id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
0909.3895
|
Kirk D. Borne
|
Kirk D. Borne (1), Suzanne Jacoby (2), K. Carney (3), A. Connolly (4),
T. Eastman (5), M. J. Raddick (6), J. A. Tyson (7), J. Wallin (1) ((1) George
Mason University, (2) LSST Corporation, (3) Adler Planetarium, (4) U.
Washington, (5) Wyle Information Systems, (6) JHU/SDSS, (7) UC Davis)
|
The Revolution in Astronomy Education: Data Science for the Masses
|
12 pages total: 1 cover page, 1 page of co-signers, plus 10 pages,
State of the Profession Position Paper submitted to the Astro2010 Decadal
Survey (March 2009)
| null | null | null |
astro-ph.IM cs.DB cs.DL cs.IR physics.ed-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
As our capacity to study ever-expanding domains of our science has increased
(including the time domain, non-electromagnetic phenomena, magnetized plasmas,
and numerous sky surveys in multiple wavebands with broad spatial coverage and
unprecedented depths), so have the horizons of our understanding of the
Universe been similarly expanding. This expansion is coupled to the exponential
data deluge from multiple sky surveys, which have grown from gigabytes into
terabytes during the past decade, and will grow from terabytes into Petabytes
(even hundreds of Petabytes) in the next decade. With this increased vastness
of information, there is a growing gap between our awareness of that
information and our understanding of it. Training the next generation in the
fine art of deriving intelligent understanding from data is needed for the
success of sciences, communities, projects, agencies, businesses, and
economies. This is true for both specialists (scientists) and non-specialists
(everyone else: the public, educators and students, workforce). Specialists
must learn and apply new data science research techniques in order to advance
our understanding of the Universe. Non-specialists require information literacy
skills as productive members of the 21st century workforce, integrating
foundational skills for lifelong learning in a world increasingly dominated by
data. We address the impact of the emerging discipline of data science on
astronomy education within two contexts: formal education and lifelong
learners.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 02:55:14 GMT"
}
] | 2009-11-04T00:00:00 |
[
[
"Borne",
"Kirk D.",
""
],
[
"Jacoby",
"Suzanne",
""
],
[
"Carney",
"K.",
""
],
[
"Connolly",
"A.",
""
],
[
"Eastman",
"T.",
""
],
[
"Raddick",
"M. J.",
""
],
[
"Tyson",
"J. A.",
""
],
[
"Wallin",
"J.",
""
]
] |
[
{
"class": "Physics",
"code": "astro-ph.IM",
"description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design",
"span": "(Instrumentation and Methods for Astrophysics)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.ed-ph",
"description": "Report of results of a research study, laboratory experience, assessment or classroom practice that represents a way to improve teaching and learning in physics. Also, report on misconceptions of students, textbook errors, and other similar information relative to promoting physics understanding.",
"span": "(Physics Education)"
}
] |
0909.3911
|
R Doomun
|
Yon Ping Chen, and Tien Der Yeh
|
A Method for Extraction and Recognition of Isolated License Plate
Characters
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 1-10, August 2009, USA
| null |
ISSN 1947 5500
|
cs.CV
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A method to extract and recognize isolated characters in license plates is
proposed. In extraction stage, the proposed method detects isolated characters
by using Difference-of-Gaussian (DOG) function, The DOG function, similar to
Laplacian of Gaussian function, was proven to produce the most stable image
features compared to a range of other possible image functions. The candidate
characters are extracted by doing connected component analysis on different
scale DOG images. In recognition stage, a novel feature vector named
accumulated gradient projection vector (AGPV) is used to compare the candidate
character with the standard ones. The AGPV is calculated by first projecting
pixels of similar gradient orientations onto specific axes, and then
accumulates the projected gradient magnitudes by each axis. In the experiments,
the AGPVs are proven to be invariant from image scaling and rotation, and
robust to noise and illumination change.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 05:38:32 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Chen",
"Yon Ping",
""
],
[
"Der Yeh",
"Tien",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
}
] |
0909.3917
|
Damien Chablat
|
Anatoly Pashkevich (IRCCyN), Alexandr Klimchik (IRCCyN), Damien
Chablat (IRCCyN), Philippe Wenger (IRCCyN)
|
Stiffness Analysis Of Multi-Chain Parallel Robotic Systems
| null |
Journal of Automation, Mobile Robotics and Intelligent Systems 3,
3 (2009) 75-82
| null |
JA2009
|
cs.RO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper presents a new stiffness modelling method for multi-chain parallel
robotic manipulators with flexible links and compliant actuating joints. In
contrast to other works, the method involves a FEA-based link stiffness
evaluation and employs a new solution strategy of the kinetostatic equations,
which allows computing the stiffness matrix for singular postures and to take
into account influence of the external forces. The advantages of the developed
technique are confirmed by application examples, which deal with stiffness
analysis of a parallel manipulator of the Orthoglide family
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 06:38:24 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Pashkevich",
"Anatoly",
"",
"IRCCyN"
],
[
"Klimchik",
"Alexandr",
"",
"IRCCyN"
],
[
"Chablat",
"Damien",
"",
"IRCCyN"
],
[
"Wenger",
"Philippe",
"",
"IRCCyN"
]
] |
[
{
"class": "Computer Science",
"code": "cs.RO",
"description": "Roughly includes material in ACM Subject Class I.2.9.",
"span": "(Robotics)"
}
] |
0909.3930
|
Bill Rosgen
|
Bill Rosgen
|
Computational Distinguishability of Quantum Channels
|
Ph.D. Thesis, 178 pages, 35 figures
| null | null | null |
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The computational problem of distinguishing two quantum channels is central
to quantum computing. It is a generalization of the well-known satisfiability
problem from classical to quantum computation. This problem is shown to be
surprisingly hard: it is complete for the class QIP of problems that have
quantum interactive proof systems, which implies that it is hard for the class
PSPACE of problems solvable by a classical computation in polynomial space.
Several restrictions of distinguishability are also shown to be hard. It is
no easier when restricted to quantum computations of logarithmic depth, to
mixed-unitary channels, to degradable channels, or to antidegradable channels.
These hardness results are demonstrated by finding reductions between these
classes of quantum channels. These techniques have applications outside the
distinguishability problem, as the construction for mixed-unitary channels is
used to prove that the additivity problem for the classical capacity of quantum
channels can be equivalently restricted to the mixed unitary channels.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 11:17:39 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Rosgen",
"Bill",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.3931
|
Sunil Pandey Mr.
|
Sunil Pandey and Praveen Kaushik and Dr.S.C. Shrivastava
|
Rossler Nonlinear Dynamical Machine for Cryptography Applications
|
5 pages, 3 figures
| null | null | null |
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In many of the cryptography applications like password or IP address
encryption schemes, symmetric cryptography is useful. In these relatively
simpler applications of cryptography, asymmetric cryptography is difficult to
justify on account of the computational and implementation complexities
associated with asymmetric cryptography. Symmetric schemes make use of a single
shared key known only between the two communicating hosts. This shared key is
used both for the encryption as well as the decryption of data. This key has to
be small in size besides being a subset of a potentially large keyspace making
it convenient for the communicating hosts while at the same time making
cryptanalysis difficult for the potential attackers. In the present work, an
abstract Rossler nonlinear dynamical machine has been described first. The
Rossler system exhibits chaotic dynamics for certain values of system
parameters and initial conditions. The chaotic dynamics of the Rossler system
with its apparently erratic and irregular characteristics and extreme
sensitivity to the initial conditions has been used for the design of the
cryptographic key in an attempt to increase the confusion and the challenge for
the potential attackers.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 08:42:36 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Pandey",
"Sunil",
""
],
[
"Kaushik",
"Praveen",
""
],
[
"Shrivastava",
"Dr. S. C.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.3966
|
Ananthanarayanan Chockalingam
|
P. Ubaidulla and A. Chockalingam
|
Robust THP Transceiver Designs for Multiuser MIMO Downlink with
Imperfect CSIT
|
Accepted for publication in EURASIP Journal on Advances in Signal
Processing: Special Issue on Multiuser MIMO Transmission with Limited
Feedback, Cooperation, and Coordination
| null |
10.1155/2009/473930
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we present robust joint non-linear transceiver designs for
multiuser multiple-input multiple-output (MIMO) downlink in the presence of
imperfections in the channel state information at the transmitter (CSIT). The
base station (BS) is equipped with multiple transmit antennas, and each user
terminal is equipped with one or more receive antennas. The BS employs
Tomlinson-Harashima precoding (THP) for inter-user interference
pre-cancellation at the transmitter. We consider robust transceiver designs
that jointly optimize the transmit THP filters and receive filter for two
models of CSIT errors. The first model is a stochastic error (SE) model, where
the CSIT error is Gaussian-distributed. This model is applicable when the CSIT
error is dominated by channel estimation error. In this case, the proposed
robust transceiver design seeks to minimize a stochastic function of the sum
mean square error (SMSE) under a constraint on the total BS transmit power. We
propose an iterative algorithm to solve this problem. The other model we
consider is a norm-bounded error (NBE) model, where the CSIT error can be
specified by an uncertainty set. This model is applicable when the CSIT error
is dominated by quantization errors. In this case, we consider a worst-case
design. For this model, we consider robust i) minimum SMSE, ii)
MSE-constrained, and iii) MSE-balancing transceiver designs. We propose
iterative algorithms to solve these problems, wherein each iteration involves a
pair of semi-definite programs (SDP). Further, we consider an extension of the
proposed algorithm to the case with per-antenna power constraints.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 11:24:03 GMT"
}
] | 2016-02-17T00:00:00 |
[
[
"Ubaidulla",
"P.",
""
],
[
"Chockalingam",
"A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.3976
|
Vadim Madgazin
|
Vadim R. Madgazin
|
The Information Theory of Emotions of Musical Chords
|
18 pages, 2 figures, in English, and copy in Russian
| null | null | null |
cs.SD q-bio.NC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The paper offers a solution to the centuries-old puzzle - why the major
chords are perceived as happy and the minor chords as sad - based on the
information theory of emotions. A theory and a formula of musical emotions were
created. They define the sign and the amplitude of the utilitarian emotional
coloration of separate major and minor chords through relative pitches of
constituent sounds. Keywords: chord, major, minor, the formula of musical
emotions, the information theory of emotions.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 12:24:19 GMT"
},
{
"version": "v2",
"created": "Sat, 10 Sep 2011 12:02:21 GMT"
}
] | 2011-09-13T00:00:00 |
[
[
"Madgazin",
"Vadim R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SD",
"description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.",
"span": "(Sound)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.NC",
"description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention",
"span": "(Neurons and Cognition)"
}
] |
0909.3997
|
Pascal Vanier
|
Emmanuel Jeandel, Pascal Vanier
|
Periodicity in tilings
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tilings and tiling systems are an abstract concept that arise both as a
computational model and as a dynamical system. In this paper, we characterize
the sets of periods that a tiling system can produce. We prove that up to a
slight recoding, they correspond exactly to languages in the complexity classes
$\nspace{n}$ and $\cne$.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 13:49:42 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Jeandel",
"Emmanuel",
""
],
[
"Vanier",
"Pascal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4004
|
Robert Brijder
|
Robert Brijder, Hendrik Jan Hoogeboom
|
The Group Structure of Pivot and Loop Complementation on Graphs and Set
Systems
|
21 pages, 7 figures, significant additions w.r.t. v3 are Thm 7 and
Remark 25
|
European Journal of Combinatorics, v. 32, 1353-1367, 2011
|
10.1016/j.ejc.2011.03.002
| null |
cs.DM math.CO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the interplay between principal pivot transform (pivot) and loop
complementation for graphs. This is done by generalizing loop complementation
(in addition to pivot) to set systems. We show that the operations together,
when restricted to single vertices, form the permutation group S_3. This leads,
e.g., to a normal form for sequences of pivots and loop complementation on
graphs. The results have consequences for the operations of local
complementation and edge complementation on simple graphs: an alternative proof
of a classic result involving local and edge complementation is obtained, and
the effect of sequences of local complementations on simple graphs is
characterized.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 15:42:06 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Oct 2009 17:41:52 GMT"
},
{
"version": "v3",
"created": "Tue, 4 May 2010 16:27:00 GMT"
},
{
"version": "v4",
"created": "Mon, 18 Apr 2011 09:50:54 GMT"
}
] | 2014-03-26T00:00:00 |
[
[
"Brijder",
"Robert",
""
],
[
"Hoogeboom",
"Hendrik Jan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
0909.4011
|
Micha{\l} Adamaszek
|
Anna Adamaszek, Michal Adamaszek
|
Large-girth roots of graphs
|
14 pages, 4 figures
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the problem of recognizing graph powers and computing roots of
graphs. We provide a polynomial time recognition algorithm for r-th powers of
graphs of girth at least 2r+3, thus improving a bound conjectured by Farzad et
al. (STACS 2009). Our algorithm also finds all r-th roots of a given graph that
have girth at least 2r+3 and no degree one vertices, which is a step towards a
recent conjecture of Levenshtein that such root should be unique. On the
negative side, we prove that recognition becomes an NP-complete problem when
the bound on girth is about twice smaller. Similar results have so far only
been attempted for r=2,3.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 14:46:55 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Adamaszek",
"Anna",
""
],
[
"Adamaszek",
"Michal",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4013
|
David Monniaux
|
David Monniaux (VERIMAG - IMAG)
|
Automatic modular abstractions for template numerical constraints
| null | null | null | null |
cs.PL cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose a method for automatically generating abstract transformers for
static analysis by abstract interpretation. The method focuses on linear
constraints on programs operating on rational, real or floating-point variables
and containing linear assignments and tests. In addition to loop-free code, the
same method also applies for obtaining least fixed points as functions of the
precondition, which permits the analysis of loops and recursive functions. Our
algorithms are based on new quantifier elimination and symbolic manipulation
techniques. Given the specification of an abstract domain, and a program block,
our method automatically outputs an implementation of the corresponding
abstract transformer. It is thus a form of program transformation. The
motivation of our work is data-flow synchronous programming languages, used for
building control-command embedded systems, but it also applies to imperative
and functional programming.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 14:49:17 GMT"
},
{
"version": "v2",
"created": "Mon, 31 May 2010 06:43:29 GMT"
}
] | 2010-07-28T00:00:00 |
[
[
"Monniaux",
"David",
"",
"VERIMAG - IMAG"
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.4017
|
Chiachi Huang
|
Chiachi Huang, Syed A. Jafar, Shlomo Shamai (Shitz), Sriram Vishwanath
|
On Degrees of Freedom Region of MIMO Networks without CSIT
|
14 pages, 5 figures
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we study the effect of the absence of channel knowledge for
multiple-input-multiple-output (MIMO) networks. Specifically, we assume perfect
channel state information at the receivers, no channel state information at the
transmitter(s), and independent identically distributed (i.i.d.) Rayleigh
fading across antennas, users and time slots. We provide the characterization
of the degrees of freedom (DoF) region for a 2-user MIMO broadcast channel. We
then provide a DoF region outer bound for a 2-user MIMO interference channel.
This bound is shown to be tight for all possible combinations of the number of
antennas at each node except for one case. As a byproduct of this analysis we
point out the potential of interference alignment in the 2-user MIMO
interference channel with no CSIT.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 15:35:05 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Huang",
"Chiachi",
"",
"Shitz"
],
[
"Jafar",
"Syed A.",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
],
[
"Vishwanath",
"Sriram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4021
|
Marek Cygan
|
Marek Cygan, Marcin Pilipczuk and Jakub Onufry Wojtaszczyk
|
Beyond O*(2^n) in domination-type problems
|
Submitted to STACS 2010
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we provide algorithms faster than O*(2^n) for several
NP-complete domination-type problems. More precisely, we provide: an algorithm
for CAPACITATED DOMINATING SET that solves it in O(1.89^n), a branch-and-reduce
algorithm solving LARGEST IRREDUNDANT SET in O(1.9657^n) time and a simple
iterative-DFS algorithm for SMALLEST INCLUSION-MAXIMAL IRREDUNDANT SET that
solves it in O(1.999956^n) time.
We also provide an exponential approximation scheme for CAPACITATED
DOMINATING SET. All algorithms require polynomial space. Despite the fact that
the discussed problems are quite similar to the DOMINATING SET problem, we are
not aware of any published algorithms solving these problems faster than the
obvious O*(2^n) solution prior to this paper.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 17:06:28 GMT"
}
] | 2009-09-23T00:00:00 |
[
[
"Cygan",
"Marek",
""
],
[
"Pilipczuk",
"Marcin",
""
],
[
"Wojtaszczyk",
"Jakub Onufry",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4094
|
Adrian Dumitrescu
|
Adrian Dumitrescu and Csaba D. T\'oth
|
Long non-crossing configurations in the plane
|
12 pages, 4 figures
| null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We revisit several maximization problems for geometric networks design under
the non-crossing constraint, first studied by Alon, Rajagopalan and Suri (ACM
Symposium on Computational Geometry, 1993). Given a set of $n$ points in the
plane in general position (no three points collinear), compute a longest
non-crossing configuration composed of straight line segments that is: (a) a
matching (b) a Hamiltonian path (c) a spanning tree. Here we obtain new results
for (b) and (c), as well as for the Hamiltonian cycle problem:
(i) For the longest non-crossing Hamiltonian path problem, we give an
approximation algorithm with ratio $\frac{2}{\pi+1} \approx 0.4829$. The
previous best ratio, due to Alon et al., was $1/\pi \approx 0.3183$. Moreover,
the ratio of our algorithm is close to $2/\pi$ on a relatively broad class of
instances: for point sets whose perimeter (or diameter) is much shorter than
the maximum length matching. The algorithm runs in $O(n^{7/3}\log{n})$ time.
(ii) For the longest non-crossing spanning tree problem, we give an
approximation algorithm with ratio 0.502 which runs in $O(n \log{n})$ time. The
previous ratio, 1/2, due to Alon et al., was achieved by a quadratic time
algorithm. Along the way, we first re-derive the result of Alon et al. with a
faster $O(n \log{n})$-time algorithm and a very simple analysis.
(iii) For the longest non-crossing Hamiltonian cycle problem, we give an
approximation algorithm whose ratio is close to $2/\pi$ on a relatively broad
class of instances: for point sets with the product $\bf{<}$diameter$\times$
convex hull size $\bf{>}$ much smaller than the maximum length matching. The
algorithm runs in $O(n^{7/3}\log{n})$ time. No previous approximation results
were known for this problem.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 21:07:10 GMT"
},
{
"version": "v2",
"created": "Wed, 16 Dec 2009 23:43:31 GMT"
},
{
"version": "v3",
"created": "Wed, 3 Feb 2010 12:32:02 GMT"
}
] | 2010-02-03T00:00:00 |
[
[
"Dumitrescu",
"Adrian",
""
],
[
"Tóth",
"Csaba D.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.4101
|
Gregorio Malajovich
|
Felipe Cucker, Teresa Krick, Gregorio Malajovich, Mario Wschebor
|
A Numerical Algorithm for Zero Counting. II: Distance to Ill-posedness
and Smoothed Analysis
| null |
Journal of Fixed Point Theory and Applications 6 No 2, pp 285-294
(Dec. 2009)
|
10.1007/s11784-009-0127-4
| null |
cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We show a Condition Number Theorem for the condition number of zero counting
for real polynomial systems. That is, we show that this condition number equals
the inverse of the normalized distance to the set of ill-posed systems (i.e.,
those having multiple real zeros). As a consequence, a smoothed analysis of
this condition number follows.
|
[
{
"version": "v1",
"created": "Tue, 22 Sep 2009 21:42:51 GMT"
}
] | 2010-07-12T00:00:00 |
[
[
"Cucker",
"Felipe",
""
],
[
"Krick",
"Teresa",
""
],
[
"Malajovich",
"Gregorio",
""
],
[
"Wschebor",
"Mario",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0909.4119
|
Igor L. Markov
|
Shigeru Yamashita and Igor L. Markov
|
Fast Equivalence-checking for Quantum Circuits
|
Minor change of some wording
|
Quant. Inf. and Comp., vol. 9, no. 9,10 (2010), pp. 721-734
| null | null |
quant-ph cs.ET
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We perform formal verification of quantum circuits by integrating several
techniques specialized to particular classes of circuits. Our verification
methodology is based on the new notion of a reversible miter that allows one to
leverage existing techniques for circuit simplification of quantum circuits.
For reversible circuits which arise as runtime bottlenecks of key quantum
algorithms, we develop several verification techniques and empirically compare
them.
We also combine existing quantum verification tools with the use of
SAT-solvers. Experiments with circuits for Shor's number-factoring algorithm,
containing thousands of gates, show improvements in efficiency by 3-4 orders of
magnitude.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 02:09:40 GMT"
},
{
"version": "v2",
"created": "Sat, 3 Oct 2009 04:35:49 GMT"
},
{
"version": "v3",
"created": "Tue, 30 Apr 2013 06:37:28 GMT"
}
] | 2013-05-01T00:00:00 |
[
[
"Yamashita",
"Shigeru",
""
],
[
"Markov",
"Igor L.",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.ET",
"description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.",
"span": "(Emerging Technologies)"
}
] |
0909.4126
|
Yaming Yu
|
Yaming Yu
|
On an Inequality of Karlin and Rinott Concerning Weighted Sums of i.i.d.
Random Variables
|
<= 4 pages
|
Adv. in Appl. Probab. 40 (2008) 1223-1226
|
10.1239/aap/1231340171
| null |
cs.IT math.IT math.PR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an entropy comparison result concerning weighted sums of
independent and identically distributed random variables.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 03:14:47 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Yu",
"Yaming",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
}
] |
0909.4177
|
Tiangao Gou
|
Tiangao Gou, Syed A. Jafar, Chenwei Wang
|
On the Degrees of Freedom of Finite State Compound Wireless Networks -
Settling a Conjecture by Weingarten et. al
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We explore the degrees of freedom (DoF) of three classes of finite state
compound wireless networks in this paper. First, we study the multiple-input
single-output (MISO) finite state compound broadcast channel (BC) with
arbitrary number of users and antennas at the transmitter. In prior work,
Weingarten et. al. have found inner and outer bounds on the DoF with 2 users.
The bounds have a different character. While the inner bound collapses to unity
as the number of states increases, the outer bound does not diminish with the
increasing number of states beyond a threshold value. It has been conjectured
that the outer bound is loose and the inner bound represents the actual DoF. In
the complex setting (all signals, noise, and channel coefficients are complex
variables) we solve a few cases to find that the outer bound -and not the inner
bound- of Weingarten et. al. is tight. For the real setting (all signals, noise
and channel coefficients are real variables) we completely characterize the
DoF, once again proving that the outer bound of Weingarten et. al. is tight. We
also extend the results to arbitrary number of users. Second, we characterize
the DoF of finite state scalar (single antenna nodes) compound X networks with
arbitrary number of users in the real setting. Third, we characterize the DoF
of finite state scalar compound interference networks with arbitrary number of
users in both the real and complex setting. The key finding is that scalar
interference networks and (real) X networks do not lose any DoF due to channel
uncertainty at the transmitter in the finite state compound setting. The finite
state compound MISO BC does lose DoF relative to the perfect CSIT scenario.
However, what is lost is only the DoF benefit of joint processing at transmit
antennas, without which the MISO BC reduces to an X network.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 19:59:23 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Gou",
"Tiangao",
""
],
[
"Jafar",
"Syed A.",
""
],
[
"Wang",
"Chenwei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4196
|
R Doomun
|
Sabah S. Al-Fedaghi, Bernhard Thalheim
|
Personal Information Databases
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
Sabah S. Al-Fedaghi, Bernhard Thalheim, International Journal of
Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 11-20,
August 2009, USA
| null |
ISSN 1947 5500
|
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
One of the most important aspects of security organization is to establish a
framework to identify security significant points where policies and procedures
are declared. The (information) security infrastructure comprises entities,
processes, and technology. All are participants in handling information, which
is the item that needs to be protected. Privacy and security information
technology is a critical and unmet need in the management of personal
information. This paper proposes concepts and technologies for management of
personal information. Two different types of information can be distinguished:
personal information and nonpersonal information. Personal information can be
either personal identifiable information (PII), or nonidentifiable information
(NII). Security, policy, and technical requirements can be based on this
distinction. At the conceptual level, PII is defined and formalized by
propositions over infons (discrete pieces of information) that specify
transformations in PII and NII. PII is categorized into simple infons that
reflect the proprietor s aspects, relationships with objects, and relationships
with other proprietors. The proprietor is the identified person about whom the
information is communicated. The paper proposes a database organization that
focuses on the PII spheres of proprietors. At the design level, the paper
describes databases of personal identifiable information built exclusively for
this type of information, with their own conceptual scheme, system management,
and physical structure.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 12:55:26 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Al-Fedaghi",
"Sabah S.",
""
],
[
"Thalheim",
"Bernhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.4202
|
R Doomun
|
S Santhosh Baboo, Nikhil Lobo
|
Improving Effectiveness Of ELearning In Maintenance Using Interactive 3D
|
4 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
Lt.Dr.S Santhosh Baboo, Nikhil Lobo, International Journal of
Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 21-24,
August 2009, USA
| null |
ISSN 1947 5500
|
cs.CY cs.HC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In aerospace and defense, training is being carried out on the web by viewing
PowerPoint presentations, manuals and videos that are limited in their ability
to convey information to the technician. Interactive training in the form of 3D
is a more cost effective approach compared to creation of physical simulations
and mockups. This paper demonstrates how training using interactive 3D
simulations in elearning achieves a reduction in the time spent in training and
improves the efficiency of a trainee performing the installation or removal.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 13:17:10 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Baboo",
"S Santhosh",
""
],
[
"Lobo",
"Nikhil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
0909.4203
|
Amos Lapidoth
|
Young-Han Kim, Amos Lapidoth, and Tsachy Weissman
|
Error Exponents for the Gaussian Channel with Active Noisy Feedback
|
Submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the best exponential decay in the blocklength of the probability of
error that can be achieved in the transmission of a single bit over the
Gaussian channel with an active noisy Gaussian feedback link. We impose an
\emph{expected} block power constraint on the forward link and study both
\emph{almost-sure} and \emph{expected} block power constraints on the feedback
link. In both cases the best achievable error exponents are finite and grow
approximately proportionally to the larger between the signal-to-noise ratios
on the forward and feedback links. The error exponents under almost-sure block
power constraints are typically strictly smaller than under expected
constraints. Some of the results extend to communication at arbitrary rates
below capacity and to general discrete memoryless channels.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 13:19:56 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Kim",
"Young-Han",
""
],
[
"Lapidoth",
"Amos",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4224
|
Henning Fernau
|
Ljiljana Brankovic, Henning Fernau, Joachim Kneis, Dieter Kratsch
Alexander Langer Mathieu Liedloff Daniel Raible Peter Rossmanith
|
Breaking the 2^n-Barrier for Irredundance: A Parameterized Route to
Solving Exact Puzzles
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The lower and the upper irredundance numbers of a graph $G$, denoted $ir(G)$
and $IR(G)$ respectively, are conceptually linked to domination and
independence numbers and have numerous relations to other graph parameters. It
is a long-standing open question whether determining these numbers for a graph
$G$ on $n$ vertices admits exact algorithms running in time less than the
trivial $\Omega(2^n)$ enumeration barrier. We solve these open problems by
devising parameterized algorithms for the dual of the natural parameterizations
of the problems with running times faster than $O^*(4^{k})$. For example, we
present an algorithm running in time $O^*(3.069^{k})$ for determining whether
$IR(G)$ is at least $n-k$. Although the corresponding problem has been known to
be in FPT by kernelization techniques, this paper offers the first
parameterized algorithms with an exponential dependency on the parameter in the
running time. Additionally, our work also appears to be the first example of a
parameterized approach leading to a solution to a problem in exponential time
algorithmics where the natural interpretation as an exact exponential-time
algorithm fails.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 15:01:24 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Brankovic",
"Ljiljana",
""
],
[
"Fernau",
"Henning",
""
],
[
"Kneis",
"Joachim",
""
],
[
"Rossmanith",
"Dieter Kratsch Alexander Langer Mathieu Liedloff Daniel Raible Peter",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4233
|
Jacob Ziv
|
Jacob Ziv
|
On the optimality of universal classifiers for finite-length individual
test sequences
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider pairs of finite-length individual sequences that are realizations
of unknown, finite alphabet, stationary sources in a clas M of sources with
vanishing memory (e.g. stationary Markov sources).
The task of a universal classifier is to decide whether the two sequences are
emerging from the same source or are emerging from two distinct sources in M,
and it has to carry this task without any prior knowledge of the two underlying
probability measures.
Given a fidelity function and a fidelity criterion, the probability of
classification error for a given universal classifier is defined.
Two universal classifiers are defined for pairs of $N$ -sequence: A
"classical" fixed-length (FL) universal classifier and an alternative
variable-length (VL) universal classifier.
Following Wyner and Ziv (1996) it is demonstrated that if the length of the
individual sequences N is smaller than a cut-off value that is determined by
the properties of the class M, any universal classifier will fail with high
probability .
It is demonstrated that for values of N larger than the cut-off rate, the
classification error relative to either one of the two classifiers tends to
zero as the length of the sequences tends to infinity.
However, the probability of classification error that is associated with the
variable-length universal classifier is uniformly smaller (or equal) to the one
that is associated with the "classical" fixed-length universal classifier, for
any finite length.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 16:04:19 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Sep 2009 21:19:07 GMT"
},
{
"version": "v3",
"created": "Thu, 8 Oct 2009 14:03:44 GMT"
},
{
"version": "v4",
"created": "Fri, 16 Oct 2009 11:39:55 GMT"
},
{
"version": "v5",
"created": "Thu, 25 Nov 2010 11:16:18 GMT"
},
{
"version": "v6",
"created": "Mon, 4 Jul 2011 08:11:03 GMT"
},
{
"version": "v7",
"created": "Wed, 26 Oct 2011 19:28:55 GMT"
},
{
"version": "v8",
"created": "Mon, 7 Nov 2011 04:32:41 GMT"
}
] | 2011-11-08T00:00:00 |
[
[
"Ziv",
"Jacob",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4260
|
R Doomun
|
Olalekan S. Akinola, Adenike O. Osofisan
|
An Empirical Comparative Study of Checklist based and Ad Hoc Code
Reading Techniques in a Distributed Groupware Environment
|
11 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
Olalekan S. Akinola, and Adenike O. Osofisan, International
Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1,
pp. 25-35, September 2009, USA
| null |
ISSN 1947 5500
|
cs.OH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Software inspection is a necessary and important tool for software quality
assurance. Since it was introduced by Fagan at IBM in 1976, arguments exist as
to which method should be adopted to carry out the exercise, whether it should
be paper based or tool based, and what reading technique should be used on the
inspection document. Extensive works have been done to determine the
effectiveness of reviewers in paper based environment when using ad hoc and
checklist reading techniques. In this work, we take the software inspection
research further by examining whether there is going to be any significant
difference in defect detection effectiveness of reviewers when they use either
ad hoc or checklist reading techniques in a distributed groupware environment.
Twenty final year undergraduate students of computer science, divided into ad
hoc and checklist reviewers groups of ten members each were employed to inspect
a medium sized java code synchronously on groupware deployed on the Internet.
The data obtained were subjected to tests of hypotheses using independent T
test and correlation coefficients. Results from the study indicate that there
are no significant differences in the defect detection effectiveness, effort in
terms of time taken in minutes and false positives reported by the reviewers
using either ad hoc or checklist based reading techniques in the distributed
groupware environment studied.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 17:36:55 GMT"
},
{
"version": "v2",
"created": "Thu, 1 Oct 2009 18:34:21 GMT"
}
] | 2009-10-01T00:00:00 |
[
[
"Akinola",
"Olalekan S.",
""
],
[
"Osofisan",
"Adenike O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
0909.4275
|
Ilya Safro
|
Jie Chen and Ilya Safro
|
A Measure of the Connection Strengths between Graph Vertices with
Applications
| null | null | null | null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a simple iterative strategy for measuring the connection strength
between a pair of vertices in a graph. The method is attractive in that it has
a linear complexity and can be easily parallelized. Based on an analysis of the
convergence property, we propose a mutually reinforcing model to explain the
intuition behind the strategy. The practical effectiveness of this measure is
demonstrated through several combinatorial optimization problems on graphs and
hypergraphs.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 18:31:32 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Chen",
"Jie",
""
],
[
"Safro",
"Ilya",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4280
|
Laurent Romary
|
Harry Bunt, Laurent Romary (INRIA Lorraine - LORIA)
|
Towards Multimodal Content Representation
|
Colloque avec actes et comit\'e de lecture. internationale
|
LREC Workshop on International Standards of Terminology and
Language Resources Management, Las Palams : Spain (2002)
| null |
A02-R-095 || bunt02a
|
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multimodal interfaces, combining the use of speech, graphics, gestures, and
facial expressions in input and output, promise to provide new possibilities to
deal with information in more effective and efficient ways, supporting for
instance: - the understanding of possibly imprecise, partial or ambiguous
multimodal input; - the generation of coordinated, cohesive, and coherent
multimodal presentations; - the management of multimodal interaction (e.g.,
task completion, adapting the interface, error prevention) by representing and
exploiting models of the user, the domain, the task, the interactive context,
and the media (e.g. text, audio, video). The present document is intended to
support the discussion on multimodal content representation, its possible
objectives and basic constraints, and how the definition of a generic
representation framework for multimodal content representation may be
approached. It takes into account the results of the Dagstuhl workshop, in
particular those of the informal working group on multimodal meaning
representation that was active during the workshop (see
http://www.dfki.de/~wahlster/Dagstuhl_Multi_Modality, Working Group 4).
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 18:55:53 GMT"
}
] | 2009-09-24T00:00:00 |
[
[
"Bunt",
"Harry",
"",
"INRIA Lorraine - LORIA"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
0909.4314
|
David Spivak
|
David I. Spivak
|
Higher-dimensional models of networks
| null | null | null | null |
cs.NI cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Networks are often studied as graphs, where the vertices stand for entities
in the world and the edges stand for connections between them. While relatively
easy to study, graphs are often inadequate for modeling real-world situations,
especially those that include contexts of more than two entities. For these
situations, one typically uses hypergraphs or simplicial complexes.
In this paper, we provide a precise framework in which graphs, hypergraphs,
simplicial complexes, and many other categories, all of which model higher
graphs, can be studied side-by-side. We show how to transform a hypergraph into
its nearest simplicial analogue, for example. Our framework includes many new
categories as well, such as one that models broadcasting networks. We give
several examples and applications of these ideas.
|
[
{
"version": "v1",
"created": "Wed, 23 Sep 2009 20:37:20 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Spivak",
"David I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4341
|
Travis Gagie
|
Paolo Ferragina, Travis Gagie and Giovanni Manzini
|
Lightweight Data Indexing and Compression in External Memory
| null | null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we describe algorithms for computing the BWT and for building
(compressed) indexes in external memory. The innovative feature of our
algorithms is that they are lightweight in the sense that, for an input of size
$n$, they use only ${n}$ bits of disk working space while all previous
approaches use $\Th{n \log n}$ bits of disk working space. Moreover, our
algorithms access disk data only via sequential scans, thus they take full
advantage of modern disk features that make sequential disk accesses much
faster than random accesses.
We also present a scan-based algorithm for inverting the BWT that uses
$\Th{n}$ bits of working space, and a lightweight {\em internal-memory}
algorithm for computing the BWT which is the fastest in the literature when the
available working space is $\os{n}$ bits.
Finally, we prove {\em lower} bounds on the complexity of computing and
inverting the BWT via sequential scans in terms of the classic product:
internal-memory space $\times$ number of passes over the disk data.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 18:23:20 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Ferragina",
"Paolo",
""
],
[
"Gagie",
"Travis",
""
],
[
"Manzini",
"Giovanni",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4348
|
Jan Vondrak
|
Chandra Chekuri, Jan Vondrak, Rico Zenklusen
|
Dependent Randomized Rounding for Matroid Polytopes and Applications
|
Rico Zenklusen joined as an author; paper substantially expanded
compared to previous version; note a slight change in the title
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by several applications, we consider the problem of randomly
rounding a fractional solution in a matroid (base) polytope to an integral one.
We consider the pipage rounding technique and also present a new technique,
randomized swap rounding. Our main technical results are concentration bounds
for functions of random variables arising from these rounding techniques. We
prove Chernoff-type concentration bounds for linear functions of random
variables arising from both techniques, and also a lower-tail exponential bound
for monotone submodular functions of variables arising from randomized swap
rounding.
The following are examples of our applications: (1) We give a
(1-1/e-epsilon)-approximation algorithm for the problem of maximizing a
monotone submodular function subject to 1 matroid and k linear constraints, for
any constant k and epsilon>0. (2) We present a result on minimax packing
problems that involve a matroid base constraint. We give an O(log m / log log
m)-approximation for the general problem Min {lambda: x \in {0,1}^N, x \in
B(M), Ax <= lambda b}, where m is the number of packing constraints. (3) We
generalize the continuous greedy algorithm to problems involving multiple
submodular functions, and use it to find a (1-1/e-epsilon)-approximate pareto
set for the problem of maximizing a constant number of monotone submodular
functions subject to a matroid constraint. An example is the Submodular Welfare
Problem where we are looking for an approximate pareto set with respect to
individual players' utilities.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 17:03:10 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Nov 2009 23:26:04 GMT"
}
] | 2009-11-07T00:00:00 |
[
[
"Chekuri",
"Chandra",
""
],
[
"Vondrak",
"Jan",
""
],
[
"Zenklusen",
"Rico",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4349
|
Yilun Shang
|
Yilun Shang
|
Leader-following Consensus Problems with a Time-varying Leader under
Measurement Noises
|
12 pages 3 figures
| null | null | null |
cs.MA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we consider a leader-following consensus problem for networks
of continuous-time integrator agents with a time-varying leader under
measurement noises. We propose a neighbor-based state-estimation protocol for
every agent to track the leader, and time-varying consensus gains are
introduced to attenuate the noises. By combining the tools of stochastic
analysis and algebraic graph theory, we study mean square convergence of this
multi-agent system under directed fixed as well as switching interconnection
topologies. Sufficient conditions are given for mean square consensus in both
cases. Finally, a numerical example is given to illustrate our theoretical
results.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 02:05:06 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Shang",
"Yilun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4359
|
Yilun Wang
|
Yilun Wang and Wotao Yin
|
Sparse Signal Reconstruction via Iterative Support Detection
| null |
SIAM Journal on Imaging Sciences, 3(3), 462-491, 2010
|
10.1137/090772447
| null |
cs.IT math.IT math.NA math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a novel sparse signal reconstruction method "ISD", aiming to
achieve fast reconstruction and a reduced requirement on the number of
measurements compared to the classical l_1 minimization approach. ISD addresses
failed reconstructions of l_1 minimization due to insufficient measurements. It
estimates a support set I from a current reconstruction and obtains a new
reconstruction by solving the minimization problem \min{\sum_{i\not\in
I}|x_i|:Ax=b}, and it iterates these two steps for a small number of times. ISD
differs from the orthogonal matching pursuit (OMP) method, as well as its
variants, because (i) the index set I in ISD is not necessarily nested or
increasing and (ii) the minimization problem above updates all the components
of x at the same time. We generalize the Null Space Property to Truncated Null
Space Property and present our analysis of ISD based on the latter.
We introduce an efficient implementation of ISD, called threshold--ISD, for
recovering signals with fast decaying distributions of nonzeros from
compressive sensing measurements. Numerical experiments show that
threshold--ISD has significant advantages over the classical l_1 minimization
approach, as well as two state--of--the--art algorithms: the iterative
reweighted l_1 minimization algorithm (IRL1) and the iterative reweighted
least--squares algorithm (IRLS).
MATLAB code is available for download from
http://www.caam.rice.edu/~optimization/L1/ISD/.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 04:11:33 GMT"
},
{
"version": "v2",
"created": "Mon, 5 Jul 2010 19:32:39 GMT"
}
] | 2015-11-23T00:00:00 |
[
[
"Wang",
"Yilun",
""
],
[
"Yin",
"Wotao",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0909.4362
|
Heidi Gebauer
|
Heidi Gebauer
|
A Strategy for Maker in the Clique Game which Helps to Tackle some Open
Problems by Beck
|
12 pages, no figure
| null | null | null |
cs.GT cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study Maker/Breaker games on the edges of the complete graph, as
introduced by Chvatal and Erdos. We show that in the (m:b) clique game played
on K_{N}, the complete graph on N vertices, Maker can achieve a K_{q} for q =
(m/(log_{2}(b + 1)) - o(1)) * log N, which partially solves an open problem by
Beck. Moreover, we show that in the (1:1) clique game played on K_{N} for a
sufficiently large N, Maker can achieve a K_{q} in only 2^(2q/3) moves, which
improves the previous best bound and answers a question of Beck. Finally we
consider the so called tournament game. A tournament is a directed graph where
every pair of vertices is connected by a single directed edge. The tournament
game is played on K_{N}. At the beginning Breaker fixes an arbitrary tournament
T_{q} on q vertices. Maker and Breaker then alternately take turns at claiming
one unclaimed edge e and selecting one of the two possible orientations. Maker
wins if his graph contains a copy of the goal tournament T_{q}; otherwise
Breaker wins. We show that Maker wins the tournament game on K_{N} with q = (1
- o(1))*log_{2}(N) which supports the random graph intuition: the threshold for
q is asymptotically the same for the game played by two "clever'' players and
the game played by two ``random'' players.
This last result solves an open problem of Beck which he included in his list
of the seven most humiliating open problems.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 18:02:01 GMT"
},
{
"version": "v2",
"created": "Thu, 24 Sep 2009 23:49:49 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Gebauer",
"Heidi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4369
|
Bernard Mans
|
Paola Flocchini, Bernard Mans and Nicola Santoro
|
Exploration of Periodically Varying Graphs
|
22 pages. Shorter paper (10 pages) accepted at ISAAC 2009. ISAAC'09,
The 20th International Symposium on Algorithms and Computation, December
16-18, 2008, Hawaii, USA. Exploration of Periodically Varying Graphs, P.
Flocchini, B. Mans and N. Santoro, Springer-LNCS vol. 5878, accepted Aug.
2009, Y. Dong, D.-Z. Du, and O. Ibarra (Eds), to appear
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the computability and complexity of the exploration problem in a
class of highly dynamic graphs: periodically varying (PV) graphs, where the
edges exist only at some (unknown) times defined by the periodic movements of
carriers. These graphs naturally model highly dynamic infrastructure-less
networks such as public transports with fixed timetables, low earth orbiting
(LEO) satellite systems, security guards' tours, etc. We establish necessary
conditions for the problem to be solved. We also derive lower bounds on the
amount of time required in general, as well as for the PV graphs defined by
restricted classes of carriers movements: simple routes, and circular routes.
We then prove that the limitations on computability and complexity we have
established are indeed tight. In fact we prove that all necessary conditions
are also sufficient and all lower bounds on costs are tight. We do so
constructively presenting two worst case optimal solution algorithms, one for
anonymous systems, and one for those with distinct nodes ids. An added benefit
is that the algorithms are rather simple.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 06:01:25 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Flocchini",
"Paola",
""
],
[
"Mans",
"Bernard",
""
],
[
"Santoro",
"Nicola",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4385
|
Sebastian Bernhardsson
|
Sebastian Bernhardsson, Luis Enrique Correa da Rocha and Petter
Minnhagen
|
The meta book and size-dependent properties of written language
|
7 pages, 6 figures, 1 table
|
New J. Phys. 11 (2009) 123015
|
10.1088/1367-2630/11/12/123015
| null |
physics.soc-ph cs.CL physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Evidence is given for a systematic text-length dependence of the power-law
index gamma of a single book. The estimated gamma values are consistent with a
monotonic decrease from 2 to 1 with increasing length of a text. A direct
connection to an extended Heap's law is explored. The infinite book limit is,
as a consequence, proposed to be given by gamma = 1 instead of the value
gamma=2 expected if the Zipf's law was ubiquitously applicable. In addition we
explore the idea that the systematic text-length dependence can be described by
a meta book concept, which is an abstract representation reflecting the
word-frequency structure of a text. According to this concept the
word-frequency distribution of a text, with a certain length written by a
single author, has the same characteristics as a text of the same length pulled
out from an imaginary complete infinite corpus written by the same author.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 08:50:49 GMT"
}
] | 2009-12-10T00:00:00 |
[
[
"Bernhardsson",
"Sebastian",
""
],
[
"da Rocha",
"Luis Enrique Correa",
""
],
[
"Minnhagen",
"Petter",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0909.4409
|
Mohamed El-Zawawy
|
Mohamed A. El-Zawawy, Mohamed E. El-Sharkawi
|
Clustering with Obstacles in Spatial Databases
|
In Proc. 2001 IEEE Int. Symposium of Signal Processing and
Information Technology (ISSPIT01), pages 420-425, Cairo, Egypt, Dec. 2001
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Clustering large spatial databases is an important problem, which tries to
find the densely populated regions in a spatial area to be used in data mining,
knowledge discovery, or efficient information retrieval. However most
algorithms have ignored the fact that physical obstacles such as rivers, lakes,
and highways exist in the real world and could thus affect the result of the
clustering. In this paper, we propose CPO, an efficient clustering technique to
solve the problem of clustering in the presence of obstacles. The proposed
algorithm divides the spatial area into rectangular cells. Each cell is
associated with statistical information used to label the cell as dense or
non-dense. It also labels each cell as obstructed (i.e. intersects any
obstacle) or nonobstructed. For each obstructed cell, the algorithm finds a
number of non-obstructed sub-cells. Then it finds the dense regions of
non-obstructed cells or sub-cells by a breadthfirst search as the required
clusters with a center to each region.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 10:52:58 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"El-Zawawy",
"Mohamed A.",
""
],
[
"El-Sharkawi",
"Mohamed E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.4412
|
Mohamed El-Zawawy
|
Mohamed E. El-Sharkawi, Mohamed A. El-Zawawy
|
Algorithm for Spatial Clustering with Obstacles
|
In Proc. 2002 ICICIS Int. Conference on Intelligent Computing and
Information Systems (ICICIS02), Cairo, Egypt, June 2002
| null | null | null |
cs.DB
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper, we propose an efficient clustering technique to solve the
problem of clustering in the presence of obstacles. The proposed algorithm
divides the spatial area into rectangular cells. Each cell is associated with
statistical information that enables us to label the cell as dense or
non-dense. We also label each cell as obstructed (i.e. intersects any obstacle)
or non-obstructed. Then the algorithm finds the regions (clusters) of
connected, dense, non-obstructed cells. Finally, the algorithm finds a center
for each such region and returns those centers as centers of the relatively
dense regions (clusters) in the spatial area.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 11:09:15 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"El-Sharkawi",
"Mohamed E.",
""
],
[
"El-Zawawy",
"Mohamed A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
0909.4416
|
Magnus Boman
|
Olof Gornerup, Magnus Boman
|
A baseline for content-based blog classification
|
6 pages, 4 figures New version has higher resolution for figures 2
and 3
| null | null | null |
cs.IR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A content-based network representation of web logs (blogs) using a basic
word-overlap similarity measure is presented. Due to a strong signal in blog
data the approach is sufficient for accurately classifying blogs. Using Swedish
blog data we demonstrate that blogs that treat similar subjects are organized
in clusters that, in turn, are hierarchically organized in higher-order
clusters. The simplicity of the representation renders it both computationally
tractable and transparent. We therefore argue that the approach is suitable as
a baseline when developing and analyzing more advanced content-based
representations of the blogosphere.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 12:27:02 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Sep 2009 14:17:26 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Gornerup",
"Olof",
""
],
[
"Boman",
"Magnus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
}
] |
0909.4437
|
Toby Walsh
|
Maria Pini, Francesca Rossi, Brent Venable and Toby Walsh
|
Manipulation and gender neutrality in stable marriage procedures
|
8th International Joint Conference on Autonomous Agents and
Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 1
| null | null | null |
cs.AI cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The stable marriage problem is a well-known problem of matching men to women
so that no man and woman who are not married to each other both prefer each
other. Such a problem has a wide variety of practical applications ranging from
matching resident doctors to hospitals to matching students to schools. A
well-known algorithm to solve this problem is the Gale-Shapley algorithm, which
runs in polynomial time.
It has been proven that stable marriage procedures can always be manipulated.
Whilst the Gale-Shapley algorithm is computationally easy to manipulate, we
prove that there exist stable marriage procedures which are NP-hard to
manipulate. We also consider the relationship between voting theory and stable
marriage procedures, showing that voting rules which are NP-hard to manipulate
can be used to define stable marriage procedures which are themselves NP-hard
to manipulate. Finally, we consider the issue that stable marriage procedures
like Gale-Shapley favour one gender over the other, and we show how to use
voting rules to make any stable marriage procedure gender neutral.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 13:26:38 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Pini",
"Maria",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"Brent",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.4441
|
Toby Walsh
|
Maria Pini, Francesca Rossi, Brent Venable and Toby Walsh
|
Dealing with incomplete agents' preferences and an uncertain agenda in
group decision making via sequential majority voting
|
Principles of Knowledge Representation and Reasoning: Proceedings of
the Eleventh International Conference, KR 2008, Sydney, Australia, September
16-19, 2008
| null | null | null |
cs.AI cs.GT cs.MA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider multi-agent systems where agents' preferences are aggregated via
sequential majority voting: each decision is taken by performing a sequence of
pairwise comparisons where each comparison is a weighted majority vote among
the agents. Incompleteness in the agents' preferences is common in many
real-life settings due to privacy issues or an ongoing elicitation process. In
addition, there may be uncertainty about how the preferences are aggregated.
For example, the agenda (a tree whose leaves are labelled with the decisions
being compared) may not yet be known or fixed. We therefore study how to
determine collectively optimal decisions (also called winners) when preferences
may be incomplete, and when the agenda may be uncertain. We show that it is
computationally easy to determine if a candidate decision always wins, or may
win, whatever the agenda. On the other hand, it is computationally hard to know
wheth er a candidate decision wins in at least one agenda for at least one
completion of the agents' preferences. These results hold even if the agenda
must be balanced so that each candidate decision faces the same number of
majority votes. Such results are useful for reasoning about preference
elicitation. They help understand the complexity of tasks such as determining
if a decision can be taken collectively, as well as knowing if the winner can
be manipulated by appropriately ordering the agenda.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 13:41:53 GMT"
}
] | 2012-04-18T00:00:00 |
[
[
"Pini",
"Maria",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"Brent",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.MA",
"description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.",
"span": "(Multiagent Systems)"
}
] |
0909.4446
|
Toby Walsh
|
Mirco Gelain, Maria Pini, Francesca Rossi, Brent Venable and Toby
Walsh
|
Elicitation strategies for fuzzy constraint problems with missing
preferences: algorithms and experimental studies
|
Principles and Practice of Constraint Programming, 14th International
Conference, CP 2008, Sydney, Australia, September 14-18, 2008. Proceedings
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Fuzzy constraints are a popular approach to handle preferences and
over-constrained problems in scenarios where one needs to be cautious, such as
in medical or space applications. We consider here fuzzy constraint problems
where some of the preferences may be missing. This models, for example,
settings where agents are distributed and have privacy issues, or where there
is an ongoing preference elicitation process. In this setting, we study how to
find a solution which is optimal irrespective of the missing preferences. In
the process of finding such a solution, we may elicit preferences from the user
if necessary. However, our goal is to ask the user as little as possible. We
define a combined solving and preference elicitation scheme with a large number
of different instantiations, each corresponding to a concrete algorithm which
we compare experimentally. We compute both the number of elicited preferences
and the "user effort", which may be larger, as it contains all the preference
values the user has to compute to be able to respond to the elicitation
requests. While the number of elicited preferences is important when the
concern is to communicate as little information as possible, the user effort
measures also the hidden work the user has to do to be able to communicate the
elicited preferences. Our experimental results show that some of our algorithms
are very good at finding a necessarily optimal solution while asking the user
for only a very small fraction of the missing preferences. The user effort is
also very small for the best algorithms. Finally, we test these algorithms on
hard constraint problems with possibly missing constraints, where the aim is to
find feasible solutions irrespective of the missing constraints.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 13:54:38 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Gelain",
"Mirco",
""
],
[
"Pini",
"Maria",
""
],
[
"Rossi",
"Francesca",
""
],
[
"Venable",
"Brent",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.4452
|
Toby Walsh
|
Michael J. Maher and Nina Narodytska and Claude-Guy Quimper and Toby
Walsh
|
Flow-Based Propagators for the SEQUENCE and Related Global Constraints
|
Principles and Practice of Constraint Programming, 14th International
Conference, CP 2008, Sydney, Australia, September 14-18, 2008. Proceedings
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We propose new filtering algorithms for the SEQUENCE constraint and some
extensions of the SEQUENCE constraint based on network flows. We enforce domain
consistency on the SEQUENCE constraint in $O(n^2)$ time down a branch of the
search tree. This improves upon the best existing domain consistency algorithm
by a factor of $O(\log n)$. The flows used in these algorithms are derived from
a linear program. Some of them differ from the flows used to propagate global
constraints like GCC since the domains of the variables are encoded as costs on
the edges rather than capacities. Such flows are efficient for maintaining
bounds consistency over large domains and may be useful for other global
constraints.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 14:05:14 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Maher",
"Michael J.",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Quimper",
"Claude-Guy",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.4456
|
Toby Walsh
|
George Katsirelos and Nina Narodytska and Toby Walsh
|
The Weighted CFG Constraint
|
Integration of AI and OR Techniques in Constraint Programming for
Combinatorial Optimization Problems, 5th International Conference, CPAIOR
2008, Paris, France, May 20-23, 2008, Proceedings
| null | null | null |
cs.AI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the weighted CFG constraint and propose a propagation algorithm
that enforces domain consistency in $O(n^3|G|)$ time. We show that this
algorithm can be decomposed into a set of primitive arithmetic constraints
without hindering propagation.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 14:17:40 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Katsirelos",
"George",
""
],
[
"Narodytska",
"Nina",
""
],
[
"Walsh",
"Toby",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
0909.4457
|
Loet Leydesdorff
|
Loet Leydesdorff
|
How are new citation-based journal indicators adding to the bibliometric
toolbox?
| null |
Journal of the American Society for Information Science and
Technology 60(7) (2009) 1327-1336
| null | null |
physics.soc-ph cs.DL physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The launching of Scopus and Google Scholar, and methodological developments
in Social Network Analysis have made many more indicators for evaluating
journals available than the traditional Impact Factor, Cited Half-life, and
Immediacy Index of the ISI. In this study, these new indicators are compared
with one another and with the older ones. Do the various indicators measure new
dimensions of the citation networks, or are they highly correlated among them?
Are they robust and relatively stable over time? Two main dimensions are
distinguished -- size and impact -- which together shape influence. The H-index
combines the two dimensions and can also be considered as an indicator of reach
(like Indegree). PageRank is mainly an indicator of size, but has important
interactions with centrality measures. The Scimago Journal Ranking (SJR)
indicator provides an alternative to the Journal Impact Factor, but the
computation is less easy.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 14:18:02 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Leydesdorff",
"Loet",
""
]
] |
[
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
},
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0909.4474
|
Blaise Faugeras
|
Jacques Blum (JAD), Cedric Boulbe (JAD), Blaise Faugeras (JAD)
|
Reconstruction of the equilibrium of the plasma in a Tokamak and
identification of the current density profile in real time
| null | null | null | null |
math.NA cs.SY math.AP math.OC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The reconstruction of the equilibrium of a plasma in a Tokamak is a free
boundary problem described by the Grad-Shafranov equation in axisymmetric
configuration. The right-hand side of this equation is a nonlinear source,
which represents the toroidal component of the plasma current density. This
paper deals with the identification of this nonlinearity source from
experimental measurements in real time. The proposed method is based on a fixed
point algorithm, a finite element resolution, a reduced basis method and a
least-square optimization formulation. This is implemented in a software called
Equinox with which several numerical experiments are conducted to explore the
identification problem. It is shown that the identification of the profile of
the averaged current density and of the safety factor as a function of the
poloidal flux is very robust.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 14:59:43 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Dec 2010 08:14:20 GMT"
},
{
"version": "v3",
"created": "Thu, 17 Mar 2011 17:18:06 GMT"
}
] | 2011-03-18T00:00:00 |
[
[
"Blum",
"Jacques",
"",
"JAD"
],
[
"Boulbe",
"Cedric",
"",
"JAD"
],
[
"Faugeras",
"Blaise",
"",
"JAD"
]
] |
[
{
"class": "Mathematics",
"code": "math.NA",
"description": "Numerical algorithms for problems in analysis and algebra, scientific computation",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.SY",
"description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.",
"span": "(Systems and Control)"
},
{
"class": "Mathematics",
"code": "math.AP",
"description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics",
"span": "(Analysis of PDEs)"
},
{
"class": "Mathematics",
"code": "math.OC",
"description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory",
"span": "(Optimization and Control)"
}
] |
0909.4479
|
Simon Perdrix
|
Elham Kashefi, Damian Markham, Mehdi Mhalla, Simon Perdrix
|
Information Flow in Secret Sharing Protocols
| null |
EPTCS 9, 2009, pp. 87-97
|
10.4204/EPTCS.9.10
| null |
quant-ph cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The entangled graph states have emerged as an elegant and powerful quantum
resource, indeed almost all multiparty protocols can be written in terms of
graph states including measurement based quantum computation (MBQC), error
correction and secret sharing amongst others. In addition they are at the
forefront in terms of implementations. As such they represent an excellent
opportunity to move towards integrated protocols involving many of these
elements. In this paper we look at expressing and extending graph state secret
sharing and MBQC in a common framework and graphical language related to flow.
We do so with two main contributions.
First we express in entirely graphical terms which set of players can access
which information in graph state secret sharing protocols. These succinct
graphical descriptions of access allow us to take known results from graph
theory to make statements on the generalisation of the previous schemes to
present new secret sharing protocols.
Second, we give a set of necessary conditions as to when a graph with flow,
i.e. capable of performing a class of unitary operations, can be extended to
include vertices which can be ignored, pointless measurements, and hence
considered as unauthorised players in terms of secret sharing, or error qubits
in terms of fault tolerance. This offers a way to extend existing MBQC patterns
to secret sharing protocols. Our characterisation of pointless measurements is
believed also to be a useful tool for further integrated measurement based
schemes, for example in constructing fault tolerant MBQC schemes.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 15:25:34 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2009 00:06:12 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Kashefi",
"Elham",
""
],
[
"Markham",
"Damian",
""
],
[
"Mhalla",
"Mehdi",
""
],
[
"Perdrix",
"Simon",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.4484
|
Walid Hachem
|
Walid Hachem, Eric Moulines, Francois Roueff
|
Error exponents for Neyman-Pearson detection of a continuous-time
Gaussian Markov process from noisy irregular samples
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper addresses the detection of a stochastic process in noise from
irregular samples. We consider two hypotheses. The \emph{noise only} hypothesis
amounts to model the observations as a sample of a i.i.d. Gaussian random
variables (noise only). The \emph{signal plus noise} hypothesis models the
observations as the samples of a continuous time stationary Gaussian process
(the signal) taken at known but random time-instants corrupted with an additive
noise. Two binary tests are considered, depending on which assumptions is
retained as the null hypothesis. Assuming that the signal is a linear
combination of the solution of a multidimensional stochastic differential
equation (SDE), it is shown that the minimum Type II error probability
decreases exponentially in the number of samples when the False Alarm
probability is fixed. This behavior is described by \emph{error exponents} that
are completely characterized. It turns out that they are related with the
asymptotic behavior of the Kalman Filter in random stationary environment,
which is studied in this paper. Finally, numerical illustrations of our claims
are provided in the context of sensor networks.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 16:00:41 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Hachem",
"Walid",
""
],
[
"Moulines",
"Eric",
""
],
[
"Roueff",
"Francois",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4516
|
Jos\'e I. Orlicki
|
Jos\'e I. Orlicki
|
SQL/JavaScript Hybrid Worms As Two-stage Quines
|
15 pages, 11 figures, Workshop de Seguridad Informatica, 38 JAIIO,
Mar Del Plata, Argentina
| null | null | null |
cs.CR cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Delving into present trends and anticipating future malware trends, a hybrid,
SQL on the server-side, JavaScript on the client-side, self-replicating worm
based on two-stage quines was designed and implemented on an ad-hoc scenario
instantiating a very common software pattern. The proof of concept code
combines techniques seen in the wild, in the form of SQL injections leading to
cross-site scripting JavaScript inclusion, and seen in the laboratory, in the
form of SQL quines propa- gated via RFIDs, resulting in a hybrid code
injection. General features of hybrid worms are also discussed.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 18:47:17 GMT"
}
] | 2009-09-25T00:00:00 |
[
[
"Orlicki",
"José I.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.4569
|
Amiram Wingarten
|
Amos Fiat, Amiram Wingarten
|
Envy, Multi Envy, and Revenue Maximization
| null | null | null | null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the envy free pricing problem faced by a seller who wishes to
maximize revenue by setting prices for bundles of items. If there is an
unlimited supply of items and agents are single minded then we show that
finding the revenue maximizing envy free allocation/pricing can be solved in
polynomial time by reducing it to an instance of weighted independent set on a
perfect graph.
We define an allocation/pricing as \textit{multi envy free} if no agent
wishes to replace her allocation with the union of the allocations of some set
of other agents and her price with the sum of their prices. We show that it is
\textit{coNP}-hard to decide if a given allocation/pricing is multi envy free.
We also show that revenue maximization multi envy free allocation/pricing is
\textit{APX} hard.
Furthermore, we give efficient algorithms and hardness results for various
variants of the highway problem.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 22:30:39 GMT"
}
] | 2016-09-08T00:00:00 |
[
[
"Fiat",
"Amos",
""
],
[
"Wingarten",
"Amiram",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.4573
|
Chris Ng
|
Chris T. K. Ng and Howard Huang
|
Efficient Linear Precoding in Downlink Cooperative Cellular Networks
with Soft Interference Nulling
|
To appear at the Forty-Seventh Annual Allerton Conference on
Communication, Control, and Computing, September 30 - October 2, 2009,
Monticello, Illinois
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A simple line network model is proposed to study the downlink cellular
network. Without base station cooperation, the system is interference-limited.
The interference limitation is overcome when the base stations are allowed to
jointly encode the user signals, but the capacity-achieving dirty paper coding
scheme can be too complex for practical implementation. A new linear precoding
technique called soft interference nulling (SIN) is proposed, which performs at
least as well as zero-forcing (ZF) beamforming under full network coordination.
Unlike ZF, SIN allows the possibility of but over-penalizes interference. The
SIN precoder is computed by solving a convex optimization problem, and the
formulation is extended to multiple-antenna channels. SIN can be applied when
only a limited number of base stations cooperate; it is shown that SIN under
partial network coordination can outperform full network coordination ZF at
moderate SNRs.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 23:28:25 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Ng",
"Chris T. K.",
""
],
[
"Huang",
"Howard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4575
|
Narasimha Shashidhar
|
Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar
|
Randomness Efficient Steganography
|
19 pages
| null | null | null |
cs.CR cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Steganographic protocols enable one to embed covert messages into
inconspicuous data over a public communication channel in such a way that no
one, aside from the sender and the intended receiver, can even detect the
presence of the secret message. In this paper, we provide a new
provably-secure, private-key steganographic encryption protocol secure in the
framework of Hopper et al. We first present a "one-time stegosystem" that
allows two parties to transmit messages of length at most that of the shared
key with information-theoretic security guarantees. The employment of a
pseudorandom generator (PRG) permits secure transmission of longer messages in
the same way that such a generator allows the use of one-time pad encryption
for messages longer than the key in symmetric encryption. The advantage of our
construction, compared to all previous work is randomness efficiency: in the
information theoretic setting our protocol embeds a message of length n bits
using a shared secret key of length (1+o(1))n bits while achieving security
2^{-n/log^{O(1)}n}; simply put this gives a rate of key over message that is 1
as n tends to infinity (the previous best result achieved a constant rate
greater than 1 regardless of the security offered). In this sense, our protocol
is the first truly randomness efficient steganographic system. Furthermore, in
our protocol, we can permit a portion of the shared secret key to be public
while retaining precisely n private key bits. In this setting, by separating
the public and the private randomness of the shared key, we achieve security of
2^{-n}. Our result comes as an effect of the application of randomness
extractors to stegosystem design. To the best of our knowledge this is the
first time extractors have been applied in steganography.
|
[
{
"version": "v1",
"created": "Thu, 24 Sep 2009 23:47:05 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Feb 2012 17:43:49 GMT"
}
] | 2012-02-06T00:00:00 |
[
[
"Kiayias",
"Aggelos",
""
],
[
"Russell",
"Alexander",
""
],
[
"Shashidhar",
"Narasimha",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4588
|
Marcus Hutter
|
Marcus Hutter
|
Discrete MDL Predicts in Total Variation
|
15 LaTeX pages
|
Advances in Neural Information Processing Systems 22 (NIPS 2009)
pages 817-825
| null | null |
math.PR cs.IT cs.LG math.IT math.ST stat.ML stat.TH
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The Minimum Description Length (MDL) principle selects the model that has the
shortest code for data plus model. We show that for a countable class of
models, MDL predictions are close to the true distribution in a strong sense.
The result is completely general. No independence, ergodicity, stationarity,
identifiability, or other assumption on the model class need to be made. More
formally, we show that for any countable class of models, the distributions
selected by MDL (or MAP) asymptotically predict (merge with) the true measure
in the class in total variation distance. Implications for non-i.i.d. domains
like time-series forecasting, discriminative learning, and reinforcement
learning are discussed.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 02:57:17 GMT"
}
] | 2010-12-30T00:00:00 |
[
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Statistics",
"code": "stat.ML",
"description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding",
"span": "(Machine Learning)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
0909.4589
|
Kai Cai
|
Kai Cai, Rongquan Feng, and Zhiming Zheng
|
Cross-correlation properties of cyclotomic sequences
| null |
This paper have been published in IEICE Trans. Fund., 2007
| null | null |
cs.IT cs.DM math.CO math.IT
|
http://creativecommons.org/licenses/publicdomain/
|
Sequences with good correlation properties are widely used in engineering
applications, especially in the area of communications. Among the known
sequences, cyclotomic families have the optimal autocorrelation property. In
this paper, we decide the cross-correlation function of the known cyclotomic
sequences completely. Moreover, to get our results, the relations between the
multiplier group and the decimations of the characteristic sequence are also
established for an arbitrary difference set.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 02:57:51 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Cai",
"Kai",
""
],
[
"Feng",
"Rongquan",
""
],
[
"Zheng",
"Zhiming",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4592
|
Kai Cai
|
Kai Cai
|
Autocorrelation-Run Formula for Binary Sequences
|
18 pages, 1 figure
| null | null | null |
cs.IT cs.DM math.CO math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The autocorrelation function and the run structure are two basic notions for
binary sequences, and have been used as two independent postulates to test
randomness of binary sequences ever since Golomb 1955. In this paper, we prove
for binary sequence that the autocorrelation function is in fact completely
determined by its run structure.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 03:16:07 GMT"
},
{
"version": "v2",
"created": "Sun, 22 Aug 2010 08:05:03 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Cai",
"Kai",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4601
|
Ning Chen
|
Ning Chen, Zhiyuan Yan, Maximilien Gadouleau, Ying Wang, and Bruce W.
Suter
|
Rank Metric Decoder Architectures for Random Linear Network Coding with
Error Control
|
14 pages, 12 figures, accepted by IEEE Trans. VLSI Syst
| null |
10.1109/TVLSI.2010.2096239
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
While random linear network coding is a powerful tool for disseminating
information in communication networks, it is highly susceptible to errors
caused by various sources. Due to error propagation, errors greatly deteriorate
the throughput of network coding and seriously undermine both reliability and
security of data. Hence error control for network coding is vital. Recently,
constant-dimension codes (CDCs), especially K\"otter-Kschischang (KK) codes,
have been proposed for error control in random linear network coding. KK codes
can also be constructed from Gabidulin codes, an important class of rank metric
codes. Rank metric decoders have been recently proposed for both Gabidulin and
KK codes, but they have high computational complexities. Furthermore, it is not
clear whether such decoders are feasible and suitable for hardware
implementations. In this paper, we reduce the complexities of rank metric
decoders and propose novel decoder architectures for both codes. The synthesis
results of our decoder architectures for Gabidulin and KK codes with limited
error-correcting capabilities over small fields show that our architectures not
only are affordable, but also achieve high throughput.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 04:20:29 GMT"
},
{
"version": "v2",
"created": "Wed, 14 Jul 2010 05:35:45 GMT"
},
{
"version": "v3",
"created": "Sat, 22 Jan 2011 06:46:46 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Chen",
"Ning",
""
],
[
"Yan",
"Zhiyuan",
""
],
[
"Gadouleau",
"Maximilien",
""
],
[
"Wang",
"Ying",
""
],
[
"Suter",
"Bruce W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4603
|
James Petterson
|
James Petterson, Tiberio Caetano
|
Scalable Inference for Latent Dirichlet Allocation
| null | null | null | null |
cs.LG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We investigate the problem of learning a topic model - the well-known Latent
Dirichlet Allocation - in a distributed manner, using a cluster of C processors
and dividing the corpus to be learned equally among them. We propose a simple
approximated method that can be tuned, trading speed for accuracy according to
the task at hand. Our approach is asynchronous, and therefore suitable for
clusters of heterogenous machines.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 05:23:33 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Petterson",
"James",
""
],
[
"Caetano",
"Tiberio",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
0909.4604
|
Akbar Ghasemi
|
Akbar Ghasemi, Abolfazl Seyed Motahari, and Amir Keyvan Khandani
|
Interference Alignment for the $K$ User MIMO Interference Channel
|
25 pages, 4 figures, Presented in part at ISIT 2010, submitted to
IEEE Transactions on Information Theory, June 2011
| null |
10.1109/ISIT.2010.5513347
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the $K$-user Multiple Input Multiple Output (MIMO) Gaussian
interference channel with $M$ antennas at each transmitter and $N$ antennas at
each receiver. It is assumed that channel coefficients are constant and are
available at all transmitters and at all receivers. The main objective of this
paper is to characterize the Degrees of Freedom (DoF) for this channel. Using a
new interference alignment technique which has been recently introduced in
\cite{abolfazl-final}, we show that $\frac{MN}{M+N} K$ degrees of freedom can
be achieved for almost all channel realizations. Also, a new upper-bound on the
DoF of this channel is provided. This upper-bound coincides with our achievable
DoF for $K\geq K_u\define\frac{M+N}{\gcd(M,N)}$, where $\gcd(M,N)$ denotes the
greatest common divisor of $M$ and $N$. This gives an exact characterization of
DoF for $M\times N$ MIMO Gaussian interference channel in the case of $K\geq
K_u$.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 18:57:37 GMT"
},
{
"version": "v2",
"created": "Wed, 21 Sep 2011 21:47:24 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Ghasemi",
"Akbar",
""
],
[
"Motahari",
"Abolfazl Seyed",
""
],
[
"Khandani",
"Amir Keyvan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4607
|
Troy Lee
|
Troy Lee
|
A note on the sign degree of formulas
|
7 pages
| null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Recent breakthroughs in quantum query complexity have shown that any formula
of size n can be evaluated with O(sqrt(n)log(n)/log log(n)) many quantum
queries in the bounded-error setting [FGG08, ACRSZ07, RS08b, Rei09]. In
particular, this gives an upper bound on the approximate polynomial degree of
formulas of the same magnitude, as approximate polynomial degree is a lower
bound on quantum query complexity [BBCMW01].
These results essentially answer in the affirmative a conjecture of O'Donnell
and Servedio [O'DS03] that the sign degree--the minimal degree of a polynomial
that agrees in sign with a function on the Boolean cube--of every formula of
size n is O(sqrt(n)).
In this note, we show that sign degree is super-multiplicative under function
composition. Combining this result with the above mentioned upper bounds on the
quantum query complexity of formulas allows the removal of logarithmic factors
to show that the sign degree of every size n formula is at most sqrt(n).
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 05:26:07 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Lee",
"Troy",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.4637
|
Norbert Schirmer
|
Ernie Cohen and Norbert Schirmer
|
A Better Reduction Theorem for Store Buffers
| null | null | null | null |
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
When verifying a concurrent program, it is usual to assume that memory is
sequentially consistent. However, most modern multiprocessors depend on store
buffering for efficiency, and provide native sequential consistency only at a
substantial performance penalty. To regain sequential consistency, a programmer
has to follow an appropriate programming discipline. However, na\"ive
disciplines, such as protecting all shared accesses with locks, are not
flexible enough for building high-performance multiprocessor software.
We present a new discipline for concurrent programming under TSO (total store
order, with store buffer forwarding). It does not depend on concurrency
primitives, such as locks. Instead, threads use ghost operations to acquire and
release ownership of memory addresses. A thread can write to an address only if
no other thread owns it, and can read from an address only if it owns it or it
is shared and the thread has flushed its store buffer since it last wrote to an
address it did not own. This discipline covers both coarse-grained concurrency
(where data is protected by locks) as well as fine-grained concurrency (where
atomic operations race to memory).
We formalize this discipline in Isabelle/HOL, and prove that if every
execution of a program in a system without store buffers follows the
discipline, then every execution of the program with store buffers is
sequentially consistent. Thus, we can show sequential consistency under TSO by
ordinary assertional reasoning about the program, without having to consider
store buffers at all.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 08:45:19 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Cohen",
"Ernie",
""
],
[
"Schirmer",
"Norbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.4642
|
Marc Scherfenberg
|
Christian Knauer, Maarten L\"offler, Marc Scherfenberg, Thomas Wolle
|
The directed Hausdorff distance between imprecise point sets
| null | null | null | null |
cs.CG
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the directed Hausdorff distance between point sets in the plane,
where one or both point sets consist of imprecise points. An imprecise point is
modelled by a disc given by its centre and a radius. The actual position of an
imprecise point may be anywhere within its disc. Due to the direction of the
Hausdorff Distance and whether its tight upper or lower bound is computed there
are several cases to consider. For every case we either show that the
computation is NP-hard or we present an algorithm with a polynomial running
time. Further we give several approximation algorithms for the hard cases and
show that one of them cannot be approximated better than with factor 3, unless
P=NP.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 15:25:25 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Knauer",
"Christian",
""
],
[
"Löffler",
"Maarten",
""
],
[
"Scherfenberg",
"Marc",
""
],
[
"Wolle",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
0909.4686
|
Haralampos Tsaknakis
|
Haralampos Tsaknakis and Paul G. Spirakis
|
A Graph Spectral Approach for Computing Approximate Nash Equilibria
|
14 pages
| null | null | null |
cs.GT cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present a new methodology for computing approximate Nash equilibria for
two-person non-cooperative games based upon certain extensions and
specializations of an existing optimization approach previously used for the
derivation of fixed approximations for this problem. In particular, the general
two-person problem is reduced to an indefinite quadratic programming problem of
special structure involving the $n \times n$ adjacency matrix of an induced
simple graph specified by the input data of the game, where $n$ is the number
of players' strategies. Using this methodology and exploiting certain
properties of the positive part of the spectrum of the induced graph, we show
that for any $\varepsilon > 0$ there is an algorithm to compute an
$\varepsilon$-approximate Nash equilibrium in time $n^{\xi(m)/\varepsilon}$,
where, $\xi (m) = \sum_{i=1}^m \lambda_i / n$ and $\lambda_1, \lambda_2, >...,
\lambda_m$ are the positive eigenvalues of the adjacency matrix of the graph.
For classes of games for which $\xi (m)$ is a constant, there is a PTAS. Based
on the best upper bound derived for $\xi(m)$ so far, the worst case complexity
of the method is bounded by the subexponential $n^{\sqrt{m}/\varepsilon}$.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 12:58:59 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Tsaknakis",
"Haralampos",
""
],
[
"Spirakis",
"Paul G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4692
|
Frederic Dorn Harald
|
Frederic Dorn
|
Planar Subgraph Isomorphism Revisited
|
13 pages, 4 figures
| null | null | null |
cs.DS cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The problem of Subgraph Isomorphism is defined as follows: Given a pattern H
and a host graph G on n vertices, does G contain a subgraph that is isomorphic
to H? Eppstein [SODA 95, J'GAA 99] gives the first linear time algorithm for
subgraph isomorphism for a fixed-size pattern, say of order k, and arbitrary
planar host graph, improving upon the O(n^\sqrt{k})-time algorithm when using
the ``Color-coding'' technique of Alon et al [J'ACM 95]. Eppstein's algorithm
runs in time k^O(k) n, that is, the dependency on k is superexponential. We
solve an open problem posed in Eppstein's paper and improve the running time to
2^O(k) n, that is, single exponential in k while keeping the term in n linear.
Next to deciding subgraph isomorphism, we can construct a solution and
enumerate all solutions in the same asymptotic running time. We may list w
subgraphs with an additive term O(w k) in the running time of our algorithm. We
introduce the technique of "embedded dynamic programming" on a suitably
structured graph decomposition, which exploits the topology of the underlying
embeddings of the subgraph pattern (rather than of the host graph). To achieve
our results, we give an upper bound on the number of partial solutions in each
dynamic programming step as a function of pattern size--as it turns out, for
the planar subgraph isomorphism problem, that function is single exponential in
the number of vertices in the pattern.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 13:15:31 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Dorn",
"Frederic",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4719
|
Chinh Hoang
|
Elaine M. Eschen, Chinh T. Hoang, Jeremy P. Spinrad, R. Sritharan
|
On graphs without a C4 or a diamond
| null | null | null | null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the class of (C4, diamond)-free graphs; graphs in this class do
not contain a C4 or a diamond as an induced subgraph. We provide an efficient
recognition algorithm for this class. We count the number of maximal cliques in
a (C4, diamond)-free graph and the number of n-vertex, labeled (C4,
diamond)-free graphs. We also give an efficient algorithm for finding a largest
clique in the more general class of (house, diamond)-free graphs.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 15:14:46 GMT"
}
] | 2009-09-28T00:00:00 |
[
[
"Eschen",
"Elaine M.",
""
],
[
"Hoang",
"Chinh T.",
""
],
[
"Spinrad",
"Jeremy P.",
""
],
[
"Sritharan",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4727
|
Li-Yang Tan
|
Ilias Diakonikolas, Rocco A. Servedio, Li-Yang Tan, Andrew Wan
|
A regularity lemma, and low-weight approximators, for low-degree
polynomial threshold functions
|
23 pages, 0 figures
| null | null | null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give a "regularity lemma" for degree-d polynomial threshold functions
(PTFs) over the Boolean cube {-1,1}^n. This result shows that every degree-d
PTF can be decomposed into a constant number of subfunctions such that almost
all of the subfunctions are close to being regular PTFs. Here a "regular PTF is
a PTF sign(p(x)) where the influence of each variable on the polynomial p(x) is
a small fraction of the total influence of p.
As an application of this regularity lemma, we prove that for any constants d
\geq 1, \eps \geq 0, every degree-d PTF over n variables has can be
approximated to accuracy eps by a constant-degree PTF that has integer weights
of total magnitude O(n^d). This weight bound is shown to be optimal up to
constant factors.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 15:54:33 GMT"
},
{
"version": "v2",
"created": "Thu, 6 May 2010 01:37:10 GMT"
}
] | 2015-03-13T00:00:00 |
[
[
"Diakonikolas",
"Ilias",
""
],
[
"Servedio",
"Rocco A.",
""
],
[
"Tan",
"Li-Yang",
""
],
[
"Wan",
"Andrew",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.4756
|
Brendan Lucier
|
Jason D. Hartline and Brendan Lucier
|
Bayesian Algorithmic Mechanism Design
| null | null |
10.1257/aer.20130712
| null |
cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The principal problem in algorithmic mechanism design is in merging the
incentive constraints imposed by selfish behavior with the algorithmic
constraints imposed by computational intractability. This field is motivated by
the observation that the preeminent approach for designing incentive compatible
mechanisms, namely that of Vickrey, Clarke, and Groves; and the central
approach for circumventing computational obstacles, that of approximation
algorithms, are fundamentally incompatible: natural applications of the VCG
approach to an approximation algorithm fails to yield an incentive compatible
mechanism. We consider relaxing the desideratum of (ex post) incentive
compatibility (IC) to Bayesian incentive compatibility (BIC), where
truthtelling is a Bayes-Nash equilibrium (the standard notion of incentive
compatibility in economics). For welfare maximization in single-parameter agent
settings, we give a general black-box reduction that turns any approximation
algorithm into a Bayesian incentive compatible mechanism with essentially the
same approximation factor.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 18:00:59 GMT"
},
{
"version": "v2",
"created": "Wed, 23 Feb 2011 22:16:38 GMT"
}
] | 2017-08-21T00:00:00 |
[
[
"Hartline",
"Jason D.",
""
],
[
"Lucier",
"Brendan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.4766
|
David Gosset
|
Edward Farhi, Jeffrey Goldstone, David Gosset, Sam Gutmann, Harvey B.
Meyer, Peter Shor
|
Quantum Adiabatic Algorithms, Small Gaps, and Different Paths
|
The original version considered a unique satisfying assignment and
one problematic low lying state. The revision argues that the algorithm with
path change will succeed when there are polynomially many low lying states
|
Quantum Information & Computation, Volume 11 number 3&4, 2011,
pages 181-214
| null |
MIT-CTP 4076, CERN-PH-TH-2009/175
|
quant-ph cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We construct a set of instances of 3SAT which are not solved efficiently
using the simplest quantum adiabatic algorithm. These instances are obtained by
picking random clauses all consistent with two disparate planted solutions and
then penalizing one of them with a single additional clause. We argue that by
randomly modifying the beginning Hamiltonian, one obtains (with substantial
probability) an adiabatic path that removes this difficulty. This suggests that
the quantum adiabatic algorithm should in general be run on each instance with
many different random paths leading to the problem Hamiltonian. We do not know
whether this trick will help for a random instance of 3SAT (as opposed to an
instance from the particular set we consider), especially if the instance has
an exponential number of disparate assignments that violate few clauses. We use
a continuous imaginary time Quantum Monte Carlo algorithm in a novel way to
numerically investigate the ground state as well as the first excited state of
our system. Our arguments are supplemented by Quantum Monte Carlo data from
simulations with up to 150 spins.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 19:02:53 GMT"
},
{
"version": "v2",
"created": "Fri, 4 Jun 2010 16:23:21 GMT"
}
] | 2012-03-30T00:00:00 |
[
[
"Farhi",
"Edward",
""
],
[
"Goldstone",
"Jeffrey",
""
],
[
"Gosset",
"David",
""
],
[
"Gutmann",
"Sam",
""
],
[
"Meyer",
"Harvey B.",
""
],
[
"Shor",
"Peter",
""
]
] |
[
{
"class": "Physics",
"code": "quant-ph",
"description": "Description coming soon",
"span": "(Quantum Physics)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
0909.4767
|
Christine Bachoc
|
Christine Bachoc (IMB)
|
Semidefinite programming, harmonic analysis and coding theory
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
These lecture notes where presented as a course of the CIMPA summer school in
Manila, July 20-30, 2009, Semidefinite programming in algebraic combinatorics.
This version is an update June 2010.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 19:04:18 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Sep 2010 11:37:01 GMT"
}
] | 2010-09-09T00:00:00 |
[
[
"Bachoc",
"Christine",
"",
"IMB"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4786
|
Michael J. Kurtz
|
Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn Grant,
Markus Demleitner and Stephen S. Murray
|
Worldwide Use and Impact of the NASA Astrophysics Data System Digital
Library
|
ADS bibcode: 2005JASIS..56...36K This is a portion (The bibliometric
properties of article readership information is the other part) of the
article: The NASA Astrophysics Data System: Sociology, bibliometrics and
impact, which went on-line in the summer of 2003
|
The Journal of the American Society for Information Science and
Technology, Vol. 56, p. 36. (2005)
|
10.1002/asi.20095
| null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
By combining data from the text, citation, and reference databases with data
from the ADS readership logs we have been able to create Second Order
Bibliometric Operators, a customizable class of collaborative filters which
permits substantially improved accuracy in literature queries.
Using the ADS usage logs along with membership statistics from the
International Astronomical Union and data on the population and gross domestic
product (GDP) we develop an accurate model for world-wide basic research where
the number of scientists in a country is proportional to the GDP of that
country, and the amount of basic research done by a country is proportional to
the number of scientists in that country times that country's per capita GDP.
We introduce the concept of utility time to measure the impact of the
ADS/URANIA and the electronic astronomical library on astronomical research. We
find that in 2002 it amounted to the equivalent of 736 FTE researchers, or $250
Million, or the astronomical research done in France.
Subject headings: digital libraries; bibliometrics; sociology of science;
information retrieval
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 20:31:24 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Murray",
"Stephen S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0909.4789
|
Michael J. Kurtz
|
Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn S.
Grant, Markus Demleitner, Stephen S. Murray, Nathalie Martimbeau, Barbara
Elwell
|
The Bibliometric Properties of Article Readership Information
|
ADS bibcode: 2005JASIS..56..111K This is the second paper (the first
is Worldwide Use and Impact of the NASA Astrophysics Data System Digital
Library) from the original article The NASA Astrophysics Data System:
Sociology, Bibliometrics, and Impact, which went on-line in the summer of
2003
|
The Journal of the American Society for Information Science and
Technology, Vol. 56, p. 111 (2005)
|
10.1002/asi.20096
| null |
cs.DL physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
The NASA Astrophysics Data System (ADS), along with astronomy's journals and
data centers (a collaboration dubbed URANIA), has developed a distributed
on-line digital library which has become the dominant means by which
astronomers search, access and read their technical literature. Digital
libraries such as the NASA Astrophysics Data System permit the easy
accumulation of a new type of bibliometric measure, the number of electronic
accesses (``reads'') of individual articles. We explore various aspects of this
new measure. We examine the obsolescence function as measured by actual reads,
and show that it can be well fit by the sum of four exponentials with very
different time constants. We compare the obsolescence function as measured by
readership with the obsolescence function as measured by citations. We find
that the citation function is proportional to the sum of two of the components
of the readership function. This proves that the normative theory of citation
is true in the mean. We further examine in detail the similarities and
differences between the citation rate, the readership rate and the total
citations for individual articles, and discuss some of the causes. Using the
number of reads as a bibliometric measure for individuals, we introduce the
read-cite diagram to provide a two-dimensional view of an individual's
scientific productivity. We develop a simple model to account for an
individual's reads and cites and use it to show that the position of a person
in the read-cite diagram is a function of age, innate productivity, and work
history. We show the age biases of both reads and cites, and develop two new
bibliometric measures which have substantially less age bias than citations
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 20:29:52 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Kurtz",
"Michael J.",
""
],
[
"Eichhorn",
"Guenther",
""
],
[
"Accomazzi",
"Alberto",
""
],
[
"Grant",
"Carolyn S.",
""
],
[
"Demleitner",
"Markus",
""
],
[
"Murray",
"Stephen S.",
""
],
[
"Martimbeau",
"Nathalie",
""
],
[
"Elwell",
"Barbara",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0909.4807
|
Dusan Jakovetic
|
Dusan Jakovetic, Joao Xavier, Jose' M. F. Moura
|
Consensus in Correlated Random Topologies: Weights for Finite Time
Horizon
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the weight design problem for the consensus algorithm under a
finite time horizon. We assume that the underlying network is random where the
links fail at each iteration with certain probability and the link failures can
be spatially correlated. We formulate a family of weight design criteria
(objective functions) that minimize n, n = 1,...,N (out of N possible) largest
(slowest) eigenvalues of the matrix that describes the mean squared consensus
error dynamics. We show that the objective functions are convex; hence,
globally optimal weights (with respect to the design criteria) can be
efficiently obtained. Numerical examples on large scale, sparse random networks
with spatially correlated link failures show that: 1) weights obtained
according to our criteria lead to significantly faster convergence than the
choices available in the literature; 2) different design criteria that
corresponds to different n, exhibits very interesting tradeoffs: faster
transient performance leads to slower long time run performance and vice versa.
Thus, n is a valuable degree of freedom and can be appropriately selected for
the given time horizon.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 21:30:44 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jakovetic",
"Dusan",
""
],
[
"Xavier",
"Joao",
""
],
[
"Moura",
"Jose' M. F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4808
|
Christina Fragouli
|
Javad Ebrahimi and Christina Fragouli
|
Combinatiorial Algorithms for Wireless Information Flow
| null | null | null | null |
cs.DS cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A long-standing open question in information theory is to characterize the
unicast capacity of a wireless relay network. The difficulty arises due to the
complex signal interactions induced in the network, since the wireless channel
inherently broadcasts the signals and there is interference among
transmissions. Recently, Avestimehr, Diggavi and Tse proposed a linear
deterministic model that takes into account the shared nature of wireless
channels, focusing on the signal interactions rather than the background noise.
They generalized the min-cut max-flow theorem for graphs to networks of
deterministic channels and proved that the capacity can be achieved using
information theoretical tools. They showed that the value of the minimum cut is
in this case the minimum rank of all the adjacency matrices describing
source-destination cuts.
In this paper, we develop a polynomial time algorithm that discovers the
relay encoding strategy to achieve the min-cut value in linear deterministic
(wireless) networks, for the case of a unicast connection. Our algorithm
crucially uses a notion of linear independence between channels to calculate
the capacity in polynomial time. Moreover, we can achieve the capacity by using
very simple one-symbol processing at the intermediate nodes, thereby
constructively yielding finite length strategies that achieve the unicast
capacity of the linear deterministic (wireless) relay network.
|
[
{
"version": "v1",
"created": "Fri, 25 Sep 2009 21:33:35 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Ebrahimi",
"Javad",
""
],
[
"Fragouli",
"Christina",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4828
|
Ofer Shayevitz
|
Ofer Shayevitz and Meir Feder
|
Optimal Feedback Communication via Posterior Matching
|
IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we introduce a fundamental principle for optimal communication
over general memoryless channels in the presence of noiseless feedback, termed
posterior matching. Using this principle, we devise a (simple, sequential)
generic feedback transmission scheme suitable for a large class of memoryless
channels and input distributions, achieving any rate below the corresponding
mutual information. This provides a unified framework for optimal feedback
communication in which the Horstein scheme (BSC) and the Schalkwijk-Kailath
scheme (AWGN channel) are special cases. Thus, as a corollary, we prove that
the Horstein scheme indeed attains the BSC capacity, settling a longstanding
conjecture. We further provide closed form expressions for the error
probability of the scheme over a range of rates, and derive the achievable
rates in a mismatch setting where the scheme is designed according to the wrong
channel model. Several illustrative examples of the posterior matching scheme
for specific channels are given, and the corresponding error probability
expressions are evaluated. The proof techniques employed utilize novel
relations between information rates and contraction properties of iterated
function systems.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 09:20:00 GMT"
},
{
"version": "v2",
"created": "Tue, 10 Aug 2010 05:53:13 GMT"
}
] | 2010-08-11T00:00:00 |
[
[
"Shayevitz",
"Ofer",
""
],
[
"Feder",
"Meir",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4830
|
Luis Daniel Abreu
|
Luis Daniel Abreu
|
Super-wavelets versus poly-Bergman spaces
|
Preliminar version; 19 pages
| null | null | null |
math.FA cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Motivated by potential applications in multiplexing and by recent results on
Gabor analysis with Hermite windows due to Gr\"{o}chenig and Lyubarskii, we
investigate vector-valued wavelet transforms and vector-valued wavelet frames,
which constitute special cases of super-wavelets, with a particular attention
to the case when the analyzing wavelet vector is related to Fourier transforms
of Laguerre functions. We construct an isometric isomorphism between
$L^{2}(\mathbb{R}^{+},\mathbf{C}^{n})$ and poly-Bergman spaces, with a view to
relate the sampling sequences in the poly-Bergman spaces to the wavelet frames
and super-frames with the windows $\Phi_{n}$. One of the applications of the
theory is a proof that $b\ln a<2\pi (n+1)$ is a necessary condition for the
(scalar) wavelet frame associated to the $\Phi_{n}$ to exist. This seems to be
the first known result of this type outside the setting of analytic functions
(the case $n=0$, which has been completely studied by Seip in 1993).
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 03:46:48 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Abreu",
"Luis Daniel",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.FA",
"description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory",
"span": "(Functional Analysis)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4858
|
R Doomun
|
S. Rathi, K. Thanuskodi
|
A Secure and Fault tolerant framework for Mobile IPv6 based networks
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
International Journal of Computer Science and Information Security
Vol. 5, No. 1, pp. 46-55, 2009
| null |
ISSN 1947 5500
|
cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mobile IPv6 will be an integral part of the next generation Internet
protocol. The importance of mobility in the Internet gets keep on increasing.
Current specification of Mobile IPv6 does not provide proper support for
reliability in the mobile network and there are other problems associated with
it. In this paper, we propose Virtual Private Network (VPN) based Home Agent
Reliability Protocol (VHAHA) as a complete system architecture and extension to
Mobile IPv6 that supports reliability and offers solutions to the security
problems that are found in Mobile IP registration part. The key features of
this protocol over other protocols are: better survivability, transparent
failure detection and recovery, reduced complexity of the system and workload,
secure data transfer and improved overall performance.
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 11:24:59 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Rathi",
"S.",
""
],
[
"Thanuskodi",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.4860
|
R Doomun
|
Y. Robiah, S. Siti Rahayu, M. Mohd Zaki, S. Shahrin, M. A. Faizal, R.
Marliza
|
A New Generic Taxonomy on Hybrid Malware Detection Technique
|
6 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
Robiah Y, Siti Rahayu S., Mohd Zaki M, Shahrin S., Faizal M. A.,
Marliza R., International Journal of Computer Science and Information
Security, IJCSIS, Vol. 5, No. 1, pp. 56-61, September 2009, USA
| null |
ISSN 1947 5500
|
cs.CR
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Malware is a type of malicious program that replicate from host machine and
propagate through network. It has been considered as one type of computer
attack and intrusion that can do a variety of malicious activity on a computer.
This paper addresses the current trend of malware detection techniques and
identifies the significant criteria in each technique to improve malware
detection in Intrusion Detection System (IDS). Several existing techniques are
analyzing from 48 various researches and the capability criteria of malware
detection technique have been reviewed. From the analysis, a new generic
taxonomy of malware detection technique have been proposed named Hybrid Malware
Detection Technique (Hybrid MDT) which consists of Hybrid Signature and Anomaly
detection technique and Hybrid Specification based and Anomaly detection
technique to complement the weaknesses of the existing malware detection
technique in detecting known and unknown attack as well as reducing false alert
before and during the intrusion occur.
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 11:44:56 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Robiah",
"Y.",
""
],
[
"Rahayu",
"S. Siti",
""
],
[
"Zaki",
"M. Mohd",
""
],
[
"Shahrin",
"S.",
""
],
[
"Faizal",
"M. A.",
""
],
[
"Marliza",
"R.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
0909.4876
|
Mani A
|
A. Mani
|
A Program in Dialectical Rough Set Theory
|
8 Pages, Brief Version of forthcoming paper. My conference
presentation at "Internat. Conf. on Rough Sets, Fuzzy Sets and Soft
Computing, Agartala, Tripura University, India, 2009" includes many parts of
this paper
| null | null | null |
math.LO cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A dialectical rough set theory focussed on the relation between roughly
equivalent objects and classical objects was introduced in \cite{AM699} by the
present author. The focus of our investigation is on elucidating the minimal
conditions on the nature of granularity, underlying semantic domain and nature
of the general rough set theories (RST) involved for possible extension of the
semantics to more general RST on a paradigm. On this basis we also formulate a
program in dialectical rough set theory. The dialectical approach provides
better semantics in many difficult cases and helps in formalising a wide
variety of concepts and notions that remain untamed at meta levels in the usual
approaches. This is a brief version of a more detailed forthcoming paper by the
present author.
|
[
{
"version": "v1",
"created": "Sun, 27 Sep 2009 01:39:27 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Mani",
"A.",
""
]
] |
[
{
"class": "Mathematics",
"code": "math.LO",
"description": "Logic, set theory, point-set topology, formal mathematics",
"span": "(Logic)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4888
|
Mugurel Ionut Andreica
|
Andrei-Horia Mogos, Mugurel Ionut Andreica
|
Approximating Mathematical Semantic Web Services Using Approximation
Formulas and Numerical Methods
|
The International Workshop on Multi-Agent Systems Technology and
Semantics - MASTS 2009
|
Proc. of the 17th Intl. Conf. on Control Systems and Computer
Science (CSCS), vol. 2, pp. 533-538, Bucharest, Romania, 26-29 May, 2009
| null | null |
cs.MS cs.NA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mathematical semantic web services are very useful in practice, but only a
small number of research results are reported in this area. In this paper we
present a method of obtaining an approximation of a mathematical semantic web
service, from its semantic description, using existing mathematical semantic
web services, approximation formulas, and numerical methods techniques. We also
give a method for automatic comparison of two complexity functions. In
addition, we present a method for classifying the numerical methods
mathematical semantic web services from a library.
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 18:52:59 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Mogos",
"Andrei-Horia",
""
],
[
"Andreica",
"Mugurel Ionut",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
}
] |
0909.4889
|
R Doomun
|
Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
|
Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS
|
10 pages IEEE format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423,
http://sites.google.com/site/ijcsis/
|
Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed, International
Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1,
pp. 62-71, September 2009, USA
| null |
ISSN 1947 5500
|
cs.CR cs.AI cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
This paper proposes an intrusion detection and prediction system based on
uncertain and imprecise inference networks and its implementation. Giving a
historic of sessions, it is about proposing a method of supervised learning
doubled of a classifier permitting to extract the necessary knowledge in order
to identify the presence or not of an intrusion in a session and in the
positive case to recognize its type and to predict the possible intrusions that
will follow it. The proposed system takes into account the uncertainty and
imprecision that can affect the statistical data of the historic. The
systematic utilization of an unique probability distribution to represent this
type of knowledge supposes a too rich subjective information and risk to be in
part arbitrary. One of the first objectives of this work was therefore to
permit the consistency between the manner of which we represent information and
information which we really dispose.
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 19:17:37 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jemili",
"Farah",
""
],
[
"Zaghdoud",
"Montaceur",
""
],
[
"Ahmed",
"Mohamed Ben",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4893
|
Hagai Cohen
|
Hagai Cohen and Ely Porat
|
Range Non-Overlapping Indexing
|
10 pages
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We study the non-overlapping indexing problem: Given a text T, preprocess it
so that you can answer queries of the form: given a pattern P, report the
maximal set of non-overlapping occurrences of P in T. A generalization of this
problem is the range non-overlapping indexing where in addition we are given
two indexes i,j to report the maximal set of non-overlapping occurrences
between these two indexes. We suggest new solutions for these problems. For the
non-overlapping problem our solution uses O(n) space with query time of O(m +
occ_{NO}). For the range non-overlapping problem we propose a solution with
O(n\log^\epsilon n) space for some 0<\epsilon<1 and O(m + \log\log n +
occ_{ij,NO}) query time.
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 20:24:19 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Jan 2010 19:40:45 GMT"
}
] | 2010-01-12T00:00:00 |
[
[
"Cohen",
"Hagai",
""
],
[
"Porat",
"Ely",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4896
|
Christian Attiogb\'e
|
Christian Attiogbe
|
Modelling and Analysing Dynamic Decentralised Systems
|
6 pages - two columns (IEEE) - Conference PRDC'2009
| null | null | null |
cs.SE cs.NI
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce a method to specify and analyse decentralised dynamic systems;
the method is based on the combination of an event-based multi-process system
specification approach with a multi-facet analysis approach that considers a
reference abstract model and several specific ones derived from the abstract
model in order to support facet-wise analysis. The method is illustrated with
the modelling and the analysis of a mobile ad-hoc network. The Event-B
framework and its related tools B4free and ProB are used to conduct the
experiments.
|
[
{
"version": "v1",
"created": "Sat, 26 Sep 2009 21:38:49 GMT"
}
] | 2009-09-30T00:00:00 |
[
[
"Attiogbe",
"Christian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
0909.4934
|
Ivan Voras
|
Ivan Voras, Mario Zagar
|
Characteristics of multithreading models for high-performance IO driven
network applications
| null | null | null | null |
cs.NI cs.PF
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In a technological landscape that is quickly moving toward dense multi-CPU
and multi-core computer systems, where using multithreading is an increasingly
popular application design decision, it is important to choose a proper model
for distributing tasks across multiple threads that will result in the best
efficiency for the application and the system as a whole. The work described in
this paper creates, implements and evaluates various models of distributing
tasks to CPU threads and investigates their characteristics for use in modern
high-performance network servers. The results presented here comprise a roadmap
of models for building multithreaded server applications for modern server
hardware and Unix-like operating systems.
|
[
{
"version": "v1",
"created": "Sun, 27 Sep 2009 14:20:46 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Voras",
"Ivan",
""
],
[
"Zagar",
"Mario",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Computer Science",
"code": "cs.PF",
"description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.",
"span": "(Performance)"
}
] |
0909.4938
|
Tao Zhou
|
Mingsheng Shang, Linyuan Lu, Yi-Cheng Zhang, Tao Zhou
|
Empirical analysis of web-based user-object bipartite networks
|
6 pages, 7 figures and 1 table
|
EPL 90 (2010) 48006
|
10.1209/0295-5075/90/48006
| null |
physics.data-an cs.IR physics.soc-ph
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Understanding the structure and evolution of web-based user-object networks
is a significant task since they play a crucial role in e-commerce nowadays.
This Letter reports the empirical analysis on two large-scale web sites,
audioscrobbler.com and del.icio.us, where users are connected with music groups
and bookmarks, respectively. The degree distributions and degree-degree
correlations for both users and objects are reported. We propose a new index,
named collaborative clustering coefficient, to quantify the clustering behavior
based on the collaborative selection. Accordingly, the clustering properties
and clustering-degree correlations are investigated. We report some novel
phenomena well characterizing the selection mechanism of web users and outline
the relevance of these phenomena to the information recommendation problem.
|
[
{
"version": "v1",
"created": "Sun, 27 Sep 2009 14:52:30 GMT"
},
{
"version": "v2",
"created": "Sat, 24 Dec 2011 01:21:01 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Shang",
"Mingsheng",
""
],
[
"Lu",
"Linyuan",
""
],
[
"Zhang",
"Yi-Cheng",
""
],
[
"Zhou",
"Tao",
""
]
] |
[
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
0909.4950
|
Mikael Vejdemo-Johansson
|
Vladimir Dotsenko and Mikael Vejdemo-Johansson
|
Implementing Gr\"obner bases for operads
|
18 pages, 6 figures
| null | null | null |
cs.SC cs.MS math.QA
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We present an implementation of the algorithm for computing Groebner bases
for operads due to the first author and A. Khoroshkin. We discuss the actual
algorithms, the choices made for the implementation platform and the data
representation, and strengths and weaknesses of our approach.
|
[
{
"version": "v1",
"created": "Sun, 27 Sep 2009 16:54:34 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Aug 2010 13:30:08 GMT"
}
] | 2010-08-27T00:00:00 |
[
[
"Dotsenko",
"Vladimir",
""
],
[
"Vejdemo-Johansson",
"Mikael",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Mathematics",
"code": "math.QA",
"description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory",
"span": "(Quantum Algebra)"
}
] |
0909.4955
|
Juan Gerardo Alcazar Arribas
|
Juan Gerardo Alcazar
|
On the Different Shapes Arising in a Family of Rational Curves Depending
on a Parameter
| null | null | null | null |
cs.SC cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Given a family of rational curves depending on a real parameter, defined by
its parametric equations, we provide an algorithm to compute a finite partition
of the parameter space (${\Bbb R}$, in general) so that the shape of the family
stays invariant along each element of the partition. So, from this partition
the topology types in the family can be determined. The algorithm is based on a
geometric interpretation of previous work (\cite{JGRS}) for the implicit case.
However, in our case the algorithm works directly with the parametrization of
the family, and the implicit equation does not need to be computed. Timings
comparing the algorithm in the implicit and the parametric cases are given;
these timings show that the parametric algorithm developed here provides in
general better results than the known algorithm for the implicit case.
|
[
{
"version": "v1",
"created": "Sun, 27 Sep 2009 18:47:17 GMT"
},
{
"version": "v2",
"created": "Fri, 13 Nov 2009 10:14:05 GMT"
}
] | 2009-11-13T00:00:00 |
[
[
"Alcazar",
"Juan Gerardo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0909.4956
|
Juan Gerardo Alcazar Arribas
|
Juan Gerardo Alcazar
|
Local Shape of Generalized Offsets to Algebraic Curves
|
19 pages, 9 figures
| null | null | null |
cs.SC cs.MS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we study the local behavior of an algebraic curve under a
geometric construction which is a variation of the usual offsetting
construction, namely the {\it generalized} offsetting process (\cite {SS99}).
More precisely, here we discuss when and how this geometric construction may
cause local changes in the shape of an algebraic curve, and we compare our
results with those obtained for the case of classical offsets (\cite{JGS07}).
For these purposes, we use well-known notions of Differential Geometry, and
also the notion of {\it local shape} introduced in \cite{JGS07}.
|
[
{
"version": "v1",
"created": "Sun, 27 Sep 2009 19:38:00 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Alcazar",
"Juan Gerardo",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
}
] |
0909.4969
|
Charalampos Tsourakakis
|
Charalampos E. Tsourakakis
|
MACH: Fast Randomized Tensor Decompositions
|
15 pages, 4 Tables, 6 Figures
| null | null | null |
cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Tensors naturally model many real world processes which generate multi-aspect
data. Such processes appear in many different research disciplines, e.g,
chemometrics, computer vision, psychometrics and neuroimaging analysis. Tensor
decompositions such as the Tucker decomposition are used to analyze
multi-aspect data and extract latent factors, which capture the multilinear
data structure. Such decompositions are powerful mining tools, for extracting
patterns from large data volumes. However, most frequently used algorithms for
such decompositions involve the computationally expensive Singular Value
Decomposition.
In this paper we propose MACH, a new sampling algorithm to compute such
decompositions. Our method is of significant practical value for tensor
streams, such as environmental monitoring systems, IP traffic matrices over
time, where large amounts of data are accumulated and the analysis is
computationally intensive but also in "post-mortem" data analysis cases where
the tensor does not fit in the available memory. We provide the theoretical
analysis of our proposed method, and verify its efficacy in monitoring system
applications.
|
[
{
"version": "v1",
"created": "Sun, 27 Sep 2009 22:36:17 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Tsourakakis",
"Charalampos E.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.4983
|
Kaibin Huang
|
Kaibin Huang, Vincent K. N. Lau, and Dongku Kim
|
Event-Driven Optimal Feedback Control for Multi-Antenna Beamforming
|
29 pages; submitted for publication
| null |
10.1109/TSP.2010.2045426
| null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Transmit beamforming is a simple multi-antenna technique for increasing
throughput and the transmission range of a wireless communication system. The
required feedback of channel state information (CSI) can potentially result in
excessive overhead especially for high mobility or many antennas. This work
concerns efficient feedback for transmit beamforming and establishes a new
approach of controlling feedback for maximizing net throughput, defined as
throughput minus average feedback cost. The feedback controller using a
stationary policy turns CSI feedback on/off according to the system state that
comprises the channel state and transmit beamformer. Assuming channel isotropy
and Markovity, the controller's state reduces to two scalars. This allows the
optimal control policy to be efficiently computed using dynamic programming.
Consider the perfect feedback channel free of error, where each feedback
instant pays a fixed price. The corresponding optimal feedback control policy
is proved to be of the threshold type. This result holds regardless of whether
the controller's state space is discretized or continuous. Under the
threshold-type policy, feedback is performed whenever a state variable
indicating the accuracy of transmit CSI is below a threshold, which varies with
channel power. The practical finite-rate feedback channel is also considered.
The optimal policy for quantized feedback is proved to be also of the threshold
type. The effect of CSI quantization is shown to be equivalent to an increment
on the feedback price. Moreover, the increment is upper bounded by the expected
logarithm of one minus the quantization error. Finally, simulation shows that
feedback control increases net throughput of the conventional periodic feedback
by up to 0.5 bit/s/Hz without requiring additional bandwidth or antennas.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 01:14:54 GMT"
}
] | 2015-05-14T00:00:00 |
[
[
"Huang",
"Kaibin",
""
],
[
"Lau",
"Vincent K. N.",
""
],
[
"Kim",
"Dongku",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.4995
|
Marko Jankovic
|
Marko V. Jankovic
|
Geometrical Interpretation of Shannon's Entropy Based on the Born Rule
| null | null | null | null |
cs.IT cs.NE math.IT math.PR physics.data-an
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this paper we will analyze discrete probability distributions in which
probabilities of particular outcomes of some experiment (microstates) can be
represented by the ratio of natural numbers (in other words, probabilities are
represented by digital numbers of finite representation length). We will
introduce several results that are based on recently proposed JoyStick
Probability Selector, which represents a geometrical interpretation of the
probability based on the Born rule. The terms of generic space and generic
dimension of the discrete distribution, as well as, effective dimension are
going to be introduced. It will be shown how this simple geometric
representation can lead to an optimal code length coding of the sequence of
signals. Then, we will give a new, geometrical, interpretation of the Shannon
entropy of the discrete distribution. We will suggest that the Shannon entropy
represents the logarithm of the effective dimension of the distribution.
Proposed geometrical interpretation of the Shannon entropy can be used to prove
some information inequalities in an elementary way.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 02:47:52 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Jankovic",
"Marko V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.PR",
"description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory",
"span": "(Probability)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
}
] |
0909.5000
|
Hrushikesh Mhaskar
|
H. N. Mhaskar
|
Eignets for function approximation on manifolds
|
28 pages. Articles in press; Applied and Computational Harmonic
Analysis, 2009
| null | null | null |
cs.LG cs.NA cs.NE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Let $\XX$ be a compact, smooth, connected, Riemannian manifold without
boundary, $G:\XX\times\XX\to \RR$ be a kernel. Analogous to a radial basis
function network, an eignet is an expression of the form $\sum_{j=1}^M
a_jG(\circ,y_j)$, where $a_j\in\RR$, $y_j\in\XX$, $1\le j\le M$. We describe a
deterministic, universal algorithm for constructing an eignet for approximating
functions in $L^p(\mu;\XX)$ for a general class of measures $\mu$ and kernels
$G$. Our algorithm yields linear operators. Using the minimal separation
amongst the centers $y_j$ as the cost of approximation, we give modulus of
smoothness estimates for the degree of approximation by our eignets, and show
by means of a converse theorem that these are the best possible for every
\emph{individual function}. We also give estimates on the coefficients $a_j$ in
terms of the norm of the eignet. Finally, we demonstrate that if any sequence
of eignets satisfies the optimal estimates for the degree of approximation of a
smooth function, measured in terms of the minimal separation, then the
derivatives of the eignets also approximate the corresponding derivatives of
the target function in an optimal manner.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 04:25:03 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Mhaskar",
"H. N.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
},
{
"class": "Computer Science",
"code": "cs.NA",
"description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.",
"span": "(Numerical Analysis)"
},
{
"class": "Computer Science",
"code": "cs.NE",
"description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.",
"span": "(Neural and Evolutionary Computing)"
}
] |
0909.5006
|
Mohammad Ali Maddah-Ali Mr.
|
Mohammad Ali Maddah-Ali
|
On the Degrees of Freedom of the Compound MIMO Broadcast Channels with
Finite States
| null | null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Multiple-antenna broadcast channels with $M$ transmit antennas and $K$
single-antenna receivers is considered, where the channel of receiver $r$ takes
one of the $J_r$ finite values. It is assumed that the channel states of each
receiver are randomly selected from $\mathds{R}^{M\times 1}$ (or from
$\mathds{C}^{M\times 1}$). It is shown that no matter what $J_r$ is, the
degrees of freedom (DoF) of $\frac{MK}{M+K-1}$ is achievable. The achievable
scheme relies on the idea of interference alignment at receivers, without
exploiting the possibility of cooperation among transmit antennas. It is proven
that if $J_r \geq M$, $r=1,...,K$, this scheme achieves the optimal DoF. This
results implies that when the uncertainty of the base station about the channel
realization is considerable, the system loses the gain of cooperation. However,
it still benefits from the gain of interference alignment. In fact, in this
case, the compound broadcast channel is treated as a compound X channel.
Moreover, it is shown that when the base station knows the channel states of
some of the receivers, a combination of transmit cooperation and interference
alignment would achieve the optimal DoF.
Like time-invariant $K$-user interference channels, the naive vector-space
approaches of interference management seem insufficient to achieve the optimal
DoF of this channel. In this paper, we use the Number-Theory approach of
alignment, recently developed by Motahari et al.[1]. We extend the approach of
[1] to complex channels as well, therefore all the results that we present are
valid for both real and complex channels.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 18:38:44 GMT"
},
{
"version": "v2",
"created": "Tue, 29 Sep 2009 19:29:45 GMT"
},
{
"version": "v3",
"created": "Sun, 4 Oct 2009 02:05:21 GMT"
}
] | 2009-10-05T00:00:00 |
[
[
"Maddah-Ali",
"Mohammad Ali",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5007
|
Kenneth Shum
|
Kenneth W. Shum and Chi Wan Sung
|
Achieving Capacity of Bi-Directional Tandem Collision Network by Joint
Medium-Access Control and Channel-Network Coding
|
Submitted to IEEE Trans. Information Theory
| null | null | null |
cs.IT math.IT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In ALOHA-type packetized network, the transmission times of packets follow a
stochastic process. In this paper, we advocate a deterministic approach for
channel multiple-access. Each user is statically assigned a periodic protocol
signal, which takes value either zero or one, and transmit packets whenever the
value of the protocol signal is equal to one. On top of this multiple-access
protocol, efficient channel coding and network coding schemes are devised. We
illustrate the idea by constructing a transmission scheme for the tandem
collision network, for both slot-synchronous and slot-asynchronous systems.
This cross-layer approach is able to achieve the capacity region when the
network is bi-directional.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 05:58:47 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Shum",
"Kenneth W.",
""
],
[
"Sung",
"Chi Wan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
0909.5011
|
Li-Yang Tan
|
Ilias Diakonikolas, Prasad Raghavendra, Rocco A. Servedio, Li-Yang Tan
|
Average sensitivity and noise sensitivity of polynomial threshold
functions
|
added proofs for non-multilinear PTFs over Gaussian random variables,
added discussion section
| null | null | null |
cs.CC cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We give the first non-trivial upper bounds on the average sensitivity and
noise sensitivity of degree-$d$ polynomial threshold functions (PTFs). These
bounds hold both for PTFs over the Boolean hypercube and for PTFs over $\R^n$
under the standard $n$-dimensional Gaussian distribution. Our bound on the
Boolean average sensitivity of PTFs represents progress towards the resolution
of a conjecture of Gotsman and Linial \cite{GL:94}, which states that the
symmetric function slicing the middle $d$ layers of the Boolean hypercube has
the highest average sensitivity of all degree-$d$ PTFs. Via the $L_1$
polynomial regression algorithm of Kalai et al. \cite{KKMS:08}, our bounds on
Gaussian and Boolean noise sensitivity yield polynomial-time agnostic learning
algorithms for the broad class of constant-degree PTFs under these input
distributions.
The main ingredients used to obtain our bounds on both average and noise
sensitivity of PTFs in the Gaussian setting are tail bounds and
anti-concentration bounds on low-degree polynomials in Gaussian random
variables \cite{Janson:97,CW:01}. To obtain our bound on the Boolean average
sensitivity of PTFs, we generalize the ``critical-index'' machinery of
\cite{Servedio:07cc} (which in that work applies to halfspaces, i.e. degree-1
PTFs) to general PTFs. Together with the "invariance principle" of
\cite{MOO:05}, this lets us extend our techniques from the Gaussian setting to
the Boolean setting. Our bound on Boolean noise sensitivity is achieved via a
simple reduction from upper bounds on average sensitivity of Boolean PTFs to
corresponding bounds on noise sensitivity.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 06:45:31 GMT"
},
{
"version": "v2",
"created": "Mon, 19 Oct 2009 20:43:09 GMT"
}
] | 2009-10-19T00:00:00 |
[
[
"Diakonikolas",
"Ilias",
""
],
[
"Raghavendra",
"Prasad",
""
],
[
"Servedio",
"Rocco A.",
""
],
[
"Tan",
"Li-Yang",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.5012
|
Anthony Scemama
|
Anthony Scemama
|
IRPF90: a programming environment for high performance computing
|
18 pages, 14 figures
| null | null | null |
cs.SE cs.CE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
IRPF90 is a Fortran programming environment which helps the development of
large Fortran codes. In Fortran programs, the programmer has to focus on the
order of the instructions: before using a variable, the programmer has to be
sure that it has already been computed in all possible situations. For large
codes, it is common source of error. In IRPF90 most of the order of
instructions is handled by the pre-processor, and an automatic mechanism
guarantees that every entity is built before being used. This mechanism relies
on the {needs/needed by} relations between the entities, which are built
automatically. Codes written with IRPF90 execute often faster than Fortran
programs, are faster to write and easier to maintain.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 16:46:45 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Scemama",
"Anthony",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
}
] |
0909.5029
|
EPTCS
|
Clemens Thielen, Sven O. Krumke
|
Complexity of Strong Implementability
| null |
EPTCS 4, 2009, pp. 1-12
|
10.4204/EPTCS.4.1
| null |
cs.CC cs.GT
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We consider the question of implementability of a social choice function in a
classical setting where the preferences of finitely many selfish individuals
with private information have to be aggregated towards a social choice. This is
one of the central questions in mechanism design. If the concept of weak
implementation is considered, the Revelation Principle states that one can
restrict attention to truthful implementations and direct revelation
mechanisms, which implies that implementability of a social choice function is
easy to check. For the concept of strong implementation, however, the
Revelation Principle becomes invalid, and the complexity of deciding whether a
given social choice function is strongly implementable has been open so far. In
this paper, we show by using methods from polyhedral theory that strong
implementability of a social choice function can be decided in polynomial space
and that each of the payments needed for strong implementation can always be
chosen to be of polynomial encoding length. Moreover, we show that strong
implementability of a social choice function involving only a single selfish
individual can be decided in polynomial time via linear programming.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 07:59:23 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Thielen",
"Clemens",
""
],
[
"Krumke",
"Sven O.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
0909.5032
|
EPTCS
|
Alain Bretto (University of Caen), Yannick Silvestre (University of
Caen), Thierry Vall\'ee (University of Caen)
|
Cartesian product of hypergraphs: properties and algorithms
| null |
EPTCS 4, 2009, pp. 22-28
|
10.4204/EPTCS.4.3
| null |
cs.DM cs.DS
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Cartesian products of graphs have been studied extensively since the 1960s.
They make it possible to decrease the algorithmic complexity of problems by
using the factorization of the product. Hypergraphs were introduced as a
generalization of graphs and the definition of Cartesian products extends
naturally to them. In this paper, we give new properties and algorithms
concerning coloring aspects of Cartesian products of hypergraphs. We also
extend a classical prime factorization algorithm initially designed for graphs
to connected conformal hypergraphs using 2-sections of hypergraphs.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 08:24:08 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Bretto",
"Alain",
"",
"University of Caen"
],
[
"Silvestre",
"Yannick",
"",
"University of\n Caen"
],
[
"Vallée",
"Thierry",
"",
"University of Caen"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
0909.5033
|
EPTCS
|
Konstantinos Papalamprou (London School of Economics), Leonidas
Pitsoulis (Aristotle University of Thessaloniki)
|
Regular Matroids with Graphic Cocircuits
| null |
EPTCS 4, 2009, pp. 29-41
|
10.4204/EPTCS.4.4
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We introduce the notion of graphic cocircuits and show that a large class of
regular matroids with graphic cocircuits belongs to the class of signed-graphic
matroids. Moreover, we provide an algorithm which determines whether a
cographic matroid with graphic cocircuits is signed-graphic or not.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 08:29:16 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Papalamprou",
"Konstantinos",
"",
"London School of Economics"
],
[
"Pitsoulis",
"Leonidas",
"",
"Aristotle University of Thessaloniki"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
0909.5038
|
EPTCS
|
Olga Tveretina (Karlsruhe University), Carsten Sinz (Karlsruhe
University), Hans Zantema (Technical University of Eindhoven, Radboud
University of Nijmegen)
|
An Exponential Lower Bound on OBDD Refutations for Pigeonhole Formulas
| null |
EPTCS 4, 2009, pp. 13-21
|
10.4204/EPTCS.4.2
| null |
cs.CC cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Haken proved that every resolution refutation of the pigeonhole formula has
at least exponential size. Groote and Zantema proved that a particular OBDD
computation of the pigeonhole formula has an exponential size. Here we show
that any arbitrary OBDD refutation of the pigeonhole formula has an exponential
size, too: we prove that the size of one of the intermediate OBDDs is at least
$\Omega(1.025^n)$.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 08:55:33 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Tveretina",
"Olga",
"",
"Karlsruhe University"
],
[
"Sinz",
"Carsten",
"",
"Karlsruhe\n University"
],
[
"Zantema",
"Hans",
"",
"Technical University of Eindhoven, Radboud\n University of Nijmegen"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.5045
|
Emmanuel Polonowski
|
Emmanuel Polonowski
|
Deriving SN from PSN: a general proof technique
| null |
TR-LACL (2006) 1-50
| null |
TR-LACL-2006-5
|
cs.LO
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In the framework of explicit substitutions there is two termination
properties: preservation of strong normalization (PSN), and strong
normalization (SN). Since there are not easily proved, only one of them is
usually established (and sometimes none). We propose here a connection between
them which helps to get SN when one already has PSN. For this purpose, we
formalize a general proof technique of SN which consists in expanding
substitutions into "pure" lambda-terms and to inherit SN of the whole calculus
by SN of the "pure" calculus and by PSN. We apply it successfully to a large
set of calculi with explicit substitutions, allowing us to establish SN, or, at
least, to trace back the failure of SN to that of PSN.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 09:26:11 GMT"
}
] | 2009-10-08T00:00:00 |
[
[
"Polonowski",
"Emmanuel",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
0909.5064
|
Norbert B\'atfai
|
Norbert B\'atfai
|
A Conceivable Origin of Machine Consciousness in the IDLE process
|
4 pages
| null | null | null |
cs.OS cs.DC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
In this short paper, we would like to call professional community's attention
to a daring idea that is surely unhelpful, but is exciting for programmers and
anyway conflicts with the trend of energy consumption in computer systems.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 10:54:48 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Bátfai",
"Norbert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OS",
"description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.",
"span": "(Operating Systems)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
0909.5087
|
Stefano Zacchiroli
|
Davide Di Ruscio (UNIVAQ), Patrizio Pelliccione (UNIVAQ), Alfonso
Pierantonio, Stefano Zacchiroli (PPS)
|
Towards maintainer script modernization in FOSS distributions
| null |
IWOCE 2009: 1st international workshop on Open component
ecosystems, Amsterdam : Netherlands (2009)
| null | null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Free and Open Source Software (FOSS) distributions are complex software
systems, made of thousands packages that evolve rapidly, independently, and
without centralized coordination. During packages upgrades, corner case
failures can be encountered and are hard to deal with, especially when they are
due to misbehaving maintainer scripts: executable code snippets used to
finalize package configuration. In this paper we report a software
modernization experience, the process of representing existing legacy systems
in terms of models, applied to FOSS distributions. We present a process to
define meta-models that enable dealing with upgrade failures and help rolling
back from them, taking into account maintainer scripts. The process has been
applied to widely used FOSS distributions and we report about such experiences.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 13:12:57 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Di Ruscio",
"Davide",
"",
"UNIVAQ"
],
[
"Pelliccione",
"Patrizio",
"",
"UNIVAQ"
],
[
"Pierantonio",
"Alfonso",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
0909.5091
|
Stefano Zacchiroli
|
Ralf Treinen (PPS), Stefano Zacchiroli (PPS)
|
Expressing advanced user preferences in component installation
| null |
IWOCE 2009: 1st international workshop on Open component
ecosystems, Amsterdam : Netherlands (2009)
|
10.1145/1595800.1595806
| null |
cs.SE
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
State of the art component-based software collections - such as FOSS
distributions - are made of up to dozens of thousands components, with complex
inter-dependencies and conflicts. Given a particular installation of such a
system, each request to alter the set of installed components has potentially
(too) many satisfying answers. We present an architecture that allows to
express advanced user preferences about package selection in FOSS
distributions. The architecture is composed by a distribution-independent
format for describing available and installed packages called CUDF (Common
Upgradeability Description Format), and a foundational language called MooML to
specify optimization criteria. We present the syntax and semantics of CUDF and
MooML, and discuss the partial evaluation mechanism of MooML which allows to
gain efficiency in package dependency solvers.
|
[
{
"version": "v1",
"created": "Mon, 28 Sep 2009 13:31:17 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Treinen",
"Ralf",
"",
"PPS"
],
[
"Zacchiroli",
"Stefano",
"",
"PPS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.