id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0909.2489
Pu Yang
Pu Yang, Jun Guo, Weiran Xu
PrisCrawler: A Relevance Based Crawler for Automated Data Classification from Bulletin Board
published in GCIS of IEEE WRI '09
null
10.1109/GCIS.2009.434
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Nowadays people realize that it is difficult to find information simply and quickly on the bulletin boards. In order to solve this problem, people propose the concept of bulletin board search engine. This paper describes the priscrawler system, a subsystem of the bulletin board search engine, which can automatically crawl and add the relevance to the classified attachments of the bulletin board. Priscrawler utilizes Attachrank algorithm to generate the relevance between webpages and attachments and then turns bulletin board into clear classified and associated databases, making the search for attachments greatly simplified. Moreover, it can effectively reduce the complexity of pretreatment subsystem and retrieval subsystem and improve the search precision. We provide experimental results to demonstrate the efficacy of the priscrawler.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 09:02:01 GMT" } ]
2016-11-17T00:00:00
[ [ "Yang", "Pu", "" ], [ "Guo", "Jun", "" ], [ "Xu", "Weiran", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.2496
Pu Yang
Pu Yang, Jun Guo, Guang Chen
Pavideoge: A Metadata Markup Video Structure in Video Search Engine
Submitted
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the problems of video processing in video search engine. Video has now become a very important kind of data in Internet; while searching for video is still a challenging task due to the inner properties of video: requiring enormous storage space, being independent, expressing information hiddenly. To handle the properties of video more effectively, in this paper, we propose a new video processing method in video search engine. In detail, the core of the new video processing method is creating pavideoge--a new data type, which contains the video advantages and webpage advantages. The pavideoge has four attributes: real link, videorank, text information and playnum. Each of them combines video's properties with webpage's. Video search engine based on the pavideoge can retrieve video more effectively. The experiment results show the encouraging performance of our approach. Based on the pavideoge, our video search engine can retrieve more precise videos in comparsion with previous related work.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 09:39:17 GMT" }, { "version": "v2", "created": "Fri, 2 Oct 2009 17:39:28 GMT" } ]
2009-10-02T00:00:00
[ [ "Yang", "Pu", "" ], [ "Guo", "Jun", "" ], [ "Chen", "Guang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.2504
Dominique Tschopp
Dominique Tschopp, Suhas Diggavi, Matthias Grossglauser
Hierarchical Routing over Dynamic Wireless Networks
29 pages, 19 figures, a shorter version was published in the proceedings of the 2008 ACM Sigmetrics conference
null
null
LICOS-REPORT-2007-005
cs.NI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Wireless network topologies change over time and maintaining routes requires frequent updates. Updates are costly in terms of consuming throughput available for data transmission, which is precious in wireless networks. In this paper, we ask whether there exist low-overhead schemes that produce low-stretch routes. This is studied by using the underlying geometric properties of the connectivity graph in wireless networks.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 09:57:50 GMT" }, { "version": "v2", "created": "Wed, 16 Sep 2009 08:06:15 GMT" } ]
2009-09-16T00:00:00
[ [ "Tschopp", "Dominique", "" ], [ "Diggavi", "Suhas", "" ], [ "Grossglauser", "Matthias", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.2517
Sk Sarif Hassan s
Pabitra Pal Choudhury, Sk. Sarif Hassan, Sudhakar Sahoo, Soubhik Chakraborty
On the Interesting World of Fractals and Their Applications to Music
This paper tell about music fractals. It is delivered at FRMS-2009
null
null
null
cs.OH
http://creativecommons.org/licenses/publicdomain/
In this paper we have defined one function that has been used to construct different fractals having fractal dimensions between 1.58 and 2. Also, we tried to calculate the amount of increment of fractal dimension in accordance with the base of the number systems. Further, interestingly enough, these very fractals could be a frame of lyrics for the musicians, as we know that the fractal dimension of music is around 1.65 and varies between a high of 1.68 and a low of 1.60. Further, at the end we conjecture that the switching from one music fractal to another is nothing but enhancing a constant amount fractal dimension which might be equivalent to a kind of different sets of musical notes in various orientations.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 11:07:50 GMT" }, { "version": "v2", "created": "Tue, 6 Oct 2009 06:34:25 GMT" } ]
2009-10-06T00:00:00
[ [ "Choudhury", "Pabitra Pal", "" ], [ "Hassan", "Sk. Sarif", "" ], [ "Sahoo", "Sudhakar", "" ], [ "Chakraborty", "Soubhik", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.2526
Olli Pottonen
Patric R. J. \"Osterg{\aa}rd and Olli Pottonen
Two Optimal One-Error-Correcting Codes of Length 13 That Are Not Doubly Shortened Perfect Codes
v2: a correction concerning shortened codes of length 12
null
10.1007/s10623-010-9450-4
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The doubly shortened perfect codes of length 13 are classified utilizing the classification of perfect codes in [P.R.J. \"Osterg{\aa}rd and O. Pottonen, The perfect binary one-error-correcting codes of length 15: Part I - Classification, IEEE Trans. Inform. Theory, to appear]; there are 117821 such (13,512,3) codes. By applying a switching operation to those codes, two more (13,512,3) codes are obtained, which are then not doubly shortened perfect codes.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 12:04:50 GMT" }, { "version": "v2", "created": "Mon, 28 Feb 2011 13:57:11 GMT" } ]
2011-03-01T00:00:00
[ [ "Östergård", "Patric R. J.", "" ], [ "Pottonen", "Olli", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2542
Vadim Yatsenko
Vadim Yatsenko (State Design Office Yuzhnoye, Ukraine)
Stochastic Optimization of Linear Dynamic Systems with Parametric Uncertainties
Submitted to Journal of Automation and Information Science
null
null
null
cs.AI cs.IT math.IT
http://creativecommons.org/licenses/by/3.0/
This paper describes a new approach to solving some stochastic optimization problems for linear dynamic system with various parametric uncertainties. Proposed approach is based on application of tensor formalism for creation the mathematical model of parametric uncertainties. Within proposed approach following problems are considered: prediction, data processing and optimal control. Outcomes of carried out simulation are used as illustration of properties and effectiveness of proposed methods.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 13:02:31 GMT" } ]
2009-09-15T00:00:00
[ [ "Yatsenko", "Vadim", "", "State Design Office Yuzhnoye, Ukraine" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2547
Maxim Kolosovskiy
Maxim Kolosovskiy (Altai State Technical University, Russia)
Simple implementation of deletion from open-address hash table
6 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Deletion from open-address hash table is not so easy as deletion from chained hash table, because in open-address table we can't simply mark a slot containing deleted key as empty. Search for keys may become incorrect. The classical method to implement deletion is to mark slots in hash table by three values: "free", "busy", "deleted". That method is easy to implement, but there are some disadvantages. In this article we consider alternative method of deletion keys, where we avoid using the mark "deleted". The article contains the implementation of the method in Java.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 13:36:58 GMT" } ]
2009-09-15T00:00:00
[ [ "Kolosovskiy", "Maxim", "", "Altai State Technical University, Russia" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.2622
Jiangyuan Li
Jiangyuan Li and Athina Petropulu
Transmitter Optimization for Achieving Secrecy Capacity in Gaussian MIMO Wiretap Channels
29 pages, 10 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a Gaussian multiple-input multiple-output (MIMO) wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each node equipped with multiple antennas. We study the problem of finding the optimal input covariance matrix that achieves secrecy capacity subject to a power constraint, which leads to a non-convex optimization problem that is in general difficult to solve. Existing results for this problem address the case in which the transmitter and the legitimate receiver have two antennas each and the eavesdropper has one antenna. For the general cases, it has been shown that the optimal input covariance matrix has low rank when the difference between the Grams of the eavesdropper and the legitimate receiver channel matrices is indefinite or semi-definite, while it may have low rank or full rank when the difference is positive definite. In this paper, the aforementioned non-convex optimization problem is investigated. In particular, for the multiple-input single-output (MISO) wiretap channel, the optimal input covariance matrix is obtained in closed form. For general cases, we derive the necessary conditions for the optimal input covariance matrix consisting of a set of equations. For the case in which the transmitter has two antennas, the derived necessary conditions can result in a closed form solution; For the case in which the difference between the Grams is indefinite and has all negative eigenvalues except one positive eigenvalue, the optimal input covariance matrix has rank one and can be obtained in closed form; For other cases, the solution is proved to be a fixed point of a mapping from a convex set to itself and an iterative procedure is provided to search for it. Numerical results are presented to illustrate the proposed theoretical findings.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 19:07:49 GMT" } ]
2009-09-15T00:00:00
[ [ "Li", "Jiangyuan", "" ], [ "Petropulu", "Athina", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2623
Reza Akbarinia
Reza Akbarinia (INRIA - Lina), Esther Pacitti (INRIA - Lina), Patrick Valduriez (INRIA - Lina)
Reducing Network Traffic in Unstructured P2P Systems Using Top-k Queries
null
Distributed and Parallel Databases 19, 2-3 (2006) 67-86
10.1007/s10619-006-8313-5
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A major problem of unstructured P2P systems is their heavy network traffic. This is caused mainly by high numbers of query answers, many of which are irrelevant for users. One solution to this problem is to use Top-k queries whereby the user can specify a limited number (k) of the most relevant answers. In this paper, we present FD, a (Fully Distributed) framework for executing Top-k queries in unstructured P2P systems, with the objective of reducing network traffic. FD consists of a family of algorithms that are simple but effec-tive. FD is completely distributed, does not depend on the existence of certain peers, and addresses the volatility of peers during query execution. We vali-dated FD through implementation over a 64-node cluster and simulation using the BRITE topology generator and SimJava. Our performance evaluation shows that FD can achieve major performance gains in terms of communication and response time.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 19:07:58 GMT" } ]
2009-09-15T00:00:00
[ [ "Akbarinia", "Reza", "", "INRIA - Lina" ], [ "Pacitti", "Esther", "", "INRIA - Lina" ], [ "Valduriez", "Patrick", "", "INRIA - Lina" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.2626
Laurent Romary
Susanne Salmon-Alt (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine - LORIA)
Reference Resolution within the Framework of Cognitive Grammar
Colloque avec actes et comit\'e de lecture. internationale
International Colloqium on Cognitive Science, San Sebastian : Spain (2001)
null
A01-R-057 || salmon-alt01a
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Following the principles of Cognitive Grammar, we concentrate on a model for reference resolution that attempts to overcome the difficulties previous approaches, based on the fundamental assumption that all reference (independent on the type of the referring expression) is accomplished via access to and restructuring of domains of reference rather than by direct linkage to the entities themselves. The model accounts for entities not explicitly mentioned but understood in a discourse, and enables exploitation of discursive and perceptual context to limit the set of potential referents for a given referring expression. As the most important feature, we note that a single mechanism is required to handle what are typically treated as diverse phenomena. Our approach, then, provides a fresh perspective on the relations between Cognitive Grammar and the problem of reference.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 19:10:59 GMT" } ]
2009-09-15T00:00:00
[ [ "Salmon-Alt", "Susanne", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA\n Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.2694
Ilia Toli
Ilia Toli
Singularity of Sparse Circulant Matrices is NP-complete
References are somewhere in the middle, before the appendices. 8 pages
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is shown by Karp reduction that deciding the singularity of $(2^n - 1) \times (2^n - 1)$ sparse circulant matrices (SC problem) is NP-complete. We can write them only implicitly, by indicating values of the $2 + n(n + 1)/2$ eventually nonzero entries of the first row and can make all matrix operations with them. The positions are $0, 1, 2^{i} + 2^{j}$. The complexity parameter is $n$. Mulmuley's work on the rank of matrices \cite{Mulmuley87} makes SC stand alone in a list of 3,000 and growing NP-complete problems.
[ { "version": "v1", "created": "Mon, 14 Sep 2009 23:26:54 GMT" } ]
2009-09-16T00:00:00
[ [ "Toli", "Ilia", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.2704
Aaron Sterling
Aaron Sterling
Memory Consistency Conditions for Self-Assembly Programming
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Perhaps the two most significant theoretical questions about the programming of self-assembling agents are: (1) necessary and sufficient conditions to produce a unique terminal assembly, and (2) error correction. We address both questions, by reducing two well-studied models of tile assembly to models of distributed shared memory (DSM), in order to obtain results from the memory consistency systems induced by tile assembly systems when simulated in the DSM setting. The Abstract Tile Assembly Model (aTAM) can be simulated by a DSM system that obeys causal consistency, and the locally deterministic tile assembly systems in the aTAM correspond exactly to the concurrent-write free programs that simulate tile assembly in such a model. Thus, the detection of the failure of local determinism (which had formerly been an open problem) reduces to the detection of data races in simulating programs. Further, the Kinetic Tile Assembly Model can be simulated by a DSM system that obeys GWO, a memory consistency condition defined by Steinke and Nutt. (To our knowledge, this is the first natural example of a DSM system that obeys GWO, but no stronger consistency condition.) We combine these results with the observation that self-assembly algorithms are local algorithms, and there exists a fast conversion of deterministic local algorithms into deterministic self-stabilizing algorithms. This provides an "immediate" generalization of a theorem by Soloveichik et al. about the existence of tile assembly systems that simultaneously perform two forms of self-stabilization: proofreading and self-healing. Our reductions and proof techniques can be extended to the programming of self-assembling agents in a variety of media, not just DNA tiles, and not just two-dimensional surfaces.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 19:45:22 GMT" } ]
2009-09-16T00:00:00
[ [ "Sterling", "Aaron", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.2705
Wei Dai
Wei Dai and Olgica Milenkovic
SET: an algorithm for consistent matrix completion
4+ pages, submitted to ICASSP 2010
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A new algorithm, termed subspace evolution and transfer (SET), is proposed for solving the consistent matrix completion problem. In this setting, one is given a subset of the entries of a low-rank matrix, and asked to find one low-rank matrix consistent with the given observations. We show that this problem can be solved by searching for a column space that matches the observations. The corresponding algorithm consists of two parts -- subspace evolution and subspace transfer. In the evolution part, we use a line search procedure to refine the column space. However, line search is not guaranteed to converge, as there may exist barriers along the search path that prevent the algorithm from reaching a global optimum. To address this problem, in the transfer part, we design mechanisms to detect barriers and transfer the estimated column space from one side of the barrier to the another. The SET algorithm exhibits excellent empirical performance for very low-rank matrices.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 02:42:58 GMT" }, { "version": "v2", "created": "Wed, 16 Sep 2009 20:26:21 GMT" }, { "version": "v3", "created": "Sat, 19 Sep 2009 05:23:28 GMT" }, { "version": "v4", "created": "Tue, 29 Sep 2009 19:33:47 GMT" }, { "version": "v5", "created": "Wed, 3 Feb 2010 16:49:26 GMT" } ]
2010-02-03T00:00:00
[ [ "Dai", "Wei", "" ], [ "Milenkovic", "Olgica", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2706
Yingwu Zhu
Yingwu Zhu
Measurement and Analysis of an Online Content Voting Network: A Case Study of Digg
12 pages, first draft in April 2009
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Emergence of online content voting networks allows users to share and rate content including social news, photos and videos. The basic idea behind online content voting networks is that aggregate user activities (e.g., submitting and rating content) makes high-quality content thrive through the unprecedented scale, high dynamics and divergent quality of user generated content (UGC). To better understand the nature and impact of online content voting networks, we have analyzed Digg, a popular online social news aggregator and rating website. Based on a large amount of data collected, we provide an in-depth study of Digg. In particular, we study structural properties of Digg social network, impact of social network properties on user digging activities and vice versa, distribution of user diggs, content promotion, and information filtering. We also provide insight into design of content promotion algorithms and recommendation-assisted content discovery. Overall, we believe that the results presented in this paper are crucial in understanding online content rating networks.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 02:58:04 GMT" } ]
2009-09-30T00:00:00
[ [ "Zhu", "Yingwu", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.2715
Laurent Romary
Dan Cristea, Nancy Ide, Laurent Romary (INRIA Lorraine - LORIA)
Marking-up multiple views of a Text: Discourse and Reference
null
First International Language Resources and Evaluation Conference, Grenada, Espagne : France (1998)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe an encoding scheme for discourse structure and reference, based on the TEI Guidelines and the recommendations of the Corpus Encoding Specification (CES). A central feature of the scheme is a CES-based data architecture enabling the encoding of and access to multiple views of a marked-up document. We describe a tool architecture that supports the encoding scheme, and then show how we have used the encoding scheme and the tools to perform a discourse analytic task in support of a model of global discourse cohesion called Veins Theory (Cristea & Ide, 1998).
[ { "version": "v1", "created": "Tue, 15 Sep 2009 06:02:56 GMT" } ]
2009-09-16T00:00:00
[ [ "Cristea", "Dan", "", "INRIA Lorraine - LORIA" ], [ "Ide", "Nancy", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.2718
Laurent Romary
Nancy Ide (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine - LORIA), Tomaz Erjavec
A Common XML-based Framework for Syntactic Annotations
Colloque avec actes et comit\'e de lecture. internationale
1st NLP and XML Workshop, Tokyo, Japan : Japan (2001)
null
A01-R-289 || ide01d
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is widely recognized that the proliferation of annotation schemes runs counter to the need to re-use language resources, and that standards for linguistic annotation are becoming increasingly mandatory. To answer this need, we have developed a framework comprised of an abstract model for a variety of different annotation types (e.g., morpho-syntactic tagging, syntactic annotation, co-reference annotation, etc.), which can be instantiated in different ways depending on the annotator's approach and goals. In this paper we provide an overview of the framework, demonstrate its applicability to syntactic annotation, and show how it can contribute to comparative evaluation of parser output and diverse syntactic annotation schemes.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 06:09:47 GMT" } ]
2009-09-16T00:00:00
[ [ "Ide", "Nancy", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA Lorraine -\n LORIA" ], [ "Erjavec", "Tomaz", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.2719
Laurent Romary
Nancy Ide (COMPUTER Science Department), Laurent Romary (INRIA Lorraine - Loria)
Standards for Language Resources
Colloque avec actes et comit\'e de lecture. internationale
Third International Conference on Language Resources and Evaluation - LREC 2002, Las Palmas, Spain : France (2002)
null
A02-R-096 || ide02a
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents an abstract data model for linguistic annotations and its implementation using XML, RDF and related standards; and to outline the work of a newly formed committee of the International Standards Organization (ISO), ISO/TC 37/SC 4 Language Resource Management, which will use this work as its starting point. The primary motive for presenting the latter is to solicit the participation of members of the research community to contribute to the work of the committee.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 06:10:45 GMT" } ]
2009-09-16T00:00:00
[ [ "Ide", "Nancy", "", "COMPUTER Science Department" ], [ "Romary", "Laurent", "", "INRIA\n Lorraine - Loria" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.2721
Laurent Romary
Minit Gupta (INRIA Lorraine - LORIA), Laurent Romary (INRIA Lorraine - LORIA)
Dynamically Generated Interfaces in XML Based Architecture
Colloque avec actes et comit\'e de lecture. internationale
User Interface Markup Language - UIMl'2001, Paris : France (2001)
null
A01-R-293 || gupta01a
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Providing on-line services on the Internet will require the definition of flexible interfaces that are capable of adapting to the user's characteristics. This is all the more important in the context of medical applications like home monitoring, where no two patients have the same medical profile. Still, the problem is not limited to the capacity of defining generic interfaces, as has been made possible by UIML, but also to define the underlying information structures from which these may be generated. The DIATELIC project deals with the tele-monitoring of patients under peritoneal dialysis. By means of XML abstractions, termed as "medical components", to represent the patient's profile, the application configures the customizable properties of the patient's interface and generates a UIML document dynamically. The interface allows the patient to feed the data manually or use a device which allows "automatic data acquisition". The acquired medical data is transferred to an expert system, which analyses the data and sends alerts to the medical staff. In this paper we show how UIML can be seen as one component within a global XML based architecture.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 06:18:26 GMT" } ]
2009-09-16T00:00:00
[ [ "Gupta", "Minit", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA Lorraine -\n LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.2733
Pierre Fraigniaud
Pierre Fraigniaud and Amos Korman
An Optimal Labeling Scheme for Ancestry Queries
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An ancestry labeling scheme assigns labels (bit strings) to the nodes of rooted trees such that ancestry queries between any two nodes in a tree can be answered merely by looking at their corresponding labels. The quality of an ancestry labeling scheme is measured by its label size, that is the maximal number of bits in a label of a tree node. In addition to its theoretical appeal, the design of efficient ancestry labeling schemes is motivated by applications in web search engines. For this purpose, even small improvements in the label size are important. In fact, the literature about this topic is interested in the exact label size rather than just its order of magnitude. As a result, following the proposal of a simple interval-based ancestry scheme with label size $2\log_2 n$ bits (Kannan et al., STOC '88), a considerable amount of work was devoted to improve the bound on the size of a label. The current state of the art upper bound is $\log_2 n + O(\sqrt{\log n})$ bits (Abiteboul et al., SODA '02) which is still far from the known $\log_2 n + \Omega(\log\log n)$ bits lower bound (Alstrup et al., SODA '03). In this paper we close the gap between the known lower and upper bounds, by constructing an ancestry labeling scheme with label size $\log_2 n + O(\log\log n)$ bits. In addition to the optimal label size, our scheme assigns the labels in linear time and can support any ancestry query in constant time.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 13:31:54 GMT" } ]
2009-09-16T00:00:00
[ [ "Fraigniaud", "Pierre", "" ], [ "Korman", "Amos", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.2737
Yin Xiang
Yin Xiang, Lianlin Li, Fang Li
Compressive sensing by white random convolution
10 pages with 4 figures
null
null
null
math.OC cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A different compressive sensing framework, convolution with white noise waveform followed by subsampling at fixed (not randomly selected) locations, is studied in this paper. We show that its recoverability for sparse signals depends on the coherence (denoted by mu) between the signal representation and the Fourier basis. In particular, an n-dimensional signal which is S-sparse in such a basis can be recovered with a probability exceeding 1-delta from any fixed m~O(mu^2*S*log(n/delta)^(3/2)) output samples of the random convolution.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 08:05:42 GMT" }, { "version": "v2", "created": "Wed, 30 Sep 2009 09:32:15 GMT" } ]
2009-09-30T00:00:00
[ [ "Xiang", "Yin", "" ], [ "Li", "Lianlin", "" ], [ "Li", "Fang", "" ] ]
[ { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2767
Vahan Mkrtchyan
Davit Aslanyan, Vahan V. Mkrtchyan, Samvel S. Petrosyan, Gagik N. Vardanyan
On disjoint matchings in cubic graphs: maximum 2- and 3-edge-colorable subgraphs
31 pages, 14 figures, majorly revised
Discrete Applied Mathematics 172 (2014) pp. 12--27
10.1016/j.dam.2014.03.001
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show that any $2-$factor of a cubic graph can be extended to a maximum $3-$edge-colorable subgraph. We also show that the sum of sizes of maximum $2-$ and $3-$edge-colorable subgraphs of a cubic graph is at least twice of its number of vertices. Finally, for a cubic graph $G$, consider the pairs of edge-disjoint matchings whose union consists of as many edges as possible. Let $H$ be the largest matching among such pairs. Let $M$ be a maximum matching of $G$. We show that 9/8 is a tight upper bound for $|M|/|H|$.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 11:00:49 GMT" }, { "version": "v2", "created": "Fri, 24 Dec 2010 10:40:26 GMT" }, { "version": "v3", "created": "Wed, 10 Oct 2012 16:26:33 GMT" } ]
2014-05-01T00:00:00
[ [ "Aslanyan", "Davit", "" ], [ "Mkrtchyan", "Vahan V.", "" ], [ "Petrosyan", "Samvel S.", "" ], [ "Vardanyan", "Gagik N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.2777
Hossein Bagheri
Hossein Bagheri, Abolfazl S. Motahari, and Amir K. Khandani
On the Symmetric Gaussian Interference Channel with Partial Unidirectional Cooperation
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A two-user symmetric Gaussian Interference Channel (IC) is considered in which a noiseless unidirectional link connects one encoder to the other. Having a constant capacity, the additional link provides partial cooperation between the encoders. It is shown that the available cooperation can dramatically increase the sum-capacity of the channel. This fact is proved based on comparison of proposed lower and upper bounds on the sum-capacity. Partitioning the data into three independent messages, namely private, common, and cooperative ones, the transmission strategy used to obtain the lower bound enjoys a simple type of Han-Kobayashi scheme together with a cooperative communication scheme. A Genie-aided upper bound is developed which incorporates the capacity of the cooperative link. Other upper bounds are based on the sum-capacity of the Cognitive Radio Channel and cut-set bounds. For the strong interference regime, the achievablity scheme is simplified to employ common and/or cooperative messages but not the private one. Through a careful analysis it is shown that the gap between these bounds is at most one and two bits per real dimension for strong and weak interference regimes, respectively. Moreover, the Generalized Degrees-of-Freedom of the channel is characterized.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 11:48:57 GMT" } ]
2009-09-16T00:00:00
[ [ "Bagheri", "Hossein", "" ], [ "Motahari", "Abolfazl S.", "" ], [ "Khandani", "Amir K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2787
Tamara Mchedlidze David
Tamara Mchedlidze, Antonios Symvonis
Crossing-Free Acyclic Hamiltonian Path Completion for Planar st-Digraphs
Accepted to ISAAC2009
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the problem of existence of a crossing-free acyclic hamiltonian path completion (for short, HP-completion) set for embedded upward planar digraphs. In the context of book embeddings, this question becomes: given an embedded upward planar digraph $G$, determine whether there exists an upward 2-page book embedding of $G$ preserving the given planar embedding. Given an embedded $st$-digraph $G$ which has a crossing-free HP-completion set, we show that there always exists a crossing-free HP-completion set with at most two edges per face of $G$. For an embedded $N$-free upward planar digraph $G$, we show that there always exists a crossing-free acyclic HP-completion set for $G$ which, moreover, can be computed in linear time. For a width-$k$ embedded planar $st$-digraph $G$, we show that we can be efficiently test whether $G$ admits a crossing-free acyclic HP-completion set.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 12:12:06 GMT" } ]
2009-09-16T00:00:00
[ [ "Mchedlidze", "Tamara", "" ], [ "Symvonis", "Antonios", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.2793
Ge Di
D. Ge, J. Idier and E. Le Carpentier
Enhanced sampling schemes for MCMC based blind Bernoulli-Gaussian deconvolution
null
null
null
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes and compares two new sampling schemes for sparse deconvolution using a Bernoulli-Gaussian model. To tackle such a deconvolution problem in a blind and unsupervised context, the Markov Chain Monte Carlo (MCMC) framework is usually adopted, and the chosen sampling scheme is most often the Gibbs sampler. However, such a sampling scheme fails to explore the state space efficiently. Our first alternative, the $K$-tuple Gibbs sampler, is simply a grouped Gibbs sampler. The second one, called partially marginalized sampler, is obtained by integrating the Gaussian amplitudes out of the target distribution. While the mathematical validity of the first scheme is obvious as a particular instance of the Gibbs sampler, a more detailed analysis is provided to prove the validity of the second scheme. For both methods, optimized implementations are proposed in terms of computation and storage cost. Finally, simulation results validate both schemes as more efficient in terms of convergence time compared with the plain Gibbs sampler. Benchmark sequence simulations show that the partially marginalized sampler takes fewer iterations to converge than the $K$-tuple Gibbs sampler. However, its computation load per iteration grows almost quadratically with respect to the data length, while it only grows linearly for the $K$-tuple Gibbs sampler.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 12:29:26 GMT" }, { "version": "v2", "created": "Fri, 18 Sep 2009 14:58:05 GMT" } ]
2009-09-18T00:00:00
[ [ "Ge", "D.", "" ], [ "Idier", "J.", "" ], [ "Carpentier", "E. Le", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0909.2814
Ren\'e van Bevern
Ren\'e van Bevern
Graph-based data clustering: a quadratic-vertex problem kernel for s-Plex Cluster Vertex Deletion
41 pages, 17 figures
Algorithmica, 62(3-4):930-950, 2012
10.1007/s00453-011-9492-7
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the s-Plex Cluster Vertex Deletion problem. Like the Cluster Vertex Deletion problem, it is NP-hard and motivated by graph-based data clustering. While the task in Cluster Vertex Deletion is to delete vertices from a graph so that its connected components become cliques, the task in s-Plex Cluster Vertex Deletion is to delete vertices from a graph so that its connected components become s-plexes. An s-plex is a graph in which every vertex is nonadjacent to at most s-1 other vertices; a clique is an 1-plex. In contrast to Cluster Vertex Deletion, s-Plex Cluster Vertex Deletion allows to balance the number of vertex deletions against the sizes and the density of the resulting clusters, which are s-plexes instead of cliques. The focus of this work is the development of provably efficient and effective data reduction rules for s-Plex Cluster Vertex Deletion. In terms of fixed-parameter algorithmics, these yield a so-called problem kernel. A similar problem, s-Plex Editing, where the task is the insertion or the deletion of edges so that the connected components of a graph become s-plexes, has also been studied in terms of fixed-parameter algorithmics. Using the number of allowed graph modifications as parameter, we expect typical parameter values for s-Plex Cluster Vertex Deletion to be significantly lower than for s-Plex Editing, because one vertex deletion can lead to a high number of edge deletions. This holds out the prospect for faster fixed-parameter algorithms for s-Plex Cluster Vertex Deletion.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 17:27:00 GMT" } ]
2019-11-14T00:00:00
[ [ "van Bevern", "René", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.2816
Christian Feldbauer
Emine Zerrin Sakir and Christian Feldbauer
Efficient Quality-Based Playout Buffer Algorithm
6 pages
null
null
null
cs.MM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Playout buffers are used in VoIP systems to compensate for network delay jitter by making a trade-off between delay and loss. In this work we propose a playout buffer algorithm that makes the trade-off based on maximization of conversational speech quality, aiming to keep the computational complexity lowest possible. We model the network delay using a Pareto distribution and show that it is a good compromise between providing an appropriate fit to the network delay characteristics and yielding a low arithmetical complexity. We use the ITU-T E-Model as the quality model and simplify its delay impairment function. The proposed playout buffer algorithm finds the optimum playout delay using a closed-form solution that minimizes the sum of the simplified delay impairment factor and the loss-dependent equipment impairment factor of the E-model. The simulation results show that our proposed algorithm outperforms existing state-of-the-art algorithms with a reduced complexity for a quality-based algorithm.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 14:44:21 GMT" } ]
2009-09-16T00:00:00
[ [ "Sakir", "Emine Zerrin", "" ], [ "Feldbauer", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" } ]
0909.2817
ShinnYih Huang
ShinnYih Huang and Hoda Bidkhori
Strongly Cancellative and Recovering Sets On Lattices
9 pages
null
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We use information theory to study recovering sets $\R_L$ and strongly cancellative sets $\C_L$ on different lattices. These sets are special classes of recovering pairs and cancellative sets previously discussed in [1], [3] and [5]. We mainly focus on the lattices $B_n$ and $D_{l}^{k}$. Specifically, we find upper bounds and constructions for the sets $\R_{B_n}$, $\C_{B_n}$, and $\C_{D_{l}^{k}}$.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 16:49:58 GMT" } ]
2009-09-16T00:00:00
[ [ "Huang", "ShinnYih", "" ], [ "Bidkhori", "Hoda", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2839
Alban Ponse
Jan A. Bergstra, Alban Ponse
A progression ring for interfaces of instruction sequences, threads, and services
12 pages
null
null
null
cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We define focus-method interfaces and some connections between such interfaces and instruction sequences, giving rise to instruction sequence components. We provide a flexible and practical notation for interfaces using an abstract datatype specification comparable to that of basic process algebra with deadlock. The structures thus defined are called progression rings. We also define thread and service components. Two types of composition of instruction sequences or threads and services (called `use' and `apply') are lifted to the level of components.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 16:59:57 GMT" } ]
2009-09-16T00:00:00
[ [ "Bergstra", "Jan A.", "" ], [ "Ponse", "Alban", "" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" } ]
0909.2849
Shayan Oveis Gharan
Shayan Oveis Gharan, Amin Saberi
The Asymmetric Traveling Salesman Problem on Graphs with Bounded Genus
null
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a constant factor approximation algorithm for the asymmetric traveling salesman problem when the support graph of the solution of the Held-Karp linear programming relaxation has bounded orientable genus.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 18:39:03 GMT" }, { "version": "v2", "created": "Thu, 17 Sep 2009 17:46:49 GMT" }, { "version": "v3", "created": "Sat, 7 Nov 2009 17:11:54 GMT" }, { "version": "v4", "created": "Fri, 14 Jan 2011 20:49:58 GMT" } ]
2011-01-17T00:00:00
[ [ "Gharan", "Shayan Oveis", "" ], [ "Saberi", "Amin", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.2852
Ashwin Jain
Ashwin Jain, C Hari
A new efficient k-out-of-n Oblivious Transfer protocol
12 pages, 1 figure
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper presents a new efficient protocol for k-out-of-n oblivious transfer which is a generalization of Parakh's 1-out-of-2 oblivious transfer protocol based on Diffie-Hellman key exchange. In the proposed protocol, the parties involved generate Diffie-Hellman keys obliviously and then use them for oblivious transfer of secrets.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 18:49:24 GMT" } ]
2009-09-16T00:00:00
[ [ "Jain", "Ashwin", "" ], [ "Hari", "C", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.2859
Petar Maymounkov
Jonathan Kelner, Petar Maymounkov
Electric routing and concurrent flow cutting
21 pages, 0 figures. To be published in Springer LNCS Book No. 5878, Proceedings of The 20th International Symposium on Algorithms and Computation (ISAAC'09)
null
null
null
cs.DM cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate an oblivious routing scheme, amenable to distributed computation and resilient to graph changes, based on electrical flow. Our main technical contribution is a new rounding method which we use to obtain a bound on the L1->L1 operator norm of the inverse graph Laplacian. We show how this norm reflects both latency and congestion of electric routing.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 19:50:37 GMT" } ]
2009-09-16T00:00:00
[ [ "Kelner", "Jonathan", "" ], [ "Maymounkov", "Petar", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.2891
Michael Goodrich
David Eppstein, Michael T. Goodrich, Lowell Trott
Going Off-road: Transversal Complexity in Road Networks
Fuller version of paper appearing in ACM GIS '09
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A geometric graph is a graph embedded in the plane with vertices at points and edges drawn as curves (which are usually straight line segments) between those points. The average transversal complexity of a geometric graph is the number of edges of that graph that are crossed by random line or line segment. In this paper, we study the average transversal complexity of road networks. By viewing road networks as multiscale-dispersed graphs, we show that a random line will cross the edges of such a graph O(sqrt(n)) times on average. In addition, we provide by empirical evidence from experiments on the road networks of the fifty states of United States and the District of Columbia that this bound holds in practice and has a small constant factor. Combining this result with data structuring techniques from computational geometry, allows us to show that we can then do point location and ray-shooting navigational queries with respect to road networks in O(sqrt(n) log n) expected time. Finally, we provide empirical justification for this claim as well.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 22:09:19 GMT" } ]
2009-09-17T00:00:00
[ [ "Eppstein", "David", "" ], [ "Goodrich", "Michael T.", "" ], [ "Trott", "Lowell", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.2894
Jun Zhang
Jun Zhang and Jeffrey G. Andrews
Adaptive Spatial Intercell Interference Cancellation in Multicell Wireless Networks
26 pages, submitted to IEEE J. Select. Areas Commun. special issue on Cooperative Communications in MIMO Cellular Networks, Sept. 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Downlink spatial intercell interference cancellation (ICIC) is considered for mitigating other-cell interference using multiple transmit antennas. A principle question we explore is whether it is better to do ICIC or simply standard single-cell beamforming. We explore this question analytically and show that beamforming is preferred for all users when the edge SNR (signal-to-noise ratio) is low ($<0$ dB), and ICIC is preferred when the edge SNR is high ($>10$ dB), for example in an urban setting. At medium SNR, a proposed adaptive strategy, where multiple base stations jointly select transmission strategies based on the user location, outperforms both while requiring a lower feedback rate than the pure ICIC approach. The employed metric is sum rate, which is normally a dubious metric for cellular systems, but surprisingly we show that even with this reward function the adaptive strategy also improves fairness. When the channel information is provided by limited feedback, the impact of the induced quantization error is also investigated. It is shown that ICIC with well-designed feedback strategies still provides significant throughput gain.
[ { "version": "v1", "created": "Tue, 15 Sep 2009 22:32:22 GMT" }, { "version": "v2", "created": "Tue, 22 Sep 2009 19:22:16 GMT" } ]
2009-09-22T00:00:00
[ [ "Zhang", "Jun", "" ], [ "Andrews", "Jeffrey G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.2927
Vitaly Feldman
Vitaly Feldman
Distribution-Specific Agnostic Boosting
null
Proceedings of Innovations in Computer Science (ICS), 2010, pp 241-250
null
null
cs.LG cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the problem of boosting the accuracy of weak learning algorithms in the agnostic learning framework of Haussler (1992) and Kearns et al. (1992). Known algorithms for this problem (Ben-David et al., 2001; Gavinsky, 2002; Kalai et al., 2008) follow the same strategy as boosting algorithms in the PAC model: the weak learner is executed on the same target function but over different distributions on the domain. We demonstrate boosting algorithms for the agnostic learning framework that only modify the distribution on the labels of the points (or, equivalently, modify the target function). This allows boosting a distribution-specific weak agnostic learner to a strong agnostic learner with respect to the same distribution. When applied to the weak agnostic parity learning algorithm of Goldreich and Levin (1989) our algorithm yields a simple PAC learning algorithm for DNF and an agnostic learning algorithm for decision trees over the uniform distribution using membership queries. These results substantially simplify Jackson's famous DNF learning algorithm (1994) and the recent result of Gopalan et al. (2008). We also strengthen the connection to hard-core set constructions discovered by Klivans and Servedio (1999) by demonstrating that hard-core set constructions that achieve the optimal hard-core set size (given by Holenstein (2005) and Barak et al. (2009)) imply distribution-specific agnostic boosting algorithms. Conversely, our boosting algorithm gives a simple hard-core set construction with an (almost) optimal hard-core set size.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 06:19:12 GMT" } ]
2012-02-22T00:00:00
[ [ "Feldman", "Vitaly", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.2934
Ron Meir
D. Di Castro and R. Meir
A Convergent Online Single Time Scale Actor Critic Algorithm
null
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Actor-Critic based approaches were among the first to address reinforcement learning in a general setting. Recently, these algorithms have gained renewed interest due to their generality, good convergence properties, and possible biological relevance. In this paper, we introduce an online temporal difference based actor-critic algorithm which is proved to converge to a neighborhood of a local maximum of the average reward. Linear function approximation is used by the critic in order estimate the value function, and the temporal difference signal, which is passed from the critic to the actor. The main distinguishing feature of the present convergence proof is that both the actor and the critic operate on a similar time scale, while in most current convergence proofs they are required to have very different time scales in order to converge. Moreover, the same temporal difference signal is used to update the parameters of both the actor and the critic. A limitation of the proposed approach, compared to results available for two time scale convergence, is that convergence is guaranteed only to a neighborhood of an optimal value, rather to an optimal value itself. The single time scale and identical temporal difference signal used by the actor and the critic, may provide a step towards constructing more biologically realistic models of reinforcement learning in the brain.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 07:08:44 GMT" } ]
2009-09-17T00:00:00
[ [ "Di Castro", "D.", "" ], [ "Meir", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.3005
Terry Rudolph
Terry Rudolph
A simple encoding of a quantum circuit amplitude as a matrix permanent
6 figures
null
10.1103/PhysRevA.80.054302
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple construction is presented which allows computing the transition amplitude of a quantum circuit to be encoded as computing the permanent of a matrix which is of size proportional to the number of quantum gates in the circuit. This opens up some interesting classical monte-carlo algorithms for approximating quantum circuits.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 13:12:15 GMT" } ]
2013-05-29T00:00:00
[ [ "Rudolph", "Terry", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.3027
Emmanuel Prochasson
Emmanuel Ep Prochasson (LINA), Christian Viard-Gaudin (IRCCyN), Emmanuel Morin (LINA)
Language Models for Handwritten Short Message Services
null
International Conference on Document Analysis and Recognition, Brazil (2007)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Handwriting is an alternative method for entering texts composing Short Message Services. However, a whole new language features the texts which are produced. They include for instance abbreviations and other consonantal writing which sprung up for time saving and fashion. We have collected and processed a significant number of such handwriting SMS, and used various strategies to tackle this challenging area of handwriting recognition. We proposed to study more specifically three different phenomena: consonant skeleton, rebus, and phonetic writing. For each of them, we compare the rough results produced by a standard recognition system with those obtained when using a specific language model.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 14:38:19 GMT" } ]
2009-09-17T00:00:00
[ [ "Prochasson", "Emmanuel Ep", "", "LINA" ], [ "Viard-Gaudin", "Christian", "", "IRCCyN" ], [ "Morin", "Emmanuel", "", "LINA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.3028
Emmanuel Prochasson
Emmanuel Prochasson (LINA), Emmanuel Morin (LINA), Christian Viard-Gaudin (IRCCyN)
Vers la reconnaissance de mini-messages manuscrits
null
Colloque International sur le Lexique et la Grammaire, Bonifacio : France (2007)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Handwriting is an alternative method for entering texts which composed Short Message Services. However, a whole new language features the texts which are produced. They include for instance abbreviations and other consonantal writing which sprung up for time saving and fashion. We have collected and processed a significant number of such handwritten SMS, and used various strategies to tackle this challenging area of handwriting recognition. We proposed to study more specifically three different phenomena: consonant skeleton, rebus, and phonetic writing. For each of them, we compare the rough results produced by a standard recognition system with those obtained when using a specific language model to take care of them.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 14:39:05 GMT" } ]
2009-09-17T00:00:00
[ [ "Prochasson", "Emmanuel", "", "LINA" ], [ "Morin", "Emmanuel", "", "LINA" ], [ "Viard-Gaudin", "Christian", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.3055
Syed Qaseem
Syed T. Qaseem, Tareq Y. Al-Naffouri
Compressive Sensing Based Opportunistic Protocol for Throughput Improvement in Wireless Networks
Submitted to IEEE Transactions on Communications, August 2009
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A key feature in the design of any MAC protocol is the throughput it can provide. In wireless networks, the channel of a user is not fixed but varies randomly. Thus, in order to maximize the throughput of the MAC protocol at any given time, only users with large channel gains should be allowed to transmit. In this paper, compressive sensing based opportunistic protocol for throughput improvement in wireless networks is proposed. The protocol is based on the traditional protocol of R-ALOHA which allows users to compete for channel access before reserving the channel to the best user. We use compressive sensing to find the best user, and show that the proposed protocol requires less time for reservation and so it outperforms other schemes proposed in literature. This makes the protocol particularly suitable for enhancing R-ALOHA in fast fading environments. We consider both analog and digital versions of the protocol where the channel gains sent by the user are analog and digital, respectively.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 16:21:26 GMT" } ]
2009-09-17T00:00:00
[ [ "Qaseem", "Syed T.", "" ], [ "Al-Naffouri", "Tareq Y.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3080
Jean-Philippe Cointet
Jean-Philippe Cointet (CREA, Inra - Sens), Camille Roth (CREA, Cams)
Socio-semantic dynamics in a blog network
null
IEEE International Conference on Social Computing (SocialCom-09), Vancouver : Canada (2009)
null
null
cs.CY physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The blogosphere can be construed as a knowledge network made of bloggers who are interacting through a social network to share, exchange or produce information. We claim that the social and semantic dimensions are essentially co-determined and propose to investigate the co-evolutionary dynamics of the blogosphere by examining two intertwined issues: First, how does knowledge distribution drive new interactions and thus influence the social network topology? Second, which role structural network properties play in the information circulation in the system? We adopt an empirical standpoint by analyzing the semantic and social activity of a portion of the US political blogosphere, monitored on a period of four months.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 18:43:39 GMT" } ]
2009-09-20T00:00:00
[ [ "Cointet", "Jean-Philippe", "", "CREA, Inra - Sens" ], [ "Roth", "Camille", "", "CREA, Cams" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0909.3091
Xin Liu
Xin Liu, John Kountouriotis, Athina P. Petropulu and Kapil R. Dandekar
ALOHA With Collision Resolution(ALOHA-CR): Theory and Software Defined Radio Implementation
null
null
10.1109/TSP.2010.2048315
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A cross-layer scheme, namely ALOHA With Collision Resolution (ALOHA-CR), is proposed for high throughput wireless communications in a cellular scenario. Transmissions occur in a time-slotted ALOHA-type fashion but with an important difference: simultaneous transmissions of two users can be successful. If more than two users transmit in the same slot the collision cannot be resolved and retransmission is required. If only one user transmits, the transmitted packet is recovered with some probability, depending on the state of the channel. If two users transmit the collision is resolved and the packets are recovered by first over-sampling the collision signal and then exploiting independent information about the two users that is contained in the signal polyphase components. The ALOHA-CR throughput is derived under the infinite backlog assumption and also under the assumption of finite backlog. The contention probability is determined under these two assumptions in order to maximize the network throughput and maintain stability. Queuing delay analysis for network users is also conducted. The performance of ALOHA-CR is demonstrated on the Wireless Open Access Research Platform (WARP) test-bed containing five software defined radio nodes. Analysis and test-bed results indicate that ALOHA-CR leads to significant increase in throughput and reduction of service delays.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 19:46:12 GMT" } ]
2015-05-14T00:00:00
[ [ "Liu", "Xin", "" ], [ "Kountouriotis", "John", "" ], [ "Petropulu", "Athina P.", "" ], [ "Dandekar", "Kapil R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.3122
Gwendal Simon
Jacob Chakareski, Pascal Frossard, Herv\'e Kerivin, Jimmy Leblet and Gwendal Simon
A note on the data-driven capacity of P2P networks
10 pages, technical report assisting a submission
null
null
EPFL-LTS-2009-008
cs.DS cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider two capacity problems in P2P networks. In the first one, the nodes have an infinite amount of data to send and the goal is to optimally allocate their uplink bandwidths such that the demands of every peer in terms of receiving data rate are met. We solve this problem through a mapping from a node-weighted graph featuring two labels per node to a max flow problem on an edge-weighted bipartite graph. In the second problem under consideration, the resource allocation is driven by the availability of the data resource that the peers are interested in sharing. That is a node cannot allocate its uplink resources unless it has data to transmit first. The problem of uplink bandwidth allocation is then equivalent to constructing a set of directed trees in the overlay such that the number of nodes receiving the data is maximized while the uplink capacities of the peers are not exceeded. We show that the problem is NP-complete, and provide a linear programming decomposition decoupling it into a master problem and multiple slave subproblems that can be resolved in polynomial time. We also design a heuristic algorithm in order to compute a suboptimal solution in a reasonable time. This algorithm requires only a local knowledge from nodes, so it should support distributed implementations. We analyze both problems through a series of simulation experiments featuring different network sizes and network densities. On large networks, we compare our heuristic and its variants with a genetic algorithm and show that our heuristic computes the better resource allocation. On smaller networks, we contrast these performances to that of the exact algorithm and show that resource allocation fulfilling a large part of the peer can be found, even for hard configuration where no resources are in excess.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 22:44:47 GMT" } ]
2009-09-18T00:00:00
[ [ "Chakareski", "Jacob", "" ], [ "Frossard", "Pascal", "" ], [ "Kerivin", "Hervé", "" ], [ "Leblet", "Jimmy", "" ], [ "Simon", "Gwendal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.3123
Gilad Lerman Dr
Teng Zhang, Arthur Szlam and Gilad Lerman
Median K-flats for hybrid linear modeling with many outliers
null
Proc. of 2nd IEEE International Workshop on Subspace Methods (Subspace 2009), pp. 234-241 (2009)
10.1109/ICCVW.2009.5457695
null
cs.CV cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the Median K-Flats (MKF) algorithm, a simple online method for hybrid linear modeling, i.e., for approximating data by a mixture of flats. This algorithm simultaneously partitions the data into clusters while finding their corresponding best approximating l1 d-flats, so that the cumulative l1 error is minimized. The current implementation restricts d-flats to be d-dimensional linear subspaces. It requires a negligible amount of storage, and its complexity, when modeling data consisting of N points in D-dimensional Euclidean space with K d-dimensional linear subspaces, is of order O(n K d D+n d^2 D), where n is the number of iterations required for convergence (empirically on the order of 10^4). Since it is an online algorithm, data can be supplied to it incrementally and it can incrementally produce the corresponding output. The performance of the algorithm is carefully evaluated using synthetic and real data.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 23:09:16 GMT" } ]
2010-05-10T00:00:00
[ [ "Zhang", "Teng", "" ], [ "Szlam", "Arthur", "" ], [ "Lerman", "Gilad", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0909.3127
Adrian Dumitrescu
Adrian Dumitrescu and Minghui Jiang
On the largest empty axis-parallel box amidst $n$ points
19 pages, 2 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give the first nontrivial upper and lower bounds on the maximum volume of an empty axis-parallel box inside an axis-parallel unit hypercube in $\RR^d$ containing $n$ points. For a fixed $d$, we show that the maximum volume is of the order $\Theta(\frac{1}{n})$. We then use the fact that the maximum volume is $\Omega(\frac{1}{n})$ in our design of the first efficient $(1-\eps)$-approximation algorithm for the following problem: Given an axis-parallel $d$-dimensional box $R$ in $\RR^d$ containing $n$ points, compute a maximum-volume empty axis-parallel $d$-dimensional box contained in $R$. The running time of our algorithm is nearly linear in $n$, for small $d$, and increases only by an $O(\log{n})$ factor when one goes up one dimension. No previous efficient exact or approximation algorithms were known for this problem for $d \geq 4$. As the problem has been recently shown to be NP-hard in arbitrary high dimensions (i.e., when $d$ is part of the input), the existence of efficient exact algorithms is unlikely. We also obtain tight estimates on the maximum volume of an empty axis-parallel hypercube inside an axis-parallel unit hypercube in $\RR^d$ containing $n$ points. For a fixed $d$, this maximum volume is of the same order order $\Theta(\frac{1}{n})$. A faster $(1-\eps)$-approximation algorithm, with a milder dependence on $d$ in the running time, is obtained in this case.
[ { "version": "v1", "created": "Wed, 16 Sep 2009 23:37:56 GMT" }, { "version": "v2", "created": "Mon, 23 Nov 2009 20:42:35 GMT" } ]
2009-11-23T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Jiang", "Minghui", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.3131
Shengtian Yang
Shengtian Yang, Thomas Honold, Yan Chen, Zhaoyang Zhang, Peiliang Qiu
Constructing Linear Encoders with Good Spectra
v5.5.5, no. 201408271350, 40 pages, 3 figures, extended version of the paper to be published in IEEE Transactions on Information Theory
IEEE Trans. Inf. Theory 60 (2014) 5950-5965
10.1109/TIT.2014.2341560
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Linear encoders with good joint spectra are suitable candidates for optimal lossless joint source-channel coding (JSCC), where the joint spectrum is a variant of the input-output complete weight distribution and is considered good if it is close to the average joint spectrum of all linear encoders (of the same coding rate). In spite of their existence, little is known on how to construct such encoders in practice. This paper is devoted to their construction. In particular, two families of linear encoders are presented and proved to have good joint spectra. The first family is derived from Gabidulin codes, a class of maximum-rank-distance codes. The second family is constructed using a serial concatenation of an encoder of a low-density parity-check code (as outer encoder) with a low-density generator matrix encoder (as inner encoder). In addition, criteria for good linear encoders are defined for three coding applications: lossless source coding, channel coding, and lossless JSCC. In the framework of the code-spectrum approach, these three scenarios correspond to the problems of constructing linear encoders with good kernel spectra, good image spectra, and good joint spectra, respectively. Good joint spectra imply both good kernel spectra and good image spectra, and for every linear encoder having a good kernel (resp., image) spectrum, it is proved that there exists a linear encoder not only with the same kernel (resp., image) but also with a good joint spectrum. Thus a good joint spectrum is the most important feature of a linear encoder.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 00:18:28 GMT" }, { "version": "v10", "created": "Fri, 18 Jul 2014 07:32:23 GMT" }, { "version": "v11", "created": "Wed, 27 Aug 2014 06:08:43 GMT" }, { "version": "v2", "created": "Fri, 16 Oct 2009 06:02:09 GMT" }, { "version": "v3", "created": "Thu, 7 Oct 2010 23:48:31 GMT" }, { "version": "v4", "created": "Mon, 14 May 2012 02:15:56 GMT" }, { "version": "v5", "created": "Mon, 18 Feb 2013 01:16:46 GMT" }, { "version": "v6", "created": "Tue, 3 Sep 2013 02:24:18 GMT" }, { "version": "v7", "created": "Wed, 8 Jan 2014 05:01:23 GMT" }, { "version": "v8", "created": "Mon, 3 Feb 2014 00:50:00 GMT" }, { "version": "v9", "created": "Mon, 12 May 2014 04:15:23 GMT" } ]
2016-02-02T00:00:00
[ [ "Yang", "Shengtian", "" ], [ "Honold", "Thomas", "" ], [ "Chen", "Yan", "" ], [ "Zhang", "Zhaoyang", "" ], [ "Qiu", "Peiliang", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3135
Jia Wang
Jia Wang, Jun Chen, Lei Zhao, Paul Cuff, and Haim Permuter
A Random Variable Substitution Lemma With Applications to Multiple Description Coding
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We establish a random variable substitution lemma and use it to investigate the role of refinement layer in multiple description coding, which clarifies the relationship among several existing achievable multiple description rate-distortion regions. Specifically, it is shown that the El Gamal-Cover (EGC) region is equivalent to the EGC* region (an antecedent version of the EGC region) while the Venkataramani-Kramer-Goyal (VKG) region (when specialized to the 2-description case) is equivalent to the Zhang-Berger (ZB) region. Moreover, we prove that for multiple description coding with individual and hierarchical distortion constraints, the number of layers in the VKG scheme can be significantly reduced when only certain weighted sum rates are concerned. The role of refinement layer in scalable coding (a special case of multiple description coding) is also studied.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 00:59:01 GMT" } ]
2009-09-18T00:00:00
[ [ "Wang", "Jia", "" ], [ "Chen", "Jun", "" ], [ "Zhao", "Lei", "" ], [ "Cuff", "Paul", "" ], [ "Permuter", "Haim", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3137
Beno\^it Hudson
Beno\^it Hudson
Succinct Representation of Well-Spaced Point Clouds
12 pages
null
null
null
cs.CG cs.DS cs.GR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A set of n points in low dimensions takes Theta(n w) bits to store on a w-bit machine. Surface reconstruction and mesh refinement impose a requirement on the distribution of the points they process. I show how to use this assumption to lossily compress a set of n input points into a representation that takes only O(n) bits, independent of the word size. The loss can keep inter-point distances to within 10% relative error while still achieving a factor of three space savings. The representation allows standard quadtree operations, along with computing the restricted Voronoi cell of a point, in time O(w^2 + log n), which can be improved to time O(log n) if w is in Theta(log n). Thus one can use this compressed representation to perform mesh refinement or surface reconstruction in O(n) bits with only a logarithmic slowdown.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 01:39:59 GMT" } ]
2009-09-18T00:00:00
[ [ "Hudson", "Benoît", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.GR", "description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.", "span": "(Graphics)" } ]
0909.3146
Fr\'ed\'erique Oggier
Frederique Oggier and Hanane Fathi
An Authentication Code against Pollution Attacks in Network Coding
null
null
null
null
cs.IT cs.CR math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Systems exploiting network coding to increase their throughput suffer greatly from pollution attacks which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage than under traditional routing. In this paper, we address this issue by designing an unconditionally secure authentication code suitable for multicast network coding. The proposed scheme is robust against pollution attacks from outsiders, as well as coalitions of malicious insiders. Intermediate nodes can verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious messages in-transit that fail the verification. This way, the pollution is canceled out before reaching the destinations. We analyze the performance of the scheme in terms of both multicast throughput and goodput, and show the goodput gains. We also discuss applications to file distribution.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 06:05:44 GMT" } ]
2009-09-18T00:00:00
[ [ "Oggier", "Frederique", "" ], [ "Fathi", "Hanane", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3158
Evangelos Karapanos
Evangelos Karapanos, Jean-Bernard Martens
The quantitative side of the Repertory Grid Technique: some concerns
null
null
null
null
cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
User experience (UX) evaluation is gaining increased interest lately, both from academia and industry. In this paper we argue that UX evaluation needs to fulfill two important requirements: scalability, i.e. the ability to provide useful feedback in different stages of the design, and diversity, i.e. the ability to reflect the di-versity of opinions that may exist in different users. We promote the use of the Repertory Grid Technique as a promising UX evaluation technique and discuss some of our concerns regarding the quantitative side of its use.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 13:05:49 GMT" } ]
2009-09-18T00:00:00
[ [ "Karapanos", "Evangelos", "" ], [ "Martens", "Jean-Bernard", "" ] ]
[ { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.3165
Yilun Shang
Yilun Shang
Finite-time Consensus for Nonlinear Multi-agent Systems with Fixed Topologies
11 pages, 3 figures
null
null
null
cs.IT cs.MA math.IT math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study finite-time state consensus problems for continuous nonlinear multi-agent systems. Building on the theory of finite-time Lyapunov stability, we propose sufficient criteria which guarantee the system to reach a consensus in finite time, provided that the underlying directed network contains a spanning tree. Novel finite-time consensus protocols are introduced as examples for applying the criteria. Simulations are also presented to illustrate our theoretical results.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 08:52:35 GMT" } ]
2009-09-18T00:00:00
[ [ "Shang", "Yilun", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0909.3169
Purushottam Kar
Arnab Bhattacharya, Purushottam Kar and Manjish Pal
On Low Distortion Embeddings of Statistical Distance Measures into Low Dimensional Spaces
18 pages, The short version of this paper was accepted for presentation at the 20th International Conference on Database and Expert Systems Applications, DEXA 2009
Database and Expert Systems Applications (DEXA) 2009
10.1007/978-3-642-03573-9_13
null
cs.CG cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Statistical distance measures have found wide applicability in information retrieval tasks that typically involve high dimensional datasets. In order to reduce the storage space and ensure efficient performance of queries, dimensionality reduction while preserving the inter-point similarity is highly desirable. In this paper, we investigate various statistical distance measures from the point of view of discovering low distortion embeddings into low-dimensional spaces. More specifically, we consider the Mahalanobis distance measure, the Bhattacharyya class of divergences and the Kullback-Leibler divergence. We present a dimensionality reduction method based on the Johnson-Lindenstrauss Lemma for the Mahalanobis measure that achieves arbitrarily low distortion. By using the Johnson-Lindenstrauss Lemma again, we further demonstrate that the Bhattacharyya distance admits dimensionality reduction with arbitrarily low additive error. We also examine the question of embeddability into metric spaces for these distance measures due to the availability of efficient indexing schemes on metric spaces. We provide explicit constructions of point sets under the Bhattacharyya and the Kullback-Leibler divergences whose embeddings into any metric space incur arbitrarily large distortions. We show that the lower bound presented for Bhattacharyya distance is nearly tight by providing an embedding that approaches the lower bound for relatively small dimensional datasets.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 09:29:48 GMT" } ]
2010-03-09T00:00:00
[ [ "Bhattacharya", "Arnab", "" ], [ "Kar", "Purushottam", "" ], [ "Pal", "Manjish", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.3180
Geevarghese Philip
Neeldhara Misra, Geevarghese Philip, Venkatesh Raman, Saket Saurabh and Somnath Sikdar
FPT Algorithms for Connected Feedback Vertex Set
12 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the recently introduced Connected Feedback Vertex Set (CFVS) problem from the view-point of parameterized algorithms. CFVS is the connected variant of the classical Feedback Vertex Set problem and is defined as follows: given a graph G=(V,E) and an integer k, decide whether there exists a subset F of V, of size at most k, such that G[V F] is a forest and G[F] is connected. We show that Connected Feedback Vertex Set can be solved in time $O(2^{O(k)}n^{O(1)})$ on general graphs and in time $O(2^{O(\sqrt{k}\log k)}n^{O(1)})$ on graphs excluding a fixed graph H as a minor. Our result on general undirected graphs uses as subroutine, a parameterized algorithm for Group Steiner Tree, a well studied variant of Steiner Tree. We find the algorithm for Group Steiner Tree of independent interest and believe that it will be useful for obtaining parameterized algorithms for other connectivity problems.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 10:37:31 GMT" } ]
2009-09-18T00:00:00
[ [ "Misra", "Neeldhara", "" ], [ "Philip", "Geevarghese", "" ], [ "Raman", "Venkatesh", "" ], [ "Saurabh", "Saket", "" ], [ "Sikdar", "Somnath", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.3185
Lorena Ronquillo
J. Pujol, J. Rif\`a, L. Ronquillo
Construction of Additive Reed-Muller Codes
7 pages, Part of the material in this paper was presented without proofs at the 18-th Symposium on Applied algebra, Algebraic algorithms, and Error Correcting Codes (AAECC 2009), Tarragona, Spain, June 8-12, 2009
J. Pujol, J. Rifa and L. Ronquillo. Construction of Additive Reed-Muller Codes. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, LNCS 5527 (June 2009), pages 223-226
10.1007/978-3-642-02181-7
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The well known Plotkin construction is, in the current paper, generalized and used to yield new families of Z2Z4-additive codes, whose length, dimension as well as minimum distance are studied. These new constructions enable us to obtain families of Z2Z4-additive codes such that, under the Gray map, the corresponding binary codes have the same parameters and properties as the usual binary linear Reed-Muller codes. Moreover, the first family is the usual binary linear Reed-Muller family.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 11:13:02 GMT" }, { "version": "v2", "created": "Wed, 28 Dec 2011 11:52:08 GMT" } ]
2011-12-30T00:00:00
[ [ "Pujol", "J.", "" ], [ "Rifà", "J.", "" ], [ "Ronquillo", "L.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3221
Gwena\"el Joret
Jean Cardinal, Erik D. Demaine, Samuel Fiorini, Gwena\"el Joret, Ilan Newman, Oren Weimann
The Stackelberg Minimum Spanning Tree Game on Planar and Bounded-Treewidth Graphs
v2: Referees' comments incorporated, section on bounded-treewidth graphs expanded
Journal of Combinatorial Optimization, 25/1:19--46, 2013
10.1007/s10878-011-9414-2
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Stackelberg Minimum Spanning Tree Game is a two-level combinatorial pricing problem played on a graph representing a network. Its edges are colored either red or blue, and the red edges have a given fixed cost, representing the competitor's prices. The first player chooses an assignment of prices to the blue edges, and the second player then buys the cheapest spanning tree, using any combination of red and blue edges. The goal of the first player is to maximize the total price of purchased blue edges. We study this problem in the cases of planar and bounded-treewidth graphs. We show that the problem is NP-hard on planar graphs but can be solved in polynomial time on graphs of bounded treewidth.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 13:52:46 GMT" }, { "version": "v2", "created": "Tue, 13 Sep 2011 04:25:08 GMT" } ]
2013-05-24T00:00:00
[ [ "Cardinal", "Jean", "" ], [ "Demaine", "Erik D.", "" ], [ "Fiorini", "Samuel", "" ], [ "Joret", "Gwenaël", "" ], [ "Newman", "Ilan", "" ], [ "Weimann", "Oren", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.3226
Stefano Buzzi
Stefano Buzzi, Luca Venturino, Alessio Zappone, Antonio De Maio
Blind user detection in doubly-dispersive DS/CDMA channels
Accepted for publication on IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing, Vol. 58, No. 3, pp. 1446 - 1451, March 2010
10.1109/TSP.2009.2033001
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this work, we consider the problem of detecting the presence of a new user in a direct-sequence/code-division-multiple-access (DS/CDMA) system with a doubly-dispersive fading channel, and we propose a novel blind detection strategy which only requires knowledge of the spreading code of the user to be detected, but no prior information as to the time-varying channel impulse response and the structure of the multiaccess interference. The proposed detector has a bounded constant false alarm rate (CFAR) under the design assumptions, while providing satisfactory detection performance even in the presence of strong cochannel interference and high user mobility.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 14:10:09 GMT" } ]
2010-02-17T00:00:00
[ [ "Buzzi", "Stefano", "" ], [ "Venturino", "Luca", "" ], [ "Zappone", "Alessio", "" ], [ "De Maio", "Antonio", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3248
Juan Gerardo Alcazar Arribas
Juan Gerardo Alcazar, Gema Maria Diaz-Toca
Topology of 2D and 3D Rational Curves
26 pages, 19 figures
null
10.1016/j.cagd.2010.07.001
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we present algorithms for computing the topology of planar and space rational curves defined by a parametrization. The algorithms given here work directly with the parametrization of the curve, and do not require to compute or use the implicit equation of the curve (in the case of planar curves) or of any projection (in the case of space curves). Moreover, these algorithms have been implemented in Maple; the examples considered and the timings obtained show good performance skills.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 14:58:09 GMT" } ]
2015-02-17T00:00:00
[ [ "Alcazar", "Juan Gerardo", "" ], [ "Diaz-Toca", "Gema Maria", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0909.3257
Piotr Faliszewski
P. Faliszewski, E. Hemaspaandra, L. A. Hemaspaandra, J. Rothe
The Shield that Never Was: Societies with Single-Peaked Preferences are More Open to Manipulation and Control
38 pages, 2 figures
null
null
URCS TR-2009-950
cs.GT cs.CC cs.MA physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Much work has been devoted, during the past twenty years, to using complexity to protect elections from manipulation and control. Many results have been obtained showing NP-hardness shields, and recently there has been much focus on whether such worst-case hardness protections can be bypassed by frequently correct heuristics or by approximations. This paper takes a very different approach: We argue that when electorates follow the canonical political science model of societal preferences the complexity shield never existed in the first place. In particular, we show that for electorates having single-peaked preferences, many existing NP-hardness results on manipulation and control evaporate.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 17:45:34 GMT" }, { "version": "v2", "created": "Sat, 19 Jun 2010 12:54:44 GMT" } ]
2010-06-22T00:00:00
[ [ "Faliszewski", "P.", "" ], [ "Hemaspaandra", "E.", "" ], [ "Hemaspaandra", "L. A.", "" ], [ "Rothe", "J.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0909.3273
Toby Walsh
Christian Bessiere, George Katsirelos, Nina Narodytska, Claude-Guy Quimper, and Toby Walsh
Decomposition of the NVALUE constraint
To appear in Proceedings of the Eighth International Workshop on Constraint Modelling and Reformulation, held alongside the 15th International Conference on Principles and Practice of Constraint Programming (CP 2009), Lisbon, Portugal
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study decompositions of NVALUE, a global constraint that can be used to model a wide range of problems where values need to be counted. Whilst decomposition typically hinders propagation, we identify one decomposition that maintains a global view as enforcing bound consistency on the decomposition achieves bound consistency on the original global NVALUE constraint. Such decompositions offer the prospect for advanced solving techniques like nogood learning and impact based branching heuristics. They may also help SAT and IP solvers take advantage of the propagation of global constraints.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 16:58:28 GMT" } ]
2009-09-18T00:00:00
[ [ "Bessiere", "Christian", "" ], [ "Katsirelos", "George", "" ], [ "Narodytska", "Nina", "" ], [ "Quimper", "Claude-Guy", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.3276
Toby Walsh
George Katsirelos, and Toby Walsh
Symmetries of Symmetry Breaking Constraints
To appear in the Proceedings of the Ninth International Workshop on Symmetry and Constraint Satisfaction Problems, held alongside the 15th International Conference on Principles and Practice of Constraint Programming (CP 2009), Lisbon, Portugal
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Symmetry is an important feature of many constraint programs. We show that any symmetry acting on a set of symmetry breaking constraints can be used to break symmetry. Different symmetries pick out different solutions in each symmetry class. We use these observations in two methods for eliminating symmetry from a problem. These methods are designed to have many of the advantages of symmetry breaking methods that post static symmetry breaking constraint without some of the disadvantages. In particular, the two methods prune the search space using fast and efficient propagation of posted constraints, whilst reducing the conflict between symmetry breaking and branching heuristics. Experimental results show that the two methods perform well on some standard benchmarks.
[ { "version": "v1", "created": "Thu, 17 Sep 2009 17:16:34 GMT" } ]
2009-09-18T00:00:00
[ [ "Katsirelos", "George", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.3342
Manar Mohaisen
Manar Mohaisen, YuPeng Wang, KyungHi Chang
Multiple antenna technologies
20 pages, 15 figures, Information and Communications Magazine
null
null
null
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple antenna technologies have received high attention in the last few decades for their capabilities to improve the overall system performance. Multiple-input multiple-output systems include a variety of techniques capable of not only increase the reliability of the communication but also impressively boost the channel capacity. In addition, smart antenna systems can increase the link quality and lead to appreciable interference reduction.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 01:14:31 GMT" } ]
2009-09-21T00:00:00
[ [ "Mohaisen", "Manar", "" ], [ "Wang", "YuPeng", "" ], [ "Chang", "KyungHi", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.3346
Michael Kapralov
Ashish Goel, Michael Kapralov and Sanjeev Khanna
Perfect Matchings in O(n \log n) Time in Regular Bipartite Graphs
10 pages
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we consider the well-studied problem of finding a perfect matching in a d-regular bipartite graph on 2n nodes with m=nd edges. The best-known algorithm for general bipartite graphs (due to Hopcroft and Karp) takes time O(m\sqrt{n}). In regular bipartite graphs, however, a matching is known to be computable in O(m) time (due to Cole, Ost and Schirra). In a recent line of work by Goel, Kapralov and Khanna the O(m) time algorithm was improved first to \tilde O(min{m, n^{2.5}/d}) and then to \tilde O(min{m, n^2/d}). It was also shown that the latter algorithm is optimal up to polylogarithmic factors among all algorithms that use non-adaptive uniform sampling to reduce the size of the graph as a first step. In this paper, we give a randomized algorithm that finds a perfect matching in a d-regular graph and runs in O(n\log n) time (both in expectation and with high probability). The algorithm performs an appropriately truncated random walk on a modified graph to successively find augmenting paths. Our algorithm may be viewed as using adaptive uniform sampling, and is thus able to bypass the limitations of (non-adaptive) uniform sampling established in earlier work. We also show that randomization is crucial for obtaining o(nd) time algorithms by establishing an \Omega(nd) lower bound for any deterministic algorithm. Our techniques also give an algorithm that successively finds a matching in the support of a doubly stochastic matrix in expected time O(n\log^2 n) time, with O(m) pre-processing time; this gives a simple O(m+mn\log^2 n) time algorithm for finding the Birkhoff-von Neumann decomposition of a doubly stochastic matrix.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 02:11:43 GMT" }, { "version": "v2", "created": "Sat, 10 Apr 2010 01:44:43 GMT" }, { "version": "v3", "created": "Fri, 12 Nov 2010 06:45:01 GMT" } ]
2010-11-15T00:00:00
[ [ "Goel", "Ashish", "" ], [ "Kapralov", "Michael", "" ], [ "Khanna", "Sanjeev", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.3356
Chi-Kin Chau
Chi-Kin Chau, Minghua Chen, Soung Chang Liew
Capacity of Large-scale CSMA Wireless Networks
Extended version of the paper presented at ACM MobiCom 09'. Improved Model for Aggregate Carrier-Sensing
IEEE/ACM Transactions on Networking, Vol. 19, No. 3, pp893-906 (Jun 2011)
10.1109/TNET.2010.2095880
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the literature, asymptotic studies of multi-hop wireless network capacity often consider only centralized and deterministic TDMA (time-division multi-access) coordination schemes. There have been fewer studies of the asymptotic capacity of large-scale wireless networks based on CSMA (carrier-sensing multi-access), which schedules transmissions in a distributed and random manner. With the rapid and widespread adoption of CSMA technology, a critical question is that whether CSMA networks can be as scalable as TDMA networks. To answer this question and explore the capacity of CSMA networks, we first formulate the models of CSMA protocols to take into account the unique CSMA characteristics not captured by existing interference models in the literature. These CSMA models determine the feasible states, and consequently the capacity of CSMA networks. We then study the throughput efficiency of CSMA scheduling as compared to TDMA. Finally, we tune the CSMA parameters so as to maximize the throughput to the optimal order. As a result, we show that CSMA can achieve throughput as $\Omega(\frac{1}{\sqrt{n}})$, the same order as optimal centralized TDMA, on uniform random networks. Our CSMA scheme makes use of an efficient backbone-peripheral routing scheme and a careful design of dual carrier-sensing and dual channel scheme. We also address the implementation issues of our CSMA scheme.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 05:22:30 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 01:16:46 GMT" }, { "version": "v3", "created": "Thu, 5 Nov 2009 10:32:03 GMT" }, { "version": "v4", "created": "Mon, 17 May 2010 11:22:39 GMT" } ]
2017-09-25T00:00:00
[ [ "Chau", "Chi-Kin", "" ], [ "Chen", "Minghua", "" ], [ "Liew", "Soung Chang", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.3382
Atsushi Hatabu
Atsushi Hatabu, Koujin Takeda, Yoshiyuki Kabashima
Statistical mechanical analysis of the Kronecker channel model for MIMO wireless communication
null
Phys. Rev. E 80, 061124 (2009)
10.1103/PhysRevE.80.061124
null
cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Kronecker channel model of wireless communication is analyzed using statistical mechanics methods. In the model, spatial proximities among transmission/reception antennas are taken into account as certain correlation matrices, which generally yield non-trivial dependence among symbols to be estimated. This prevents accurate assessment of the communication performance by naively using a previously developed analytical scheme based on a matrix integration formula. In order to resolve this difficulty, we develop a formalism that can formally handle the correlations in Kronecker models based on the known scheme. Unfortunately, direct application of the developed scheme is, in general, practically difficult. However, the formalism is still useful, indicating that the effect of the correlations generally increase after the fourth order with respect to correlation strength. Therefore, the known analytical scheme offers a good approximation in performance evaluation when the correlation strength is sufficiently small. For a class of specific correlation, we show that the performance analysis can be mapped to the problem of one-dimensional spin systems in random fields, which can be investigated without approximation by the belief propagation algorithm.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 08:34:30 GMT" } ]
2010-04-19T00:00:00
[ [ "Hatabu", "Atsushi", "" ], [ "Takeda", "Koujin", "" ], [ "Kabashima", "Yoshiyuki", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Physics", "code": "cond-mat.dis-nn", "description": "Glasses and spin glasses; properties of random, aperiodic and quasiperiodic systems; transport in disordered media; localization; phenomena mediated by defects and disorder; neural networks", "span": "(Disordered Systems and Neural Networks)" }, { "class": "Physics", "code": "cond-mat.stat-mech", "description": "Phase transitions, thermodynamics, field theory, non-equilibrium phenomena, renormalization group and scaling, integrable models, turbulence", "span": "(Statistical Mechanics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3384
Anna Isabel Esparcia-Alcazar
Anna I Esparcia-Alc\'azar, J.J. Merelo, Ana\'is Mart\'inez-Garc\'ia, Pablo Garc\'ia-S\'anchez, Eva Alfaro-Cid and Ken Sharman
Comparing Single and Multiobjective Evolutionary Approaches to the Inventory and Transportation Problem
34 pages. Submitted to Evolutionary Computation
null
null
null
cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
EVITA, standing for Evolutionary Inventory and Transportation Algorithm, is a two-level methodology designed to address the Inventory and Transportation Problem (ITP) in retail chains. The top level uses an evolutionary algorithm to obtain delivery patterns for each shop on a weekly basis so as to minimise the inventory costs, while the bottom level solves the Vehicle Routing Problem (VRP) for every day in order to obtain the minimum transport costs associated to a particular set of patterns. The aim of this paper is to investigate whether a multiobjective approach to this problem can yield any advantage over the previously used single objective approach. The analysis performed allows us to conclude that this is not the case and that the single objective approach is in gene- ral preferable for the ITP in the case studied. A further conclusion is that it is useful to employ a classical algorithm such as Clarke & Wright's as the seed for other metaheuristics like local search or tabu search in order to provide good results for the Vehicle Routing Problem.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 08:35:42 GMT" } ]
2009-09-21T00:00:00
[ [ "Esparcia-Alcázar", "Anna I", "" ], [ "Merelo", "J. J.", "" ], [ "Martínez-García", "Anaís", "" ], [ "García-Sánchez", "Pablo", "" ], [ "Alfaro-Cid", "Eva", "" ], [ "Sharman", "Ken", "" ] ]
[ { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0909.3388
Koji Nuida
Koji Nuida
Pattern occurrence in the dyadic expansion of square root of two and an analysis of pseudorandom number generators
21 pages, extended abstract presented in FPSAC 2009
A part of this paper was published in: Electronic Journal of Combinatorial Number Theory, vol.10 (2010) 111-127
null
null
math.CO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, designs of pseudorandom number generators (PRNGs) using integer-valued variants of logistic maps and their applications to some cryptographic schemes have been studied, due mostly to their ease of implementation and performance. However, it has been noted that this ease is reduced for some choices of the PRNGs accuracy parameters. In this article, we show that the distribution of such undesirable accuracy parameters is closely related to the occurrence of some patterns in the dyadic expansion of the square root of 2. We prove that for an arbitrary infinite binary word, the asymptotic occurrence rate of these patterns is bounded in terms of the asymptotic occurrence rate of zeroes. We also present examples of infinite binary words that tightly achieve the bounds. As a consequence, a classical conjecture on asymptotic evenness of occurrence of zeroes and ones in the dyadic expansion of the square root of 2 implies that the asymptotic rate of the undesirable accuracy parameters for the PRNGs is at least 1/6.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 08:42:23 GMT" } ]
2010-07-06T00:00:00
[ [ "Nuida", "Koji", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3392
Ashley Montanaro
Ashley Montanaro and Tobias Osborne
On the communication complexity of XOR functions
18 pages; v2: minor corrections
null
null
null
cs.CC quant-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
An XOR function is a function of the form g(x,y) = f(x + y), for some boolean function f on n bits. We study the quantum and classical communication complexity of XOR functions. In the case of exact protocols, we completely characterise one-way communication complexity for all f. We also show that, when f is monotone, g's quantum and classical complexities are quadratically related, and that when f is a linear threshold function, g's quantum complexity is Theta(n). More generally, we make a structural conjecture about the Fourier spectra of boolean functions which, if true, would imply that the quantum and classical exact communication complexities of all XOR functions are asymptotically equivalent. We give two randomised classical protocols for general XOR functions which are efficient for certain functions, and a third protocol for linear threshold functions with high margin. These protocols operate in the symmetric message passing model with shared randomness.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 08:50:20 GMT" }, { "version": "v2", "created": "Wed, 10 Feb 2010 10:51:41 GMT" } ]
2010-02-10T00:00:00
[ [ "Montanaro", "Ashley", "" ], [ "Osborne", "Tobias", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" } ]
0909.3395
Subhajit Karmakar Mr.
Subhajit Karmakar and Sandip Sarkar
A possible low-level explanation of "temporal dynamics of brightness induction and White's illusion"
11 pages and 7 figures
null
null
null
cs.CV physics.bio-ph q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Based upon physiological observation on time dependent orientation selectivity in the cells of macaque's primary visual cortex together with the psychophysical studies on the tuning of orientation detectors in human vision we suggest that time dependence in brightness perception can be accommodated through the time evolution of cortical contribution to the orientation tuning of the ODoG filter responses. A set of Difference of Gaussians functions has been used to mimic the time dependence of orientation tuning. The tuning of orientation preference and its inversion at a later time have been considered in explaining qualitatively the temporal dynamics of brightness perception observed in "Brief presentations reveal the temporal dynamics of brightness induction and White's illusion" for 58 and 82 ms of stimulus exposure.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 09:07:12 GMT" } ]
2009-09-21T00:00:00
[ [ "Karmakar", "Subhajit", "" ], [ "Sarkar", "Sandip", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" }, { "class": "Physics", "code": "physics.bio-ph", "description": "Molecular biophysics, cellular biophysics, neurological biophysics, membrane biophysics, single-molecule biophysics, ecological biophysics, quantum phenomena in biological systems (quantum biophysics), theoretical biophysics, molecular dynamics/modeling and simulation, game theory, biomechanics, bioinformatics, microorganisms, virology, evolution, biophysical methods.", "span": "(Biological Physics)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0909.3414
Wenguang Wang
Wenguang Wang (1), Weiping Wang (1), Justyna Zander (2), Yifan Zhu (1) ((1) College of Information System and Management, National University of Defense Technology, Changsha, China, (2) Fraunhofer Institute FOKUS, Kaiserin-Augusta-Allee 31, Berlin, Germany)
Three-dimensional conceptual model for service-oriented simulation
7 pages, 1 figures, 3 table, Journal of Zhejiang University SCIENCE A, 2009, 10(8): 1075-1081
Journal of Zhejiang University SCIENCE A, 2009, 10(8): 1075-1081
10.1631/jzus.A0920258
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this letter, we propose a novel three-dimensional conceptual model for an emerging service-oriented simulation paradigm. The model can be used as a guideline or an analytic means to find the potential and possible future directions of the current simulation frameworks. In particular, the model inspects the crossover between the disciplines of modeling and simulation, service-orientation, and software/systems engineering. Finally, two specific simulation frameworks are studied as examples.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 11:56:33 GMT" } ]
2009-09-21T00:00:00
[ [ "Wang", "Wenguang", "" ], [ "Wang", "Weiping", "" ], [ "Zander", "Justyna", "" ], [ "Zhu", "Yifan", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.3423
Gerard Briscoe Dr
Gerard Briscoe
Digital Ecosystems
206 Pages, 73 figures, PhD
null
null
null
cs.MA cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We view Digital Ecosystems to be the digital counterparts of biological ecosystems, which are considered to be robust, self-organising and scalable architectures that can automatically solve complex, dynamic problems. So, this work is concerned with the creation, investigation, and optimisation of Digital Ecosystems, exploiting the self-organising properties of biological ecosystems. First, we created the Digital Ecosystem, a novel optimisation technique inspired by biological ecosystems, where the optimisation works at two levels: a first optimisation, migration of agents which are distributed in a decentralised peer-to-peer network, operating continuously in time; this process feeds a second optimisation based on evolutionary computing that operates locally on single peers and is aimed at finding solutions to satisfy locally relevant constraints. We then investigated its self-organising aspects, starting with an extension to the definition of Physical Complexity to include evolving agent populations. Next, we established stability of evolving agent populations over time, by extending the Chli-DeWilde definition of agent stability to include evolutionary dynamics. Further, we evaluated the diversity of the software agents within evolving agent populations. To conclude, we considered alternative augmentations to optimise and accelerate our Digital Ecosystem, by studying the accelerating effect of a clustering catalyst on the evolutionary dynamics. We also studied the optimising effect of targeted migration on the ecological dynamics, through the indirect and emergent optimisation of the agent migration patterns. Overall, we have advanced the understanding of creating Digital Ecosystems, the self-organisation that occurs within them, and the optimisation of their Ecosystem-Oriented Architecture.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 15:07:47 GMT" }, { "version": "v2", "created": "Tue, 6 Oct 2009 16:36:39 GMT" } ]
2009-10-06T00:00:00
[ [ "Briscoe", "Gerard", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0909.3444
Jonathan Marchand
Jonathan Marchand (INRIA Lorraine - LORIA), Bruno Guillaume (INRIA Lorraine - LORIA), Guy Perrier (INRIA Lorraine - LORIA)
Analyse en d\'ependances \`a l'aide des grammaires d'interaction
null
Traitement Automatique des Langues Naturelles, Senlis : France (2009)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article proposes a method to extract dependency structures from phrase-structure level parsing with Interaction Grammars. Interaction Grammars are a formalism which expresses interactions among words using a polarity system. Syntactical composition is led by the saturation of polarities. Interactions take place between constituents, but as grammars are lexicalized, these interactions can be translated at the level of words. Dependency relations are extracted from the parsing process: every dependency is the consequence of a polarity saturation. The dependency relations we obtain can be seen as a refinement of the usual dependency tree. Generally speaking, this work sheds new light on links between phrase structure and dependency parsing.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 14:23:05 GMT" } ]
2009-09-21T00:00:00
[ [ "Marchand", "Jonathan", "", "INRIA Lorraine - LORIA" ], [ "Guillaume", "Bruno", "", "INRIA\n Lorraine - LORIA" ], [ "Perrier", "Guy", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.3445
Ingrid Falk
Ingrid Falk (INRIA Lorraine - LORIA), Claire Gardent (INRIA Lorraine - LORIA), Evelyne Jacquey (ATILF), Fabienne Venant (INRIA Lorraine - LORIA)
Grouping Synonyms by Definitions
null
Recent Advances in Natural Language Processing (RANLP), Borovets : Bulgaria (2009)
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a method for grouping the synonyms of a lemma according to its dictionary senses. The senses are defined by a large machine readable dictionary for French, the TLFi (Tr\'esor de la langue fran\c{c}aise informatis\'e) and the synonyms are given by 5 synonym dictionaries (also for French). To evaluate the proposed method, we manually constructed a gold standard where for each (word, definition) pair and given the set of synonyms defined for that word by the 5 synonym dictionaries, 4 lexicographers specified the set of synonyms they judge adequate. While inter-annotator agreement ranges on that task from 67% to at best 88% depending on the annotator pair and on the synonym dictionary being considered, the automatic procedure we propose scores a precision of 67% and a recall of 71%. The proposed method is compared with related work namely, word sense disambiguation, synonym lexicon acquisition and WordNet construction.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 14:25:29 GMT" } ]
2009-09-21T00:00:00
[ [ "Falk", "Ingrid", "", "INRIA Lorraine - LORIA" ], [ "Gardent", "Claire", "", "INRIA Lorraine -\n LORIA" ], [ "Jacquey", "Evelyne", "", "ATILF" ], [ "Venant", "Fabienne", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.3466
Yann Dujardin
Yann Dujardin
R\'esolution du "partition problem" par une approche arithm\'etique
This paper has been withdrawn by the author due to a crucial error (in one of the quadratic forms introduced)
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article has been withdrawn
[ { "version": "v1", "created": "Fri, 18 Sep 2009 15:25:32 GMT" }, { "version": "v2", "created": "Mon, 21 Sep 2009 20:38:51 GMT" }, { "version": "v3", "created": "Fri, 3 Dec 2010 12:28:12 GMT" } ]
2010-12-06T00:00:00
[ [ "Dujardin", "Yann", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.3472
J\'er\^oAme Kunegis
J\'er\^ome Kunegis, Alan Said, Winfried Umbrath
The Universal Recommender
17 pages; typo and references fixed
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We describe the Universal Recommender, a recommender system for semantic datasets that generalizes domain-specific recommenders such as content-based, collaborative, social, bibliographic, lexicographic, hybrid and other recommenders. In contrast to existing recommender systems, the Universal Recommender applies to any dataset that allows a semantic representation. We describe the scalable three-stage architecture of the Universal Recommender and its application to Internet Protocol Television (IPTV). To achieve good recommendation accuracy, several novel machine learning and optimization problems are identified. We finally give a brief argument supporting the need for machine learning recommenders.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 15:54:51 GMT" }, { "version": "v2", "created": "Tue, 9 Mar 2010 12:43:28 GMT" } ]
2010-03-13T00:00:00
[ [ "Kunegis", "Jérôme", "" ], [ "Said", "Alan", "" ], [ "Umbrath", "Winfried", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.3475
Yilun Shang
Yilun Shang
Multi-agent Coordination in Directed Moving Neighborhood Random Networks
9 pages
Chinese physics b, 2010
10.1088/1674-1056/19/7/070201
null
cs.MA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider the consensus problem of dynamical multiple agents that communicate via a directed moving neighborhood random network. Each agent performs random walk on a weighted directed network. Agents interact with each other through random unidirectional information flow when they coincide in the underlying network at a given instant. For such a framework, we present sufficient conditions for almost sure asymptotic consensus. Some existed consensus schemes are shown to be reduced versions of the current model.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 15:58:43 GMT" } ]
2015-05-14T00:00:00
[ [ "Shang", "Yilun", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3481
Pan Hui
Pan Hui, Richard Mortier, Tristan Henderson, Jon Crowcroft
Planet-scale Human Mobility Measurement
6 pages, 2 figures
null
null
null
cs.NI cs.CY cs.GL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Research into, and design and construction of mobile systems and algorithms requires access to large-scale mobility data. Unfortunately, the wireless and mobile research community lacks such data. For instance, the largest available human contact traces contain only 100 nodes with very sparse connectivity, limited by experimental logistics. In this paper we pose a challenge to the community: how can we collect mobility data from billions of human participants? We re-assert the importance of large-scale datasets in communication network design, and claim that this could impact fundamental studies in other academic disciplines. In effect, we argue that planet-scale mobility measurements can help to save the world. For example, through understanding large-scale human mobility, we can track and model and contain the spread of epidemics of various kinds.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 16:27:51 GMT" } ]
2009-09-21T00:00:00
[ [ "Hui", "Pan", "" ], [ "Mortier", "Richard", "" ], [ "Henderson", "Tristan", "" ], [ "Crowcroft", "Jon", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.GL", "description": "Covers introductory material, survey material, predictions of future trends, biographies, and miscellaneous computer-science related material. Roughly includes all of ACM Subject Class A, except it does not include conference proceedings (which will be listed in the appropriate subject area).", "span": "(General Literature)" } ]
0909.3508
Mahdi Cheraghchi
Mahdi Cheraghchi, Ali Hormati, Amin Karbasi, Martin Vetterli
Compressed Sensing with Probabilistic Measurements: A Group Testing Solution
In Proceedings of the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing
null
null
null
cs.IT cs.DM math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Detection of defective members of large populations has been widely studied in the statistics community under the name "group testing", a problem which dates back to World War II when it was suggested for syphilis screening. There the main interest is to identify a small number of infected people among a large population using collective samples. In viral epidemics, one way to acquire collective samples is by sending agents inside the population. While in classical group testing, it is assumed that the sampling procedure is fully known to the reconstruction algorithm, in this work we assume that the decoder possesses only partial knowledge about the sampling process. This assumption is justified by observing the fact that in a viral sickness, there is a chance that an agent remains healthy despite having contact with an infected person. Therefore, the reconstruction method has to cope with two different types of uncertainty; namely, identification of the infected population and the partially unknown sampling procedure. In this work, by using a natural probabilistic model for "viral infections", we design non-adaptive sampling procedures that allow successful identification of the infected population with overwhelming probability 1-o(1). We propose both probabilistic and explicit design procedures that require a "small" number of agents to single out the infected individuals. More precisely, for a contamination probability p, the number of agents required by the probabilistic and explicit designs for identification of up to k infected members is bounded by m = O(k^2 (log n)/p^2) and m = O(k^2 (log n)^2 /p^2), respectively. In both cases, a simple decoder is able to successfully identify the infected population in time O(mn).
[ { "version": "v1", "created": "Fri, 18 Sep 2009 19:29:42 GMT" }, { "version": "v2", "created": "Mon, 28 Sep 2009 12:31:25 GMT" } ]
2009-09-28T00:00:00
[ [ "Cheraghchi", "Mahdi", "" ], [ "Hormati", "Ali", "" ], [ "Karbasi", "Amin", "" ], [ "Vetterli", "Martin", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3530
Ajinkya Kale
Ajinkya Kale, Ashish Gilda, Sudeep Pradhan
Securing Remote Procedure Calls over HTTPS
null
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Remote Procedure Calls (RPC) are widely used over the Internet as they provide a simple and elegant way of interaction between the client and the server. This paper proposes a solution for securing the remote procedure calls (RPC) by tunneling it through HTTPS (Hypertext Transfer Protocol over Secure Socket Layer). RPC over HTTP actually uses the Secure Socket Layer (SSL) protocol as a transport for the traffic. SSL mandates that the server authenticates itself to the client using a digital certificate (and associated private key). SSL is normally configured to encrypt traffic before transmitting it between the server and client and vice versa.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 20:38:03 GMT" } ]
2009-09-22T00:00:00
[ [ "Kale", "Ajinkya", "" ], [ "Gilda", "Ashish", "" ], [ "Pradhan", "Sudeep", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.3533
Yavuz Oruc A.
A. Yavuz Oruc and Abdullah Atmaca
On Ordinal Covering of Proposals Using Balanced Incomplete Block Designs
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A frequently encountered problem in peer review systems is to facilitate pairwise comparisons of a given set of proposals by as few as referees as possible. In [8], it was shown that, if each referee is assigned to review k proposals then ceil{n(n-1)/k(k-1)} referees are necessary and ceil{n(2n-k)/k^2} referees are sufficient to cover all n(n-1)/2 pairs of n proposals. While the upper bound remains within a factor of 2 of the lower bound, it becomes relatively large for small values of k and the ratio of the upper bound to the lower bound is not less than 3/2 when 2 <= k <= n/2. In this paper, we show that, if sqrt(n) <= k <= n/2 then the upper and lower bounds can be made closer in that their ratio never exceeds 3/2. This is accomplished by a new method that assigns proposals to referees using a particular family of balanced incomplete block designs. Specifically, the new method uses ceil{n(n+k)/k^2} referees when n/k is a prime power, n divides k^2, and sqrt(n) <= k <= n/2. Comparing this new upper bound to the one given in [8] shows that the new upper bound approaches the lower bound as k tends to sqrt(n) whereas the upper bound in [8] approaches the lower bound as k tends to n. Therefore, the new method given here when combined together with the one in [8] provides an assignment whose upper bound referee complexity always remains within a factor of 3/2 of the lower bound when sqrt(n) <= k <= n, thereby improving upon the assignment described in [8]. Furthermore, the new method provides a minimal covering, i.e., it uses the minimum number of referees possible when k = sqrt(n) and k is a prime power.
[ { "version": "v1", "created": "Fri, 18 Sep 2009 21:01:14 GMT" } ]
2009-09-22T00:00:00
[ [ "Oruc", "A. Yavuz", "" ], [ "Atmaca", "Abdullah", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.3554
R Doomun
Harsh K Verma, Abhishek Narain Singh, Raman Kumar
Robustness of the Digital Image Watermarking Techniques against Brightness and Rotation Attack
5 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact factor 0.423
Harsh K Verma, Abhishek Narain Singh, Raman Kumar, International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, September 2009, USA
null
ISSN 1947 5500
cs.MM cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The recent advent in the field of multimedia proposed a many facilities in transport, transmission and manipulation of data. Along with this advancement of facilities there are larger threats in authentication of data, its licensed use and protection against illegal use of data. A lot of digital image watermarking techniques have been designed and implemented to stop the illegal use of the digital multimedia images. This paper compares the robustness of three different watermarking schemes against brightness and rotation attacks. The robustness of the watermarked images has been verified on the parameters of PSNR (Peak Signal to Noise Ratio), RMSE (Root Mean Square Error) and MAE (Mean Absolute Error).
[ { "version": "v1", "created": "Sat, 19 Sep 2009 03:06:57 GMT" } ]
2009-09-22T00:00:00
[ [ "Verma", "Harsh K", "" ], [ "Singh", "Abhishek Narain", "" ], [ "Kumar", "Raman", "" ] ]
[ { "class": "Computer Science", "code": "cs.MM", "description": "Roughly includes material in ACM Subject Class H.5.1.", "span": "(Multimedia)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.3558
Joud Khoury
Joud Khoury, Chaouki T. Abdallah, Kate Krause, Jorge Crichigno
Route Distribution Incentives
15 page, lncs format, 2 figures, workshop
null
null
null
cs.GT cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an incentive model for route distribution in the context of path vector routing protocols and we focus on the Border Gateway Protocol (BGP). BGP is the de-facto protocol for interdomain routing on the Internet. We model BGP route distribution and computation using a game in which a BGP speaker advertises its prefix to its direct neighbors promising them a reward for further distributing the route deeper into the network, the neighbors do the same thing with their neighbors, and so on. The result of this cascaded route distribution is an advertised prefix and hence reachability of the BGP speaker. We first study the convergence of BGP protocol dynamics to a unique outcome tree in the defined game. We then proceed to study the existence of equilibria in the full information game considering competition dynamics. We focus our work on the simplest two classes of graphs: 1) the line (and the tree) graphs which involve no competition, and 2) the ring graph which involves competition.
[ { "version": "v1", "created": "Sat, 19 Sep 2009 04:25:34 GMT" } ]
2009-09-22T00:00:00
[ [ "Khoury", "Joud", "" ], [ "Abdallah", "Chaouki T.", "" ], [ "Krause", "Kate", "" ], [ "Crichigno", "Jorge", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.3561
R Doomun
Farzane Kabudvand
ODMRP with Quality of Service and local recovery with security Support
5 Pages IEEE Format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423
Farzane Kabudvand, International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, September 2009, USA
null
ISSN 1947 5500
cs.NI cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we focus on one critical issue in mobile ad hoc networks that is multicast routing and propose a mesh based on demand multicast routing protocol for Ad-Hoc networks with QoS (quality of service) support. Then a model was presented which is used for create a local recovering mechanism in order to joining the nodes to multi sectional groups at the minimized time and method for security in this protocol we present .
[ { "version": "v1", "created": "Sat, 19 Sep 2009 05:50:01 GMT" } ]
2009-09-22T00:00:00
[ [ "Kabudvand", "Farzane", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.3591
Peter B. Gilkey
P. Gilkey, S. Lopez Ornat, and A. Karousou
Mathematics, Recursion, and Universals in Human Languages
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
There are many scientific problems generated by the multiple and conflicting alternative definitions of linguistic recursion and human recursive processing that exist in the literature. The purpose of this article is to make available to the linguistic community the standard mathematical definition of recursion and to apply it to discuss linguistic recursion. As a byproduct, we obtain an insight into certain "soft universals" of human languages, which are related to cognitive constructs necessary to implement mathematical reasoning, i.e. mathematical model theory.
[ { "version": "v1", "created": "Sat, 19 Sep 2009 15:38:55 GMT" } ]
2009-09-22T00:00:00
[ [ "Gilkey", "P.", "" ], [ "Ornat", "S. Lopez", "" ], [ "Karousou", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.3593
Zhi-Hua Zhou
Min-Ling Zhang and Zhi-Hua Zhou
Exploiting Unlabeled Data to Enhance Ensemble Diversity
10 pages, to appear in ICDM 2010
null
null
null
cs.LG cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Ensemble learning aims to improve generalization ability by using multiple base learners. It is well-known that to construct a good ensemble, the base learners should be accurate as well as diverse. In this paper, unlabeled data is exploited to facilitate ensemble learning by helping augment the diversity among the base learners. Specifically, a semi-supervised ensemble method named UDEED is proposed. Unlike existing semi-supervised ensemble methods where error-prone pseudo-labels are estimated for unlabeled data to enlarge the labeled data to improve accuracy, UDEED works by maximizing accuracies of base learners on labeled data while maximizing diversity among them on unlabeled data. Experiments show that UDEED can effectively utilize unlabeled data for ensemble learning and is highly competitive to well-established semi-supervised ensemble methods.
[ { "version": "v1", "created": "Sat, 19 Sep 2009 16:10:19 GMT" }, { "version": "v2", "created": "Sat, 25 Sep 2010 02:27:46 GMT" } ]
2010-09-28T00:00:00
[ [ "Zhang", "Min-Ling", "" ], [ "Zhou", "Zhi-Hua", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.3596
Chris Preston
Chris Preston
Specifying Data Objects with Initial Algebras
120 pages
null
null
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This study presents a systematic approach to specifying data objects with the help of initial algebras. The primary aim is to describe the set-up to be found in modern functional programming languages such as Haskell and ML, although it can also be applied to more general situations.
[ { "version": "v1", "created": "Sat, 19 Sep 2009 16:59:18 GMT" } ]
2009-09-22T00:00:00
[ [ "Preston", "Chris", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" }, { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" } ]
0909.3606
Vinay Jethava
Vinay Jethava
Extension of Path Probability Method to Approximate Inference over Time
M.Sc.(Research) Thesis, 64 pages
null
null
null
cs.LG cs.CV
http://creativecommons.org/licenses/by/3.0/
There has been a tremendous growth in publicly available digital video footage over the past decade. This has necessitated the development of new techniques in computer vision geared towards efficient analysis, storage and retrieval of such data. Many mid-level computer vision tasks such as segmentation, object detection, tracking, etc. involve an inference problem based on the video data available. Video data has a high degree of spatial and temporal coherence. The property must be intelligently leveraged in order to obtain better results. Graphical models, such as Markov Random Fields, have emerged as a powerful tool for such inference problems. They are naturally suited for expressing the spatial dependencies present in video data, It is however, not clear, how to extend the existing techniques for the problem of inference over time. This thesis explores the Path Probability Method, a variational technique in statistical mechanics, in the context of graphical models and approximate inference problems. It extends the method to a general framework for problems involving inference in time, resulting in an algorithm, \emph{DynBP}. We explore the relation of the algorithm with existing techniques, and find the algorithm competitive with existing approaches. The main contribution of this thesis are the extended GBP algorithm, the extension of Path Probability Methods to the DynBP algorithm and the relationship between them. We have also explored some applications in computer vision involving temporal evolution with promising results.
[ { "version": "v1", "created": "Sat, 19 Sep 2009 23:46:21 GMT" } ]
2009-09-22T00:00:00
[ [ "Jethava", "Vinay", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0909.3609
Vinay Jethava
Vinay Jethava, Krishnan Suresh, Chiranjib Bhattacharyya, Ramesh Hariharan
Randomized Algorithms for Large scale SVMs
17 pages, Submitted to Machine Learning journal (October 2008) - under revision
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a randomized algorithm for training Support vector machines(SVMs) on large datasets. By using ideas from Random projections we show that the combinatorial dimension of SVMs is $O({log} n)$ with high probability. This estimate of combinatorial dimension is used to derive an iterative algorithm, called RandSVM, which at each step calls an existing solver to train SVMs on a randomly chosen subset of size $O({log} n)$. The algorithm has probabilistic guarantees and is capable of training SVMs with Kernels for both classification and regression problems. Experiments done on synthetic and real life data sets demonstrate that the algorithm scales up existing SVM learners, without loss of accuracy.
[ { "version": "v1", "created": "Sat, 19 Sep 2009 23:40:10 GMT" } ]
2009-09-22T00:00:00
[ [ "Jethava", "Vinay", "" ], [ "Suresh", "Krishnan", "" ], [ "Bhattacharyya", "Chiranjib", "" ], [ "Hariharan", "Ramesh", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0909.3637
Fei Li
Fei Li
Packet Scheduling in a Size-Bounded Buffer
6 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider algorithms to schedule packets with values and deadlines in a size-bounded buffer. At any time, the buffer can store at most B packets. Packets arrive over time. Each packet has a non-negative value and an integer deadline. In each time step, at most one packet can be sent. Packets can be dropped at any time before they are sent. The objective is to maximize the total value gained by delivering packets no later than their respective deadlines. This model generalizes the well-studied bounded-delay model (Hajek. CISS 2001. Kesselman et al. STOC 2001). We first provide an optimal offline algorithm for this model. Then we present an alternative proof of the 2-competitive deterministic online algorithm (Fung. arXiv July 2009). We also prove that the lower bound of competitive ratio of a family of (deterministic and randomized) algorithms is 2 - 1 / B.
[ { "version": "v1", "created": "Sun, 20 Sep 2009 15:20:17 GMT" }, { "version": "v2", "created": "Mon, 1 Feb 2010 00:40:03 GMT" } ]
2010-02-01T00:00:00
[ [ "Li", "Fei", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.3647
Denes Petz
Denes Petz
From f-divergence to quantum quasi-entropies and their use
Written version of the lecture in the conference "Information and Communication" held in Budapest
null
10.3390/e12030304
null
cs.IT math.IT math.ST quant-ph stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Csiszar's f-divergence of two probability distributions was extended to the quantum case by the author in 1985. In the quantum setting positive semidefinite matrices are in the place of probability distributions and the quantum generalization is called quasi-entropy which is related to some other important concepts as covariance, quadratic costs, Fisher information, Cramer-Rao inequality and uncertainty relation. A conjecture about the scalar curvature of a Fisher information geometry is explained. The described subjects are overviewed in details in the matrix setting, but at the very end the von Neumann algebra approach is sketched shortly.
[ { "version": "v1", "created": "Sun, 20 Sep 2009 18:10:11 GMT" } ]
2015-05-14T00:00:00
[ [ "Petz", "Denes", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0909.3648
Joel Ratsaby
Joel Ratsaby
Random scattering of bits by prediction
null
null
null
null
cs.AI cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate a population of binary mistake sequences that result from learning with parametric models of different order. We obtain estimates of their error, algorithmic complexity and divergence from a purely random Bernoulli sequence. We study the relationship of these variables to the learner's information density parameter which is defined as the ratio between the lengths of the compressed to uncompressed files that contain the learner's decision rule. The results indicate that good learners have a low information density$\rho$ while bad learners have a high $\rho$. Bad learners generate mistake sequences that are atypically complex or diverge stochastically from a purely random Bernoulli sequence. Good learners generate typically complex sequences with low divergence from Bernoulli sequences and they include mistake sequences generated by the Bayes optimal predictor. Based on the static algorithmic interference model of \cite{Ratsaby_entropy} the learner here acts as a static structure which "scatters" the bits of an input sequence (to be predicted) in proportion to its information density $\rho$ thereby deforming its randomness characteristics.
[ { "version": "v1", "created": "Sun, 20 Sep 2009 18:10:55 GMT" }, { "version": "v2", "created": "Wed, 13 Oct 2010 19:03:58 GMT" } ]
2010-10-14T00:00:00
[ [ "Ratsaby", "Joel", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3658
Narasimha Shashidhar
Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha Shashidhar
Efficient Steganography with Provable Security Guarantees
12 pages
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We provide a new provably-secure steganographic encryption protocol that is proven secure in the complexity-theoretic framework of Hopper et al. The fundamental building block of our steganographic encryption protocol is a "one-time stegosystem" that allows two parties to transmit messages of length shorter than the shared key with information-theoretic security guarantees. The employment of a pseudorandom generator (PRG) permits secure transmission of longer messages in the same way that such a generator allows the use of one-time pad encryption for messages longer than the key in symmetric encryption. The advantage of our construction, compared to that of Hopper et al., is that it avoids the use of a pseudorandom function family and instead relies (directly) on a pseudorandom generator in a way that provides linear improvement in the number of applications of the underlying one-way permutation per transmitted bit. This advantageous trade-off is achieved by substituting the pseudorandom function family employed in the previous construction with an appropriate combinatorial construction that has been used extensively in derandomization, namely almost t-wise independent function families.
[ { "version": "v1", "created": "Sun, 20 Sep 2009 22:54:26 GMT" } ]
2009-09-22T00:00:00
[ [ "Kiayias", "Aggelos", "" ], [ "Raekow", "Yona", "" ], [ "Russell", "Alexander", "" ], [ "Shashidhar", "Narasimha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3688
Emiliano De Cristofaro
Mishari Al Mishari, Emiliano De Cristofaro, Karim El Defrawy and Gene Tsudik
Harvesting SSL Certificate Data to Identify Web-Fraud
To appear in the International Journal of Network Security
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Web-fraud is one of the most unpleasant features of today's Internet. Two well-known examples of fraudulent activities on the web are phishing and typosquatting. Their effects range from relatively benign (such as unwanted ads) to downright sinister (especially, when typosquatting is combined with phishing). This paper presents a novel technique to detect web-fraud domains that utilize HTTPS. To this end, we conduct the first comprehensive study of SSL certificates. We analyze certificates of legitimate and popular domains and those used by fraudulent ones. Drawing from extensive measurements, we build a classifier that detects such malicious domains with high accuracy.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 05:39:17 GMT" }, { "version": "v2", "created": "Tue, 15 Dec 2009 02:19:53 GMT" }, { "version": "v3", "created": "Thu, 12 Jan 2012 03:15:29 GMT" }, { "version": "v4", "created": "Fri, 13 Jan 2012 03:55:04 GMT" } ]
2015-03-13T00:00:00
[ [ "Mishari", "Mishari Al", "" ], [ "De Cristofaro", "Emiliano", "" ], [ "Defrawy", "Karim El", "" ], [ "Tsudik", "Gene", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.3696
Victor Chen
Victor Chen, Elena Grigorescu, Ronald de Wolf
Efficient and Error-Correcting Data Structures for Membership and Polynomial Evaluation
An abridged version of this paper appears in STACS 2010
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct efficient data structures that are resilient against a constant fraction of adversarial noise. Our model requires that the decoder answers most queries correctly with high probability and for the remaining queries, the decoder with high probability either answers correctly or declares "don't know." Furthermore, if there is no noise on the data structure, it answers all queries correctly with high probability. Our model is the common generalization of a model proposed recently by de Wolf and the notion of "relaxed locally decodable codes" developed in the PCP literature. We measure the efficiency of a data structure in terms of its length, measured by the number of bits in its representation, and query-answering time, measured by the number of bit-probes to the (possibly corrupted) representation. In this work, we study two data structure problems: membership and polynomial evaluation. We show that these two problems have constructions that are simultaneously efficient and error-correcting.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 07:16:22 GMT" }, { "version": "v2", "created": "Wed, 27 Jan 2010 16:06:04 GMT" } ]
2010-01-27T00:00:00
[ [ "Chen", "Victor", "" ], [ "Grigorescu", "Elena", "" ], [ "de Wolf", "Ronald", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.3717
Pranav Agrawal
Pranav Agrawal (1), Anurag Kumar (2), Joy Kuri (1), Manoj Panda (2), Vishnu Navda (3), Ramachandran Ramjee (3), Venkata N. Padmanabhan (3) ((1) CEDT Indian Institute of Science Bangalore, (2) ECE Indian Institute of Science Bangalore, (3) Microsoft Research Bangalore India)
Analytical Models for Energy Consumption in Infrastructure WLAN STAs Carrying TCP Traffic
null
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We develop analytical models for estimating the energy spent by stations (STAs) in infrastructure WLANs when performing TCP controlled file downloads. We focus on the energy spent in radio communication when the STAs are in the Continuously Active Mode (CAM), or in the static Power Save Mode (PSM). Our approach is to develop accurate models for obtaining the fraction of times the STA radios spend in idling, receiving and transmitting. We discuss two traffic models for each mode of operation: (i) each STA performs one large file download, and (ii) the STAs perform short file transfers. We evaluate the rate of STA energy expenditure with long file downloads, and show that static PSM is worse than just using CAM. For short file downloads we compute the number of file downloads that can be completed with given battery capacity, and show that PSM performs better than CAM for this case. We provide a validation of our analytical models using the NS-2 simulator. In contrast to earlier work on analytical modeling of PSM, our models that capture the details of the interactions between the 802.11 MAC in PSM and certain aspects of TCP.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 09:32:27 GMT" }, { "version": "v2", "created": "Mon, 21 Sep 2009 23:14:20 GMT" }, { "version": "v3", "created": "Wed, 23 Sep 2009 23:10:26 GMT" }, { "version": "v4", "created": "Tue, 6 Oct 2009 11:54:38 GMT" } ]
2009-10-06T00:00:00
[ [ "Agrawal", "Pranav", "" ], [ "Kumar", "Anurag", "" ], [ "Kuri", "Joy", "" ], [ "Panda", "Manoj", "" ], [ "Navda", "Vishnu", "" ], [ "Ramjee", "Ramachandran", "" ], [ "Padmanabhan", "Venkata N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.3786
Damien Chablat
Anatoly Pashkevich (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Kinematic calibration of Orthoglide-type mechanisms from observation of parallel leg motions
null
Mechatronics 19, 4 (2009) 478-488
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper proposes a new calibration method for parallel manipulators that allows efficient identification of the joint offsets using observations of the manipulator leg parallelism with respect to the base surface. The method employs a simple and low-cost measuring system, which evaluates deviation of the leg location during motions that are assumed to preserve the leg parallelism for the nominal values of the manipulator parameters. Using the measured deviations, the developed algorithm estimates the joint offsets that are treated as the most essential parameters to be identified. The validity of the proposed calibration method and efficiency of the developed numerical algorithms are confirmed by experimental results. The sensitivity of the measurement methods and the calibration accuracy are also studied.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 14:15:09 GMT" } ]
2009-09-22T00:00:00
[ [ "Pashkevich", "Anatoly", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0909.3787
Mikhail Berlinkov
M.V. Berlinkov
Approximating the minimum length of synchronizing words is hard
12 pages, 1 figure
null
10.1007/978-3-642-13182-0_4
null
cs.FL cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We prove that, unless $\mathrm{P}=\mathrm{NP}$, no polynomial algorithm can approximate the minimum length of \sws for a given \san within a constant factor.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 14:27:05 GMT" }, { "version": "v2", "created": "Sat, 19 Dec 2009 05:20:58 GMT" } ]
2015-05-14T00:00:00
[ [ "Berlinkov", "M. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.3789
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom
Maximal Pivots on Graphs with an Application to Gene Assembly
modest revision (including different latex style) w.r.t. v2, 16 pages, 5 figures
Discrete Applied Mathematics, Volume 158, Issue 18, Pages 1977-1985
10.1016/j.dam.2010.08.030
null
math.CO cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider principal pivot transform (pivot) on graphs. We define a natural variant of this operation, called dual pivot, and show that both the kernel and the set of maximally applicable pivots of a graph are invariant under this operation. The result is motivated by and applicable to the theory of gene assembly in ciliates.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 14:47:11 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2009 18:52:29 GMT" }, { "version": "v3", "created": "Thu, 14 Oct 2010 14:04:04 GMT" } ]
2010-10-15T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ] ]
[ { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.3790
Mikhail Berlinkov
M.V. Berlinkov
On Carpi and Alessandro conjecture
11 pages, 1 figure
null
null
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The well known open \v{C}ern\'y conjecture states that each \san with $n$ states has a \sw of length at most $(n-1)^2$. On the other hand, the best known upper bound is cubic of $n$. Recently, in the paper \cite{CARPI1} of Alessandro and Carpi, the authors introduced the new notion of strongly transitivity for automata and conjectured that this property with a help of \emph{Extension} method allows to get a quadratic upper bound for the length of the shortest \sws. They also confirmed this conjecture for circular automata. We disprove this conjecture and the long-standing \emph{Extension} conjecture too. We also consider the widely used Extension method and its perspectives.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 14:43:15 GMT" }, { "version": "v2", "created": "Sun, 14 Feb 2010 12:09:32 GMT" } ]
2010-02-15T00:00:00
[ [ "Berlinkov", "M. V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.FL", "description": "Covers automata theory, formal language theory, grammars, and combinatorics on words. This roughly corresponds to ACM Subject Classes F.1.1, and F.4.3. Papers dealing with computational complexity should go to cs.CC; papers dealing with logic should go to cs.LO.", "span": "(Formal Languages and Automata Theory)" } ]
0909.3868
Luigi Salemi
Luigi Salemi
Method of resolution of 3SAT in polynomial time
null
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Presentation of a Method for determining whether a problem 3Sat has solution, and if yes to find one, in time max O(n^15). Is thus proved that the problem 3Sat is fully resolved in polynomial time and therefore that it is in P, by the work of Cook and Levin, and can transform a SAT problem in a 3Sat in polynomial time (ref. Karp), it follows that P = NP. Open Source program is available at http://www.visainformatica.it/3sat
[ { "version": "v1", "created": "Mon, 21 Sep 2009 21:45:10 GMT" }, { "version": "v2", "created": "Mon, 13 Sep 2010 12:50:32 GMT" } ]
2010-09-14T00:00:00
[ [ "Salemi", "Luigi", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.3877
James Nastos
James Nastos, Yong Gao
A note on the hardness of graph diameter augmentation problems
No figures
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A graph has \emph{diameter} D if every pair of vertices are connected by a path of at most D edges. The Diameter-D Augmentation problem asks how to add the a number of edges to a graph in order to make the resulting graph have diameter D. It was previously known that this problem is NP-hard \cite{GJ}, even in the D=2 case. In this note, we give a simpler reduction to arrive at this fact and show that this problem is W[2]-hard.
[ { "version": "v1", "created": "Mon, 21 Sep 2009 23:26:00 GMT" } ]
2009-09-23T00:00:00
[ [ "Nastos", "James", "" ], [ "Gao", "Yong", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.3892
Kirk D. Borne
Kirk D. Borne (1) ((1) George Mason University)
Astroinformatics: A 21st Century Approach to Astronomy
14 pages total: 1 cover page, 3 pages of co-signers, plus 10 pages, Astro2010 Decadal Survey State of the Profession Position Paper
null
null
null
astro-ph.IM cs.DB cs.DL cs.IR physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Data volumes from multiple sky surveys have grown from gigabytes into terabytes during the past decade, and will grow from terabytes into tens (or hundreds) of petabytes in the next decade. This exponential growth of new data both enables and challenges effective astronomical research, requiring new approaches. Thus far, astronomy has tended to address these challenges in an informal and ad hoc manner, with the necessary special expertise being assigned to e-Science or survey science. However, we see an even wider scope and therefore promote a broader vision of this data-driven revolution in astronomical research. For astronomy to effectively cope with and reap the maximum scientific return from existing and future large sky surveys, facilities, and data-producing projects, we need our own information science specialists. We therefore recommend the formal creation, recognition, and support of a major new discipline, which we call Astroinformatics. Astroinformatics includes a set of naturally-related specialties including data organization, data description, astronomical classification taxonomies, astronomical concept ontologies, data mining, machine learning, visualization, and astrostatistics. By virtue of its new stature, we propose that astronomy now needs to integrate Astroinformatics as a formal sub-discipline within agency funding plans, university departments, research programs, graduate training, and undergraduate education. Now is the time for the recognition of Astroinformatics as an essential methodology of astronomical research. The future of astronomy depends on it.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 02:21:49 GMT" } ]
2009-11-04T00:00:00
[ [ "Borne", "Kirk D.", "", "George Mason University" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]