id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0909.2489
|
Pu Yang
|
Pu Yang, Jun Guo, Weiran Xu
|
PrisCrawler: A Relevance Based Crawler for Automated Data Classification
from Bulletin Board
|
published in GCIS of IEEE WRI '09
| null |
10.1109/GCIS.2009.434
| null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Nowadays people realize that it is difficult to find information simply and
quickly on the bulletin boards. In order to solve this problem, people propose
the concept of bulletin board search engine. This paper describes the
priscrawler system, a subsystem of the bulletin board search engine, which can
automatically crawl and add the relevance to the classified attachments of the
bulletin board. Priscrawler utilizes Attachrank algorithm to generate the
relevance between webpages and attachments and then turns bulletin board into
clear classified and associated databases, making the search for attachments
greatly simplified. Moreover, it can effectively reduce the complexity of
pretreatment subsystem and retrieval subsystem and improve the search
precision. We provide experimental results to demonstrate the efficacy of the
priscrawler.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 09:02:01 GMT"
}
] | 2016-11-17T00:00:00 |
[
[
"Yang",
"Pu",
""
],
[
"Guo",
"Jun",
""
],
[
"Xu",
"Weiran",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.2496
|
Pu Yang
|
Pu Yang, Jun Guo, Guang Chen
|
Pavideoge: A Metadata Markup Video Structure in Video Search Engine
|
Submitted
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the problems of video processing in video search
engine. Video has now become a very important kind of data in Internet; while
searching for video is still a challenging task due to the inner properties of
video: requiring enormous storage space, being independent, expressing
information hiddenly. To handle the properties of video more effectively, in
this paper, we propose a new video processing method in video search engine. In
detail, the core of the new video processing method is creating pavideoge--a
new data type, which contains the video advantages and webpage advantages. The
pavideoge has four attributes: real link, videorank, text information and
playnum. Each of them combines video's properties with webpage's. Video search
engine based on the pavideoge can retrieve video more effectively. The
experiment results show the encouraging performance of our approach. Based on
the pavideoge, our video search engine can retrieve more precise videos in
comparsion with previous related work.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 09:39:17 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Oct 2009 17:39:28 GMT"
}
] | 2009-10-02T00:00:00 |
[
[
"Yang",
"Pu",
""
],
[
"Guo",
"Jun",
""
],
[
"Chen",
"Guang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.2504
|
Dominique Tschopp
|
Dominique Tschopp, Suhas Diggavi, Matthias Grossglauser
|
Hierarchical Routing over Dynamic Wireless Networks
|
29 pages, 19 figures, a shorter version was published in the
proceedings of the 2008 ACM Sigmetrics conference
| null | null |
LICOS-REPORT-2007-005
|
cs.NI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Wireless network topologies change over time and maintaining routes requires
frequent updates. Updates are costly in terms of consuming throughput available
for data transmission, which is precious in wireless networks. In this paper,
we ask whether there exist low-overhead schemes that produce low-stretch
routes. This is studied by using the underlying geometric properties of the
connectivity graph in wireless networks.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 09:57:50 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Sep 2009 08:06:15 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Tschopp",
"Dominique",
""
],
[
"Diggavi",
"Suhas",
""
],
[
"Grossglauser",
"Matthias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.2517
|
Sk Sarif Hassan s
|
Pabitra Pal Choudhury, Sk. Sarif Hassan, Sudhakar Sahoo, Soubhik
Chakraborty
|
On the Interesting World of Fractals and Their Applications to Music
|
This paper tell about music fractals. It is delivered at FRMS-2009
| null | null | null |
cs.OH
|
http://creativecommons.org/licenses/publicdomain/
|
In this paper we have defined one function that has been used to construct
different fractals having fractal dimensions between 1.58 and 2. Also, we tried
to calculate the amount of increment of fractal dimension in accordance with
the base of the number systems. Further, interestingly enough, these very
fractals could be a frame of lyrics for the musicians, as we know that the
fractal dimension of music is around 1.65 and varies between a high of 1.68 and
a low of 1.60. Further, at the end we conjecture that the switching from one
music fractal to another is nothing but enhancing a constant amount fractal
dimension which might be equivalent to a kind of different sets of musical
notes in various orientations.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 11:07:50 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Oct 2009 06:34:25 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Choudhury",
"Pabitra Pal",
""
],
[
"Hassan",
"Sk. Sarif",
""
],
[
"Sahoo",
"Sudhakar",
""
],
[
"Chakraborty",
"Soubhik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.2526
|
Olli Pottonen
|
Patric R. J. \"Osterg{\aa}rd and Olli Pottonen
|
Two Optimal One-Error-Correcting Codes of Length 13 That Are Not Doubly
Shortened Perfect Codes
|
v2: a correction concerning shortened codes of length 12
| null |
10.1007/s10623-010-9450-4
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The doubly shortened perfect codes of length 13 are classified utilizing the
classification of perfect codes in [P.R.J. \"Osterg{\aa}rd and O. Pottonen, The
perfect binary one-error-correcting codes of length 15: Part I -
Classification, IEEE Trans. Inform. Theory, to appear]; there are 117821 such
(13,512,3) codes. By applying a switching operation to those codes, two more
(13,512,3) codes are obtained, which are then not doubly shortened perfect
codes.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 12:04:50 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Feb 2011 13:57:11 GMT"
}
] | 2011-03-01T00:00:00 |
[
[
"Östergård",
"Patric R. J.",
""
],
[
"Pottonen",
"Olli",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2542
|
Vadim Yatsenko
|
Vadim Yatsenko (State Design Office Yuzhnoye, Ukraine)
|
Stochastic Optimization of Linear Dynamic Systems with Parametric
Uncertainties
|
Submitted to Journal of Automation and Information Science
| null | null | null |
cs.AI cs.IT math.IT
|
http://creativecommons.org/licenses/by/3.0/
|
This paper describes a new approach to solving some stochastic optimization
problems for linear dynamic system with various parametric uncertainties.
Proposed approach is based on application of tensor formalism for creation the
mathematical model of parametric uncertainties. Within proposed approach
following problems are considered: prediction, data processing and optimal
control. Outcomes of carried out simulation are used as illustration of
properties and effectiveness of proposed methods.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 13:02:31 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Yatsenko",
"Vadim",
"",
"State Design Office Yuzhnoye, Ukraine"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2547
|
Maxim Kolosovskiy
|
Maxim Kolosovskiy (Altai State Technical University, Russia)
|
Simple implementation of deletion from open-address hash table
|
6 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Deletion from open-address hash table is not so easy as deletion from chained
hash table, because in open-address table we can't simply mark a slot
containing deleted key as empty. Search for keys may become incorrect. The
classical method to implement deletion is to mark slots in hash table by three
values: "free", "busy", "deleted". That method is easy to implement, but there
are some disadvantages. In this article we consider alternative method of
deletion keys, where we avoid using the mark "deleted". The article contains
the implementation of the method in Java.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 13:36:58 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Kolosovskiy",
"Maxim",
"",
"Altai State Technical University, Russia"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.2622
|
Jiangyuan Li
|
Jiangyuan Li and Athina Petropulu
|
Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO
Wiretap Channels
|
29 pages, 10 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider a Gaussian multiple-input multiple-output (MIMO) wiretap channel
model, where there exists a transmitter, a legitimate receiver and an
eavesdropper, each node equipped with multiple antennas. We study the problem
of finding the optimal input covariance matrix that achieves secrecy capacity
subject to a power constraint, which leads to a non-convex optimization problem
that is in general difficult to solve. Existing results for this problem
address the case in which the transmitter and the legitimate receiver have two
antennas each and the eavesdropper has one antenna. For the general cases, it
has been shown that the optimal input covariance matrix has low rank when the
difference between the Grams of the eavesdropper and the legitimate receiver
channel matrices is indefinite or semi-definite, while it may have low rank or
full rank when the difference is positive definite. In this paper, the
aforementioned non-convex optimization problem is investigated. In particular,
for the multiple-input single-output (MISO) wiretap channel, the optimal input
covariance matrix is obtained in closed form. For general cases, we derive the
necessary conditions for the optimal input covariance matrix consisting of a
set of equations. For the case in which the transmitter has two antennas, the
derived necessary conditions can result in a closed form solution; For the case
in which the difference between the Grams is indefinite and has all negative
eigenvalues except one positive eigenvalue, the optimal input covariance matrix
has rank one and can be obtained in closed form; For other cases, the solution
is proved to be a fixed point of a mapping from a convex set to itself and an
iterative procedure is provided to search for it. Numerical results are
presented to illustrate the proposed theoretical findings.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 19:07:49 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Li",
"Jiangyuan",
""
],
[
"Petropulu",
"Athina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2623
|
Reza Akbarinia
|
Reza Akbarinia (INRIA - Lina), Esther Pacitti (INRIA - Lina), Patrick
Valduriez (INRIA - Lina)
|
Reducing Network Traffic in Unstructured P2P Systems Using Top-k Queries
| null |
Distributed and Parallel Databases 19, 2-3 (2006) 67-86
|
10.1007/s10619-006-8313-5
| null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A major problem of unstructured P2P systems is their heavy network traffic.
This is caused mainly by high numbers of query answers, many of which are
irrelevant for users. One solution to this problem is to use Top-k queries
whereby the user can specify a limited number (k) of the most relevant answers.
In this paper, we present FD, a (Fully Distributed) framework for executing
Top-k queries in unstructured P2P systems, with the objective of reducing
network traffic. FD consists of a family of algorithms that are simple but
effec-tive. FD is completely distributed, does not depend on the existence of
certain peers, and addresses the volatility of peers during query execution. We
vali-dated FD through implementation over a 64-node cluster and simulation
using the BRITE topology generator and SimJava. Our performance evaluation
shows that FD can achieve major performance gains in terms of communication and
response time.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 19:07:58 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Akbarinia",
"Reza",
"",
"INRIA - Lina"
],
[
"Pacitti",
"Esther",
"",
"INRIA - Lina"
],
[
"Valduriez",
"Patrick",
"",
"INRIA - Lina"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.2626
|
Laurent Romary
|
Susanne Salmon-Alt (INRIA Lorraine - LORIA), Laurent Romary (INRIA
Lorraine - LORIA)
|
Reference Resolution within the Framework of Cognitive Grammar
|
Colloque avec actes et comit\'e de lecture. internationale
|
International Colloqium on Cognitive Science, San Sebastian :
Spain (2001)
| null |
A01-R-057 || salmon-alt01a
|
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Following the principles of Cognitive Grammar, we concentrate on a model for
reference resolution that attempts to overcome the difficulties previous
approaches, based on the fundamental assumption that all reference (independent
on the type of the referring expression) is accomplished via access to and
restructuring of domains of reference rather than by direct linkage to the
entities themselves. The model accounts for entities not explicitly mentioned
but understood in a discourse, and enables exploitation of discursive and
perceptual context to limit the set of potential referents for a given
referring expression. As the most important feature, we note that a single
mechanism is required to handle what are typically treated as diverse
phenomena. Our approach, then, provides a fresh perspective on the relations
between Cognitive Grammar and the problem of reference.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 19:10:59 GMT"
}
] | 2009-09-15T00:00:00 |
[
[
"Salmon-Alt",
"Susanne",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA\n Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.2694
|
Ilia Toli
|
Ilia Toli
|
Singularity of Sparse Circulant Matrices is NP-complete
|
References are somewhere in the middle, before the appendices. 8
pages
| null | null | null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is shown by Karp reduction that deciding the singularity of $(2^n - 1)
\times (2^n - 1)$ sparse circulant matrices (SC problem) is NP-complete. We can
write them only implicitly, by indicating values of the $2 + n(n + 1)/2$
eventually nonzero entries of the first row and can make all matrix operations
with them. The positions are $0, 1, 2^{i} + 2^{j}$. The complexity parameter is
$n$. Mulmuley's work on the rank of matrices \cite{Mulmuley87} makes SC stand
alone in a list of 3,000 and growing NP-complete problems.
|
[
{
"version": "v1",
"created": "Mon, 14 Sep 2009 23:26:54 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Toli",
"Ilia",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.2704
|
Aaron Sterling
|
Aaron Sterling
|
Memory Consistency Conditions for Self-Assembly Programming
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Perhaps the two most significant theoretical questions about the programming
of self-assembling agents are: (1) necessary and sufficient conditions to
produce a unique terminal assembly, and (2) error correction. We address both
questions, by reducing two well-studied models of tile assembly to models of
distributed shared memory (DSM), in order to obtain results from the memory
consistency systems induced by tile assembly systems when simulated in the DSM
setting. The Abstract Tile Assembly Model (aTAM) can be simulated by a DSM
system that obeys causal consistency, and the locally deterministic tile
assembly systems in the aTAM correspond exactly to the concurrent-write free
programs that simulate tile assembly in such a model. Thus, the detection of
the failure of local determinism (which had formerly been an open problem)
reduces to the detection of data races in simulating programs. Further, the
Kinetic Tile Assembly Model can be simulated by a DSM system that obeys GWO, a
memory consistency condition defined by Steinke and Nutt. (To our knowledge,
this is the first natural example of a DSM system that obeys GWO, but no
stronger consistency condition.) We combine these results with the observation
that self-assembly algorithms are local algorithms, and there exists a fast
conversion of deterministic local algorithms into deterministic
self-stabilizing algorithms. This provides an "immediate" generalization of a
theorem by Soloveichik et al. about the existence of tile assembly systems that
simultaneously perform two forms of self-stabilization: proofreading and
self-healing. Our reductions and proof techniques can be extended to the
programming of self-assembling agents in a variety of media, not just DNA
tiles, and not just two-dimensional surfaces.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 19:45:22 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Sterling",
"Aaron",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.2705
|
Wei Dai
|
Wei Dai and Olgica Milenkovic
|
SET: an algorithm for consistent matrix completion
|
4+ pages, submitted to ICASSP 2010
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A new algorithm, termed subspace evolution and transfer (SET), is proposed
for solving the consistent matrix completion problem. In this setting, one is
given a subset of the entries of a low-rank matrix, and asked to find one
low-rank matrix consistent with the given observations. We show that this
problem can be solved by searching for a column space that matches the
observations. The corresponding algorithm consists of two parts -- subspace
evolution and subspace transfer. In the evolution part, we use a line search
procedure to refine the column space. However, line search is not guaranteed to
converge, as there may exist barriers along the search path that prevent the
algorithm from reaching a global optimum. To address this problem, in the
transfer part, we design mechanisms to detect barriers and transfer the
estimated column space from one side of the barrier to the another. The SET
algorithm exhibits excellent empirical performance for very low-rank matrices.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 02:42:58 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Sep 2009 20:26:21 GMT"
},
{
"version": "v3",
"created": "Sat, 19 Sep 2009 05:23:28 GMT"
},
{
"version": "v4",
"created": "Tue, 29 Sep 2009 19:33:47 GMT"
},
{
"version": "v5",
"created": "Wed, 3 Feb 2010 16:49:26 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Milenkovic",
"Olgica",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2706
|
Yingwu Zhu
|
Yingwu Zhu
|
Measurement and Analysis of an Online Content Voting Network: A Case
Study of Digg
|
12 pages, first draft in April 2009
| null | null | null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Emergence of online content voting networks allows users to share and rate
content including social news, photos and videos. The basic idea behind online
content voting networks is that aggregate user activities (e.g., submitting and
rating content) makes high-quality content thrive through the unprecedented
scale, high dynamics and divergent quality of user generated content (UGC). To
better understand the nature and impact of online content voting networks, we
have analyzed Digg, a popular online social news aggregator and rating website.
Based on a large amount of data collected, we provide an in-depth study of
Digg. In particular, we study structural properties of Digg social network,
impact of social network properties on user digging activities and vice versa,
distribution of user diggs, content promotion, and information filtering. We
also provide insight into design of content promotion algorithms and
recommendation-assisted content discovery. Overall, we believe that the results
presented in this paper are crucial in understanding online content rating
networks.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 02:58:04 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Zhu",
"Yingwu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.2715
|
Laurent Romary
|
Dan Cristea, Nancy Ide, Laurent Romary (INRIA Lorraine - LORIA)
|
Marking-up multiple views of a Text: Discourse and Reference
| null |
First International Language Resources and Evaluation Conference,
Grenada, Espagne : France (1998)
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe an encoding scheme for discourse structure and reference, based
on the TEI Guidelines and the recommendations of the Corpus Encoding
Specification (CES). A central feature of the scheme is a CES-based data
architecture enabling the encoding of and access to multiple views of a
marked-up document. We describe a tool architecture that supports the encoding
scheme, and then show how we have used the encoding scheme and the tools to
perform a discourse analytic task in support of a model of global discourse
cohesion called Veins Theory (Cristea & Ide, 1998).
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 06:02:56 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Cristea",
"Dan",
"",
"INRIA Lorraine - LORIA"
],
[
"Ide",
"Nancy",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.2718
|
Laurent Romary
|
Nancy Ide (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine -
LORIA), Tomaz Erjavec
|
A Common XML-based Framework for Syntactic Annotations
|
Colloque avec actes et comit\'e de lecture. internationale
|
1st NLP and XML Workshop, Tokyo, Japan : Japan (2001)
| null |
A01-R-289 || ide01d
|
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
It is widely recognized that the proliferation of annotation schemes runs
counter to the need to re-use language resources, and that standards for
linguistic annotation are becoming increasingly mandatory. To answer this need,
we have developed a framework comprised of an abstract model for a variety of
different annotation types (e.g., morpho-syntactic tagging, syntactic
annotation, co-reference annotation, etc.), which can be instantiated in
different ways depending on the annotator's approach and goals. In this paper
we provide an overview of the framework, demonstrate its applicability to
syntactic annotation, and show how it can contribute to comparative evaluation
of parser output and diverse syntactic annotation schemes.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 06:09:47 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Ide",
"Nancy",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Erjavec",
"Tomaz",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.2719
|
Laurent Romary
|
Nancy Ide (COMPUTER Science Department), Laurent Romary (INRIA
Lorraine - Loria)
|
Standards for Language Resources
|
Colloque avec actes et comit\'e de lecture. internationale
|
Third International Conference on Language Resources and
Evaluation - LREC 2002, Las Palmas, Spain : France (2002)
| null |
A02-R-096 || ide02a
|
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents an abstract data model for linguistic annotations and its
implementation using XML, RDF and related standards; and to outline the work of
a newly formed committee of the International Standards Organization (ISO),
ISO/TC 37/SC 4 Language Resource Management, which will use this work as its
starting point. The primary motive for presenting the latter is to solicit the
participation of members of the research community to contribute to the work of
the committee.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 06:10:45 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Ide",
"Nancy",
"",
"COMPUTER Science Department"
],
[
"Romary",
"Laurent",
"",
"INRIA\n Lorraine - Loria"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.2721
|
Laurent Romary
|
Minit Gupta (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine -
LORIA)
|
Dynamically Generated Interfaces in XML Based Architecture
|
Colloque avec actes et comit\'e de lecture. internationale
|
User Interface Markup Language - UIMl'2001, Paris : France (2001)
| null |
A01-R-293 || gupta01a
|
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Providing on-line services on the Internet will require the definition of
flexible interfaces that are capable of adapting to the user's characteristics.
This is all the more important in the context of medical applications like home
monitoring, where no two patients have the same medical profile. Still, the
problem is not limited to the capacity of defining generic interfaces, as has
been made possible by UIML, but also to define the underlying information
structures from which these may be generated. The DIATELIC project deals with
the tele-monitoring of patients under peritoneal dialysis. By means of XML
abstractions, termed as "medical components", to represent the patient's
profile, the application configures the customizable properties of the
patient's interface and generates a UIML document dynamically. The interface
allows the patient to feed the data manually or use a device which allows
"automatic data acquisition". The acquired medical data is transferred to an
expert system, which analyses the data and sends alerts to the medical staff.
In this paper we show how UIML can be seen as one component within a global XML
based architecture.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 06:18:26 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Gupta",
"Minit",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine -\n LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.2733
|
Pierre Fraigniaud
|
Pierre Fraigniaud and Amos Korman
|
An Optimal Labeling Scheme for Ancestry Queries
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An ancestry labeling scheme assigns labels (bit strings) to the nodes of
rooted trees such that ancestry queries between any two nodes in a tree can be
answered merely by looking at their corresponding labels. The quality of an
ancestry labeling scheme is measured by its label size, that is the maximal
number of bits in a label of a tree node.
In addition to its theoretical appeal, the design of efficient ancestry
labeling schemes is motivated by applications in web search engines. For this
purpose, even small improvements in the label size are important. In fact, the
literature about this topic is interested in the exact label size rather than
just its order of magnitude. As a result, following the proposal of a simple
interval-based ancestry scheme with label size $2\log_2 n$ bits (Kannan et al.,
STOC '88), a considerable amount of work was devoted to improve the bound on
the size of a label. The current state of the art upper bound is $\log_2 n +
O(\sqrt{\log n})$ bits (Abiteboul et al., SODA '02) which is still far from the
known $\log_2 n + \Omega(\log\log n)$ bits lower bound (Alstrup et al., SODA
'03).
In this paper we close the gap between the known lower and upper bounds, by
constructing an ancestry labeling scheme with label size $\log_2 n + O(\log\log
n)$ bits. In addition to the optimal label size, our scheme assigns the labels
in linear time and can support any ancestry query in constant time.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 13:31:54 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Fraigniaud",
"Pierre",
""
],
[
"Korman",
"Amos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.2737
|
Yin Xiang
|
Yin Xiang, Lianlin Li, Fang Li
|
Compressive sensing by white random convolution
|
10 pages with 4 figures
| null | null | null |
math.OC cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A different compressive sensing framework, convolution with white noise
waveform followed by subsampling at fixed (not randomly selected) locations, is
studied in this paper. We show that its recoverability for sparse signals
depends on the coherence (denoted by mu) between the signal representation and
the Fourier basis. In particular, an n-dimensional signal which is S-sparse in
such a basis can be recovered with a probability exceeding 1-delta from any
fixed m~O(mu^2*S*log(n/delta)^(3/2)) output samples of the random convolution.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 08:05:42 GMT"
},
{
"version": "v2",
"created": "Wed, 30 Sep 2009 09:32:15 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Xiang",
"Yin",
""
],
[
"Li",
"Lianlin",
""
],
[
"Li",
"Fang",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2767
|
Vahan Mkrtchyan
|
Davit Aslanyan, Vahan V. Mkrtchyan, Samvel S. Petrosyan, Gagik N.
Vardanyan
|
On disjoint matchings in cubic graphs: maximum 2- and 3-edge-colorable
subgraphs
|
31 pages, 14 figures, majorly revised
|
Discrete Applied Mathematics 172 (2014) pp. 12--27
|
10.1016/j.dam.2014.03.001
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show that any $2-$factor of a cubic graph can be extended to a maximum
$3-$edge-colorable subgraph. We also show that the sum of sizes of maximum $2-$
and $3-$edge-colorable subgraphs of a cubic graph is at least twice of its
number of vertices. Finally, for a cubic graph $G$, consider the pairs of
edge-disjoint matchings whose union consists of as many edges as possible. Let
$H$ be the largest matching among such pairs. Let $M$ be a maximum matching of
$G$. We show that 9/8 is a tight upper bound for $|M|/|H|$.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 11:00:49 GMT"
},
{
"version": "v2",
"created": "Fri, 24 Dec 2010 10:40:26 GMT"
},
{
"version": "v3",
"created": "Wed, 10 Oct 2012 16:26:33 GMT"
}
] | 2014-05-01T00:00:00 |
[
[
"Aslanyan",
"Davit",
""
],
[
"Mkrtchyan",
"Vahan V.",
""
],
[
"Petrosyan",
"Samvel S.",
""
],
[
"Vardanyan",
"Gagik N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.2777
|
Hossein Bagheri
|
Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani
|
On the Symmetric Gaussian Interference Channel with Partial
Unidirectional Cooperation
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A two-user symmetric Gaussian Interference Channel (IC) is considered in
which a noiseless unidirectional link connects one encoder to the other. Having
a constant capacity, the additional link provides partial cooperation between
the encoders. It is shown that the available cooperation can dramatically
increase the sum-capacity of the channel. This fact is proved based on
comparison of proposed lower and upper bounds on the sum-capacity. Partitioning
the data into three independent messages, namely private, common, and
cooperative ones, the transmission strategy used to obtain the lower bound
enjoys a simple type of Han-Kobayashi scheme together with a cooperative
communication scheme. A Genie-aided upper bound is developed which incorporates
the capacity of the cooperative link. Other upper bounds are based on the
sum-capacity of the Cognitive Radio Channel and cut-set bounds. For the strong
interference regime, the achievablity scheme is simplified to employ common
and/or cooperative messages but not the private one. Through a careful analysis
it is shown that the gap between these bounds is at most one and two bits per
real dimension for strong and weak interference regimes, respectively.
Moreover, the Generalized Degrees-of-Freedom of the channel is characterized.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 11:48:57 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Bagheri",
"Hossein",
""
],
[
"Motahari",
"Abolfazl S.",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2787
|
Tamara Mchedlidze David
|
Tamara Mchedlidze, Antonios Symvonis
|
Crossing-Free Acyclic Hamiltonian Path Completion for Planar st-Digraphs
|
Accepted to ISAAC2009
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study the problem of existence of a crossing-free acyclic
hamiltonian path completion (for short, HP-completion) set for embedded upward
planar digraphs. In the context of book embeddings, this question becomes:
given an embedded upward planar digraph $G$, determine whether there exists an
upward 2-page book embedding of $G$ preserving the given planar embedding.
Given an embedded $st$-digraph $G$ which has a crossing-free HP-completion
set, we show that there always exists a crossing-free HP-completion set with at
most two edges per face of $G$. For an embedded $N$-free upward planar digraph
$G$, we show that there always exists a crossing-free acyclic HP-completion set
for $G$ which, moreover, can be computed in linear time. For a width-$k$
embedded planar $st$-digraph $G$, we show that we can be efficiently test
whether $G$ admits a crossing-free acyclic HP-completion set.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 12:12:06 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Mchedlidze",
"Tamara",
""
],
[
"Symvonis",
"Antonios",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.2793
|
Ge Di
|
D. Ge, J. Idier and E. Le Carpentier
|
Enhanced sampling schemes for MCMC based blind Bernoulli-Gaussian
deconvolution
| null | null | null | null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes and compares two new sampling schemes for sparse
deconvolution using a Bernoulli-Gaussian model. To tackle such a deconvolution
problem in a blind and unsupervised context, the Markov Chain Monte Carlo
(MCMC) framework is usually adopted, and the chosen sampling scheme is most
often the Gibbs sampler. However, such a sampling scheme fails to explore the
state space efficiently. Our first alternative, the $K$-tuple Gibbs sampler, is
simply a grouped Gibbs sampler. The second one, called partially marginalized
sampler, is obtained by integrating the Gaussian amplitudes out of the target
distribution. While the mathematical validity of the first scheme is obvious as
a particular instance of the Gibbs sampler, a more detailed analysis is
provided to prove the validity of the second scheme.
For both methods, optimized implementations are proposed in terms of
computation and storage cost. Finally, simulation results validate both schemes
as more efficient in terms of convergence time compared with the plain Gibbs
sampler. Benchmark sequence simulations show that the partially marginalized
sampler takes fewer iterations to converge than the $K$-tuple Gibbs sampler.
However, its computation load per iteration grows almost quadratically with
respect to the data length, while it only grows linearly for the $K$-tuple
Gibbs sampler.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 12:29:26 GMT"
},
{
"version": "v2",
"created": "Fri, 18 Sep 2009 14:58:05 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Ge",
"D.",
""
],
[
"Idier",
"J.",
""
],
[
"Carpentier",
"E. Le",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0909.2814
|
Ren\'e van Bevern
|
Ren\'e van Bevern
|
Graph-based data clustering: a quadratic-vertex problem kernel for
s-Plex Cluster Vertex Deletion
|
41 pages, 17 figures
|
Algorithmica, 62(3-4):930-950, 2012
|
10.1007/s00453-011-9492-7
| null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the s-Plex Cluster Vertex Deletion problem. Like the Cluster
Vertex Deletion problem, it is NP-hard and motivated by graph-based data
clustering. While the task in Cluster Vertex Deletion is to delete vertices
from a graph so that its connected components become cliques, the task in
s-Plex Cluster Vertex Deletion is to delete vertices from a graph so that its
connected components become s-plexes. An s-plex is a graph in which every
vertex is nonadjacent to at most s-1 other vertices; a clique is an 1-plex. In
contrast to Cluster Vertex Deletion, s-Plex Cluster Vertex Deletion allows to
balance the number of vertex deletions against the sizes and the density of the
resulting clusters, which are s-plexes instead of cliques. The focus of this
work is the development of provably efficient and effective data reduction
rules for s-Plex Cluster Vertex Deletion. In terms of fixed-parameter
algorithmics, these yield a so-called problem kernel. A similar problem, s-Plex
Editing, where the task is the insertion or the deletion of edges so that the
connected components of a graph become s-plexes, has also been studied in terms
of fixed-parameter algorithmics. Using the number of allowed graph
modifications as parameter, we expect typical parameter values for s-Plex
Cluster Vertex Deletion to be significantly lower than for s-Plex Editing,
because one vertex deletion can lead to a high number of edge deletions. This
holds out the prospect for faster fixed-parameter algorithms for s-Plex Cluster
Vertex Deletion.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 17:27:00 GMT"
}
] | 2019-11-14T00:00:00 |
[
[
"van Bevern",
"René",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.2816
|
Christian Feldbauer
|
Emine Zerrin Sakir and Christian Feldbauer
|
Efficient Quality-Based Playout Buffer Algorithm
|
6 pages
| null | null | null |
cs.MM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Playout buffers are used in VoIP systems to compensate for network delay
jitter by making a trade-off between delay and loss. In this work we propose a
playout buffer algorithm that makes the trade-off based on maximization of
conversational speech quality, aiming to keep the computational complexity
lowest possible. We model the network delay using a Pareto distribution and
show that it is a good compromise between providing an appropriate fit to the
network delay characteristics and yielding a low arithmetical complexity. We
use the ITU-T E-Model as the quality model and simplify its delay impairment
function. The proposed playout buffer algorithm finds the optimum playout delay
using a closed-form solution that minimizes the sum of the simplified delay
impairment factor and the loss-dependent equipment impairment factor of the
E-model. The simulation results show that our proposed algorithm outperforms
existing state-of-the-art algorithms with a reduced complexity for a
quality-based algorithm.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 14:44:21 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Sakir",
"Emine Zerrin",
""
],
[
"Feldbauer",
"Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
}
] |
0909.2817
|
ShinnYih Huang
|
ShinnYih Huang and Hoda Bidkhori
|
Strongly Cancellative and Recovering Sets On Lattices
|
9 pages
| null | null | null |
math.CO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We use information theory to study recovering sets $\R_L$ and strongly
cancellative sets $\C_L$ on different lattices. These sets are special classes
of recovering pairs and cancellative sets previously discussed in [1], [3] and
[5]. We mainly focus on the lattices $B_n$ and $D_{l}^{k}$. Specifically, we
find upper bounds and constructions for the sets $\R_{B_n}$, $\C_{B_n}$, and
$\C_{D_{l}^{k}}$.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 16:49:58 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Huang",
"ShinnYih",
""
],
[
"Bidkhori",
"Hoda",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2839
|
Alban Ponse
|
Jan A. Bergstra, Alban Ponse
|
A progression ring for interfaces of instruction sequences, threads, and
services
|
12 pages
| null | null | null |
cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We define focus-method interfaces and some connections between such
interfaces and instruction sequences, giving rise to instruction sequence
components. We provide a flexible and practical notation for interfaces using
an abstract datatype specification comparable to that of basic process algebra
with deadlock. The structures thus defined are called progression rings. We
also define thread and service components. Two types of composition of
instruction sequences or threads and services (called `use' and `apply') are
lifted to the level of components.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 16:59:57 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Bergstra",
"Jan A.",
""
],
[
"Ponse",
"Alban",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
0909.2849
|
Shayan Oveis Gharan
|
Shayan Oveis Gharan, Amin Saberi
|
The Asymmetric Traveling Salesman Problem on Graphs with Bounded Genus
| null | null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a constant factor approximation algorithm for the asymmetric
traveling salesman problem when the support graph of the solution of the
Held-Karp linear programming relaxation has bounded orientable genus.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 18:39:03 GMT"
},
{
"version": "v2",
"created": "Thu, 17 Sep 2009 17:46:49 GMT"
},
{
"version": "v3",
"created": "Sat, 7 Nov 2009 17:11:54 GMT"
},
{
"version": "v4",
"created": "Fri, 14 Jan 2011 20:49:58 GMT"
}
] | 2011-01-17T00:00:00 |
[
[
"Gharan",
"Shayan Oveis",
""
],
[
"Saberi",
"Amin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.2852
|
Ashwin Jain
|
Ashwin Jain, C Hari
|
A new efficient k-out-of-n Oblivious Transfer protocol
|
12 pages, 1 figure
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper presents a new efficient protocol for k-out-of-n oblivious
transfer which is a generalization of Parakh's 1-out-of-2 oblivious transfer
protocol based on Diffie-Hellman key exchange. In the proposed protocol, the
parties involved generate Diffie-Hellman keys obliviously and then use them for
oblivious transfer of secrets.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 18:49:24 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Jain",
"Ashwin",
""
],
[
"Hari",
"C",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.2859
|
Petar Maymounkov
|
Jonathan Kelner, Petar Maymounkov
|
Electric routing and concurrent flow cutting
|
21 pages, 0 figures. To be published in Springer LNCS Book No. 5878,
Proceedings of The 20th International Symposium on Algorithms and Computation
(ISAAC'09)
| null | null | null |
cs.DM cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate an oblivious routing scheme, amenable to distributed
computation and resilient to graph changes, based on electrical flow. Our main
technical contribution is a new rounding method which we use to obtain a bound
on the L1->L1 operator norm of the inverse graph Laplacian. We show how this
norm reflects both latency and congestion of electric routing.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 19:50:37 GMT"
}
] | 2009-09-16T00:00:00 |
[
[
"Kelner",
"Jonathan",
""
],
[
"Maymounkov",
"Petar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.2891
|
Michael Goodrich
|
David Eppstein, Michael T. Goodrich, Lowell Trott
|
Going Off-road: Transversal Complexity in Road Networks
|
Fuller version of paper appearing in ACM GIS '09
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A geometric graph is a graph embedded in the plane with vertices at points
and edges drawn as curves (which are usually straight line segments) between
those points. The average transversal complexity of a geometric graph is the
number of edges of that graph that are crossed by random line or line segment.
In this paper, we study the average transversal complexity of road networks. By
viewing road networks as multiscale-dispersed graphs, we show that a random
line will cross the edges of such a graph O(sqrt(n)) times on average. In
addition, we provide by empirical evidence from experiments on the road
networks of the fifty states of United States and the District of Columbia that
this bound holds in practice and has a small constant factor. Combining this
result with data structuring techniques from computational geometry, allows us
to show that we can then do point location and ray-shooting navigational
queries with respect to road networks in O(sqrt(n) log n) expected time.
Finally, we provide empirical justification for this claim as well.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 22:09:19 GMT"
}
] | 2009-09-17T00:00:00 |
[
[
"Eppstein",
"David",
""
],
[
"Goodrich",
"Michael T.",
""
],
[
"Trott",
"Lowell",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.2894
|
Jun Zhang
|
Jun Zhang and Jeffrey G. Andrews
|
Adaptive Spatial Intercell Interference Cancellation in Multicell
Wireless Networks
|
26 pages, submitted to IEEE J. Select. Areas Commun. special issue on
Cooperative Communications in MIMO Cellular Networks, Sept. 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Downlink spatial intercell interference cancellation (ICIC) is considered for
mitigating other-cell interference using multiple transmit antennas. A
principle question we explore is whether it is better to do ICIC or simply
standard single-cell beamforming. We explore this question analytically and
show that beamforming is preferred for all users when the edge SNR
(signal-to-noise ratio) is low ($<0$ dB), and ICIC is preferred when the edge
SNR is high ($>10$ dB), for example in an urban setting. At medium SNR, a
proposed adaptive strategy, where multiple base stations jointly select
transmission strategies based on the user location, outperforms both while
requiring a lower feedback rate than the pure ICIC approach. The employed
metric is sum rate, which is normally a dubious metric for cellular systems,
but surprisingly we show that even with this reward function the adaptive
strategy also improves fairness. When the channel information is provided by
limited feedback, the impact of the induced quantization error is also
investigated. It is shown that ICIC with well-designed feedback strategies
still provides significant throughput gain.
|
[
{
"version": "v1",
"created": "Tue, 15 Sep 2009 22:32:22 GMT"
},
{
"version": "v2",
"created": "Tue, 22 Sep 2009 19:22:16 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Zhang",
"Jun",
""
],
[
"Andrews",
"Jeffrey G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.2927
|
Vitaly Feldman
|
Vitaly Feldman
|
Distribution-Specific Agnostic Boosting
| null |
Proceedings of Innovations in Computer Science (ICS), 2010, pp
241-250
| null | null |
cs.LG cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the problem of boosting the accuracy of weak learning algorithms
in the agnostic learning framework of Haussler (1992) and Kearns et al. (1992).
Known algorithms for this problem (Ben-David et al., 2001; Gavinsky, 2002;
Kalai et al., 2008) follow the same strategy as boosting algorithms in the PAC
model: the weak learner is executed on the same target function but over
different distributions on the domain. We demonstrate boosting algorithms for
the agnostic learning framework that only modify the distribution on the labels
of the points (or, equivalently, modify the target function). This allows
boosting a distribution-specific weak agnostic learner to a strong agnostic
learner with respect to the same distribution.
When applied to the weak agnostic parity learning algorithm of Goldreich and
Levin (1989) our algorithm yields a simple PAC learning algorithm for DNF and
an agnostic learning algorithm for decision trees over the uniform distribution
using membership queries. These results substantially simplify Jackson's famous
DNF learning algorithm (1994) and the recent result of Gopalan et al. (2008).
We also strengthen the connection to hard-core set constructions discovered
by Klivans and Servedio (1999) by demonstrating that hard-core set
constructions that achieve the optimal hard-core set size (given by Holenstein
(2005) and Barak et al. (2009)) imply distribution-specific agnostic boosting
algorithms. Conversely, our boosting algorithm gives a simple hard-core set
construction with an (almost) optimal hard-core set size.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 06:19:12 GMT"
}
] | 2012-02-22T00:00:00 |
[
[
"Feldman",
"Vitaly",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.2934
|
Ron Meir
|
D. Di Castro and R. Meir
|
A Convergent Online Single Time Scale Actor Critic Algorithm
| null | null | null | null |
cs.LG cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Actor-Critic based approaches were among the first to address reinforcement
learning in a general setting. Recently, these algorithms have gained renewed
interest due to their generality, good convergence properties, and possible
biological relevance. In this paper, we introduce an online temporal difference
based actor-critic algorithm which is proved to converge to a neighborhood of a
local maximum of the average reward. Linear function approximation is used by
the critic in order estimate the value function, and the temporal difference
signal, which is passed from the critic to the actor. The main distinguishing
feature of the present convergence proof is that both the actor and the critic
operate on a similar time scale, while in most current convergence proofs they
are required to have very different time scales in order to converge. Moreover,
the same temporal difference signal is used to update the parameters of both
the actor and the critic. A limitation of the proposed approach, compared to
results available for two time scale convergence, is that convergence is
guaranteed only to a neighborhood of an optimal value, rather to an optimal
value itself. The single time scale and identical temporal difference signal
used by the actor and the critic, may provide a step towards constructing more
biologically realistic models of reinforcement learning in the brain.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 07:08:44 GMT"
}
] | 2009-09-17T00:00:00 |
[
[
"Di Castro",
"D.",
""
],
[
"Meir",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.3005
|
Terry Rudolph
|
Terry Rudolph
|
A simple encoding of a quantum circuit amplitude as a matrix permanent
|
6 figures
| null |
10.1103/PhysRevA.80.054302
| null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simple construction is presented which allows computing the transition
amplitude of a quantum circuit to be encoded as computing the permanent of a
matrix which is of size proportional to the number of quantum gates in the
circuit. This opens up some interesting classical monte-carlo algorithms for
approximating quantum circuits.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 13:12:15 GMT"
}
] | 2013-05-29T00:00:00 |
[
[
"Rudolph",
"Terry",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.3027
|
Emmanuel Prochasson
|
Emmanuel Ep Prochasson (LINA), Christian Viard-Gaudin (IRCCyN),
Emmanuel Morin (LINA)
|
Language Models for Handwritten Short Message Services
| null |
International Conference on Document Analysis and Recognition,
Brazil (2007)
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Handwriting is an alternative method for entering texts composing Short
Message Services. However, a whole new language features the texts which are
produced. They include for instance abbreviations and other consonantal writing
which sprung up for time saving and fashion. We have collected and processed a
significant number of such handwriting SMS, and used various strategies to
tackle this challenging area of handwriting recognition. We proposed to study
more specifically three different phenomena: consonant skeleton, rebus, and
phonetic writing. For each of them, we compare the rough results produced by a
standard recognition system with those obtained when using a specific language
model.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 14:38:19 GMT"
}
] | 2009-09-17T00:00:00 |
[
[
"Prochasson",
"Emmanuel Ep",
"",
"LINA"
],
[
"Viard-Gaudin",
"Christian",
"",
"IRCCyN"
],
[
"Morin",
"Emmanuel",
"",
"LINA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.3028
|
Emmanuel Prochasson
|
Emmanuel Prochasson (LINA), Emmanuel Morin (LINA), Christian
Viard-Gaudin (IRCCyN)
|
Vers la reconnaissance de mini-messages manuscrits
| null |
Colloque International sur le Lexique et la Grammaire, Bonifacio :
France (2007)
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Handwriting is an alternative method for entering texts which composed Short
Message Services. However, a whole new language features the texts which are
produced. They include for instance abbreviations and other consonantal writing
which sprung up for time saving and fashion. We have collected and processed a
significant number of such handwritten SMS, and used various strategies to
tackle this challenging area of handwriting recognition. We proposed to study
more specifically three different phenomena: consonant skeleton, rebus, and
phonetic writing. For each of them, we compare the rough results produced by a
standard recognition system with those obtained when using a specific language
model to take care of them.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 14:39:05 GMT"
}
] | 2009-09-17T00:00:00 |
[
[
"Prochasson",
"Emmanuel",
"",
"LINA"
],
[
"Morin",
"Emmanuel",
"",
"LINA"
],
[
"Viard-Gaudin",
"Christian",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.3055
|
Syed Qaseem
|
Syed T. Qaseem, Tareq Y. Al-Naffouri
|
Compressive Sensing Based Opportunistic Protocol for Throughput
Improvement in Wireless Networks
|
Submitted to IEEE Transactions on Communications, August 2009
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A key feature in the design of any MAC protocol is the throughput it can
provide. In wireless networks, the channel of a user is not fixed but varies
randomly. Thus, in order to maximize the throughput of the MAC protocol at any
given time, only users with large channel gains should be allowed to transmit.
In this paper, compressive sensing based opportunistic protocol for throughput
improvement in wireless networks is proposed. The protocol is based on the
traditional protocol of R-ALOHA which allows users to compete for channel
access before reserving the channel to the best user. We use compressive
sensing to find the best user, and show that the proposed protocol requires
less time for reservation and so it outperforms other schemes proposed in
literature. This makes the protocol particularly suitable for enhancing R-ALOHA
in fast fading environments. We consider both analog and digital versions of
the protocol where the channel gains sent by the user are analog and digital,
respectively.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 16:21:26 GMT"
}
] | 2009-09-17T00:00:00 |
[
[
"Qaseem",
"Syed T.",
""
],
[
"Al-Naffouri",
"Tareq Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3080
|
Jean-Philippe Cointet
|
Jean-Philippe Cointet (CREA, Inra - Sens), Camille Roth (CREA, Cams)
|
Socio-semantic dynamics in a blog network
| null |
IEEE International Conference on Social Computing (SocialCom-09),
Vancouver : Canada (2009)
| null | null |
cs.CY physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The blogosphere can be construed as a knowledge network made of bloggers who
are interacting through a social network to share, exchange or produce
information. We claim that the social and semantic dimensions are essentially
co-determined and propose to investigate the co-evolutionary dynamics of the
blogosphere by examining two intertwined issues: First, how does knowledge
distribution drive new interactions and thus influence the social network
topology? Second, which role structural network properties play in the
information circulation in the system? We adopt an empirical standpoint by
analyzing the semantic and social activity of a portion of the US political
blogosphere, monitored on a period of four months.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 18:43:39 GMT"
}
] | 2009-09-20T00:00:00 |
[
[
"Cointet",
"Jean-Philippe",
"",
"CREA, Inra - Sens"
],
[
"Roth",
"Camille",
"",
"CREA, Cams"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0909.3091
|
Xin Liu
|
Xin Liu, John Kountouriotis, Athina P. Petropulu and Kapil R. Dandekar
|
ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined
Radio Implementation
| null | null |
10.1109/TSP.2010.2048315
| null |
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is
proposed for high throughput wireless communications in a cellular scenario.
Transmissions occur in a time-slotted ALOHA-type fashion but with an important
difference: simultaneous transmissions of two users can be successful. If more
than two users transmit in the same slot the collision cannot be resolved and
retransmission is required. If only one user transmits, the transmitted packet
is recovered with some probability, depending on the state of the channel. If
two users transmit the collision is resolved and the packets are recovered by
first over-sampling the collision signal and then exploiting independent
information about the two users that is contained in the signal polyphase
components. The ALOHA-CR throughput is derived under the infinite backlog
assumption and also under the assumption of finite backlog. The contention
probability is determined under these two assumptions in order to maximize the
network throughput and maintain stability. Queuing delay analysis for network
users is also conducted. The performance of ALOHA-CR is demonstrated on the
Wireless Open Access Research Platform (WARP) test-bed containing five software
defined radio nodes. Analysis and test-bed results indicate that ALOHA-CR leads
to significant increase in throughput and reduction of service delays.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 19:46:12 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Liu",
"Xin",
""
],
[
"Kountouriotis",
"John",
""
],
[
"Petropulu",
"Athina P.",
""
],
[
"Dandekar",
"Kapil R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.3122
|
Gwendal Simon
|
Jacob Chakareski, Pascal Frossard, Herv\'e Kerivin, Jimmy Leblet and
Gwendal Simon
|
A note on the data-driven capacity of P2P networks
|
10 pages, technical report assisting a submission
| null | null |
EPFL-LTS-2009-008
|
cs.DS cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider two capacity problems in P2P networks. In the first one, the
nodes have an infinite amount of data to send and the goal is to optimally
allocate their uplink bandwidths such that the demands of every peer in terms
of receiving data rate are met. We solve this problem through a mapping from a
node-weighted graph featuring two labels per node to a max flow problem on an
edge-weighted bipartite graph. In the second problem under consideration, the
resource allocation is driven by the availability of the data resource that the
peers are interested in sharing. That is a node cannot allocate its uplink
resources unless it has data to transmit first. The problem of uplink bandwidth
allocation is then equivalent to constructing a set of directed trees in the
overlay such that the number of nodes receiving the data is maximized while the
uplink capacities of the peers are not exceeded. We show that the problem is
NP-complete, and provide a linear programming decomposition decoupling it into
a master problem and multiple slave subproblems that can be resolved in
polynomial time. We also design a heuristic algorithm in order to compute a
suboptimal solution in a reasonable time. This algorithm requires only a local
knowledge from nodes, so it should support distributed implementations.
We analyze both problems through a series of simulation experiments featuring
different network sizes and network densities. On large networks, we compare
our heuristic and its variants with a genetic algorithm and show that our
heuristic computes the better resource allocation. On smaller networks, we
contrast these performances to that of the exact algorithm and show that
resource allocation fulfilling a large part of the peer can be found, even for
hard configuration where no resources are in excess.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 22:44:47 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Chakareski",
"Jacob",
""
],
[
"Frossard",
"Pascal",
""
],
[
"Kerivin",
"Hervé",
""
],
[
"Leblet",
"Jimmy",
""
],
[
"Simon",
"Gwendal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.3123
|
Gilad Lerman Dr
|
Teng Zhang, Arthur Szlam and Gilad Lerman
|
Median K-flats for hybrid linear modeling with many outliers
| null |
Proc. of 2nd IEEE International Workshop on Subspace Methods
(Subspace 2009), pp. 234-241 (2009)
|
10.1109/ICCVW.2009.5457695
| null |
cs.CV cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe the Median K-Flats (MKF) algorithm, a simple online method for
hybrid linear modeling, i.e., for approximating data by a mixture of flats.
This algorithm simultaneously partitions the data into clusters while finding
their corresponding best approximating l1 d-flats, so that the cumulative l1
error is minimized. The current implementation restricts d-flats to be
d-dimensional linear subspaces. It requires a negligible amount of storage, and
its complexity, when modeling data consisting of N points in D-dimensional
Euclidean space with K d-dimensional linear subspaces, is of order O(n K d D+n
d^2 D), where n is the number of iterations required for convergence
(empirically on the order of 10^4). Since it is an online algorithm, data can
be supplied to it incrementally and it can incrementally produce the
corresponding output. The performance of the algorithm is carefully evaluated
using synthetic and real data.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 23:09:16 GMT"
}
] | 2010-05-10T00:00:00 |
[
[
"Zhang",
"Teng",
""
],
[
"Szlam",
"Arthur",
""
],
[
"Lerman",
"Gilad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0909.3127
|
Adrian Dumitrescu
|
Adrian Dumitrescu and Minghui Jiang
|
On the largest empty axis-parallel box amidst $n$ points
|
19 pages, 2 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give the first nontrivial upper and lower bounds on the maximum volume of
an empty axis-parallel box inside an axis-parallel unit hypercube in $\RR^d$
containing $n$ points. For a fixed $d$, we show that the maximum volume is of
the order $\Theta(\frac{1}{n})$. We then use the fact that the maximum volume
is $\Omega(\frac{1}{n})$ in our design of the first efficient
$(1-\eps)$-approximation algorithm for the following problem: Given an
axis-parallel $d$-dimensional box $R$ in $\RR^d$ containing $n$ points, compute
a maximum-volume empty axis-parallel $d$-dimensional box contained in $R$. The
running time of our algorithm is nearly linear in $n$, for small $d$, and
increases only by an $O(\log{n})$ factor when one goes up one dimension. No
previous efficient exact or approximation algorithms were known for this
problem for $d \geq 4$. As the problem has been recently shown to be NP-hard in
arbitrary high dimensions (i.e., when $d$ is part of the input), the existence
of efficient exact algorithms is unlikely.
We also obtain tight estimates on the maximum volume of an empty
axis-parallel hypercube inside an axis-parallel unit hypercube in $\RR^d$
containing $n$ points. For a fixed $d$, this maximum volume is of the same
order order $\Theta(\frac{1}{n})$. A faster $(1-\eps)$-approximation algorithm,
with a milder dependence on $d$ in the running time, is obtained in this case.
|
[
{
"version": "v1",
"created": "Wed, 16 Sep 2009 23:37:56 GMT"
},
{
"version": "v2",
"created": "Mon, 23 Nov 2009 20:42:35 GMT"
}
] | 2009-11-23T00:00:00 |
[
[
"Dumitrescu",
"Adrian",
""
],
[
"Jiang",
"Minghui",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.3131
|
Shengtian Yang
|
Shengtian Yang, Thomas Honold, Yan Chen, Zhaoyang Zhang, Peiliang Qiu
|
Constructing Linear Encoders with Good Spectra
|
v5.5.5, no. 201408271350, 40 pages, 3 figures, extended version of
the paper to be published in IEEE Transactions on Information Theory
|
IEEE Trans. Inf. Theory 60 (2014) 5950-5965
|
10.1109/TIT.2014.2341560
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Linear encoders with good joint spectra are suitable candidates for optimal
lossless joint source-channel coding (JSCC), where the joint spectrum is a
variant of the input-output complete weight distribution and is considered good
if it is close to the average joint spectrum of all linear encoders (of the
same coding rate). In spite of their existence, little is known on how to
construct such encoders in practice. This paper is devoted to their
construction. In particular, two families of linear encoders are presented and
proved to have good joint spectra. The first family is derived from Gabidulin
codes, a class of maximum-rank-distance codes. The second family is constructed
using a serial concatenation of an encoder of a low-density parity-check code
(as outer encoder) with a low-density generator matrix encoder (as inner
encoder). In addition, criteria for good linear encoders are defined for three
coding applications: lossless source coding, channel coding, and lossless JSCC.
In the framework of the code-spectrum approach, these three scenarios
correspond to the problems of constructing linear encoders with good kernel
spectra, good image spectra, and good joint spectra, respectively. Good joint
spectra imply both good kernel spectra and good image spectra, and for every
linear encoder having a good kernel (resp., image) spectrum, it is proved that
there exists a linear encoder not only with the same kernel (resp., image) but
also with a good joint spectrum. Thus a good joint spectrum is the most
important feature of a linear encoder.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 00:18:28 GMT"
},
{
"version": "v10",
"created": "Fri, 18 Jul 2014 07:32:23 GMT"
},
{
"version": "v11",
"created": "Wed, 27 Aug 2014 06:08:43 GMT"
},
{
"version": "v2",
"created": "Fri, 16 Oct 2009 06:02:09 GMT"
},
{
"version": "v3",
"created": "Thu, 7 Oct 2010 23:48:31 GMT"
},
{
"version": "v4",
"created": "Mon, 14 May 2012 02:15:56 GMT"
},
{
"version": "v5",
"created": "Mon, 18 Feb 2013 01:16:46 GMT"
},
{
"version": "v6",
"created": "Tue, 3 Sep 2013 02:24:18 GMT"
},
{
"version": "v7",
"created": "Wed, 8 Jan 2014 05:01:23 GMT"
},
{
"version": "v8",
"created": "Mon, 3 Feb 2014 00:50:00 GMT"
},
{
"version": "v9",
"created": "Mon, 12 May 2014 04:15:23 GMT"
}
] | 2016-02-02T00:00:00 |
[
[
"Yang",
"Shengtian",
""
],
[
"Honold",
"Thomas",
""
],
[
"Chen",
"Yan",
""
],
[
"Zhang",
"Zhaoyang",
""
],
[
"Qiu",
"Peiliang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3135
|
Jia Wang
|
Jia Wang, Jun Chen, Lei Zhao, Paul Cuff, and Haim Permuter
|
A Random Variable Substitution Lemma With Applications to Multiple
Description Coding
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We establish a random variable substitution lemma and use it to investigate
the role of refinement layer in multiple description coding, which clarifies
the relationship among several existing achievable multiple description
rate-distortion regions. Specifically, it is shown that the El Gamal-Cover
(EGC) region is equivalent to the EGC* region (an antecedent version of the EGC
region) while the Venkataramani-Kramer-Goyal (VKG) region (when specialized to
the 2-description case) is equivalent to the Zhang-Berger (ZB) region.
Moreover, we prove that for multiple description coding with individual and
hierarchical distortion constraints, the number of layers in the VKG scheme can
be significantly reduced when only certain weighted sum rates are concerned.
The role of refinement layer in scalable coding (a special case of multiple
description coding) is also studied.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 00:59:01 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Wang",
"Jia",
""
],
[
"Chen",
"Jun",
""
],
[
"Zhao",
"Lei",
""
],
[
"Cuff",
"Paul",
""
],
[
"Permuter",
"Haim",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3137
|
Beno\^it Hudson
|
Beno\^it Hudson
|
Succinct Representation of Well-Spaced Point Clouds
|
12 pages
| null | null | null |
cs.CG cs.DS cs.GR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A set of n points in low dimensions takes Theta(n w) bits to store on a w-bit
machine. Surface reconstruction and mesh refinement impose a requirement on the
distribution of the points they process. I show how to use this assumption to
lossily compress a set of n input points into a representation that takes only
O(n) bits, independent of the word size. The loss can keep inter-point
distances to within 10% relative error while still achieving a factor of three
space savings. The representation allows standard quadtree operations, along
with computing the restricted Voronoi cell of a point, in time O(w^2 + log n),
which can be improved to time O(log n) if w is in Theta(log n). Thus one can
use this compressed representation to perform mesh refinement or surface
reconstruction in O(n) bits with only a logarithmic slowdown.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 01:39:59 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Hudson",
"Benoît",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
0909.3146
|
Fr\'ed\'erique Oggier
|
Frederique Oggier and Hanane Fathi
|
An Authentication Code against Pollution Attacks in Network Coding
| null | null | null | null |
cs.IT cs.CR math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Systems exploiting network coding to increase their throughput suffer greatly
from pollution attacks which consist of injecting malicious packets in the
network. The pollution attacks are amplified by the network coding process,
resulting in a greater damage than under traditional routing. In this paper, we
address this issue by designing an unconditionally secure authentication code
suitable for multicast network coding. The proposed scheme is robust against
pollution attacks from outsiders, as well as coalitions of malicious insiders.
Intermediate nodes can verify the integrity and origin of the packets received
without having to decode, and thus detect and discard the malicious messages
in-transit that fail the verification. This way, the pollution is canceled out
before reaching the destinations. We analyze the performance of the scheme in
terms of both multicast throughput and goodput, and show the goodput gains. We
also discuss applications to file distribution.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 06:05:44 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Oggier",
"Frederique",
""
],
[
"Fathi",
"Hanane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3158
|
Evangelos Karapanos
|
Evangelos Karapanos, Jean-Bernard Martens
|
The quantitative side of the Repertory Grid Technique: some concerns
| null | null | null | null |
cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
User experience (UX) evaluation is gaining increased interest lately, both
from academia and industry. In this paper we argue that UX evaluation needs to
fulfill two important requirements: scalability, i.e. the ability to provide
useful feedback in different stages of the design, and diversity, i.e. the
ability to reflect the di-versity of opinions that may exist in different
users. We promote the use of the Repertory Grid Technique as a promising UX
evaluation technique and discuss some of our concerns regarding the
quantitative side of its use.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 13:05:49 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Karapanos",
"Evangelos",
""
],
[
"Martens",
"Jean-Bernard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.3165
|
Yilun Shang
|
Yilun Shang
|
Finite-time Consensus for Nonlinear Multi-agent Systems with Fixed
Topologies
|
11 pages, 3 figures
| null | null | null |
cs.IT cs.MA math.IT math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study finite-time state consensus problems for continuous
nonlinear multi-agent systems. Building on the theory of finite-time Lyapunov
stability, we propose sufficient criteria which guarantee the system to reach a
consensus in finite time, provided that the underlying directed network
contains a spanning tree. Novel finite-time consensus protocols are introduced
as examples for applying the criteria. Simulations are also presented to
illustrate our theoretical results.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 08:52:35 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Shang",
"Yilun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0909.3169
|
Purushottam Kar
|
Arnab Bhattacharya, Purushottam Kar and Manjish Pal
|
On Low Distortion Embeddings of Statistical Distance Measures into Low
Dimensional Spaces
|
18 pages, The short version of this paper was accepted for
presentation at the 20th International Conference on Database and Expert
Systems Applications, DEXA 2009
|
Database and Expert Systems Applications (DEXA) 2009
|
10.1007/978-3-642-03573-9_13
| null |
cs.CG cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Statistical distance measures have found wide applicability in information
retrieval tasks that typically involve high dimensional datasets. In order to
reduce the storage space and ensure efficient performance of queries,
dimensionality reduction while preserving the inter-point similarity is highly
desirable. In this paper, we investigate various statistical distance measures
from the point of view of discovering low distortion embeddings into
low-dimensional spaces. More specifically, we consider the Mahalanobis distance
measure, the Bhattacharyya class of divergences and the Kullback-Leibler
divergence. We present a dimensionality reduction method based on the
Johnson-Lindenstrauss Lemma for the Mahalanobis measure that achieves
arbitrarily low distortion. By using the Johnson-Lindenstrauss Lemma again, we
further demonstrate that the Bhattacharyya distance admits dimensionality
reduction with arbitrarily low additive error. We also examine the question of
embeddability into metric spaces for these distance measures due to the
availability of efficient indexing schemes on metric spaces. We provide
explicit constructions of point sets under the Bhattacharyya and the
Kullback-Leibler divergences whose embeddings into any metric space incur
arbitrarily large distortions. We show that the lower bound presented for
Bhattacharyya distance is nearly tight by providing an embedding that
approaches the lower bound for relatively small dimensional datasets.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 09:29:48 GMT"
}
] | 2010-03-09T00:00:00 |
[
[
"Bhattacharya",
"Arnab",
""
],
[
"Kar",
"Purushottam",
""
],
[
"Pal",
"Manjish",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.3180
|
Geevarghese Philip
|
Neeldhara Misra, Geevarghese Philip, Venkatesh Raman, Saket Saurabh
and Somnath Sikdar
|
FPT Algorithms for Connected Feedback Vertex Set
|
12 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the recently introduced Connected Feedback Vertex Set (CFVS) problem
from the view-point of parameterized algorithms. CFVS is the connected variant
of the classical Feedback Vertex Set problem and is defined as follows: given a
graph G=(V,E) and an integer k, decide whether there exists a subset F of V, of
size at most k, such that G[V F] is a forest and G[F] is connected. We show
that Connected Feedback Vertex Set can be solved in time $O(2^{O(k)}n^{O(1)})$
on general graphs and in time $O(2^{O(\sqrt{k}\log k)}n^{O(1)})$ on graphs
excluding a fixed graph H as a minor. Our result on general undirected graphs
uses as subroutine, a parameterized algorithm for Group Steiner Tree, a well
studied variant of Steiner Tree. We find the algorithm for Group Steiner Tree
of independent interest and believe that it will be useful for obtaining
parameterized algorithms for other connectivity problems.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 10:37:31 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Misra",
"Neeldhara",
""
],
[
"Philip",
"Geevarghese",
""
],
[
"Raman",
"Venkatesh",
""
],
[
"Saurabh",
"Saket",
""
],
[
"Sikdar",
"Somnath",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.3185
|
Lorena Ronquillo
|
J. Pujol, J. Rif\`a, L. Ronquillo
|
Construction of Additive Reed-Muller Codes
|
7 pages, Part of the material in this paper was presented without
proofs at the 18-th Symposium on Applied algebra, Algebraic algorithms, and
Error Correcting Codes (AAECC 2009), Tarragona, Spain, June 8-12, 2009
|
J. Pujol, J. Rifa and L. Ronquillo. Construction of Additive
Reed-Muller Codes. Applied Algebra, Algebraic Algorithms and Error-Correcting
Codes, LNCS 5527 (June 2009), pages 223-226
|
10.1007/978-3-642-02181-7
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The well known Plotkin construction is, in the current paper, generalized and
used to yield new families of Z2Z4-additive codes, whose length, dimension as
well as minimum distance are studied. These new constructions enable us to
obtain families of Z2Z4-additive codes such that, under the Gray map, the
corresponding binary codes have the same parameters and properties as the usual
binary linear Reed-Muller codes. Moreover, the first family is the usual binary
linear Reed-Muller family.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 11:13:02 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Dec 2011 11:52:08 GMT"
}
] | 2011-12-30T00:00:00 |
[
[
"Pujol",
"J.",
""
],
[
"Rifà",
"J.",
""
],
[
"Ronquillo",
"L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3221
|
Gwena\"el Joret
|
Jean Cardinal, Erik D. Demaine, Samuel Fiorini, Gwena\"el Joret, Ilan
Newman, Oren Weimann
|
The Stackelberg Minimum Spanning Tree Game on Planar and
Bounded-Treewidth Graphs
|
v2: Referees' comments incorporated, section on bounded-treewidth
graphs expanded
|
Journal of Combinatorial Optimization, 25/1:19--46, 2013
|
10.1007/s10878-011-9414-2
| null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Stackelberg Minimum Spanning Tree Game is a two-level combinatorial
pricing problem played on a graph representing a network. Its edges are colored
either red or blue, and the red edges have a given fixed cost, representing the
competitor's prices. The first player chooses an assignment of prices to the
blue edges, and the second player then buys the cheapest spanning tree, using
any combination of red and blue edges. The goal of the first player is to
maximize the total price of purchased blue edges.
We study this problem in the cases of planar and bounded-treewidth graphs. We
show that the problem is NP-hard on planar graphs but can be solved in
polynomial time on graphs of bounded treewidth.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 13:52:46 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Sep 2011 04:25:08 GMT"
}
] | 2013-05-24T00:00:00 |
[
[
"Cardinal",
"Jean",
""
],
[
"Demaine",
"Erik D.",
""
],
[
"Fiorini",
"Samuel",
""
],
[
"Joret",
"Gwenaël",
""
],
[
"Newman",
"Ilan",
""
],
[
"Weimann",
"Oren",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.3226
|
Stefano Buzzi
|
Stefano Buzzi, Luca Venturino, Alessio Zappone, Antonio De Maio
|
Blind user detection in doubly-dispersive DS/CDMA channels
|
Accepted for publication on IEEE Transactions on Signal Processing
|
IEEE Transactions on Signal Processing, Vol. 58, No. 3, pp. 1446 -
1451, March 2010
|
10.1109/TSP.2009.2033001
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this work, we consider the problem of detecting the presence of a new user
in a direct-sequence/code-division-multiple-access (DS/CDMA) system with a
doubly-dispersive fading channel, and we propose a novel blind detection
strategy which only requires knowledge of the spreading code of the user to be
detected, but no prior information as to the time-varying channel impulse
response and the structure of the multiaccess interference. The proposed
detector has a bounded constant false alarm rate (CFAR) under the design
assumptions, while providing satisfactory detection performance even in the
presence of strong cochannel interference and high user mobility.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 14:10:09 GMT"
}
] | 2010-02-17T00:00:00 |
[
[
"Buzzi",
"Stefano",
""
],
[
"Venturino",
"Luca",
""
],
[
"Zappone",
"Alessio",
""
],
[
"De Maio",
"Antonio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3248
|
Juan Gerardo Alcazar Arribas
|
Juan Gerardo Alcazar, Gema Maria Diaz-Toca
|
Topology of 2D and 3D Rational Curves
|
26 pages, 19 figures
| null |
10.1016/j.cagd.2010.07.001
| null |
cs.SC cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we present algorithms for computing the topology of planar and
space rational curves defined by a parametrization. The algorithms given here
work directly with the parametrization of the curve, and do not require to
compute or use the implicit equation of the curve (in the case of planar
curves) or of any projection (in the case of space curves). Moreover, these
algorithms have been implemented in Maple; the examples considered and the
timings obtained show good performance skills.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 14:58:09 GMT"
}
] | 2015-02-17T00:00:00 |
[
[
"Alcazar",
"Juan Gerardo",
""
],
[
"Diaz-Toca",
"Gema Maria",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0909.3257
|
Piotr Faliszewski
|
P. Faliszewski, E. Hemaspaandra, L. A. Hemaspaandra, J. Rothe
|
The Shield that Never Was: Societies with Single-Peaked Preferences are
More Open to Manipulation and Control
|
38 pages, 2 figures
| null | null |
URCS TR-2009-950
|
cs.GT cs.CC cs.MA physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Much work has been devoted, during the past twenty years, to using complexity
to protect elections from manipulation and control. Many results have been
obtained showing NP-hardness shields, and recently there has been much focus on
whether such worst-case hardness protections can be bypassed by frequently
correct heuristics or by approximations. This paper takes a very different
approach: We argue that when electorates follow the canonical political science
model of societal preferences the complexity shield never existed in the first
place. In particular, we show that for electorates having single-peaked
preferences, many existing NP-hardness results on manipulation and control
evaporate.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 17:45:34 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Jun 2010 12:54:44 GMT"
}
] | 2010-06-22T00:00:00 |
[
[
"Faliszewski",
"P.",
""
],
[
"Hemaspaandra",
"E.",
""
],
[
"Hemaspaandra",
"L. A.",
""
],
[
"Rothe",
"J.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0909.3273
|
Toby Walsh
|
Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy
Quimper, and Toby Walsh
|
Decomposition of the NVALUE constraint
|
To appear in Proceedings of the Eighth International Workshop on
Constraint Modelling and Reformulation, held alongside the 15th International
Conference on Principles and Practice of Constraint Programming (CP 2009),
Lisbon, Portugal
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study decompositions of NVALUE, a global constraint that can be used to
model a wide range of problems where values need to be counted. Whilst
decomposition typically hinders propagation, we identify one decomposition that
maintains a global view as enforcing bound consistency on the decomposition
achieves bound consistency on the original global NVALUE constraint. Such
decompositions offer the prospect for advanced solving techniques like nogood
learning and impact based branching heuristics. They may also help SAT and IP
solvers take advantage of the propagation of global constraints.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 16:58:28 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Bessiere",
"Christian",
""
],
[
"Katsirelos",
"George",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Quimper",
"Claude-Guy",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.3276
|
Toby Walsh
|
George Katsirelos, and Toby Walsh
|
Symmetries of Symmetry Breaking Constraints
|
To appear in the Proceedings of the Ninth International Workshop on
Symmetry and Constraint Satisfaction Problems, held alongside the 15th
International Conference on Principles and Practice of Constraint Programming
(CP 2009), Lisbon, Portugal
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Symmetry is an important feature of many constraint programs. We show that
any symmetry acting on a set of symmetry breaking constraints can be used to
break symmetry. Different symmetries pick out different solutions in each
symmetry class. We use these observations in two methods for eliminating
symmetry from a problem. These methods are designed to have many of the
advantages of symmetry breaking methods that post static symmetry breaking
constraint without some of the disadvantages. In particular, the two methods
prune the search space using fast and efficient propagation of posted
constraints, whilst reducing the conflict between symmetry breaking and
branching heuristics. Experimental results show that the two methods perform
well on some standard benchmarks.
|
[
{
"version": "v1",
"created": "Thu, 17 Sep 2009 17:16:34 GMT"
}
] | 2009-09-18T00:00:00 |
[
[
"Katsirelos",
"George",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.3342
|
Manar Mohaisen
|
Manar Mohaisen, YuPeng Wang, KyungHi Chang
|
Multiple antenna technologies
|
20 pages, 15 figures, Information and Communications Magazine
| null | null | null |
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiple antenna technologies have received high attention in the last few
decades for their capabilities to improve the overall system performance.
Multiple-input multiple-output systems include a variety of techniques capable
of not only increase the reliability of the communication but also impressively
boost the channel capacity. In addition, smart antenna systems can increase the
link quality and lead to appreciable interference reduction.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 01:14:31 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Mohaisen",
"Manar",
""
],
[
"Wang",
"YuPeng",
""
],
[
"Chang",
"KyungHi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.3346
|
Michael Kapralov
|
Ashish Goel, Michael Kapralov and Sanjeev Khanna
|
Perfect Matchings in O(n \log n) Time in Regular Bipartite Graphs
|
10 pages
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we consider the well-studied problem of finding a perfect
matching in a d-regular bipartite graph on 2n nodes with m=nd edges. The
best-known algorithm for general bipartite graphs (due to Hopcroft and Karp)
takes time O(m\sqrt{n}). In regular bipartite graphs, however, a matching is
known to be computable in O(m) time (due to Cole, Ost and Schirra). In a recent
line of work by Goel, Kapralov and Khanna the O(m) time algorithm was improved
first to \tilde O(min{m, n^{2.5}/d}) and then to \tilde O(min{m, n^2/d}). It
was also shown that the latter algorithm is optimal up to polylogarithmic
factors among all algorithms that use non-adaptive uniform sampling to reduce
the size of the graph as a first step.
In this paper, we give a randomized algorithm that finds a perfect matching
in a d-regular graph and runs in O(n\log n) time (both in expectation and with
high probability). The algorithm performs an appropriately truncated random
walk on a modified graph to successively find augmenting paths. Our algorithm
may be viewed as using adaptive uniform sampling, and is thus able to bypass
the limitations of (non-adaptive) uniform sampling established in earlier work.
We also show that randomization is crucial for obtaining o(nd) time algorithms
by establishing an \Omega(nd) lower bound for any deterministic algorithm. Our
techniques also give an algorithm that successively finds a matching in the
support of a doubly stochastic matrix in expected time O(n\log^2 n) time, with
O(m) pre-processing time; this gives a simple O(m+mn\log^2 n) time algorithm
for finding the Birkhoff-von Neumann decomposition of a doubly stochastic
matrix.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 02:11:43 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Apr 2010 01:44:43 GMT"
},
{
"version": "v3",
"created": "Fri, 12 Nov 2010 06:45:01 GMT"
}
] | 2010-11-15T00:00:00 |
[
[
"Goel",
"Ashish",
""
],
[
"Kapralov",
"Michael",
""
],
[
"Khanna",
"Sanjeev",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.3356
|
Chi-Kin Chau
|
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
|
Capacity of Large-scale CSMA Wireless Networks
|
Extended version of the paper presented at ACM MobiCom 09'. Improved
Model for Aggregate Carrier-Sensing
|
IEEE/ACM Transactions on Networking, Vol. 19, No. 3, pp893-906
(Jun 2011)
|
10.1109/TNET.2010.2095880
| null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the literature, asymptotic studies of multi-hop wireless network capacity
often consider only centralized and deterministic TDMA (time-division
multi-access) coordination schemes. There have been fewer studies of the
asymptotic capacity of large-scale wireless networks based on CSMA
(carrier-sensing multi-access), which schedules transmissions in a distributed
and random manner. With the rapid and widespread adoption of CSMA technology, a
critical question is that whether CSMA networks can be as scalable as TDMA
networks. To answer this question and explore the capacity of CSMA networks, we
first formulate the models of CSMA protocols to take into account the unique
CSMA characteristics not captured by existing interference models in the
literature. These CSMA models determine the feasible states, and consequently
the capacity of CSMA networks. We then study the throughput efficiency of CSMA
scheduling as compared to TDMA. Finally, we tune the CSMA parameters so as to
maximize the throughput to the optimal order. As a result, we show that CSMA
can achieve throughput as $\Omega(\frac{1}{\sqrt{n}})$, the same order as
optimal centralized TDMA, on uniform random networks. Our CSMA scheme makes use
of an efficient backbone-peripheral routing scheme and a careful design of dual
carrier-sensing and dual channel scheme. We also address the implementation
issues of our CSMA scheme.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 05:22:30 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 01:16:46 GMT"
},
{
"version": "v3",
"created": "Thu, 5 Nov 2009 10:32:03 GMT"
},
{
"version": "v4",
"created": "Mon, 17 May 2010 11:22:39 GMT"
}
] | 2017-09-25T00:00:00 |
[
[
"Chau",
"Chi-Kin",
""
],
[
"Chen",
"Minghua",
""
],
[
"Liew",
"Soung Chang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.3382
|
Atsushi Hatabu
|
Atsushi Hatabu, Koujin Takeda, Yoshiyuki Kabashima
|
Statistical mechanical analysis of the Kronecker channel model for MIMO
wireless communication
| null |
Phys. Rev. E 80, 061124 (2009)
|
10.1103/PhysRevE.80.061124
| null |
cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Kronecker channel model of wireless communication is analyzed using
statistical mechanics methods. In the model, spatial proximities among
transmission/reception antennas are taken into account as certain correlation
matrices, which generally yield non-trivial dependence among symbols to be
estimated. This prevents accurate assessment of the communication performance
by naively using a previously developed analytical scheme based on a matrix
integration formula. In order to resolve this difficulty, we develop a
formalism that can formally handle the correlations in Kronecker models based
on the known scheme. Unfortunately, direct application of the developed scheme
is, in general, practically difficult. However, the formalism is still useful,
indicating that the effect of the correlations generally increase after the
fourth order with respect to correlation strength. Therefore, the known
analytical scheme offers a good approximation in performance evaluation when
the correlation strength is sufficiently small. For a class of specific
correlation, we show that the performance analysis can be mapped to the problem
of one-dimensional spin systems in random fields, which can be investigated
without approximation by the belief propagation algorithm.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 08:34:30 GMT"
}
] | 2010-04-19T00:00:00 |
[
[
"Hatabu",
"Atsushi",
""
],
[
"Takeda",
"Koujin",
""
],
[
"Kabashima",
"Yoshiyuki",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Physics",
"code": "cond-mat.dis-nn",
"description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks",
"span": "(Disordered Systems and Neural Networks)"
},
{
"class": "Physics",
"code": "cond-mat.stat-mech",
"description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence",
"span": "(Statistical Mechanics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3384
|
Anna Isabel Esparcia-Alcazar
|
Anna I Esparcia-Alc\'azar, J.J. Merelo, Ana\'is Mart\'inez-Garc\'ia,
Pablo Garc\'ia-S\'anchez, Eva Alfaro-Cid and Ken Sharman
|
Comparing Single and Multiobjective Evolutionary Approaches to the
Inventory and Transportation Problem
|
34 pages. Submitted to Evolutionary Computation
| null | null | null |
cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
EVITA, standing for Evolutionary Inventory and Transportation Algorithm, is a
two-level methodology designed to address the Inventory and Transportation
Problem (ITP) in retail chains. The top level uses an evolutionary algorithm to
obtain delivery patterns for each shop on a weekly basis so as to minimise the
inventory costs, while the bottom level solves the Vehicle Routing Problem
(VRP) for every day in order to obtain the minimum transport costs associated
to a particular set of patterns. The aim of this paper is to investigate
whether a multiobjective approach to this problem can yield any advantage over
the previously used single objective approach. The analysis performed allows us
to conclude that this is not the case and that the single objective approach is
in gene- ral preferable for the ITP in the case studied. A further conclusion
is that it is useful to employ a classical algorithm such as Clarke & Wright's
as the seed for other metaheuristics like local search or tabu search in order
to provide good results for the Vehicle Routing Problem.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 08:35:42 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Esparcia-Alcázar",
"Anna I",
""
],
[
"Merelo",
"J. J.",
""
],
[
"Martínez-García",
"Anaís",
""
],
[
"García-Sánchez",
"Pablo",
""
],
[
"Alfaro-Cid",
"Eva",
""
],
[
"Sharman",
"Ken",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0909.3388
|
Koji Nuida
|
Koji Nuida
|
Pattern occurrence in the dyadic expansion of square root of two and an
analysis of pseudorandom number generators
|
21 pages, extended abstract presented in FPSAC 2009
|
A part of this paper was published in: Electronic Journal of
Combinatorial Number Theory, vol.10 (2010) 111-127
| null | null |
math.CO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recently, designs of pseudorandom number generators (PRNGs) using
integer-valued variants of logistic maps and their applications to some
cryptographic schemes have been studied, due mostly to their ease of
implementation and performance. However, it has been noted that this ease is
reduced for some choices of the PRNGs accuracy parameters. In this article, we
show that the distribution of such undesirable accuracy parameters is closely
related to the occurrence of some patterns in the dyadic expansion of the
square root of 2. We prove that for an arbitrary infinite binary word, the
asymptotic occurrence rate of these patterns is bounded in terms of the
asymptotic occurrence rate of zeroes. We also present examples of infinite
binary words that tightly achieve the bounds. As a consequence, a classical
conjecture on asymptotic evenness of occurrence of zeroes and ones in the
dyadic expansion of the square root of 2 implies that the asymptotic rate of
the undesirable accuracy parameters for the PRNGs is at least 1/6.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 08:42:23 GMT"
}
] | 2010-07-06T00:00:00 |
[
[
"Nuida",
"Koji",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3392
|
Ashley Montanaro
|
Ashley Montanaro and Tobias Osborne
|
On the communication complexity of XOR functions
|
18 pages; v2: minor corrections
| null | null | null |
cs.CC quant-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
An XOR function is a function of the form g(x,y) = f(x + y), for some boolean
function f on n bits. We study the quantum and classical communication
complexity of XOR functions. In the case of exact protocols, we completely
characterise one-way communication complexity for all f. We also show that,
when f is monotone, g's quantum and classical complexities are quadratically
related, and that when f is a linear threshold function, g's quantum complexity
is Theta(n). More generally, we make a structural conjecture about the Fourier
spectra of boolean functions which, if true, would imply that the quantum and
classical exact communication complexities of all XOR functions are
asymptotically equivalent. We give two randomised classical protocols for
general XOR functions which are efficient for certain functions, and a third
protocol for linear threshold functions with high margin. These protocols
operate in the symmetric message passing model with shared randomness.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 08:50:20 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Feb 2010 10:51:41 GMT"
}
] | 2010-02-10T00:00:00 |
[
[
"Montanaro",
"Ashley",
""
],
[
"Osborne",
"Tobias",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
}
] |
0909.3395
|
Subhajit Karmakar Mr.
|
Subhajit Karmakar and Sandip Sarkar
|
A possible low-level explanation of "temporal dynamics of brightness
induction and White's illusion"
|
11 pages and 7 figures
| null | null | null |
cs.CV physics.bio-ph q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Based upon physiological observation on time dependent orientation
selectivity in the cells of macaque's primary visual cortex together with the
psychophysical studies on the tuning of orientation detectors in human vision
we suggest that time dependence in brightness perception can be accommodated
through the time evolution of cortical contribution to the orientation tuning
of the ODoG filter responses. A set of Difference of Gaussians functions has
been used to mimic the time dependence of orientation tuning. The tuning of
orientation preference and its inversion at a later time have been considered
in explaining qualitatively the temporal dynamics of brightness perception
observed in "Brief presentations reveal the temporal dynamics of brightness
induction and White's illusion" for 58 and 82 ms of stimulus exposure.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 09:07:12 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Karmakar",
"Subhajit",
""
],
[
"Sarkar",
"Sandip",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Physics",
"code": "physics.bio-ph",
"description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.",
"span": "(Biological Physics)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0909.3414
|
Wenguang Wang
|
Wenguang Wang (1), Weiping Wang (1), Justyna Zander (2), Yifan Zhu (1)
((1) College of Information System and Management, National University of
Defense Technology, Changsha, China, (2) Fraunhofer Institute FOKUS,
Kaiserin-Augusta-Allee 31, Berlin, Germany)
|
Three-dimensional conceptual model for service-oriented simulation
|
7 pages, 1 figures, 3 table, Journal of Zhejiang University SCIENCE
A, 2009, 10(8): 1075-1081
|
Journal of Zhejiang University SCIENCE A, 2009, 10(8): 1075-1081
|
10.1631/jzus.A0920258
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this letter, we propose a novel three-dimensional conceptual model for an
emerging service-oriented simulation paradigm. The model can be used as a
guideline or an analytic means to find the potential and possible future
directions of the current simulation frameworks. In particular, the model
inspects the crossover between the disciplines of modeling and simulation,
service-orientation, and software/systems engineering. Finally, two specific
simulation frameworks are studied as examples.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 11:56:33 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Wang",
"Wenguang",
""
],
[
"Wang",
"Weiping",
""
],
[
"Zander",
"Justyna",
""
],
[
"Zhu",
"Yifan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.3423
|
Gerard Briscoe Dr
|
Gerard Briscoe
|
Digital Ecosystems
|
206 Pages, 73 figures, PhD
| null | null | null |
cs.MA cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We view Digital Ecosystems to be the digital counterparts of biological
ecosystems, which are considered to be robust, self-organising and scalable
architectures that can automatically solve complex, dynamic problems. So, this
work is concerned with the creation, investigation, and optimisation of Digital
Ecosystems, exploiting the self-organising properties of biological ecosystems.
First, we created the Digital Ecosystem, a novel optimisation technique
inspired by biological ecosystems, where the optimisation works at two levels:
a first optimisation, migration of agents which are distributed in a
decentralised peer-to-peer network, operating continuously in time; this
process feeds a second optimisation based on evolutionary computing that
operates locally on single peers and is aimed at finding solutions to satisfy
locally relevant constraints. We then investigated its self-organising aspects,
starting with an extension to the definition of Physical Complexity to include
evolving agent populations. Next, we established stability of evolving agent
populations over time, by extending the Chli-DeWilde definition of agent
stability to include evolutionary dynamics. Further, we evaluated the diversity
of the software agents within evolving agent populations. To conclude, we
considered alternative augmentations to optimise and accelerate our Digital
Ecosystem, by studying the accelerating effect of a clustering catalyst on the
evolutionary dynamics. We also studied the optimising effect of targeted
migration on the ecological dynamics, through the indirect and emergent
optimisation of the agent migration patterns. Overall, we have advanced the
understanding of creating Digital Ecosystems, the self-organisation that occurs
within them, and the optimisation of their Ecosystem-Oriented Architecture.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 15:07:47 GMT"
},
{
"version": "v2",
"created": "Tue, 6 Oct 2009 16:36:39 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Briscoe",
"Gerard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0909.3444
|
Jonathan Marchand
|
Jonathan Marchand (INRIA Lorraine - LORIA), Bruno Guillaume (INRIA
Lorraine - LORIA), Guy Perrier (INRIA Lorraine - LORIA)
|
Analyse en d\'ependances \`a l'aide des grammaires d'interaction
| null |
Traitement Automatique des Langues Naturelles, Senlis : France
(2009)
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article proposes a method to extract dependency structures from
phrase-structure level parsing with Interaction Grammars. Interaction Grammars
are a formalism which expresses interactions among words using a polarity
system. Syntactical composition is led by the saturation of polarities.
Interactions take place between constituents, but as grammars are lexicalized,
these interactions can be translated at the level of words. Dependency
relations are extracted from the parsing process: every dependency is the
consequence of a polarity saturation. The dependency relations we obtain can be
seen as a refinement of the usual dependency tree. Generally speaking, this
work sheds new light on links between phrase structure and dependency parsing.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 14:23:05 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Marchand",
"Jonathan",
"",
"INRIA Lorraine - LORIA"
],
[
"Guillaume",
"Bruno",
"",
"INRIA\n Lorraine - LORIA"
],
[
"Perrier",
"Guy",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.3445
|
Ingrid Falk
|
Ingrid Falk (INRIA Lorraine - LORIA), Claire Gardent (INRIA Lorraine -
LORIA), Evelyne Jacquey (ATILF), Fabienne Venant (INRIA Lorraine - LORIA)
|
Grouping Synonyms by Definitions
| null |
Recent Advances in Natural Language Processing (RANLP), Borovets :
Bulgaria (2009)
| null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a method for grouping the synonyms of a lemma according to its
dictionary senses. The senses are defined by a large machine readable
dictionary for French, the TLFi (Tr\'esor de la langue fran\c{c}aise
informatis\'e) and the synonyms are given by 5 synonym dictionaries (also for
French). To evaluate the proposed method, we manually constructed a gold
standard where for each (word, definition) pair and given the set of synonyms
defined for that word by the 5 synonym dictionaries, 4 lexicographers specified
the set of synonyms they judge adequate. While inter-annotator agreement ranges
on that task from 67% to at best 88% depending on the annotator pair and on the
synonym dictionary being considered, the automatic procedure we propose scores
a precision of 67% and a recall of 71%. The proposed method is compared with
related work namely, word sense disambiguation, synonym lexicon acquisition and
WordNet construction.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 14:25:29 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Falk",
"Ingrid",
"",
"INRIA Lorraine - LORIA"
],
[
"Gardent",
"Claire",
"",
"INRIA Lorraine -\n LORIA"
],
[
"Jacquey",
"Evelyne",
"",
"ATILF"
],
[
"Venant",
"Fabienne",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.3466
|
Yann Dujardin
|
Yann Dujardin
|
R\'esolution du "partition problem" par une approche arithm\'etique
|
This paper has been withdrawn by the author due to a crucial error
(in one of the quadratic forms introduced)
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This article has been withdrawn
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 15:25:32 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Sep 2009 20:38:51 GMT"
},
{
"version": "v3",
"created": "Fri, 3 Dec 2010 12:28:12 GMT"
}
] | 2010-12-06T00:00:00 |
[
[
"Dujardin",
"Yann",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.3472
|
J\'er\^oAme Kunegis
|
J\'er\^ome Kunegis, Alan Said, Winfried Umbrath
|
The Universal Recommender
|
17 pages; typo and references fixed
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We describe the Universal Recommender, a recommender system for semantic
datasets that generalizes domain-specific recommenders such as content-based,
collaborative, social, bibliographic, lexicographic, hybrid and other
recommenders. In contrast to existing recommender systems, the Universal
Recommender applies to any dataset that allows a semantic representation. We
describe the scalable three-stage architecture of the Universal Recommender and
its application to Internet Protocol Television (IPTV). To achieve good
recommendation accuracy, several novel machine learning and optimization
problems are identified. We finally give a brief argument supporting the need
for machine learning recommenders.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 15:54:51 GMT"
},
{
"version": "v2",
"created": "Tue, 9 Mar 2010 12:43:28 GMT"
}
] | 2010-03-13T00:00:00 |
[
[
"Kunegis",
"Jérôme",
""
],
[
"Said",
"Alan",
""
],
[
"Umbrath",
"Winfried",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.3475
|
Yilun Shang
|
Yilun Shang
|
Multi-agent Coordination in Directed Moving Neighborhood Random Networks
|
9 pages
|
Chinese physics b, 2010
|
10.1088/1674-1056/19/7/070201
| null |
cs.MA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider the consensus problem of dynamical multiple agents
that communicate via a directed moving neighborhood random network. Each agent
performs random walk on a weighted directed network. Agents interact with each
other through random unidirectional information flow when they coincide in the
underlying network at a given instant. For such a framework, we present
sufficient conditions for almost sure asymptotic consensus. Some existed
consensus schemes are shown to be reduced versions of the current model.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 15:58:43 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Shang",
"Yilun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3481
|
Pan Hui
|
Pan Hui, Richard Mortier, Tristan Henderson, Jon Crowcroft
|
Planet-scale Human Mobility Measurement
|
6 pages, 2 figures
| null | null | null |
cs.NI cs.CY cs.GL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Research into, and design and construction of mobile systems and algorithms
requires access to large-scale mobility data. Unfortunately, the wireless and
mobile research community lacks such data. For instance, the largest available
human contact traces contain only 100 nodes with very sparse connectivity,
limited by experimental logistics. In this paper we pose a challenge to the
community: how can we collect mobility data from billions of human
participants? We re-assert the importance of large-scale datasets in
communication network design, and claim that this could impact fundamental
studies in other academic disciplines. In effect, we argue that planet-scale
mobility measurements can help to save the world. For example, through
understanding large-scale human mobility, we can track and model and contain
the spread of epidemics of various kinds.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 16:27:51 GMT"
}
] | 2009-09-21T00:00:00 |
[
[
"Hui",
"Pan",
""
],
[
"Mortier",
"Richard",
""
],
[
"Henderson",
"Tristan",
""
],
[
"Crowcroft",
"Jon",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.GL",
"description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).",
"span": "(General Literature)"
}
] |
0909.3508
|
Mahdi Cheraghchi
|
Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Martin Vetterli
|
Compressed Sensing with Probabilistic Measurements: A Group Testing
Solution
|
In Proceedings of the Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing
| null | null | null |
cs.IT cs.DM math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Detection of defective members of large populations has been widely studied
in the statistics community under the name "group testing", a problem which
dates back to World War II when it was suggested for syphilis screening. There
the main interest is to identify a small number of infected people among a
large population using collective samples. In viral epidemics, one way to
acquire collective samples is by sending agents inside the population. While in
classical group testing, it is assumed that the sampling procedure is fully
known to the reconstruction algorithm, in this work we assume that the decoder
possesses only partial knowledge about the sampling process. This assumption is
justified by observing the fact that in a viral sickness, there is a chance
that an agent remains healthy despite having contact with an infected person.
Therefore, the reconstruction method has to cope with two different types of
uncertainty; namely, identification of the infected population and the
partially unknown sampling procedure.
In this work, by using a natural probabilistic model for "viral infections",
we design non-adaptive sampling procedures that allow successful identification
of the infected population with overwhelming probability 1-o(1). We propose
both probabilistic and explicit design procedures that require a "small" number
of agents to single out the infected individuals. More precisely, for a
contamination probability p, the number of agents required by the probabilistic
and explicit designs for identification of up to k infected members is bounded
by m = O(k^2 (log n)/p^2) and m = O(k^2 (log n)^2 /p^2), respectively. In both
cases, a simple decoder is able to successfully identify the infected
population in time O(mn).
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 19:29:42 GMT"
},
{
"version": "v2",
"created": "Mon, 28 Sep 2009 12:31:25 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Cheraghchi",
"Mahdi",
""
],
[
"Hormati",
"Ali",
""
],
[
"Karbasi",
"Amin",
""
],
[
"Vetterli",
"Martin",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3530
|
Ajinkya Kale
|
Ajinkya Kale, Ashish Gilda, Sudeep Pradhan
|
Securing Remote Procedure Calls over HTTPS
| null | null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Remote Procedure Calls (RPC) are widely used over the Internet as they
provide a simple and elegant way of interaction between the client and the
server. This paper proposes a solution for securing the remote procedure calls
(RPC) by tunneling it through HTTPS (Hypertext Transfer Protocol over Secure
Socket Layer). RPC over HTTP actually uses the Secure Socket Layer (SSL)
protocol as a transport for the traffic. SSL mandates that the server
authenticates itself to the client using a digital certificate (and associated
private key). SSL is normally configured to encrypt traffic before transmitting
it between the server and client and vice versa.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 20:38:03 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Kale",
"Ajinkya",
""
],
[
"Gilda",
"Ashish",
""
],
[
"Pradhan",
"Sudeep",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.3533
|
Yavuz Oruc A.
|
A. Yavuz Oruc and Abdullah Atmaca
|
On Ordinal Covering of Proposals Using Balanced Incomplete Block Designs
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A frequently encountered problem in peer review systems is to facilitate
pairwise comparisons of a given set of proposals by as few as referees as
possible. In [8], it was shown that, if each referee is assigned to review k
proposals then ceil{n(n-1)/k(k-1)} referees are necessary and ceil{n(2n-k)/k^2}
referees are sufficient to cover all n(n-1)/2 pairs of n proposals. While the
upper bound remains within a factor of 2 of the lower bound, it becomes
relatively large for small values of k and the ratio of the upper bound to the
lower bound is not less than 3/2 when 2 <= k <= n/2. In this paper, we show
that, if sqrt(n) <= k <= n/2 then the upper and lower bounds can be made closer
in that their ratio never exceeds 3/2. This is accomplished by a new method
that assigns proposals to referees using a particular family of balanced
incomplete block designs. Specifically, the new method uses ceil{n(n+k)/k^2}
referees when n/k is a prime power, n divides k^2, and sqrt(n) <= k <= n/2.
Comparing this new upper bound to the one given in [8] shows that the new upper
bound approaches the lower bound as k tends to sqrt(n) whereas the upper bound
in [8] approaches the lower bound as k tends to n. Therefore, the new method
given here when combined together with the one in [8] provides an assignment
whose upper bound referee complexity always remains within a factor of 3/2 of
the lower bound when sqrt(n) <= k <= n, thereby improving upon the assignment
described in [8]. Furthermore, the new method provides a minimal covering,
i.e., it uses the minimum number of referees possible when k = sqrt(n) and k is
a prime power.
|
[
{
"version": "v1",
"created": "Fri, 18 Sep 2009 21:01:14 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Oruc",
"A. Yavuz",
""
],
[
"Atmaca",
"Abdullah",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.3554
|
R Doomun
|
Harsh K Verma, Abhishek Narain Singh, Raman Kumar
|
Robustness of the Digital Image Watermarking Techniques against
Brightness and Rotation Attack
|
5 Pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
|
Harsh K Verma, Abhishek Narain Singh, Raman Kumar, International
Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1,
September 2009, USA
| null |
ISSN 1947 5500
|
cs.MM cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The recent advent in the field of multimedia proposed a many facilities in
transport, transmission and manipulation of data. Along with this advancement
of facilities there are larger threats in authentication of data, its licensed
use and protection against illegal use of data. A lot of digital image
watermarking techniques have been designed and implemented to stop the illegal
use of the digital multimedia images. This paper compares the robustness of
three different watermarking schemes against brightness and rotation attacks.
The robustness of the watermarked images has been verified on the parameters of
PSNR (Peak Signal to Noise Ratio), RMSE (Root Mean Square Error) and MAE (Mean
Absolute Error).
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 03:06:57 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Verma",
"Harsh K",
""
],
[
"Singh",
"Abhishek Narain",
""
],
[
"Kumar",
"Raman",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.3558
|
Joud Khoury
|
Joud Khoury, Chaouki T. Abdallah, Kate Krause, Jorge Crichigno
|
Route Distribution Incentives
|
15 page, lncs format, 2 figures, workshop
| null | null | null |
cs.GT cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an incentive model for route distribution in the context of path
vector routing protocols and we focus on the Border Gateway Protocol (BGP). BGP
is the de-facto protocol for interdomain routing on the Internet. We model BGP
route distribution and computation using a game in which a BGP speaker
advertises its prefix to its direct neighbors promising them a reward for
further distributing the route deeper into the network, the neighbors do the
same thing with their neighbors, and so on. The result of this cascaded route
distribution is an advertised prefix and hence reachability of the BGP speaker.
We first study the convergence of BGP protocol dynamics to a unique outcome
tree in the defined game. We then proceed to study the existence of equilibria
in the full information game considering competition dynamics. We focus our
work on the simplest two classes of graphs: 1) the line (and the tree) graphs
which involve no competition, and 2) the ring graph which involves competition.
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 04:25:34 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Khoury",
"Joud",
""
],
[
"Abdallah",
"Chaouki T.",
""
],
[
"Krause",
"Kate",
""
],
[
"Crichigno",
"Jorge",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.3561
|
R Doomun
|
Farzane Kabudvand
|
ODMRP with Quality of Service and local recovery with security Support
|
5 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
|
Farzane Kabudvand, International Journal of Computer Science and
Information Security, IJCSIS, Vol. 5, No. 1, September 2009, USA
| null |
ISSN 1947 5500
|
cs.NI cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we focus on one critical issue in mobile ad hoc networks that
is multicast routing and propose a mesh based on demand multicast routing
protocol for Ad-Hoc networks with QoS (quality of service) support. Then a
model was presented which is used for create a local recovering mechanism in
order to joining the nodes to multi sectional groups at the minimized time and
method for security in this protocol we present .
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 05:50:01 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Kabudvand",
"Farzane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.3591
|
Peter B. Gilkey
|
P. Gilkey, S. Lopez Ornat, and A. Karousou
|
Mathematics, Recursion, and Universals in Human Languages
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
There are many scientific problems generated by the multiple and conflicting
alternative definitions of linguistic recursion and human recursive processing
that exist in the literature. The purpose of this article is to make available
to the linguistic community the standard mathematical definition of recursion
and to apply it to discuss linguistic recursion. As a byproduct, we obtain an
insight into certain "soft universals" of human languages, which are related to
cognitive constructs necessary to implement mathematical reasoning, i.e.
mathematical model theory.
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 15:38:55 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Gilkey",
"P.",
""
],
[
"Ornat",
"S. Lopez",
""
],
[
"Karousou",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.3593
|
Zhi-Hua Zhou
|
Min-Ling Zhang and Zhi-Hua Zhou
|
Exploiting Unlabeled Data to Enhance Ensemble Diversity
|
10 pages, to appear in ICDM 2010
| null | null | null |
cs.LG cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Ensemble learning aims to improve generalization ability by using multiple
base learners. It is well-known that to construct a good ensemble, the base
learners should be accurate as well as diverse. In this paper, unlabeled data
is exploited to facilitate ensemble learning by helping augment the diversity
among the base learners. Specifically, a semi-supervised ensemble method named
UDEED is proposed. Unlike existing semi-supervised ensemble methods where
error-prone pseudo-labels are estimated for unlabeled data to enlarge the
labeled data to improve accuracy, UDEED works by maximizing accuracies of base
learners on labeled data while maximizing diversity among them on unlabeled
data. Experiments show that UDEED can effectively utilize unlabeled data for
ensemble learning and is highly competitive to well-established semi-supervised
ensemble methods.
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 16:10:19 GMT"
},
{
"version": "v2",
"created": "Sat, 25 Sep 2010 02:27:46 GMT"
}
] | 2010-09-28T00:00:00 |
[
[
"Zhang",
"Min-Ling",
""
],
[
"Zhou",
"Zhi-Hua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.3596
|
Chris Preston
|
Chris Preston
|
Specifying Data Objects with Initial Algebras
|
120 pages
| null | null | null |
cs.LO math.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This study presents a systematic approach to specifying data objects with the
help of initial algebras. The primary aim is to describe the set-up to be found
in modern functional programming languages such as Haskell and ML, although it
can also be applied to more general situations.
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 16:59:18 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Preston",
"Chris",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
}
] |
0909.3606
|
Vinay Jethava
|
Vinay Jethava
|
Extension of Path Probability Method to Approximate Inference over Time
|
M.Sc.(Research) Thesis, 64 pages
| null | null | null |
cs.LG cs.CV
|
http://creativecommons.org/licenses/by/3.0/
|
There has been a tremendous growth in publicly available digital video
footage over the past decade. This has necessitated the development of new
techniques in computer vision geared towards efficient analysis, storage and
retrieval of such data. Many mid-level computer vision tasks such as
segmentation, object detection, tracking, etc. involve an inference problem
based on the video data available. Video data has a high degree of spatial and
temporal coherence. The property must be intelligently leveraged in order to
obtain better results.
Graphical models, such as Markov Random Fields, have emerged as a powerful
tool for such inference problems. They are naturally suited for expressing the
spatial dependencies present in video data, It is however, not clear, how to
extend the existing techniques for the problem of inference over time. This
thesis explores the Path Probability Method, a variational technique in
statistical mechanics, in the context of graphical models and approximate
inference problems. It extends the method to a general framework for problems
involving inference in time, resulting in an algorithm, \emph{DynBP}. We
explore the relation of the algorithm with existing techniques, and find the
algorithm competitive with existing approaches.
The main contribution of this thesis are the extended GBP algorithm, the
extension of Path Probability Methods to the DynBP algorithm and the
relationship between them. We have also explored some applications in computer
vision involving temporal evolution with promising results.
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 23:46:21 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Jethava",
"Vinay",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0909.3609
|
Vinay Jethava
|
Vinay Jethava, Krishnan Suresh, Chiranjib Bhattacharyya, Ramesh
Hariharan
|
Randomized Algorithms for Large scale SVMs
|
17 pages, Submitted to Machine Learning journal (October 2008) -
under revision
| null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a randomized algorithm for training Support vector machines(SVMs)
on large datasets. By using ideas from Random projections we show that the
combinatorial dimension of SVMs is $O({log} n)$ with high probability. This
estimate of combinatorial dimension is used to derive an iterative algorithm,
called RandSVM, which at each step calls an existing solver to train SVMs on a
randomly chosen subset of size $O({log} n)$. The algorithm has probabilistic
guarantees and is capable of training SVMs with Kernels for both classification
and regression problems. Experiments done on synthetic and real life data sets
demonstrate that the algorithm scales up existing SVM learners, without loss of
accuracy.
|
[
{
"version": "v1",
"created": "Sat, 19 Sep 2009 23:40:10 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Jethava",
"Vinay",
""
],
[
"Suresh",
"Krishnan",
""
],
[
"Bhattacharyya",
"Chiranjib",
""
],
[
"Hariharan",
"Ramesh",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0909.3637
|
Fei Li
|
Fei Li
|
Packet Scheduling in a Size-Bounded Buffer
|
6 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider algorithms to schedule packets with values and deadlines in a
size-bounded buffer. At any time, the buffer can store at most B packets.
Packets arrive over time. Each packet has a non-negative value and an integer
deadline. In each time step, at most one packet can be sent. Packets can be
dropped at any time before they are sent. The objective is to maximize the
total value gained by delivering packets no later than their respective
deadlines. This model generalizes the well-studied bounded-delay model (Hajek.
CISS 2001. Kesselman et al. STOC 2001). We first provide an optimal offline
algorithm for this model. Then we present an alternative proof of the
2-competitive deterministic online algorithm (Fung. arXiv July 2009). We also
prove that the lower bound of competitive ratio of a family of (deterministic
and randomized) algorithms is 2 - 1 / B.
|
[
{
"version": "v1",
"created": "Sun, 20 Sep 2009 15:20:17 GMT"
},
{
"version": "v2",
"created": "Mon, 1 Feb 2010 00:40:03 GMT"
}
] | 2010-02-01T00:00:00 |
[
[
"Li",
"Fei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.3647
|
Denes Petz
|
Denes Petz
|
From f-divergence to quantum quasi-entropies and their use
|
Written version of the lecture in the conference "Information and
Communication" held in Budapest
| null |
10.3390/e12030304
| null |
cs.IT math.IT math.ST quant-ph stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Csiszar's f-divergence of two probability distributions was extended to the
quantum case by the author in 1985. In the quantum setting positive
semidefinite matrices are in the place of probability distributions and the
quantum generalization is called quasi-entropy which is related to some other
important concepts as covariance, quadratic costs, Fisher information,
Cramer-Rao inequality and uncertainty relation. A conjecture about the scalar
curvature of a Fisher information geometry is explained. The described subjects
are overviewed in details in the matrix setting, but at the very end the von
Neumann algebra approach is sketched shortly.
|
[
{
"version": "v1",
"created": "Sun, 20 Sep 2009 18:10:11 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Petz",
"Denes",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0909.3648
|
Joel Ratsaby
|
Joel Ratsaby
|
Random scattering of bits by prediction
| null | null | null | null |
cs.AI cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate a population of binary mistake sequences that result from
learning with parametric models of different order. We obtain estimates of
their error, algorithmic complexity and divergence from a purely random
Bernoulli sequence. We study the relationship of these variables to the
learner's information density parameter which is defined as the ratio between
the lengths of the compressed to uncompressed files that contain the learner's
decision rule. The results indicate that good learners have a low information
density$\rho$ while bad learners have a high $\rho$. Bad learners generate
mistake sequences that are atypically complex or diverge stochastically from a
purely random Bernoulli sequence. Good learners generate typically complex
sequences with low divergence from Bernoulli sequences and they include mistake
sequences generated by the Bayes optimal predictor. Based on the static
algorithmic interference model of \cite{Ratsaby_entropy} the learner here acts
as a static structure which "scatters" the bits of an input sequence (to be
predicted) in proportion to its information density $\rho$ thereby deforming
its randomness characteristics.
|
[
{
"version": "v1",
"created": "Sun, 20 Sep 2009 18:10:55 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Oct 2010 19:03:58 GMT"
}
] | 2010-10-14T00:00:00 |
[
[
"Ratsaby",
"Joel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3658
|
Narasimha Shashidhar
|
Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
|
Efficient Steganography with Provable Security Guarantees
|
12 pages
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We provide a new provably-secure steganographic encryption protocol that is
proven secure in the complexity-theoretic framework of Hopper et al. The
fundamental building block of our steganographic encryption protocol is a
"one-time stegosystem" that allows two parties to transmit messages of length
shorter than the shared key with information-theoretic security guarantees. The
employment of a pseudorandom generator (PRG) permits secure transmission of
longer messages in the same way that such a generator allows the use of
one-time pad encryption for messages longer than the key in symmetric
encryption. The advantage of our construction, compared to that of Hopper et
al., is that it avoids the use of a pseudorandom function family and instead
relies (directly) on a pseudorandom generator in a way that provides linear
improvement in the number of applications of the underlying one-way permutation
per transmitted bit. This advantageous trade-off is achieved by substituting
the pseudorandom function family employed in the previous construction with an
appropriate combinatorial construction that has been used extensively in
derandomization, namely almost t-wise independent function families.
|
[
{
"version": "v1",
"created": "Sun, 20 Sep 2009 22:54:26 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Kiayias",
"Aggelos",
""
],
[
"Raekow",
"Yona",
""
],
[
"Russell",
"Alexander",
""
],
[
"Shashidhar",
"Narasimha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3688
|
Emiliano De Cristofaro
|
Mishari Al Mishari, Emiliano De Cristofaro, Karim El Defrawy and Gene
Tsudik
|
Harvesting SSL Certificate Data to Identify Web-Fraud
|
To appear in the International Journal of Network Security
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Web-fraud is one of the most unpleasant features of today's Internet. Two
well-known examples of fraudulent activities on the web are phishing and
typosquatting. Their effects range from relatively benign (such as unwanted
ads) to downright sinister (especially, when typosquatting is combined with
phishing). This paper presents a novel technique to detect web-fraud domains
that utilize HTTPS. To this end, we conduct the first comprehensive study of
SSL certificates. We analyze certificates of legitimate and popular domains and
those used by fraudulent ones. Drawing from extensive measurements, we build a
classifier that detects such malicious domains with high accuracy.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 05:39:17 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Dec 2009 02:19:53 GMT"
},
{
"version": "v3",
"created": "Thu, 12 Jan 2012 03:15:29 GMT"
},
{
"version": "v4",
"created": "Fri, 13 Jan 2012 03:55:04 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Mishari",
"Mishari Al",
""
],
[
"De Cristofaro",
"Emiliano",
""
],
[
"Defrawy",
"Karim El",
""
],
[
"Tsudik",
"Gene",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.3696
|
Victor Chen
|
Victor Chen, Elena Grigorescu, Ronald de Wolf
|
Efficient and Error-Correcting Data Structures for Membership and
Polynomial Evaluation
|
An abridged version of this paper appears in STACS 2010
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We construct efficient data structures that are resilient against a constant
fraction of adversarial noise. Our model requires that the decoder answers most
queries correctly with high probability and for the remaining queries, the
decoder with high probability either answers correctly or declares "don't
know." Furthermore, if there is no noise on the data structure, it answers all
queries correctly with high probability. Our model is the common generalization
of a model proposed recently by de Wolf and the notion of "relaxed locally
decodable codes" developed in the PCP literature.
We measure the efficiency of a data structure in terms of its length,
measured by the number of bits in its representation, and query-answering time,
measured by the number of bit-probes to the (possibly corrupted)
representation. In this work, we study two data structure problems: membership
and polynomial evaluation. We show that these two problems have constructions
that are simultaneously efficient and error-correcting.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 07:16:22 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Jan 2010 16:06:04 GMT"
}
] | 2010-01-27T00:00:00 |
[
[
"Chen",
"Victor",
""
],
[
"Grigorescu",
"Elena",
""
],
[
"de Wolf",
"Ronald",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.3717
|
Pranav Agrawal
|
Pranav Agrawal (1), Anurag Kumar (2), Joy Kuri (1), Manoj Panda (2),
Vishnu Navda (3), Ramachandran Ramjee (3), Venkata N. Padmanabhan (3) ((1)
CEDT Indian Institute of Science Bangalore, (2) ECE Indian Institute of
Science Bangalore, (3) Microsoft Research Bangalore India)
|
Analytical Models for Energy Consumption in Infrastructure WLAN STAs
Carrying TCP Traffic
| null | null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We develop analytical models for estimating the energy spent by stations
(STAs) in infrastructure WLANs when performing TCP controlled file downloads.
We focus on the energy spent in radio communication when the STAs are in the
Continuously Active Mode (CAM), or in the static Power Save Mode (PSM). Our
approach is to develop accurate models for obtaining the fraction of times the
STA radios spend in idling, receiving and transmitting. We discuss two traffic
models for each mode of operation: (i) each STA performs one large file
download, and (ii) the STAs perform short file transfers. We evaluate the rate
of STA energy expenditure with long file downloads, and show that static PSM is
worse than just using CAM. For short file downloads we compute the number of
file downloads that can be completed with given battery capacity, and show that
PSM performs better than CAM for this case. We provide a validation of our
analytical models using the NS-2 simulator. In contrast to earlier work on
analytical modeling of PSM, our models that capture the details of the
interactions between the 802.11 MAC in PSM and certain aspects of TCP.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 09:32:27 GMT"
},
{
"version": "v2",
"created": "Mon, 21 Sep 2009 23:14:20 GMT"
},
{
"version": "v3",
"created": "Wed, 23 Sep 2009 23:10:26 GMT"
},
{
"version": "v4",
"created": "Tue, 6 Oct 2009 11:54:38 GMT"
}
] | 2009-10-06T00:00:00 |
[
[
"Agrawal",
"Pranav",
""
],
[
"Kumar",
"Anurag",
""
],
[
"Kuri",
"Joy",
""
],
[
"Panda",
"Manoj",
""
],
[
"Navda",
"Vishnu",
""
],
[
"Ramjee",
"Ramachandran",
""
],
[
"Padmanabhan",
"Venkata N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.3786
|
Damien Chablat
|
Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger
(IRCCyN)
|
Kinematic calibration of Orthoglide-type mechanisms from observation of
parallel leg motions
| null |
Mechatronics 19, 4 (2009) 478-488
| null | null |
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper proposes a new calibration method for parallel manipulators that
allows efficient identification of the joint offsets using observations of the
manipulator leg parallelism with respect to the base surface. The method
employs a simple and low-cost measuring system, which evaluates deviation of
the leg location during motions that are assumed to preserve the leg
parallelism for the nominal values of the manipulator parameters. Using the
measured deviations, the developed algorithm estimates the joint offsets that
are treated as the most essential parameters to be identified. The validity of
the proposed calibration method and efficiency of the developed numerical
algorithms are confirmed by experimental results. The sensitivity of the
measurement methods and the calibration accuracy are also studied.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 14:15:09 GMT"
}
] | 2009-09-22T00:00:00 |
[
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0909.3787
|
Mikhail Berlinkov
|
M.V. Berlinkov
|
Approximating the minimum length of synchronizing words is hard
|
12 pages, 1 figure
| null |
10.1007/978-3-642-13182-0_4
| null |
cs.FL cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We prove that, unless $\mathrm{P}=\mathrm{NP}$, no polynomial algorithm can
approximate the minimum length of \sws for a given \san within a constant
factor.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 14:27:05 GMT"
},
{
"version": "v2",
"created": "Sat, 19 Dec 2009 05:20:58 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Berlinkov",
"M. V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.3789
|
Robert Brijder
|
Robert Brijder, Hendrik Jan Hoogeboom
|
Maximal Pivots on Graphs with an Application to Gene Assembly
|
modest revision (including different latex style) w.r.t. v2, 16
pages, 5 figures
|
Discrete Applied Mathematics, Volume 158, Issue 18, Pages
1977-1985
|
10.1016/j.dam.2010.08.030
| null |
math.CO cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider principal pivot transform (pivot) on graphs. We define a natural
variant of this operation, called dual pivot, and show that both the kernel and
the set of maximally applicable pivots of a graph are invariant under this
operation. The result is motivated by and applicable to the theory of gene
assembly in ciliates.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 14:47:11 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 2009 18:52:29 GMT"
},
{
"version": "v3",
"created": "Thu, 14 Oct 2010 14:04:04 GMT"
}
] | 2010-10-15T00:00:00 |
[
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.3790
|
Mikhail Berlinkov
|
M.V. Berlinkov
|
On Carpi and Alessandro conjecture
|
11 pages, 1 figure
| null | null | null |
cs.FL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The well known open \v{C}ern\'y conjecture states that each \san with $n$
states has a \sw of length at most $(n-1)^2$. On the other hand, the best known
upper bound is cubic of $n$. Recently, in the paper \cite{CARPI1} of Alessandro
and Carpi, the authors introduced the new notion of strongly transitivity for
automata and conjectured that this property with a help of \emph{Extension}
method allows to get a quadratic upper bound for the length of the shortest
\sws. They also confirmed this conjecture for circular automata. We disprove
this conjecture and the long-standing \emph{Extension} conjecture too. We also
consider the widely used Extension method and its perspectives.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 14:43:15 GMT"
},
{
"version": "v2",
"created": "Sun, 14 Feb 2010 12:09:32 GMT"
}
] | 2010-02-15T00:00:00 |
[
[
"Berlinkov",
"M. V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.FL",
"description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.",
"span": "(Formal Languages and Automata Theory)"
}
] |
0909.3868
|
Luigi Salemi
|
Luigi Salemi
|
Method of resolution of 3SAT in polynomial time
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Presentation of a Method for determining whether a problem 3Sat has solution,
and if yes to find one, in time max O(n^15). Is thus proved that the problem
3Sat is fully resolved in polynomial time and therefore that it is in P, by the
work of Cook and Levin, and can transform a SAT problem in a 3Sat in polynomial
time (ref. Karp), it follows that P = NP. Open Source program is available at
http://www.visainformatica.it/3sat
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 21:45:10 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Sep 2010 12:50:32 GMT"
}
] | 2010-09-14T00:00:00 |
[
[
"Salemi",
"Luigi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.3877
|
James Nastos
|
James Nastos, Yong Gao
|
A note on the hardness of graph diameter augmentation problems
|
No figures
| null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A graph has \emph{diameter} D if every pair of vertices are connected by a
path of at most D edges. The Diameter-D Augmentation problem asks how to add
the a number of edges to a graph in order to make the resulting graph have
diameter D. It was previously known that this problem is NP-hard \cite{GJ},
even in the D=2 case. In this note, we give a simpler reduction to arrive at
this fact and show that this problem is W[2]-hard.
|
[
{
"version": "v1",
"created": "Mon, 21 Sep 2009 23:26:00 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Nastos",
"James",
""
],
[
"Gao",
"Yong",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.3892
|
Kirk D. Borne
|
Kirk D. Borne (1) ((1) George Mason University)
|
Astroinformatics: A 21st Century Approach to Astronomy
|
14 pages total: 1 cover page, 3 pages of co-signers, plus 10 pages,
Astro2010 Decadal Survey State of the Profession Position Paper
| null | null | null |
astro-ph.IM cs.DB cs.DL cs.IR physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Data volumes from multiple sky surveys have grown from gigabytes into
terabytes during the past decade, and will grow from terabytes into tens (or
hundreds) of petabytes in the next decade. This exponential growth of new data
both enables and challenges effective astronomical research, requiring new
approaches. Thus far, astronomy has tended to address these challenges in an
informal and ad hoc manner, with the necessary special expertise being assigned
to e-Science or survey science. However, we see an even wider scope and
therefore promote a broader vision of this data-driven revolution in
astronomical research. For astronomy to effectively cope with and reap the
maximum scientific return from existing and future large sky surveys,
facilities, and data-producing projects, we need our own information science
specialists. We therefore recommend the formal creation, recognition, and
support of a major new discipline, which we call Astroinformatics.
Astroinformatics includes a set of naturally-related specialties including data
organization, data description, astronomical classification taxonomies,
astronomical concept ontologies, data mining, machine learning, visualization,
and astrostatistics. By virtue of its new stature, we propose that astronomy
now needs to integrate Astroinformatics as a formal sub-discipline within
agency funding plans, university departments, research programs, graduate
training, and undergraduate education. Now is the time for the recognition of
Astroinformatics as an essential methodology of astronomical research. The
future of astronomy depends on it.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 02:21:49 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Borne",
"Kirk D.",
"",
"George Mason University"
]
] |
[
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.