journal of Computer
Science Issues, Volume 1, pp1-12, August 2009
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The development of pervasive computing has put the light on a challenging
problem: how to dynamically compose services in heterogeneous and highly
changing environments? We propose a survey that defines the service composition
as a sequence of four steps: the translation, the generation, the evaluation,
and finally the execution. With this powerful and simple model we describe the
major service composition middleware. Then, a classification of these service
composition middleware according to pervasive requirements - interoperability,
discoverability, adaptability, context awareness, QoS management, security,
spontaneous management, and autonomous management - is given. The
classification highlights what has been done and what remains to do to develop
the service composition in pervasive environments.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 14:43:54 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Ibrahim",
"Noha",
""
],
[
"Mouel",
"Frederic Le",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.2185
|
Nevin Vunka Jungum
|
Scott Carter and Laurent Denoue
|
SeeReader: An (Almost) Eyes-Free Mobile Rich Document Viewer
|
International Journal of Computer Science Issues, Volume 1, pp36-41,
August 2009
|
S. Carter and L. Denoue, "SeeReader: An (Almost) Eyes-Free Mobile
Rich Document Viewer ", International Journal of Computer Science Issues,
Volume 1, pp36-41, August 2009
| null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Reading documents on mobile devices is challenging. Not only are screens
small and difficult to read, but also navigating an environment using limited
visual attention can be difficult and potentially dangerous. Reading content
aloud using text-tospeech (TTS) processing can mitigate these problems, but
only for content that does not include rich visual information. In this paper,
we introduce a new technique, SeeReader, that combines TTS with automatic
content recognition and document presentation control that allows users to
listen to documents while also being notified of important visual content.
Together, these services allow users to read rich documents on mobile devices
while maintaining awareness of their visual environment.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 14:49:10 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Carter",
"Scott",
""
],
[
"Denoue",
"Laurent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.2187
|
Nevin Vunka Jungum
|
Santiago J. Barro Torres and Carlos J. Escudero Cascon
|
Embedded Sensor System for Early Pathology Detection in Building
Construction
|
International Journal of Computer Science Issues, Volume 1, pp26-35,
August 2009
|
S.J. B. Torres and C. J. E. Cascon, " Embedded Sensor System for
Early Pathology Detection in Building Construction", International Journal of
Computer Science Issues, Volume 1, pp26-35, August 2009
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Structure pathology detection is an important security task in building
construction, which is performed by an operator by looking manually for damages
on the materials. This activity could be dangerous if the structure is hidden
or difficult to reach. On the other hand, embedded devices and wireless sensor
networks (WSN) are becoming popular and cheap, enabling the design of an
alternative pathology detection system to monitor structures based on these
technologies. This article introduces a ZigBee WSN system, intending to be
autonomous, easy to use and with low power consumption. Its functional parts
are fully discussed with diagrams, as well as the protocol used to collect
samples from sensor nodes. Finally, several tests focused on range and power
consumption of our prototype are shown, analysing whether the results obtained
were as expected or not.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 14:54:08 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Torres",
"Santiago J. Barro",
""
],
[
"Cascon",
"Carlos J. Escudero",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.2194
|
Dominique Tschopp
|
Dominique Tschopp, Suhas Diggavi
|
Approximate Nearest Neighbor Search through Comparisons
|
19 pages, 4 figures
| null | null | null |
cs.DS cs.DB cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the problem of finding the nearest neighbor (or one of
the R-nearest neighbors) of a query object q in a database of n objects. In
contrast with most existing approaches, we can only access the ``hidden'' space
in which the objects live through a similarity oracle. The oracle, given two
reference objects and a query object, returns the reference object closest to
the query object. The oracle attempts to model the behavior of human users,
capable of making statements about similarity, but not of assigning meaningful
numerical values to distances between objects.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 15:32:03 GMT"
}
] | 2009-09-14T00:00:00 |
[
[
"Tschopp",
"Dominique",
""
],
[
"Diggavi",
"Suhas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0909.2234
|
Jayakrishnan Unnikrishnan
|
Jayakrishnan Unnikrishnan, Dayu Huang, Sean Meyn, Amit Surana and
Venugopal Veeravalli
|
Universal and Composite Hypothesis Testing via Mismatched Divergence
|
Accepted to IEEE Transactions on Information Theory, July 2010
| null |
10.1109/TIT.2011.2104670
| null |
cs.IT cs.LG math.IT math.ST stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
For the universal hypothesis testing problem, where the goal is to decide
between the known null hypothesis distribution and some other unknown
distribution, Hoeffding proposed a universal test in the nineteen sixties.
Hoeffding's universal test statistic can be written in terms of
Kullback-Leibler (K-L) divergence between the empirical distribution of the
observations and the null hypothesis distribution. In this paper a modification
of Hoeffding's test is considered based on a relaxation of the K-L divergence
test statistic, referred to as the mismatched divergence. The resulting
mismatched test is shown to be a generalized likelihood-ratio test (GLRT) for
the case where the alternate distribution lies in a parametric family of the
distributions characterized by a finite dimensional parameter, i.e., it is a
solution to the corresponding composite hypothesis testing problem. For certain
choices of the alternate distribution, it is shown that both the Hoeffding test
and the mismatched test have the same asymptotic performance in terms of error
exponents. A consequence of this result is that the GLRT is optimal in
differentiating a particular distribution from others in an exponential family.
It is also shown that the mismatched test has a significant advantage over the
Hoeffding test in terms of finite sample size performance. This advantage is
due to the difference in the asymptotic variances of the two test statistics
under the null hypothesis. In particular, the variance of the K-L divergence
grows linearly with the alphabet size, making the test impractical for
applications involving large alphabet distributions. The variance of the
mismatched divergence on the other hand grows linearly with the dimension of
the parameter space, and can hence be controlled through a prudent choice of
the function class defining the mismatched divergence.
|
[
{
"version": "v1",
"created": "Fri, 11 Sep 2009 18:35:52 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Apr 2010 16:49:01 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Sep 2010 06:56:44 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Unnikrishnan",
"Jayakrishnan",
""
],
[
"Huang",
"Dayu",
""
],
[
"Meyn",
"Sean",
""
],
[
"Surana",
"Amit",
""
],
[
"Veeravalli",
"Venugopal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0909.2290
|
Tiancheng Li
|
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
|
Slicing: A New Approach to Privacy Preserving Data Publishing
| null | null | null | null |
cs.DB cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Several anonymization techniques, such as generalization and bucketization,
have been designed for privacy preserving microdata publishing. Recent work has
shown that generalization loses considerable amount of information, especially
for high-dimensional data. Bucketization, on the other hand, does not prevent
membership disclosure and does not apply for data that do not have a clear
separation between quasi-identifying attributes and sensitive attributes.
In this paper, we present a novel technique called slicing, which partitions
the data both horizontally and vertically. We show that slicing preserves
better data utility than generalization and can be used for membership
disclosure protection. Another important advantage of slicing is that it can
handle high-dimensional data. We show how slicing can be used for attribute
disclosure protection and develop an efficient algorithm for computing the
sliced data that obey the l-diversity requirement. Our workload experiments
confirm that slicing preserves better utility than generalization and is more
effective than bucketization in workloads involving the sensitive attribute.
Our experiments also demonstrate that slicing can be used to prevent membership
disclosure.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 01:42:55 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Li",
"Tiancheng",
""
],
[
"Li",
"Ninghui",
""
],
[
"Zhang",
"Jian",
""
],
[
"Molloy",
"Ian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2292
|
Wei E.I. Sha
|
Xiao Z. Wang and Wei E.I. Sha
|
Random Sampling Using Shannon Interpolation and Poisson Summation
Formulae
|
This is a preprint version of research report, which may submit to
some conference or journal
| null | null | null |
cs.IT cs.CE math.IT math.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This report mainly focused on the basic concepts and the recovery methods for
the random sampling. The recovery methods involve the orthogonal matching
pursuit algorithm and the gradient-based total variation strategy. In
particular, a fast and efficient observation matrix filling technique was
implemented by the classic Shannon interpolation and Poisson summation
formulae. The numerical results for the trigonometric signal, the
Gaussian-modulated sinusoidal pulse, and the square wave were demonstrated and
discussed. The work may give some help for future work in theoretical study and
practical implementation of the random sampling.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 01:43:44 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Sep 2009 14:51:47 GMT"
},
{
"version": "v3",
"created": "Thu, 1 Oct 2009 09:43:29 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Wang",
"Xiao Z.",
""
],
[
"Sha",
"Wei E. I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
}
] |
0909.2297
|
Andias Wira-Alam T
|
Andias Wira-Alam
|
Simulation of Resource Usage in Parallel Evolutionary Peptide
Optimization using JavaSpaces Technology
| null | null | null | null |
cs.DC cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Peptide Optimization is a highly complex problem and it takes very long time
of computation. This optimization process uses many software applications in a
cluster running GNU/Linux Operating System that perform special tasks. The
application to organize the whole optimization process had been already
developed, namely SEPP (System for Evolutionary Pareto Optimization of
Peptides/Polymers). A single peptide optimization takes a lot of computation
time to produce a certain number of individuals. However, it can be accelerated
by increasing the degree of parallelism as well as the number of nodes
(processors) in the cluster. In this master thesis, I build a model simulating
the interplay of the programs so that the usage of each resource (processor)
can be determined and also the approximated time needed for the overall
optimization process. There are two Evolutionary Algorithms that could be used
in the optimization, namely Generation-based and Steady-state Evolutionary
Algorithm. The results of each Evolutionary Algorithm are shown based on the
simulations. Moreover, the results are also compared by using different
parameters (the degree of parallelism and the number of processors) in the
simulation to give an overview of the advantages and the disadvantages of the
algorithms in terms of computation time and resource usage. The model is built
up using JavaSpaces Technology.
|
[
{
"version": "v1",
"created": "Sun, 13 Sep 2009 12:36:22 GMT"
}
] | 2009-12-05T00:00:00 |
[
[
"Wira-Alam",
"Andias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.2309
|
Jun Tanaka
|
Jun Tanaka
|
Logic with Verbs
| null | null | null | null |
cs.AI cs.LO
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
The aim of this paper is to introduce a logic in which nouns and verbs are
handled together as a deductive reasoning, and also to observe the relationship
between nouns and verbs as well as between logics and conversations.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 07:49:36 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Oct 2009 00:49:38 GMT"
},
{
"version": "v3",
"created": "Mon, 14 Dec 2009 10:54:13 GMT"
}
] | 2010-06-01T00:00:00 |
[
[
"Tanaka",
"Jun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.2318
|
Jocelyne Troccaz
|
Gr\'egoire Chevreau, Jocelyne Troccaz (TIMC), Pierre Conort,
Rapha\"elle Renard-Penna, Alain Mallet, Michel Daudon (CRISTAL), Pierre Mozer
|
Estimation of urinary stone composition by automated processing of CT
images
| null |
Urological Research (2009) epub ahead of print
|
10.1007/s00240-009-0195-3
| null |
physics.med-ph cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The objective of this article was developing an automated tool for routine
clinical practice to estimate urinary stone composition from CT images based on
the density of all constituent voxels. A total of 118 stones for which the
composition had been determined by infrared spectroscopy were placed in a
helical CT scanner. A standard acquisition, low-dose and high-dose acquisitions
were performed. All voxels constituting each stone were automatically selected.
A dissimilarity index evaluating variations of density around each voxel was
created in order to minimize partial volume effects: stone composition was
established on the basis of voxel density of homogeneous zones. Stone
composition was determined in 52% of cases. Sensitivities for each compound
were: uric acid: 65%, struvite: 19%, cystine: 78%, carbapatite: 33.5%, calcium
oxalate dihydrate: 57%, calcium oxalate monohydrate: 66.5%, brushite: 75%.
Low-dose acquisition did not lower the performances (P < 0.05). This entirely
automated approach eliminates manual intervention on the images by the
radiologist while providing identical performances including for low-dose
protocols.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 09:57:08 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Chevreau",
"Grégoire",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Conort",
"Pierre",
"",
"CRISTAL"
],
[
"Renard-Penna",
"Raphaëlle",
"",
"CRISTAL"
],
[
"Mallet",
"Alain",
"",
"CRISTAL"
],
[
"Daudon",
"Michel",
"",
"CRISTAL"
],
[
"Mozer",
"Pierre",
""
]
] |
[
{
"class": "Physics",
"code": "physics.med-ph",
"description": "Radiation therapy. Radiation dosimetry. Biomedical imaging modelling. Reconstruction, processing, and analysis. Biomedical system modelling and analysis. Health physics. New imaging or therapy modalities.",
"span": "(Medical Physics)"
},
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.2331
|
Jerome Kelleher
|
Jerome Kelleher and Barry O'Sullivan
|
Generating All Partitions: A Comparison Of Two Encodings
|
40 pages, 2 figures. Derived from J. Kelleher's Ph.D thesis, Encoding
Partitions as Ascending Compositions, University College Cork, 2006. V2:
corrected typos in RuleDesc algorithm
| null | null | null |
cs.DS cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Integer partitions may be encoded as either ascending or descending
compositions for the purposes of systematic generation. Many algorithms exist
to generate all descending compositions, yet none have previously been
published to generate all ascending compositions. We develop three new
algorithms to generate all ascending compositions and compare these with
descending composition generators from the literature. We analyse the new
algorithms and provide new and more precise analyses for the descending
composition generators. In each case, the ascending composition generation
algorithm is substantially more efficient than its descending composition
counterpart. We develop a new formula for the partition function p(n) as part
of our analysis of the lexicographic succession rule for ascending
compositions.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 13:29:56 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2014 09:02:35 GMT"
}
] | 2014-05-05T00:00:00 |
[
[
"Kelleher",
"Jerome",
""
],
[
"O'Sullivan",
"Barry",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0909.2336
|
Hamed Owladeghaffari O.Ghaffari
|
Hamed .O.Ghaffari
|
Two-Phase Flow in Heterogeneous Media
|
This paper has been withdrawn by the author due to repetition of some
parts in other publications
| null | null | null |
cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this study, we investigate the appeared complexity of two-phase flow
(air-water) in a heterogeneous soil where the supposed porous media is
non-deformable media which is under the time-dependent gas pressure. After
obtaining of governing equations and considering the capillary
pressure-saturation and permeability functions, the evolution of the models
unknown parameters were obtained. In this way, using COMSOL (FEMLAB) and fluid
flow-script Module, the role of heterogeneity in intrinsic permeability was
analysed. Also, the evolution of relative permeability of wetting and
non-wetting fluid, capillary pressure and other parameters were elicited.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 13:51:59 GMT"
},
{
"version": "v2",
"created": "Wed, 19 May 2010 13:37:06 GMT"
}
] | 2010-05-20T00:00:00 |
[
[
"Ghaffari",
"Hamed . O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0909.2339
|
\^Hamed \"Owladeghaffari O.Ghaffari
|
H. Owladeghaffari, H. Aghababaei
|
Back analysis based on SOM-RST system
|
10th. International Symposium on Landslides and Engineering and.
Engineered Slopes, Xi'an, China
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper describes application of information granulation theory, on the
back analysis of Jeffrey mine southeast wall Quebec. In this manner, using a
combining of Self Organizing Map (SOM) and rough set theory (RST), crisp and
rough granules are obtained. Balancing of crisp granules and sub rough granules
is rendered in close-open iteration. Combining of hard and soft computing,
namely finite difference method (FDM) and computational intelligence and taking
in to account missing information are two main benefits of the proposed method.
As a practical example, reverse analysis on the failure of the southeast wall
Jeffrey mine is accomplished.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 14:03:04 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Owladeghaffari",
"H.",
""
],
[
"Aghababaei",
"H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.2345
|
Andri Mirzal M.Sc.
|
Andri Mirzal
|
Weblog Clustering in Multilinear Algebra Perspective
|
16 pages, 7 figures
|
International Journal of Information Technology, Vol. 15 No. 1,
2009
| null | null |
cs.IR
|
http://creativecommons.org/licenses/by-nc-sa/3.0/
|
This paper describes a clustering method to group the most similar and
important weblogs with their descriptive shared words by using a technique from
multilinear algebra known as PARAFAC tensor decomposition. The proposed method
first creates labeled-link network representation of the weblog datasets, where
the nodes are the blogs and the labels are the shared words. Then, 3-way
adjacency tensor is extracted from the network and the PARAFAC decomposition is
applied to the tensor to get pairs of node lists and label lists with scores
attached to each list as the indication of the degree of importance. The
clustering is done by sorting the lists in decreasing order and taking the
pairs of top ranked blogs and words. Thus, unlike standard co-clustering
methods, this method not only groups the similar blogs with their descriptive
words but also tends to produce clusters of important blogs and descriptive
words.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 15:53:33 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Mirzal",
"Andri",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.2358
|
Lenka Zdeborova
|
Lenka Zdeborov\'a, Scott Backhaus, Michael Chertkov
|
Message Passing for Integrating and Assessing Renewable Generation in a
Redundant Power Grid
|
10 pages, accepted for HICSS-43
|
43rd Hawaii International Conference on System Sciences (HICSS),
1-10 (2010)
|
10.1109/HICSS.2010.272
| null |
physics.soc-ph cond-mat.stat-mech cs.CE physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simplified model of a redundant power grid is used to study integration of
fluctuating renewable generation. The grid consists of large number of
generator and consumer nodes. The net power consumption is determined by the
difference between the gross consumption and the level of renewable generation.
The gross consumption is drawn from a narrow distribution representing the
predictability of aggregated loads, and we consider two different distributions
representing wind and solar resources. Each generator is connected to D
consumers, and redundancy is built in by connecting R of these consumers to
other generators. The lines are switchable so that at any instance each
consumer is connected to a single generator. We explore the capacity of the
renewable generation by determining the level of "firm" generation capacity
that can be displaced for different levels of redundancy R. We also develop
message-passing control algorithm for finding switch settings where no
generator is overloaded.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 19:42:03 GMT"
}
] | 2023-10-06T00:00:00 |
[
[
"Zdeborová",
"Lenka",
""
],
[
"Backhaus",
"Scott",
""
],
[
"Chertkov",
"Michael",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0909.2363
|
Nevin Vunka Jungum
|
Md. Rabiul Islam and Md. Fayzur Rahman
|
Improvement of Text Dependent Speaker Identification System Using
Neuro-Genetic Hybrid Algorithm in Office Environmental Conditions
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp42-48, August 2009
|
R. Islam and F. Rahman," International Journal of Computer Science
Issues (IJCSI), Volume 1, pp42-48,August 2009"
| null | null |
cs.SD
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, an improved strategy for automated text dependent speaker
identification system has been proposed in noisy environment. The
identification process incorporates the Neuro- Genetic hybrid algorithm with
cepstral based features. To remove the background noise from the source
utterance, wiener filter has been used. Different speech pre-processing
techniques such as start-end point detection algorithm, pre-emphasis filtering,
frame blocking and windowing have been used to process the speech utterances.
RCC, MFCC, MFCC, MFCC, LPC and LPCC have been used to extract the features.
After feature extraction of the speech, Neuro-Genetic hybrid algorithm has been
used in the learning and identification purposes. Features are extracted by
using different techniques to optimize the performance of the identification.
According to the VALID speech database, the highest speaker identification rate
of 100.000 percent for studio environment and 82.33 percent for office
environmental conditions have been achieved in the close set text dependent
speaker identification system.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 20:36:35 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Islam",
"Md. Rabiul",
""
],
[
"Rahman",
"Md. Fayzur",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
}
] |
0909.2365
|
Nevin Vunka Jungum
|
Markus Schatten, Miroslav Baca and Mirko Cubrilo
|
Towards a General Definition of Biometric Systems
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp1-7, August 2009
|
M. Schatten, M. Baca and M. Cubrilo, " Towards a General
Definition of Biometric Systems", International Journal of Computer Science
Issues (IJCSI), Volume 1, pp1-7, August 2009
| null | null |
cs.OH q-bio.QM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A foundation for closing the gap between biometrics in the narrower and the
broader perspective is presented trough a conceptualization of biometric
systems in both perspectives. A clear distinction between verification,
identification and classification systems is made as well as shown that there
are additional classes of biometric systems. In the end a Unified Modeling
Language model is developed showing the connections between the two
perspectives.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 20:52:25 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Schatten",
"Markus",
""
],
[
"Baca",
"Miroslav",
""
],
[
"Cubrilo",
"Mirko",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
}
] |
0909.2366
|
Nevin Vunka Jungum
|
Maisa Halloush and Mai Sharif
|
Global Heuristic Search on Encrypted Data (GHSED)
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp13-17, August 2009
|
M. Halloush and M. Sharif,"Global Heuristic Search on Encrypted
Data (GHSED) ", International Journal of Computer Science Issues (IJCSI),
Volume 1, pp13-17, August 2009
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Important document are being kept encrypted in remote servers. In order to
retrieve these encrypted data, efficient search methods needed to enable the
retrieval of the document without knowing the content of the documents In this
paper a technique called a global heuristic search on encrypted data (GHSED)
technique will be described for search in an encrypted files using public key
encryption stored on an untrusted server and retrieve the files that satisfy a
certain search pattern without revealing any information about the original
files. GHSED technique would satisfy the following: (1) Provably secure, the
untrusted server cannot learn anything about the plaintext given only the
cipher text. (2) Provide controlled searching, so that the untrusted server
cannot search for a word without the user's authorization. (3) Support hidden
queries, so that the user may ask the untrusted server to search for a secret
word without revealing the word to the server. (4) Support query isolation, so
the untrusted server learns nothing more than the search result about the
plaintext.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 20:55:35 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Halloush",
"Maisa",
""
],
[
"Sharif",
"Mai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2367
|
Nevin Vunka Jungum
|
M Atif Qureshi, Arjumand Younus and Arslan Ahmed Khan
|
Philosophical Survey of Passwords
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp8-12, August 2009
|
M . Qureshi, A.Younus and A. A. Khan,"Philosophical Survey of
Passwords", International Journal of Computer Science Issues (IJCSI), Volume
1, pp8-12, August 2009
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Over the years security experts in the field of Information Technology have
had a tough time in making passwords secure. This paper studies and takes a
careful look at this issue from the angle of philosophy and cognitive science.
We have studied the process of passwords to rank its strengths and weaknesses
in order to establish a quality metric for passwords. Finally we related the
process to human senses which enables us to propose a constitutional scheme for
the process of password. The basic proposition is to exploit relationship
between human senses and password to ensure improvement in authentication while
keeping it an enjoyable activity.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 20:59:09 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Qureshi",
"M Atif",
""
],
[
"Younus",
"Arjumand",
""
],
[
"Khan",
"Arslan Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2368
|
Nevin Vunka Jungum
|
Kelly D. Lewis andjames E. Lewis
|
Web Single Sign-On Authentication using SAML
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp41-48, August 2009
|
K. D. LEWIS andJ. E. LEWIS, " Web Single Sign-On Authentication
using SAML", International Journal of Computer Science Issues (IJCSI), Volume
1, pp41-48, August 2009
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Companies have increasingly turned to application service providers (ASPs) or
Software as a Service (SaaS) vendors to offer specialized web-based services
that will cut costs and provide specific and focused applications to users. The
complexity of designing, installing, configuring, deploying, and supporting the
system with internal resources can be eliminated with this type of methodology,
providing great benefit to organizations. However, these models can present an
authentication problem for corporations with a large number of external service
providers. This paper describes the implementation of Security Assertion Markup
Language (SAML) and its capabilities to provide secure single sign-on (SSO)
solutions for externally hosted applications.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 21:01:57 GMT"
}
] | 2012-08-27T00:00:00 |
[
[
"Lewis",
"Kelly D. Lewis andjames E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2369
|
Nevin Vunka Jungum
|
Zine El Abidine Alaoui Ismaili and Ahmed Moussa
|
Self-Partial and Dynamic Reconfiguration Implementation for AES using
FPGA
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp33-40, August 2009
|
Z. El. ALAOUI ISMAILI and A. MOUSSA, " Self-Partial and Dynamic
Reconfiguration Implementation for AES using FPGA", International Journal of
Computer Science Issues (IJCSI), Volume 1, pp33-40, August 2009
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses efficient hardware/software implementation approaches
for the AES (Advanced Encryption Standard) algorithm and describes the design
and performance testing algorithm for embedded system. Also, with the spread of
reconfigurable hardware such as FPGAs (Field Programmable Gate Array) embedded
cryptographic hardware became cost-effective. Nevertheless, it is worthy to
note that nowadays, even hardwired cryptographic algorithms are not so safe.
From another side, the self-reconfiguring platform is reported that enables
an FPGA to dynamically reconfigure itself under the control of an embedded
microprocessor. Hardware acceleration significantly increases the performance
of embedded systems built on programmable logic. Allowing a FPGA-based
MicroBlaze processor to self-select the coprocessors uses can help reduce area
requirements and increase a system's versatility. The architecture proposed in
this paper is an optimal hardware implementation algorithm and takes dynamic
partially reconfigurable of FPGA. This implementation is good solution to
preserve confidentiality and accessibility to the information in the numeric
communication.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 21:04:49 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Ismaili",
"Zine El Abidine Alaoui",
""
],
[
"Moussa",
"Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2370
|
Nevin Vunka Jungum
|
Jacques Saraydaryan, Fatiha Benali and Stephane Ubeda
|
Comprehensive Security Framework for Global Threads Analysis
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp18-32, August 2009
|
J. SARAYDARYAN, F.BENALI and S. UBEDA, "Comprehensive Security
Framework for Global Threads Analysis ", International Journal of Computer
Science Issues (IJCSI), Volume 1, pp18-32, August 2009
| null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cyber criminality activities are changing and becoming more and more
professional. With the growth of financial flows through the Internet and the
Information System (IS), new kinds of thread arise involving complex scenarios
spread within multiple IS components. The IS information modeling and
Behavioral Analysis are becoming new solutions to normalize the IS information
and counter these new threads. This paper presents a framework which details
the principal and necessary steps for monitoring an IS. We present the
architecture of the framework, i.e. an ontology of activities carried out
within an IS to model security information and User Behavioral analysis. The
results of the performed experiments on real data show that the modeling is
effective to reduce the amount of events by 91%. The User Behavioral Analysis
on uniform modeled data is also effective, detecting more than 80% of
legitimate actions of attack scenarios.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 21:07:19 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Saraydaryan",
"Jacques",
""
],
[
"Benali",
"Fatiha",
""
],
[
"Ubeda",
"Stephane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2371
|
Nevin Vunka Jungum
|
Payal N. Raj and Prashant B. Swadas
|
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv
Based Manet
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp54-59, August 2009
|
P. N. Raj and P. B. Swadas, "DPRAODV: A DYANAMIC LEARNING SYSTEM
AGAINST BLACKHOLE ATTACK IN AODV BASED MANET", International Journal of
Computer Science Issues (IJCSI), Volume 1, pp54-59, August 2009
| null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Security is an essential requirement in mobile ad hoc networks to provide
protected communication between mobile nodes. Due to unique characteristics of
MANETS, it creates a number of consequential challenges to its security design.
To overcome the challenges, there is a need to build a multifence security
solution that achieves both broad protection and desirable network performance.
MANETs are vulnerable to various attacks, blackhole, is one of the possible
attacks. Black hole is a type of routing attack where a malicious node
advertise itself as having the shortest path to all nodes in the environment by
sending fake route reply. By doing this, the malicious node can deprive the
traffic from the source node. It can be used as a denial-of-service attack
where it can drop the packets later. In this paper, we proposed a DPRAODV
(Detection, Prevention and Reactive AODV) to prevent security threats of
blackhole by notifying other nodes in the network of the incident. The
simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only
prevents blackhole attack but consequently improves the overall performance of
(normal) AODV in presence of black hole attack.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 21:10:41 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Raj",
"Payal N.",
""
],
[
"Swadas",
"Prashant B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.2373
|
Nevin Vunka Jungum
|
M. Nageshkumar, P.K. Mahesh and M.N.S. Swamy
|
An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face
Image
|
International Journal of Computer Science Issues (IJCSI), Volume 1,
pp49-53, August 2009
|
M.Nageshkumar,P.K.Mahesh and M.N.S.Swamy, "An Efficient Secure
Multimodal Biometric Fusion Using Palmprint and Face Image", International
Journal of Computer Science Issues (IJCSI), Volume 1, pp49-53, August 2009
| null | null |
cs.CV cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Biometrics based personal identification is regarded as an effective method
for automatically recognizing, with a high confidence a person's identity. A
multimodal biometric systems consolidate the evidence presented by multiple
biometric sources and typically better recognition performance compare to
system based on a single biometric modality. This paper proposes an
authentication method for a multimodal biometric system identification using
two traits i.e. face and palmprint. The proposed system is designed for
application where the training data contains a face and palmprint. Integrating
the palmprint and face features increases robustness of the person
authentication. The final decision is made by fusion at matching score level
architecture in which features vectors are created independently for query
measures and are then compared to the enrolment template, which are stored
during database preparation. Multimodal biometric system is developed through
fusion of face and palmprint recognition.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 21:31:22 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Nageshkumar",
"M.",
""
],
[
"Mahesh",
"P. K.",
""
],
[
"Swamy",
"M. N. S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2375
|
Nevin Vunka Jungum
|
Mashud Kabir
|
Similarity Matching Techniques for Fault Diagnosis in Automotive
Infotainment Electronics
|
International Journal of Computer Science Issues(IJCSI), Volume 3,
pp14-19, August 2009
|
M. Kabir, " SIMILARITY MATCHING TECHNIQUES FOR FAULT DIAGNOSIS IN
AUTOMOTIVE INFOTAINMENT ELECTRONICS", International Journal of Computer
Science Issues(IJCSI), Volume 3, pp14-19, August 2009
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fault diagnosis has become a very important area of research during the last
decade due to the advancement of mechanical and electrical systems in
industries. The automobile is a crucial field where fault diagnosis is given a
special attention. Due to the increasing complexity and newly added features in
vehicles, a comprehensive study has to be performed in order to achieve an
appropriate diagnosis model. A diagnosis system is capable of identifying the
faults of a system by investigating the observable effects (or symptoms). The
system categorizes the fault into a diagnosis class and identifies a probable
cause based on the supplied fault symptoms. Fault categorization and
identification are done using similarity matching techniques. The development
of diagnosis classes is done by making use of previous experience, knowledge or
information within an application area. The necessary information used may come
from several sources of knowledge, such as from system analysis. In this paper
similarity matching techniques for fault diagnosis in automotive infotainment
applications are discussed.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 22:06:05 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Kabir",
"Mashud",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.2376
|
Nevin Vunka Jungum
|
Alexis Lazanas
|
Performing Hybrid Recommendation in Intermodal Transportation-the
FTMarket System's Recommendation Module
|
International Journal of Computer Science Issues (IJCSI), Volume 3,
pp24-34, August 2009
|
A. Lazanas"Performing Hybrid Recommendation in Intermodal
Transportation-the FTMarket System's Recommendation Module ",International
Journal of Computer Science Issues (IJCSI), Volume 3, pp24-34, August 2009
| null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Diverse recommendation techniques have been already proposed and encapsulated
into several e-business applications, aiming to perform a more accurate
evaluation of the existing information and accordingly augment the assistance
provided to the users involved. This paper reports on the development and
integration of a recommendation module in an agent-based transportation
transactions management system. The module is built according to a novel hybrid
recommendation technique, which combines the advantages of collaborative
filtering and knowledge-based approaches. The proposed technique and supporting
module assist customers in considering in detail alternative transportation
transactions that satisfy their requests, as well as in evaluating completed
transactions. The related services are invoked through a software agent that
constructs the appropriate knowledge rules and performs a synthesis of the
recommendation policy.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 22:21:12 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Lazanas",
"Alexis",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.2377
|
Nevin Vunka Jungum
|
Soumaya Zirari, Philippe Canalda and Francois Spies
|
Geometric and Signal Strength Dilution of Precision (DoP)Wi-Fi
|
International Journal of Computer Science Issues (IJCSI), Volume 3,
pp35-44, August 2009
|
S.Zirari,P. Canalda and F.Spies, " Geometric and Signal Strength
Dilution of Precision (DoP)Wi-Fi", International Journal of Computer Science
Issues (IJCSI), Volume 3, pp35-44, August 2009
| null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The democratization of wireless networks combined to the emergence of mobile
devices increasingly autonomous and efficient lead to new services. Positioning
services become overcrowded. Accuracy is the main quality criteria in
positioning. But to better appreciate this one a coefficient is needed. In this
paper we present Geometric and Signal Strength Dilution of Precision (DOP) for
positioning systems based on Wi-Fi and Signal Strength measurements.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 22:24:52 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Zirari",
"Soumaya",
""
],
[
"Canalda",
"Philippe",
""
],
[
"Spies",
"Francois",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.2379
|
Nevin Vunka Jungum
|
Priyanka Gupta and Vishal Goyal
|
Implementation of Rule Based Algorithm for Sandhi-Vicheda Of Compound
Hindi Words
|
International Journal of Computer Science Issues (IJCSI), Volume 3,
pp45-49, August 2009
|
P.Gupta and V.Goyal, " Implementation of Rule Based Algorithm for
Sandhi-Vicheda Of Compound Hindi Words", International Journal of Computer
Science Issues (IJCSI), Volume 3, pp45-49, August 2009
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sandhi means to join two or more words to coin new word. Sandhi literally
means `putting together' or combining (of sounds), It denotes all combinatory
sound-changes effected (spontaneously) for ease of pronunciation.
Sandhi-vicheda describes [5] the process by which one letter (whether single or
cojoined) is broken to form two words. Part of the broken letter remains as the
last letter of the first word and part of the letter forms the first letter of
the next letter. Sandhi- Vicheda is an easy and interesting way that can give
entirely new dimension that add new way to traditional approach to Hindi
Teaching. In this paper using the Rule based algorithm we have reported an
accuracy of 60-80% depending upon the number of rules to be implemented.
|
[
{
"version": "v1",
"created": "Sat, 12 Sep 2009 22:27:57 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Gupta",
"Priyanka",
""
],
[
"Goyal",
"Vishal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.2408
|
Paul Cuff
|
Paul Cuff (Princeton University), Haim Permuter (Ben-Gurion
University) and Thomas Cover (Stanford University)
|
Coordination Capacity
|
Accepted to IEEE Trans. on Info. Theory, 25 pages, 23 eps figure,
uses IEEEtran.cls
|
IEEE Trans. on Info. Theory, vol.56, no.9, pp.4181-4206, Sept.
2010
|
10.1109/TIT.2010.2054651
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop elements of a theory of cooperation and coordination in networks.
Rather than considering a communication network as a means of distributing
information, or of reconstructing random processes at remote nodes, we ask what
dependence can be established among the nodes given the communication
constraints. Specifically, in a network with communication rates {R_{i,j}}
between the nodes, we ask what is the set of all achievable joint distributions
p(x1, ..., xm) of actions at the nodes of the network. Several networks are
solved, including arbitrarily large cascade networks.
Distributed cooperation can be the solution to many problems such as
distributed games, distributed control, and establishing mutual information
bounds on the influence of one part of a physical system on another.
|
[
{
"version": "v1",
"created": "Sun, 13 Sep 2009 09:13:36 GMT"
},
{
"version": "v2",
"created": "Wed, 26 May 2010 04:31:25 GMT"
}
] | 2011-04-04T00:00:00 |
[
[
"Cuff",
"Paul",
"",
"Princeton University"
],
[
"Permuter",
"Haim",
"",
"Ben-Gurion\n University"
],
[
"Cover",
"Thomas",
"",
"Stanford University"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2450
|
Tamara Broderick
|
Tamara Broderick and David John Cameron MacKay
|
Fast and flexible selection with a single switch
|
14 pages, 5 figures, 1 table, presented at NIPS 2009 Mini-symposia
|
PLoS ONE 4(10): e7481, 2009
|
10.1371/journal.pone.0007481
| null |
cs.HC
|
http://creativecommons.org/licenses/by/3.0/
|
Selection methods that require only a single-switch input, such as a button
click or blink, are potentially useful for individuals with motor impairments,
mobile technology users, and individuals wishing to transmit information
securely. We present a single-switch selection method, "Nomon," that is general
and efficient. Existing single-switch selection methods require selectable
options to be arranged in ways that limit potential applications. By contrast,
traditional operating systems, web browsers, and free-form applications (such
as drawing) place options at arbitrary points on the screen. Nomon, however,
has the flexibility to select any point on a screen. Nomon adapts automatically
to an individual's clicking ability; it allows a person who clicks precisely to
make a selection quickly and allows a person who clicks imprecisely more time
to make a selection without error. Nomon reaps gains in information rate by
allowing the specification of beliefs (priors) about option selection
probabilities and by avoiding tree-based selection schemes in favor of direct
(posterior) inference. We have developed both a Nomon-based writing application
and a drawing application. To evaluate Nomon's performance, we compared the
writing application with a popular existing method for single-switch writing
(row-column scanning). Novice users wrote 35% faster with the Nomon interface
than with the scanning interface. An experienced user (author TB, with > 10
hours practice) wrote at speeds of 9.3 words per minute with Nomon, using 1.2
clicks per character and making no errors in the final text.
|
[
{
"version": "v1",
"created": "Sun, 13 Sep 2009 21:39:55 GMT"
},
{
"version": "v2",
"created": "Wed, 20 Jan 2010 16:59:54 GMT"
}
] | 2010-01-20T00:00:00 |
[
[
"Broderick",
"Tamara",
""
],
[
"MacKay",
"David John Cameron",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.2452
|
Grenville Croll
|
Susan Allan
|
Excel Modelling - Transparency, Auditing and Business Use
|
7 Pages, 6 Colour Figures
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2009 9-16
ISBN 978-1-905617-89-0
| null | null |
cs.SE cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Within Lloyds Banking Group the heritage HBOS Corporate division deals with
Corporate loans, and is required to assess these loans for risk in accordance
with the Basle Accord regulations. Statistical Risk Rating models are developed
by the risk analysts to assess the obligors credit worthiness. It is necessary
then to provide the bankers who originated the loan ('Relationship Managers' or
RMs) with an assessment tool to generate the loan rating upon which they base
their lending decisions. Heritage HBoS Corporate required a new model build
system for holding its Risk Rating models in 2006 as a result of more complex
models being created to comply with the Basle Accord. The use of Excel was
promoted by the IT department for a number of reasons; the Excel solution now
in use is reviewed in this paper.
|
[
{
"version": "v1",
"created": "Sun, 13 Sep 2009 22:36:08 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Allan",
"Susan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.2455
|
Grenville Croll
|
Andrew McGeady, Joseph McGouran
|
End User Computing in AIB Capital Markets: A Management Summary
|
7 Pages. Referenced & submitted by GJC in Sept 2009
|
Proc. European Spreadsheet Risks Int. Grp. (EuSpRIG) 2008 25-31
ISBN 978-905617-69-2
| null | null |
cs.HC cs.CY
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper is a management summary of how the area of End User Computing
(EUC) has been addressed by AIB Capital Markets. The development of an
effective policy is described, as well as the process by which a register of
critical EUC applications was assembled and how those applications were brought
into a controlled environment. A number of findings are included as well as
recommendations for others who would seek to run a similar project.
|
[
{
"version": "v1",
"created": "Sun, 13 Sep 2009 23:51:59 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"McGeady",
"Andrew",
""
],
[
"McGouran",
"Joseph",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
0909.2476
|
Jocelyne Troccaz
|
Nikolai Hungr (TIMC), Jocelyne Troccaz (TIMC), Nabil Zemiti (TIMC),
Nathanael Tripodi (TIMC)
|
Design of an ultrasound-guided robotic brachytherapy needle insertion
system
| null |
31th International Conference of the Engineering in Medicine and
Biology Society, Minneapolis : France (2009)
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we describe a new robotic brachytherapy needle-insertion system
that is designed to replace the template used in the manual technique. After a
brief review of existing robotic systems, we describe the requirements that we
based our design upon. A detailed description of the proposed system follows.
Our design is capable of positioning and inclining a needle within the same
workspace as the manual template. To help improve accuracy, the needle can be
rotated about its axis during insertion into the prostate. The system can be
mounted on existing steppers and also easily accommodates existing seed
dispensers, such as the Mick Applicator.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 06:39:27 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Hungr",
"Nikolai",
"",
"TIMC"
],
[
"Troccaz",
"Jocelyne",
"",
"TIMC"
],
[
"Zemiti",
"Nabil",
"",
"TIMC"
],
[
"Tripodi",
"Nathanael",
"",
"TIMC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.