id
stringlengths
9
16
submitter
stringlengths
1
64
authors
stringlengths
4
14.5k
title
stringlengths
1
278
comments
stringlengths
1
762
journal-ref
stringlengths
1
557
doi
stringlengths
11
153
report-no
stringlengths
2
479
categories
stringlengths
5
104
license
stringclasses
9 values
abstract
stringlengths
6
3.8k
versions
listlengths
1
103
update_date
timestamp[s]
authors_parsed
listlengths
1
942
categories_descriptions
listlengths
1
13
0909.3895
Kirk D. Borne
Kirk D. Borne (1), Suzanne Jacoby (2), K. Carney (3), A. Connolly (4), T. Eastman (5), M. J. Raddick (6), J. A. Tyson (7), J. Wallin (1) ((1) George Mason University, (2) LSST Corporation, (3) Adler Planetarium, (4) U. Washington, (5) Wyle Information Systems, (6) JHU/SDSS, (7) UC Davis)
The Revolution in Astronomy Education: Data Science for the Masses
12 pages total: 1 cover page, 1 page of co-signers, plus 10 pages, State of the Profession Position Paper submitted to the Astro2010 Decadal Survey (March 2009)
null
null
null
astro-ph.IM cs.DB cs.DL cs.IR physics.ed-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
As our capacity to study ever-expanding domains of our science has increased (including the time domain, non-electromagnetic phenomena, magnetized plasmas, and numerous sky surveys in multiple wavebands with broad spatial coverage and unprecedented depths), so have the horizons of our understanding of the Universe been similarly expanding. This expansion is coupled to the exponential data deluge from multiple sky surveys, which have grown from gigabytes into terabytes during the past decade, and will grow from terabytes into Petabytes (even hundreds of Petabytes) in the next decade. With this increased vastness of information, there is a growing gap between our awareness of that information and our understanding of it. Training the next generation in the fine art of deriving intelligent understanding from data is needed for the success of sciences, communities, projects, agencies, businesses, and economies. This is true for both specialists (scientists) and non-specialists (everyone else: the public, educators and students, workforce). Specialists must learn and apply new data science research techniques in order to advance our understanding of the Universe. Non-specialists require information literacy skills as productive members of the 21st century workforce, integrating foundational skills for lifelong learning in a world increasingly dominated by data. We address the impact of the emerging discipline of data science on astronomy education within two contexts: formal education and lifelong learners.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 02:55:14 GMT" } ]
2009-11-04T00:00:00
[ [ "Borne", "Kirk D.", "" ], [ "Jacoby", "Suzanne", "" ], [ "Carney", "K.", "" ], [ "Connolly", "A.", "" ], [ "Eastman", "T.", "" ], [ "Raddick", "M. J.", "" ], [ "Tyson", "J. A.", "" ], [ "Wallin", "J.", "" ] ]
[ { "class": "Physics", "code": "astro-ph.IM", "description": "Detector and telescope design, experiment proposals. Laboratory Astrophysics. Methods for data analysis, statistical methods. Software, database design", "span": "(Instrumentation and Methods for Astrophysics)" }, { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.ed-ph", "description": "Report of results of a research study, laboratory experience, assessment or classroom practice that represents a way to improve teaching and learning in physics. Also, report on misconceptions of students, textbook errors, and other similar information relative to promoting physics understanding.", "span": "(Physics Education)" } ]
0909.3911
R Doomun
Yon Ping Chen, and Tien Der Yeh
A Method for Extraction and Recognition of Isolated License Plate Characters
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 1-10, August 2009, USA
null
ISSN 1947 5500
cs.CV
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A method to extract and recognize isolated characters in license plates is proposed. In extraction stage, the proposed method detects isolated characters by using Difference-of-Gaussian (DOG) function, The DOG function, similar to Laplacian of Gaussian function, was proven to produce the most stable image features compared to a range of other possible image functions. The candidate characters are extracted by doing connected component analysis on different scale DOG images. In recognition stage, a novel feature vector named accumulated gradient projection vector (AGPV) is used to compare the candidate character with the standard ones. The AGPV is calculated by first projecting pixels of similar gradient orientations onto specific axes, and then accumulates the projected gradient magnitudes by each axis. In the experiments, the AGPVs are proven to be invariant from image scaling and rotation, and robust to noise and illumination change.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 05:38:32 GMT" } ]
2009-09-23T00:00:00
[ [ "Chen", "Yon Ping", "" ], [ "Der Yeh", "Tien", "" ] ]
[ { "class": "Computer Science", "code": "cs.CV", "description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.", "span": "(Computer Vision and Pattern Recognition)" } ]
0909.3917
Damien Chablat
Anatoly Pashkevich (IRCCyN), Alexandr Klimchik (IRCCyN), Damien Chablat (IRCCyN), Philippe Wenger (IRCCyN)
Stiffness Analysis Of Multi-Chain Parallel Robotic Systems
null
Journal of Automation, Mobile Robotics and Intelligent Systems 3, 3 (2009) 75-82
null
JA2009
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper presents a new stiffness modelling method for multi-chain parallel robotic manipulators with flexible links and compliant actuating joints. In contrast to other works, the method involves a FEA-based link stiffness evaluation and employs a new solution strategy of the kinetostatic equations, which allows computing the stiffness matrix for singular postures and to take into account influence of the external forces. The advantages of the developed technique are confirmed by application examples, which deal with stiffness analysis of a parallel manipulator of the Orthoglide family
[ { "version": "v1", "created": "Tue, 22 Sep 2009 06:38:24 GMT" } ]
2009-09-23T00:00:00
[ [ "Pashkevich", "Anatoly", "", "IRCCyN" ], [ "Klimchik", "Alexandr", "", "IRCCyN" ], [ "Chablat", "Damien", "", "IRCCyN" ], [ "Wenger", "Philippe", "", "IRCCyN" ] ]
[ { "class": "Computer Science", "code": "cs.RO", "description": "Roughly includes material in ACM Subject Class I.2.9.", "span": "(Robotics)" } ]
0909.3930
Bill Rosgen
Bill Rosgen
Computational Distinguishability of Quantum Channels
Ph.D. Thesis, 178 pages, 35 figures
null
null
null
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The computational problem of distinguishing two quantum channels is central to quantum computing. It is a generalization of the well-known satisfiability problem from classical to quantum computation. This problem is shown to be surprisingly hard: it is complete for the class QIP of problems that have quantum interactive proof systems, which implies that it is hard for the class PSPACE of problems solvable by a classical computation in polynomial space. Several restrictions of distinguishability are also shown to be hard. It is no easier when restricted to quantum computations of logarithmic depth, to mixed-unitary channels, to degradable channels, or to antidegradable channels. These hardness results are demonstrated by finding reductions between these classes of quantum channels. These techniques have applications outside the distinguishability problem, as the construction for mixed-unitary channels is used to prove that the additivity problem for the classical capacity of quantum channels can be equivalently restricted to the mixed unitary channels.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 11:17:39 GMT" } ]
2009-09-24T00:00:00
[ [ "Rosgen", "Bill", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.3931
Sunil Pandey Mr.
Sunil Pandey and Praveen Kaushik and Dr.S.C. Shrivastava
Rossler Nonlinear Dynamical Machine for Cryptography Applications
5 pages, 3 figures
null
null
null
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In many of the cryptography applications like password or IP address encryption schemes, symmetric cryptography is useful. In these relatively simpler applications of cryptography, asymmetric cryptography is difficult to justify on account of the computational and implementation complexities associated with asymmetric cryptography. Symmetric schemes make use of a single shared key known only between the two communicating hosts. This shared key is used both for the encryption as well as the decryption of data. This key has to be small in size besides being a subset of a potentially large keyspace making it convenient for the communicating hosts while at the same time making cryptanalysis difficult for the potential attackers. In the present work, an abstract Rossler nonlinear dynamical machine has been described first. The Rossler system exhibits chaotic dynamics for certain values of system parameters and initial conditions. The chaotic dynamics of the Rossler system with its apparently erratic and irregular characteristics and extreme sensitivity to the initial conditions has been used for the design of the cryptographic key in an attempt to increase the confusion and the challenge for the potential attackers.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 08:42:36 GMT" } ]
2009-09-23T00:00:00
[ [ "Pandey", "Sunil", "" ], [ "Kaushik", "Praveen", "" ], [ "Shrivastava", "Dr. S. C.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.3966
Ananthanarayanan Chockalingam
P. Ubaidulla and A. Chockalingam
Robust THP Transceiver Designs for Multiuser MIMO Downlink with Imperfect CSIT
Accepted for publication in EURASIP Journal on Advances in Signal Processing: Special Issue on Multiuser MIMO Transmission with Limited Feedback, Cooperation, and Coordination
null
10.1155/2009/473930
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we present robust joint non-linear transceiver designs for multiuser multiple-input multiple-output (MIMO) downlink in the presence of imperfections in the channel state information at the transmitter (CSIT). The base station (BS) is equipped with multiple transmit antennas, and each user terminal is equipped with one or more receive antennas. The BS employs Tomlinson-Harashima precoding (THP) for inter-user interference pre-cancellation at the transmitter. We consider robust transceiver designs that jointly optimize the transmit THP filters and receive filter for two models of CSIT errors. The first model is a stochastic error (SE) model, where the CSIT error is Gaussian-distributed. This model is applicable when the CSIT error is dominated by channel estimation error. In this case, the proposed robust transceiver design seeks to minimize a stochastic function of the sum mean square error (SMSE) under a constraint on the total BS transmit power. We propose an iterative algorithm to solve this problem. The other model we consider is a norm-bounded error (NBE) model, where the CSIT error can be specified by an uncertainty set. This model is applicable when the CSIT error is dominated by quantization errors. In this case, we consider a worst-case design. For this model, we consider robust i) minimum SMSE, ii) MSE-constrained, and iii) MSE-balancing transceiver designs. We propose iterative algorithms to solve these problems, wherein each iteration involves a pair of semi-definite programs (SDP). Further, we consider an extension of the proposed algorithm to the case with per-antenna power constraints.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 11:24:03 GMT" } ]
2016-02-17T00:00:00
[ [ "Ubaidulla", "P.", "" ], [ "Chockalingam", "A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.3976
Vadim Madgazin
Vadim R. Madgazin
The Information Theory of Emotions of Musical Chords
18 pages, 2 figures, in English, and copy in Russian
null
null
null
cs.SD q-bio.NC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The paper offers a solution to the centuries-old puzzle - why the major chords are perceived as happy and the minor chords as sad - based on the information theory of emotions. A theory and a formula of musical emotions were created. They define the sign and the amplitude of the utilitarian emotional coloration of separate major and minor chords through relative pitches of constituent sounds. Keywords: chord, major, minor, the formula of musical emotions, the information theory of emotions.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 12:24:19 GMT" }, { "version": "v2", "created": "Sat, 10 Sep 2011 12:02:21 GMT" } ]
2011-09-13T00:00:00
[ [ "Madgazin", "Vadim R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.SD", "description": "Covers all aspects of computing with sound, and sound as an information channel. Includes models of sound, analysis and synthesis, audio user interfaces, sonification of data, computer music, and sound signal processing. Includes ACM Subject Class H.5.5, and intersects with H.1.2, H.5.1, H.5.2, I.2.7, I.5.4, I.6.3, J.5, K.4.2.", "span": "(Sound)" }, { "class": "Quantitative Biology", "code": "q-bio.NC", "description": "Synapse, cortex, neuronal dynamics, neural network, sensorimotor control, behavior, attention", "span": "(Neurons and Cognition)" } ]
0909.3997
Pascal Vanier
Emmanuel Jeandel, Pascal Vanier
Periodicity in tilings
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tilings and tiling systems are an abstract concept that arise both as a computational model and as a dynamical system. In this paper, we characterize the sets of periods that a tiling system can produce. We prove that up to a slight recoding, they correspond exactly to languages in the complexity classes $\nspace{n}$ and $\cne$.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 13:49:42 GMT" } ]
2009-09-23T00:00:00
[ [ "Jeandel", "Emmanuel", "" ], [ "Vanier", "Pascal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4004
Robert Brijder
Robert Brijder, Hendrik Jan Hoogeboom
The Group Structure of Pivot and Loop Complementation on Graphs and Set Systems
21 pages, 7 figures, significant additions w.r.t. v3 are Thm 7 and Remark 25
European Journal of Combinatorics, v. 32, 1353-1367, 2011
10.1016/j.ejc.2011.03.002
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the interplay between principal pivot transform (pivot) and loop complementation for graphs. This is done by generalizing loop complementation (in addition to pivot) to set systems. We show that the operations together, when restricted to single vertices, form the permutation group S_3. This leads, e.g., to a normal form for sequences of pivots and loop complementation on graphs. The results have consequences for the operations of local complementation and edge complementation on simple graphs: an alternative proof of a classic result involving local and edge complementation is obtained, and the effect of sequences of local complementations on simple graphs is characterized.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 15:42:06 GMT" }, { "version": "v2", "created": "Mon, 5 Oct 2009 17:41:52 GMT" }, { "version": "v3", "created": "Tue, 4 May 2010 16:27:00 GMT" }, { "version": "v4", "created": "Mon, 18 Apr 2011 09:50:54 GMT" } ]
2014-03-26T00:00:00
[ [ "Brijder", "Robert", "" ], [ "Hoogeboom", "Hendrik Jan", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" } ]
0909.4011
Micha{\l} Adamaszek
Anna Adamaszek, Michal Adamaszek
Large-girth roots of graphs
14 pages, 4 figures
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the problem of recognizing graph powers and computing roots of graphs. We provide a polynomial time recognition algorithm for r-th powers of graphs of girth at least 2r+3, thus improving a bound conjectured by Farzad et al. (STACS 2009). Our algorithm also finds all r-th roots of a given graph that have girth at least 2r+3 and no degree one vertices, which is a step towards a recent conjecture of Levenshtein that such root should be unique. On the negative side, we prove that recognition becomes an NP-complete problem when the bound on girth is about twice smaller. Similar results have so far only been attempted for r=2,3.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 14:46:55 GMT" } ]
2009-09-23T00:00:00
[ [ "Adamaszek", "Anna", "" ], [ "Adamaszek", "Michal", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4013
David Monniaux
David Monniaux (VERIMAG - IMAG)
Automatic modular abstractions for template numerical constraints
null
null
null
null
cs.PL cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose a method for automatically generating abstract transformers for static analysis by abstract interpretation. The method focuses on linear constraints on programs operating on rational, real or floating-point variables and containing linear assignments and tests. In addition to loop-free code, the same method also applies for obtaining least fixed points as functions of the precondition, which permits the analysis of loops and recursive functions. Our algorithms are based on new quantifier elimination and symbolic manipulation techniques. Given the specification of an abstract domain, and a program block, our method automatically outputs an implementation of the corresponding abstract transformer. It is thus a form of program transformation. The motivation of our work is data-flow synchronous programming languages, used for building control-command embedded systems, but it also applies to imperative and functional programming.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 14:49:17 GMT" }, { "version": "v2", "created": "Mon, 31 May 2010 06:43:29 GMT" } ]
2010-07-28T00:00:00
[ [ "Monniaux", "David", "", "VERIMAG - IMAG" ] ]
[ { "class": "Computer Science", "code": "cs.PL", "description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.", "span": "(Programming Languages)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.4017
Chiachi Huang
Chiachi Huang, Syed A. Jafar, Shlomo Shamai (Shitz), Sriram Vishwanath
On Degrees of Freedom Region of MIMO Networks without CSIT
14 pages, 5 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we study the effect of the absence of channel knowledge for multiple-input-multiple-output (MIMO) networks. Specifically, we assume perfect channel state information at the receivers, no channel state information at the transmitter(s), and independent identically distributed (i.i.d.) Rayleigh fading across antennas, users and time slots. We provide the characterization of the degrees of freedom (DoF) region for a 2-user MIMO broadcast channel. We then provide a DoF region outer bound for a 2-user MIMO interference channel. This bound is shown to be tight for all possible combinations of the number of antennas at each node except for one case. As a byproduct of this analysis we point out the potential of interference alignment in the 2-user MIMO interference channel with no CSIT.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 15:35:05 GMT" } ]
2009-09-23T00:00:00
[ [ "Huang", "Chiachi", "", "Shitz" ], [ "Jafar", "Syed A.", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ], [ "Vishwanath", "Sriram", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4021
Marek Cygan
Marek Cygan, Marcin Pilipczuk and Jakub Onufry Wojtaszczyk
Beyond O*(2^n) in domination-type problems
Submitted to STACS 2010
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we provide algorithms faster than O*(2^n) for several NP-complete domination-type problems. More precisely, we provide: an algorithm for CAPACITATED DOMINATING SET that solves it in O(1.89^n), a branch-and-reduce algorithm solving LARGEST IRREDUNDANT SET in O(1.9657^n) time and a simple iterative-DFS algorithm for SMALLEST INCLUSION-MAXIMAL IRREDUNDANT SET that solves it in O(1.999956^n) time. We also provide an exponential approximation scheme for CAPACITATED DOMINATING SET. All algorithms require polynomial space. Despite the fact that the discussed problems are quite similar to the DOMINATING SET problem, we are not aware of any published algorithms solving these problems faster than the obvious O*(2^n) solution prior to this paper.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 17:06:28 GMT" } ]
2009-09-23T00:00:00
[ [ "Cygan", "Marek", "" ], [ "Pilipczuk", "Marcin", "" ], [ "Wojtaszczyk", "Jakub Onufry", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4094
Adrian Dumitrescu
Adrian Dumitrescu and Csaba D. T\'oth
Long non-crossing configurations in the plane
12 pages, 4 figures
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We revisit several maximization problems for geometric networks design under the non-crossing constraint, first studied by Alon, Rajagopalan and Suri (ACM Symposium on Computational Geometry, 1993). Given a set of $n$ points in the plane in general position (no three points collinear), compute a longest non-crossing configuration composed of straight line segments that is: (a) a matching (b) a Hamiltonian path (c) a spanning tree. Here we obtain new results for (b) and (c), as well as for the Hamiltonian cycle problem: (i) For the longest non-crossing Hamiltonian path problem, we give an approximation algorithm with ratio $\frac{2}{\pi+1} \approx 0.4829$. The previous best ratio, due to Alon et al., was $1/\pi \approx 0.3183$. Moreover, the ratio of our algorithm is close to $2/\pi$ on a relatively broad class of instances: for point sets whose perimeter (or diameter) is much shorter than the maximum length matching. The algorithm runs in $O(n^{7/3}\log{n})$ time. (ii) For the longest non-crossing spanning tree problem, we give an approximation algorithm with ratio 0.502 which runs in $O(n \log{n})$ time. The previous ratio, 1/2, due to Alon et al., was achieved by a quadratic time algorithm. Along the way, we first re-derive the result of Alon et al. with a faster $O(n \log{n})$-time algorithm and a very simple analysis. (iii) For the longest non-crossing Hamiltonian cycle problem, we give an approximation algorithm whose ratio is close to $2/\pi$ on a relatively broad class of instances: for point sets with the product $\bf{<}$diameter$\times$ convex hull size $\bf{>}$ much smaller than the maximum length matching. The algorithm runs in $O(n^{7/3}\log{n})$ time. No previous approximation results were known for this problem.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 21:07:10 GMT" }, { "version": "v2", "created": "Wed, 16 Dec 2009 23:43:31 GMT" }, { "version": "v3", "created": "Wed, 3 Feb 2010 12:32:02 GMT" } ]
2010-02-03T00:00:00
[ [ "Dumitrescu", "Adrian", "" ], [ "Tóth", "Csaba D.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.4101
Gregorio Malajovich
Felipe Cucker, Teresa Krick, Gregorio Malajovich, Mario Wschebor
A Numerical Algorithm for Zero Counting. II: Distance to Ill-posedness and Smoothed Analysis
null
Journal of Fixed Point Theory and Applications 6 No 2, pp 285-294 (Dec. 2009)
10.1007/s11784-009-0127-4
null
cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We show a Condition Number Theorem for the condition number of zero counting for real polynomial systems. That is, we show that this condition number equals the inverse of the normalized distance to the set of ill-posed systems (i.e., those having multiple real zeros). As a consequence, a smoothed analysis of this condition number follows.
[ { "version": "v1", "created": "Tue, 22 Sep 2009 21:42:51 GMT" } ]
2010-07-12T00:00:00
[ [ "Cucker", "Felipe", "" ], [ "Krick", "Teresa", "" ], [ "Malajovich", "Gregorio", "" ], [ "Wschebor", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0909.4119
Igor L. Markov
Shigeru Yamashita and Igor L. Markov
Fast Equivalence-checking for Quantum Circuits
Minor change of some wording
Quant. Inf. and Comp., vol. 9, no. 9,10 (2010), pp. 721-734
null
null
quant-ph cs.ET
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We perform formal verification of quantum circuits by integrating several techniques specialized to particular classes of circuits. Our verification methodology is based on the new notion of a reversible miter that allows one to leverage existing techniques for circuit simplification of quantum circuits. For reversible circuits which arise as runtime bottlenecks of key quantum algorithms, we develop several verification techniques and empirically compare them. We also combine existing quantum verification tools with the use of SAT-solvers. Experiments with circuits for Shor's number-factoring algorithm, containing thousands of gates, show improvements in efficiency by 3-4 orders of magnitude.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 02:09:40 GMT" }, { "version": "v2", "created": "Sat, 3 Oct 2009 04:35:49 GMT" }, { "version": "v3", "created": "Tue, 30 Apr 2013 06:37:28 GMT" } ]
2013-05-01T00:00:00
[ [ "Yamashita", "Shigeru", "" ], [ "Markov", "Igor L.", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.ET", "description": "Covers approaches to information processing (computing, communication, sensing) and bio-chemical analysis based on alternatives to silicon CMOS-based technologies, such as nanoscale electronic, photonic, spin-based, superconducting, mechanical, bio-chemical and quantum technologies (this list is not exclusive). Topics of interest include (1) building blocks for emerging technologies, their scalability and adoption in larger systems, including integration with traditional technologies, (2) modeling, design and optimization of novel devices and systems, (3) models of computation, algorithm design and programming for emerging technologies.", "span": "(Emerging Technologies)" } ]
0909.4126
Yaming Yu
Yaming Yu
On an Inequality of Karlin and Rinott Concerning Weighted Sums of i.i.d. Random Variables
<= 4 pages
Adv. in Appl. Probab. 40 (2008) 1223-1226
10.1239/aap/1231340171
null
cs.IT math.IT math.PR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an entropy comparison result concerning weighted sums of independent and identically distributed random variables.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 03:14:47 GMT" } ]
2009-09-24T00:00:00
[ [ "Yu", "Yaming", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" } ]
0909.4177
Tiangao Gou
Tiangao Gou, Syed A. Jafar, Chenwei Wang
On the Degrees of Freedom of Finite State Compound Wireless Networks - Settling a Conjecture by Weingarten et. al
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We explore the degrees of freedom (DoF) of three classes of finite state compound wireless networks in this paper. First, we study the multiple-input single-output (MISO) finite state compound broadcast channel (BC) with arbitrary number of users and antennas at the transmitter. In prior work, Weingarten et. al. have found inner and outer bounds on the DoF with 2 users. The bounds have a different character. While the inner bound collapses to unity as the number of states increases, the outer bound does not diminish with the increasing number of states beyond a threshold value. It has been conjectured that the outer bound is loose and the inner bound represents the actual DoF. In the complex setting (all signals, noise, and channel coefficients are complex variables) we solve a few cases to find that the outer bound -and not the inner bound- of Weingarten et. al. is tight. For the real setting (all signals, noise and channel coefficients are real variables) we completely characterize the DoF, once again proving that the outer bound of Weingarten et. al. is tight. We also extend the results to arbitrary number of users. Second, we characterize the DoF of finite state scalar (single antenna nodes) compound X networks with arbitrary number of users in the real setting. Third, we characterize the DoF of finite state scalar compound interference networks with arbitrary number of users in both the real and complex setting. The key finding is that scalar interference networks and (real) X networks do not lose any DoF due to channel uncertainty at the transmitter in the finite state compound setting. The finite state compound MISO BC does lose DoF relative to the perfect CSIT scenario. However, what is lost is only the DoF benefit of joint processing at transmit antennas, without which the MISO BC reduces to an X network.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 19:59:23 GMT" } ]
2009-09-24T00:00:00
[ [ "Gou", "Tiangao", "" ], [ "Jafar", "Syed A.", "" ], [ "Wang", "Chenwei", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4196
R Doomun
Sabah S. Al-Fedaghi, Bernhard Thalheim
Personal Information Databases
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
Sabah S. Al-Fedaghi, Bernhard Thalheim, International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 11-20, August 2009, USA
null
ISSN 1947 5500
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
One of the most important aspects of security organization is to establish a framework to identify security significant points where policies and procedures are declared. The (information) security infrastructure comprises entities, processes, and technology. All are participants in handling information, which is the item that needs to be protected. Privacy and security information technology is a critical and unmet need in the management of personal information. This paper proposes concepts and technologies for management of personal information. Two different types of information can be distinguished: personal information and nonpersonal information. Personal information can be either personal identifiable information (PII), or nonidentifiable information (NII). Security, policy, and technical requirements can be based on this distinction. At the conceptual level, PII is defined and formalized by propositions over infons (discrete pieces of information) that specify transformations in PII and NII. PII is categorized into simple infons that reflect the proprietor s aspects, relationships with objects, and relationships with other proprietors. The proprietor is the identified person about whom the information is communicated. The paper proposes a database organization that focuses on the PII spheres of proprietors. At the design level, the paper describes databases of personal identifiable information built exclusively for this type of information, with their own conceptual scheme, system management, and physical structure.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 12:55:26 GMT" } ]
2009-09-24T00:00:00
[ [ "Al-Fedaghi", "Sabah S.", "" ], [ "Thalheim", "Bernhard", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.4202
R Doomun
S Santhosh Baboo, Nikhil Lobo
Improving Effectiveness Of ELearning In Maintenance Using Interactive 3D
4 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
Lt.Dr.S Santhosh Baboo, Nikhil Lobo, International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 21-24, August 2009, USA
null
ISSN 1947 5500
cs.CY cs.HC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In aerospace and defense, training is being carried out on the web by viewing PowerPoint presentations, manuals and videos that are limited in their ability to convey information to the technician. Interactive training in the form of 3D is a more cost effective approach compared to creation of physical simulations and mockups. This paper demonstrates how training using interactive 3D simulations in elearning achieves a reduction in the time spent in training and improves the efficiency of a trainee performing the installation or removal.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 13:17:10 GMT" } ]
2009-09-24T00:00:00
[ [ "Baboo", "S Santhosh", "" ], [ "Lobo", "Nikhil", "" ] ]
[ { "class": "Computer Science", "code": "cs.CY", "description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.", "span": "(Computers and Society)" }, { "class": "Computer Science", "code": "cs.HC", "description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.", "span": "(Human-Computer Interaction)" } ]
0909.4203
Amos Lapidoth
Young-Han Kim, Amos Lapidoth, and Tsachy Weissman
Error Exponents for the Gaussian Channel with Active Noisy Feedback
Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the best exponential decay in the blocklength of the probability of error that can be achieved in the transmission of a single bit over the Gaussian channel with an active noisy Gaussian feedback link. We impose an \emph{expected} block power constraint on the forward link and study both \emph{almost-sure} and \emph{expected} block power constraints on the feedback link. In both cases the best achievable error exponents are finite and grow approximately proportionally to the larger between the signal-to-noise ratios on the forward and feedback links. The error exponents under almost-sure block power constraints are typically strictly smaller than under expected constraints. Some of the results extend to communication at arbitrary rates below capacity and to general discrete memoryless channels.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 13:19:56 GMT" } ]
2009-09-24T00:00:00
[ [ "Kim", "Young-Han", "" ], [ "Lapidoth", "Amos", "" ], [ "Weissman", "Tsachy", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4224
Henning Fernau
Ljiljana Brankovic, Henning Fernau, Joachim Kneis, Dieter Kratsch Alexander Langer Mathieu Liedloff Daniel Raible Peter Rossmanith
Breaking the 2^n-Barrier for Irredundance: A Parameterized Route to Solving Exact Puzzles
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The lower and the upper irredundance numbers of a graph $G$, denoted $ir(G)$ and $IR(G)$ respectively, are conceptually linked to domination and independence numbers and have numerous relations to other graph parameters. It is a long-standing open question whether determining these numbers for a graph $G$ on $n$ vertices admits exact algorithms running in time less than the trivial $\Omega(2^n)$ enumeration barrier. We solve these open problems by devising parameterized algorithms for the dual of the natural parameterizations of the problems with running times faster than $O^*(4^{k})$. For example, we present an algorithm running in time $O^*(3.069^{k})$ for determining whether $IR(G)$ is at least $n-k$. Although the corresponding problem has been known to be in FPT by kernelization techniques, this paper offers the first parameterized algorithms with an exponential dependency on the parameter in the running time. Additionally, our work also appears to be the first example of a parameterized approach leading to a solution to a problem in exponential time algorithmics where the natural interpretation as an exact exponential-time algorithm fails.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 15:01:24 GMT" } ]
2009-09-24T00:00:00
[ [ "Brankovic", "Ljiljana", "" ], [ "Fernau", "Henning", "" ], [ "Kneis", "Joachim", "" ], [ "Rossmanith", "Dieter Kratsch Alexander Langer Mathieu Liedloff Daniel Raible Peter", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4233
Jacob Ziv
Jacob Ziv
On the optimality of universal classifiers for finite-length individual test sequences
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider pairs of finite-length individual sequences that are realizations of unknown, finite alphabet, stationary sources in a clas M of sources with vanishing memory (e.g. stationary Markov sources). The task of a universal classifier is to decide whether the two sequences are emerging from the same source or are emerging from two distinct sources in M, and it has to carry this task without any prior knowledge of the two underlying probability measures. Given a fidelity function and a fidelity criterion, the probability of classification error for a given universal classifier is defined. Two universal classifiers are defined for pairs of $N$ -sequence: A "classical" fixed-length (FL) universal classifier and an alternative variable-length (VL) universal classifier. Following Wyner and Ziv (1996) it is demonstrated that if the length of the individual sequences N is smaller than a cut-off value that is determined by the properties of the class M, any universal classifier will fail with high probability . It is demonstrated that for values of N larger than the cut-off rate, the classification error relative to either one of the two classifiers tends to zero as the length of the sequences tends to infinity. However, the probability of classification error that is associated with the variable-length universal classifier is uniformly smaller (or equal) to the one that is associated with the "classical" fixed-length universal classifier, for any finite length.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 16:04:19 GMT" }, { "version": "v2", "created": "Wed, 23 Sep 2009 21:19:07 GMT" }, { "version": "v3", "created": "Thu, 8 Oct 2009 14:03:44 GMT" }, { "version": "v4", "created": "Fri, 16 Oct 2009 11:39:55 GMT" }, { "version": "v5", "created": "Thu, 25 Nov 2010 11:16:18 GMT" }, { "version": "v6", "created": "Mon, 4 Jul 2011 08:11:03 GMT" }, { "version": "v7", "created": "Wed, 26 Oct 2011 19:28:55 GMT" }, { "version": "v8", "created": "Mon, 7 Nov 2011 04:32:41 GMT" } ]
2011-11-08T00:00:00
[ [ "Ziv", "Jacob", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4260
R Doomun
Olalekan S. Akinola, Adenike O. Osofisan
An Empirical Comparative Study of Checklist based and Ad Hoc Code Reading Techniques in a Distributed Groupware Environment
11 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
Olalekan S. Akinola, and Adenike O. Osofisan, International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 25-35, September 2009, USA
null
ISSN 1947 5500
cs.OH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Software inspection is a necessary and important tool for software quality assurance. Since it was introduced by Fagan at IBM in 1976, arguments exist as to which method should be adopted to carry out the exercise, whether it should be paper based or tool based, and what reading technique should be used on the inspection document. Extensive works have been done to determine the effectiveness of reviewers in paper based environment when using ad hoc and checklist reading techniques. In this work, we take the software inspection research further by examining whether there is going to be any significant difference in defect detection effectiveness of reviewers when they use either ad hoc or checklist reading techniques in a distributed groupware environment. Twenty final year undergraduate students of computer science, divided into ad hoc and checklist reviewers groups of ten members each were employed to inspect a medium sized java code synchronously on groupware deployed on the Internet. The data obtained were subjected to tests of hypotheses using independent T test and correlation coefficients. Results from the study indicate that there are no significant differences in the defect detection effectiveness, effort in terms of time taken in minutes and false positives reported by the reviewers using either ad hoc or checklist based reading techniques in the distributed groupware environment studied.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 17:36:55 GMT" }, { "version": "v2", "created": "Thu, 1 Oct 2009 18:34:21 GMT" } ]
2009-10-01T00:00:00
[ [ "Akinola", "Olalekan S.", "" ], [ "Osofisan", "Adenike O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.OH", "description": "This is the classification to use for documents that do not fit anywhere else.", "span": "(Other Computer Science)" } ]
0909.4275
Ilya Safro
Jie Chen and Ilya Safro
A Measure of the Connection Strengths between Graph Vertices with Applications
null
null
null
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a simple iterative strategy for measuring the connection strength between a pair of vertices in a graph. The method is attractive in that it has a linear complexity and can be easily parallelized. Based on an analysis of the convergence property, we propose a mutually reinforcing model to explain the intuition behind the strategy. The practical effectiveness of this measure is demonstrated through several combinatorial optimization problems on graphs and hypergraphs.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 18:31:32 GMT" } ]
2009-09-24T00:00:00
[ [ "Chen", "Jie", "" ], [ "Safro", "Ilya", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4280
Laurent Romary
Harry Bunt, Laurent Romary (INRIA Lorraine - LORIA)
Towards Multimodal Content Representation
Colloque avec actes et comit\'e de lecture. internationale
LREC Workshop on International Standards of Terminology and Language Resources Management, Las Palams : Spain (2002)
null
A02-R-095 || bunt02a
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multimodal interfaces, combining the use of speech, graphics, gestures, and facial expressions in input and output, promise to provide new possibilities to deal with information in more effective and efficient ways, supporting for instance: - the understanding of possibly imprecise, partial or ambiguous multimodal input; - the generation of coordinated, cohesive, and coherent multimodal presentations; - the management of multimodal interaction (e.g., task completion, adapting the interface, error prevention) by representing and exploiting models of the user, the domain, the task, the interactive context, and the media (e.g. text, audio, video). The present document is intended to support the discussion on multimodal content representation, its possible objectives and basic constraints, and how the definition of a generic representation framework for multimodal content representation may be approached. It takes into account the results of the Dagstuhl workshop, in particular those of the informal working group on multimodal meaning representation that was active during the workshop (see http://www.dfki.de/~wahlster/Dagstuhl_Multi_Modality, Working Group 4).
[ { "version": "v1", "created": "Wed, 23 Sep 2009 18:55:53 GMT" } ]
2009-09-24T00:00:00
[ [ "Bunt", "Harry", "", "INRIA Lorraine - LORIA" ], [ "Romary", "Laurent", "", "INRIA Lorraine - LORIA" ] ]
[ { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" } ]
0909.4314
David Spivak
David I. Spivak
Higher-dimensional models of networks
null
null
null
null
cs.NI cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Networks are often studied as graphs, where the vertices stand for entities in the world and the edges stand for connections between them. While relatively easy to study, graphs are often inadequate for modeling real-world situations, especially those that include contexts of more than two entities. For these situations, one typically uses hypergraphs or simplicial complexes. In this paper, we provide a precise framework in which graphs, hypergraphs, simplicial complexes, and many other categories, all of which model higher graphs, can be studied side-by-side. We show how to transform a hypergraph into its nearest simplicial analogue, for example. Our framework includes many new categories as well, such as one that models broadcasting networks. We give several examples and applications of these ideas.
[ { "version": "v1", "created": "Wed, 23 Sep 2009 20:37:20 GMT" } ]
2009-09-25T00:00:00
[ [ "Spivak", "David I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4341
Travis Gagie
Paolo Ferragina, Travis Gagie and Giovanni Manzini
Lightweight Data Indexing and Compression in External Memory
null
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we describe algorithms for computing the BWT and for building (compressed) indexes in external memory. The innovative feature of our algorithms is that they are lightweight in the sense that, for an input of size $n$, they use only ${n}$ bits of disk working space while all previous approaches use $\Th{n \log n}$ bits of disk working space. Moreover, our algorithms access disk data only via sequential scans, thus they take full advantage of modern disk features that make sequential disk accesses much faster than random accesses. We also present a scan-based algorithm for inverting the BWT that uses $\Th{n}$ bits of working space, and a lightweight {\em internal-memory} algorithm for computing the BWT which is the fastest in the literature when the available working space is $\os{n}$ bits. Finally, we prove {\em lower} bounds on the complexity of computing and inverting the BWT via sequential scans in terms of the classic product: internal-memory space $\times$ number of passes over the disk data.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 18:23:20 GMT" } ]
2009-09-25T00:00:00
[ [ "Ferragina", "Paolo", "" ], [ "Gagie", "Travis", "" ], [ "Manzini", "Giovanni", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4348
Jan Vondrak
Chandra Chekuri, Jan Vondrak, Rico Zenklusen
Dependent Randomized Rounding for Matroid Polytopes and Applications
Rico Zenklusen joined as an author; paper substantially expanded compared to previous version; note a slight change in the title
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by several applications, we consider the problem of randomly rounding a fractional solution in a matroid (base) polytope to an integral one. We consider the pipage rounding technique and also present a new technique, randomized swap rounding. Our main technical results are concentration bounds for functions of random variables arising from these rounding techniques. We prove Chernoff-type concentration bounds for linear functions of random variables arising from both techniques, and also a lower-tail exponential bound for monotone submodular functions of variables arising from randomized swap rounding. The following are examples of our applications: (1) We give a (1-1/e-epsilon)-approximation algorithm for the problem of maximizing a monotone submodular function subject to 1 matroid and k linear constraints, for any constant k and epsilon>0. (2) We present a result on minimax packing problems that involve a matroid base constraint. We give an O(log m / log log m)-approximation for the general problem Min {lambda: x \in {0,1}^N, x \in B(M), Ax <= lambda b}, where m is the number of packing constraints. (3) We generalize the continuous greedy algorithm to problems involving multiple submodular functions, and use it to find a (1-1/e-epsilon)-approximate pareto set for the problem of maximizing a constant number of monotone submodular functions subject to a matroid constraint. An example is the Submodular Welfare Problem where we are looking for an approximate pareto set with respect to individual players' utilities.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 17:03:10 GMT" }, { "version": "v2", "created": "Fri, 6 Nov 2009 23:26:04 GMT" } ]
2009-11-07T00:00:00
[ [ "Chekuri", "Chandra", "" ], [ "Vondrak", "Jan", "" ], [ "Zenklusen", "Rico", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4349
Yilun Shang
Yilun Shang
Leader-following Consensus Problems with a Time-varying Leader under Measurement Noises
12 pages 3 figures
null
null
null
cs.MA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we consider a leader-following consensus problem for networks of continuous-time integrator agents with a time-varying leader under measurement noises. We propose a neighbor-based state-estimation protocol for every agent to track the leader, and time-varying consensus gains are introduced to attenuate the noises. By combining the tools of stochastic analysis and algebraic graph theory, we study mean square convergence of this multi-agent system under directed fixed as well as switching interconnection topologies. Sufficient conditions are given for mean square consensus in both cases. Finally, a numerical example is given to illustrate our theoretical results.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 02:05:06 GMT" } ]
2009-09-25T00:00:00
[ [ "Shang", "Yilun", "" ] ]
[ { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4359
Yilun Wang
Yilun Wang and Wotao Yin
Sparse Signal Reconstruction via Iterative Support Detection
null
SIAM Journal on Imaging Sciences, 3(3), 462-491, 2010
10.1137/090772447
null
cs.IT math.IT math.NA math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a novel sparse signal reconstruction method "ISD", aiming to achieve fast reconstruction and a reduced requirement on the number of measurements compared to the classical l_1 minimization approach. ISD addresses failed reconstructions of l_1 minimization due to insufficient measurements. It estimates a support set I from a current reconstruction and obtains a new reconstruction by solving the minimization problem \min{\sum_{i\not\in I}|x_i|:Ax=b}, and it iterates these two steps for a small number of times. ISD differs from the orthogonal matching pursuit (OMP) method, as well as its variants, because (i) the index set I in ISD is not necessarily nested or increasing and (ii) the minimization problem above updates all the components of x at the same time. We generalize the Null Space Property to Truncated Null Space Property and present our analysis of ISD based on the latter. We introduce an efficient implementation of ISD, called threshold--ISD, for recovering signals with fast decaying distributions of nonzeros from compressive sensing measurements. Numerical experiments show that threshold--ISD has significant advantages over the classical l_1 minimization approach, as well as two state--of--the--art algorithms: the iterative reweighted l_1 minimization algorithm (IRL1) and the iterative reweighted least--squares algorithm (IRLS). MATLAB code is available for download from http://www.caam.rice.edu/~optimization/L1/ISD/.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 04:11:33 GMT" }, { "version": "v2", "created": "Mon, 5 Jul 2010 19:32:39 GMT" } ]
2015-11-23T00:00:00
[ [ "Wang", "Yilun", "" ], [ "Yin", "Wotao", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0909.4362
Heidi Gebauer
Heidi Gebauer
A Strategy for Maker in the Clique Game which Helps to Tackle some Open Problems by Beck
12 pages, no figure
null
null
null
cs.GT cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study Maker/Breaker games on the edges of the complete graph, as introduced by Chvatal and Erdos. We show that in the (m:b) clique game played on K_{N}, the complete graph on N vertices, Maker can achieve a K_{q} for q = (m/(log_{2}(b + 1)) - o(1)) * log N, which partially solves an open problem by Beck. Moreover, we show that in the (1:1) clique game played on K_{N} for a sufficiently large N, Maker can achieve a K_{q} in only 2^(2q/3) moves, which improves the previous best bound and answers a question of Beck. Finally we consider the so called tournament game. A tournament is a directed graph where every pair of vertices is connected by a single directed edge. The tournament game is played on K_{N}. At the beginning Breaker fixes an arbitrary tournament T_{q} on q vertices. Maker and Breaker then alternately take turns at claiming one unclaimed edge e and selecting one of the two possible orientations. Maker wins if his graph contains a copy of the goal tournament T_{q}; otherwise Breaker wins. We show that Maker wins the tournament game on K_{N} with q = (1 - o(1))*log_{2}(N) which supports the random graph intuition: the threshold for q is asymptotically the same for the game played by two "clever'' players and the game played by two ``random'' players. This last result solves an open problem of Beck which he included in his list of the seven most humiliating open problems.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 18:02:01 GMT" }, { "version": "v2", "created": "Thu, 24 Sep 2009 23:49:49 GMT" } ]
2009-09-25T00:00:00
[ [ "Gebauer", "Heidi", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4369
Bernard Mans
Paola Flocchini, Bernard Mans and Nicola Santoro
Exploration of Periodically Varying Graphs
22 pages. Shorter paper (10 pages) accepted at ISAAC 2009. ISAAC'09, The 20th International Symposium on Algorithms and Computation, December 16-18, 2008, Hawaii, USA. Exploration of Periodically Varying Graphs, P. Flocchini, B. Mans and N. Santoro, Springer-LNCS vol. 5878, accepted Aug. 2009, Y. Dong, D.-Z. Du, and O. Ibarra (Eds), to appear
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the computability and complexity of the exploration problem in a class of highly dynamic graphs: periodically varying (PV) graphs, where the edges exist only at some (unknown) times defined by the periodic movements of carriers. These graphs naturally model highly dynamic infrastructure-less networks such as public transports with fixed timetables, low earth orbiting (LEO) satellite systems, security guards' tours, etc. We establish necessary conditions for the problem to be solved. We also derive lower bounds on the amount of time required in general, as well as for the PV graphs defined by restricted classes of carriers movements: simple routes, and circular routes. We then prove that the limitations on computability and complexity we have established are indeed tight. In fact we prove that all necessary conditions are also sufficient and all lower bounds on costs are tight. We do so constructively presenting two worst case optimal solution algorithms, one for anonymous systems, and one for those with distinct nodes ids. An added benefit is that the algorithms are rather simple.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 06:01:25 GMT" } ]
2009-09-25T00:00:00
[ [ "Flocchini", "Paola", "" ], [ "Mans", "Bernard", "" ], [ "Santoro", "Nicola", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4385
Sebastian Bernhardsson
Sebastian Bernhardsson, Luis Enrique Correa da Rocha and Petter Minnhagen
The meta book and size-dependent properties of written language
7 pages, 6 figures, 1 table
New J. Phys. 11 (2009) 123015
10.1088/1367-2630/11/12/123015
null
physics.soc-ph cs.CL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Evidence is given for a systematic text-length dependence of the power-law index gamma of a single book. The estimated gamma values are consistent with a monotonic decrease from 2 to 1 with increasing length of a text. A direct connection to an extended Heap's law is explored. The infinite book limit is, as a consequence, proposed to be given by gamma = 1 instead of the value gamma=2 expected if the Zipf's law was ubiquitously applicable. In addition we explore the idea that the systematic text-length dependence can be described by a meta book concept, which is an abstract representation reflecting the word-frequency structure of a text. According to this concept the word-frequency distribution of a text, with a certain length written by a single author, has the same characteristics as a text of the same length pulled out from an imaginary complete infinite corpus written by the same author.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 08:50:49 GMT" } ]
2009-12-10T00:00:00
[ [ "Bernhardsson", "Sebastian", "" ], [ "da Rocha", "Luis Enrique Correa", "" ], [ "Minnhagen", "Petter", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.CL", "description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.", "span": "(Computation and Language)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0909.4409
Mohamed El-Zawawy
Mohamed A. El-Zawawy, Mohamed E. El-Sharkawi
Clustering with Obstacles in Spatial Databases
In Proc. 2001 IEEE Int. Symposium of Signal Processing and Information Technology (ISSPIT01), pages 420-425, Cairo, Egypt, Dec. 2001
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clustering large spatial databases is an important problem, which tries to find the densely populated regions in a spatial area to be used in data mining, knowledge discovery, or efficient information retrieval. However most algorithms have ignored the fact that physical obstacles such as rivers, lakes, and highways exist in the real world and could thus affect the result of the clustering. In this paper, we propose CPO, an efficient clustering technique to solve the problem of clustering in the presence of obstacles. The proposed algorithm divides the spatial area into rectangular cells. Each cell is associated with statistical information used to label the cell as dense or non-dense. It also labels each cell as obstructed (i.e. intersects any obstacle) or nonobstructed. For each obstructed cell, the algorithm finds a number of non-obstructed sub-cells. Then it finds the dense regions of non-obstructed cells or sub-cells by a breadthfirst search as the required clusters with a center to each region.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 10:52:58 GMT" } ]
2009-09-25T00:00:00
[ [ "El-Zawawy", "Mohamed A.", "" ], [ "El-Sharkawi", "Mohamed E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.4412
Mohamed El-Zawawy
Mohamed E. El-Sharkawi, Mohamed A. El-Zawawy
Algorithm for Spatial Clustering with Obstacles
In Proc. 2002 ICICIS Int. Conference on Intelligent Computing and Information Systems (ICICIS02), Cairo, Egypt, June 2002
null
null
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we propose an efficient clustering technique to solve the problem of clustering in the presence of obstacles. The proposed algorithm divides the spatial area into rectangular cells. Each cell is associated with statistical information that enables us to label the cell as dense or non-dense. We also label each cell as obstructed (i.e. intersects any obstacle) or non-obstructed. Then the algorithm finds the regions (clusters) of connected, dense, non-obstructed cells. Finally, the algorithm finds a center for each such region and returns those centers as centers of the relatively dense regions (clusters) in the spatial area.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 11:09:15 GMT" } ]
2009-09-25T00:00:00
[ [ "El-Sharkawi", "Mohamed E.", "" ], [ "El-Zawawy", "Mohamed A.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DB", "description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.", "span": "(Databases)" } ]
0909.4416
Magnus Boman
Olof Gornerup, Magnus Boman
A baseline for content-based blog classification
6 pages, 4 figures New version has higher resolution for figures 2 and 3
null
null
null
cs.IR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A content-based network representation of web logs (blogs) using a basic word-overlap similarity measure is presented. Due to a strong signal in blog data the approach is sufficient for accurately classifying blogs. Using Swedish blog data we demonstrate that blogs that treat similar subjects are organized in clusters that, in turn, are hierarchically organized in higher-order clusters. The simplicity of the representation renders it both computationally tractable and transparent. We therefore argue that the approach is suitable as a baseline when developing and analyzing more advanced content-based representations of the blogosphere.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 12:27:02 GMT" }, { "version": "v2", "created": "Fri, 25 Sep 2009 14:17:26 GMT" } ]
2009-09-25T00:00:00
[ [ "Gornerup", "Olof", "" ], [ "Boman", "Magnus", "" ] ]
[ { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" } ]
0909.4437
Toby Walsh
Maria Pini, Francesca Rossi, Brent Venable and Toby Walsh
Manipulation and gender neutrality in stable marriage procedures
8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 1
null
null
null
cs.AI cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The stable marriage problem is a well-known problem of matching men to women so that no man and woman who are not married to each other both prefer each other. Such a problem has a wide variety of practical applications ranging from matching resident doctors to hospitals to matching students to schools. A well-known algorithm to solve this problem is the Gale-Shapley algorithm, which runs in polynomial time. It has been proven that stable marriage procedures can always be manipulated. Whilst the Gale-Shapley algorithm is computationally easy to manipulate, we prove that there exist stable marriage procedures which are NP-hard to manipulate. We also consider the relationship between voting theory and stable marriage procedures, showing that voting rules which are NP-hard to manipulate can be used to define stable marriage procedures which are themselves NP-hard to manipulate. Finally, we consider the issue that stable marriage procedures like Gale-Shapley favour one gender over the other, and we show how to use voting rules to make any stable marriage procedure gender neutral.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 13:26:38 GMT" } ]
2009-09-25T00:00:00
[ [ "Pini", "Maria", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "Brent", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.4441
Toby Walsh
Maria Pini, Francesca Rossi, Brent Venable and Toby Walsh
Dealing with incomplete agents' preferences and an uncertain agenda in group decision making via sequential majority voting
Principles of Knowledge Representation and Reasoning: Proceedings of the Eleventh International Conference, KR 2008, Sydney, Australia, September 16-19, 2008
null
null
null
cs.AI cs.GT cs.MA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider multi-agent systems where agents' preferences are aggregated via sequential majority voting: each decision is taken by performing a sequence of pairwise comparisons where each comparison is a weighted majority vote among the agents. Incompleteness in the agents' preferences is common in many real-life settings due to privacy issues or an ongoing elicitation process. In addition, there may be uncertainty about how the preferences are aggregated. For example, the agenda (a tree whose leaves are labelled with the decisions being compared) may not yet be known or fixed. We therefore study how to determine collectively optimal decisions (also called winners) when preferences may be incomplete, and when the agenda may be uncertain. We show that it is computationally easy to determine if a candidate decision always wins, or may win, whatever the agenda. On the other hand, it is computationally hard to know wheth er a candidate decision wins in at least one agenda for at least one completion of the agents' preferences. These results hold even if the agenda must be balanced so that each candidate decision faces the same number of majority votes. Such results are useful for reasoning about preference elicitation. They help understand the complexity of tasks such as determining if a decision can be taken collectively, as well as knowing if the winner can be manipulated by appropriately ordering the agenda.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 13:41:53 GMT" } ]
2012-04-18T00:00:00
[ [ "Pini", "Maria", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "Brent", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.MA", "description": "Covers multiagent systems, distributed artificial intelligence, intelligent agents, coordinated interactions. and practical applications. Roughly covers ACM Subject Class I.2.11.", "span": "(Multiagent Systems)" } ]
0909.4446
Toby Walsh
Mirco Gelain, Maria Pini, Francesca Rossi, Brent Venable and Toby Walsh
Elicitation strategies for fuzzy constraint problems with missing preferences: algorithms and experimental studies
Principles and Practice of Constraint Programming, 14th International Conference, CP 2008, Sydney, Australia, September 14-18, 2008. Proceedings
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. We consider here fuzzy constraint problems where some of the preferences may be missing. This models, for example, settings where agents are distributed and have privacy issues, or where there is an ongoing preference elicitation process. In this setting, we study how to find a solution which is optimal irrespective of the missing preferences. In the process of finding such a solution, we may elicit preferences from the user if necessary. However, our goal is to ask the user as little as possible. We define a combined solving and preference elicitation scheme with a large number of different instantiations, each corresponding to a concrete algorithm which we compare experimentally. We compute both the number of elicited preferences and the "user effort", which may be larger, as it contains all the preference values the user has to compute to be able to respond to the elicitation requests. While the number of elicited preferences is important when the concern is to communicate as little information as possible, the user effort measures also the hidden work the user has to do to be able to communicate the elicited preferences. Our experimental results show that some of our algorithms are very good at finding a necessarily optimal solution while asking the user for only a very small fraction of the missing preferences. The user effort is also very small for the best algorithms. Finally, we test these algorithms on hard constraint problems with possibly missing constraints, where the aim is to find feasible solutions irrespective of the missing constraints.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 13:54:38 GMT" } ]
2009-09-25T00:00:00
[ [ "Gelain", "Mirco", "" ], [ "Pini", "Maria", "" ], [ "Rossi", "Francesca", "" ], [ "Venable", "Brent", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.4452
Toby Walsh
Michael J. Maher and Nina Narodytska and Claude-Guy Quimper and Toby Walsh
Flow-Based Propagators for the SEQUENCE and Related Global Constraints
Principles and Practice of Constraint Programming, 14th International Conference, CP 2008, Sydney, Australia, September 14-18, 2008. Proceedings
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We propose new filtering algorithms for the SEQUENCE constraint and some extensions of the SEQUENCE constraint based on network flows. We enforce domain consistency on the SEQUENCE constraint in $O(n^2)$ time down a branch of the search tree. This improves upon the best existing domain consistency algorithm by a factor of $O(\log n)$. The flows used in these algorithms are derived from a linear program. Some of them differ from the flows used to propagate global constraints like GCC since the domains of the variables are encoded as costs on the edges rather than capacities. Such flows are efficient for maintaining bounds consistency over large domains and may be useful for other global constraints.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 14:05:14 GMT" } ]
2009-09-25T00:00:00
[ [ "Maher", "Michael J.", "" ], [ "Narodytska", "Nina", "" ], [ "Quimper", "Claude-Guy", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.4456
Toby Walsh
George Katsirelos and Nina Narodytska and Toby Walsh
The Weighted CFG Constraint
Integration of AI and OR Techniques in Constraint Programming for Combinatorial Optimization Problems, 5th International Conference, CPAIOR 2008, Paris, France, May 20-23, 2008, Proceedings
null
null
null
cs.AI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the weighted CFG constraint and propose a propagation algorithm that enforces domain consistency in $O(n^3|G|)$ time. We show that this algorithm can be decomposed into a set of primitive arithmetic constraints without hindering propagation.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 14:17:40 GMT" } ]
2009-09-25T00:00:00
[ [ "Katsirelos", "George", "" ], [ "Narodytska", "Nina", "" ], [ "Walsh", "Toby", "" ] ]
[ { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" } ]
0909.4457
Loet Leydesdorff
Loet Leydesdorff
How are new citation-based journal indicators adding to the bibliometric toolbox?
null
Journal of the American Society for Information Science and Technology 60(7) (2009) 1327-1336
null
null
physics.soc-ph cs.DL physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The launching of Scopus and Google Scholar, and methodological developments in Social Network Analysis have made many more indicators for evaluating journals available than the traditional Impact Factor, Cited Half-life, and Immediacy Index of the ISI. In this study, these new indicators are compared with one another and with the older ones. Do the various indicators measure new dimensions of the citation networks, or are they highly correlated among them? Are they robust and relatively stable over time? Two main dimensions are distinguished -- size and impact -- which together shape influence. The H-index combines the two dimensions and can also be considered as an indicator of reach (like Indegree). PageRank is mainly an indicator of size, but has important interactions with centrality measures. The Scimago Journal Ranking (SJR) indicator provides an alternative to the Journal Impact Factor, but the computation is less easy.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 14:18:02 GMT" } ]
2009-09-25T00:00:00
[ [ "Leydesdorff", "Loet", "" ] ]
[ { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" }, { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0909.4474
Blaise Faugeras
Jacques Blum (JAD), Cedric Boulbe (JAD), Blaise Faugeras (JAD)
Reconstruction of the equilibrium of the plasma in a Tokamak and identification of the current density profile in real time
null
null
null
null
math.NA cs.SY math.AP math.OC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The reconstruction of the equilibrium of a plasma in a Tokamak is a free boundary problem described by the Grad-Shafranov equation in axisymmetric configuration. The right-hand side of this equation is a nonlinear source, which represents the toroidal component of the plasma current density. This paper deals with the identification of this nonlinearity source from experimental measurements in real time. The proposed method is based on a fixed point algorithm, a finite element resolution, a reduced basis method and a least-square optimization formulation. This is implemented in a software called Equinox with which several numerical experiments are conducted to explore the identification problem. It is shown that the identification of the profile of the averaged current density and of the safety factor as a function of the poloidal flux is very robust.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 14:59:43 GMT" }, { "version": "v2", "created": "Tue, 14 Dec 2010 08:14:20 GMT" }, { "version": "v3", "created": "Thu, 17 Mar 2011 17:18:06 GMT" } ]
2011-03-18T00:00:00
[ [ "Blum", "Jacques", "", "JAD" ], [ "Boulbe", "Cedric", "", "JAD" ], [ "Faugeras", "Blaise", "", "JAD" ] ]
[ { "class": "Mathematics", "code": "math.NA", "description": "Numerical algorithms for problems in analysis and algebra, scientific computation", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.SY", "description": "cs.SY is an alias for eess.SY. This section includes theoretical and experimental research covering all facets of automatic control systems. The section is focused on methods of control system analysis and design using tools of modeling, simulation and optimization. Specific areas of research include nonlinear, distributed, adaptive, stochastic and robust control in addition to hybrid and discrete event systems. Application areas include automotive and aerospace control systems, network control, biological systems, multiagent and cooperative control, robotics, reinforcement learning, sensor networks, control of cyber-physical and energy-related systems, and control of computing systems.", "span": "(Systems and Control)" }, { "class": "Mathematics", "code": "math.AP", "description": "Existence and uniqueness, boundary conditions, linear and non-linear operators, stability, soliton theory, integrable PDE's, conservation laws, qualitative dynamics", "span": "(Analysis of PDEs)" }, { "class": "Mathematics", "code": "math.OC", "description": "Operations research, linear programming, control theory, systems theory, optimal control, game theory", "span": "(Optimization and Control)" } ]
0909.4479
Simon Perdrix
Elham Kashefi, Damian Markham, Mehdi Mhalla, Simon Perdrix
Information Flow in Secret Sharing Protocols
null
EPTCS 9, 2009, pp. 87-97
10.4204/EPTCS.9.10
null
quant-ph cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The entangled graph states have emerged as an elegant and powerful quantum resource, indeed almost all multiparty protocols can be written in terms of graph states including measurement based quantum computation (MBQC), error correction and secret sharing amongst others. In addition they are at the forefront in terms of implementations. As such they represent an excellent opportunity to move towards integrated protocols involving many of these elements. In this paper we look at expressing and extending graph state secret sharing and MBQC in a common framework and graphical language related to flow. We do so with two main contributions. First we express in entirely graphical terms which set of players can access which information in graph state secret sharing protocols. These succinct graphical descriptions of access allow us to take known results from graph theory to make statements on the generalisation of the previous schemes to present new secret sharing protocols. Second, we give a set of necessary conditions as to when a graph with flow, i.e. capable of performing a class of unitary operations, can be extended to include vertices which can be ignored, pointless measurements, and hence considered as unauthorised players in terms of secret sharing, or error qubits in terms of fault tolerance. This offers a way to extend existing MBQC patterns to secret sharing protocols. Our characterisation of pointless measurements is believed also to be a useful tool for further integrated measurement based schemes, for example in constructing fault tolerant MBQC schemes.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 15:25:34 GMT" }, { "version": "v2", "created": "Fri, 13 Nov 2009 00:06:12 GMT" } ]
2009-11-13T00:00:00
[ [ "Kashefi", "Elham", "" ], [ "Markham", "Damian", "" ], [ "Mhalla", "Mehdi", "" ], [ "Perdrix", "Simon", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.4484
Walid Hachem
Walid Hachem, Eric Moulines, Francois Roueff
Error exponents for Neyman-Pearson detection of a continuous-time Gaussian Markov process from noisy irregular samples
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper addresses the detection of a stochastic process in noise from irregular samples. We consider two hypotheses. The \emph{noise only} hypothesis amounts to model the observations as a sample of a i.i.d. Gaussian random variables (noise only). The \emph{signal plus noise} hypothesis models the observations as the samples of a continuous time stationary Gaussian process (the signal) taken at known but random time-instants corrupted with an additive noise. Two binary tests are considered, depending on which assumptions is retained as the null hypothesis. Assuming that the signal is a linear combination of the solution of a multidimensional stochastic differential equation (SDE), it is shown that the minimum Type II error probability decreases exponentially in the number of samples when the False Alarm probability is fixed. This behavior is described by \emph{error exponents} that are completely characterized. It turns out that they are related with the asymptotic behavior of the Kalman Filter in random stationary environment, which is studied in this paper. Finally, numerical illustrations of our claims are provided in the context of sensor networks.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 16:00:41 GMT" } ]
2009-09-25T00:00:00
[ [ "Hachem", "Walid", "" ], [ "Moulines", "Eric", "" ], [ "Roueff", "Francois", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4516
Jos\'e I. Orlicki
Jos\'e I. Orlicki
SQL/JavaScript Hybrid Worms As Two-stage Quines
15 pages, 11 figures, Workshop de Seguridad Informatica, 38 JAIIO, Mar Del Plata, Argentina
null
null
null
cs.CR cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Delving into present trends and anticipating future malware trends, a hybrid, SQL on the server-side, JavaScript on the client-side, self-replicating worm based on two-stage quines was designed and implemented on an ad-hoc scenario instantiating a very common software pattern. The proof of concept code combines techniques seen in the wild, in the form of SQL injections leading to cross-site scripting JavaScript inclusion, and seen in the laboratory, in the form of SQL quines propa- gated via RFIDs, resulting in a hybrid code injection. General features of hybrid worms are also discussed.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 18:47:17 GMT" } ]
2009-09-25T00:00:00
[ [ "Orlicki", "José I.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.4569
Amiram Wingarten
Amos Fiat, Amiram Wingarten
Envy, Multi Envy, and Revenue Maximization
null
null
null
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the envy free pricing problem faced by a seller who wishes to maximize revenue by setting prices for bundles of items. If there is an unlimited supply of items and agents are single minded then we show that finding the revenue maximizing envy free allocation/pricing can be solved in polynomial time by reducing it to an instance of weighted independent set on a perfect graph. We define an allocation/pricing as \textit{multi envy free} if no agent wishes to replace her allocation with the union of the allocations of some set of other agents and her price with the sum of their prices. We show that it is \textit{coNP}-hard to decide if a given allocation/pricing is multi envy free. We also show that revenue maximization multi envy free allocation/pricing is \textit{APX} hard. Furthermore, we give efficient algorithms and hardness results for various variants of the highway problem.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 22:30:39 GMT" } ]
2016-09-08T00:00:00
[ [ "Fiat", "Amos", "" ], [ "Wingarten", "Amiram", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.4573
Chris Ng
Chris T. K. Ng and Howard Huang
Efficient Linear Precoding in Downlink Cooperative Cellular Networks with Soft Interference Nulling
To appear at the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, September 30 - October 2, 2009, Monticello, Illinois
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A simple line network model is proposed to study the downlink cellular network. Without base station cooperation, the system is interference-limited. The interference limitation is overcome when the base stations are allowed to jointly encode the user signals, but the capacity-achieving dirty paper coding scheme can be too complex for practical implementation. A new linear precoding technique called soft interference nulling (SIN) is proposed, which performs at least as well as zero-forcing (ZF) beamforming under full network coordination. Unlike ZF, SIN allows the possibility of but over-penalizes interference. The SIN precoder is computed by solving a convex optimization problem, and the formulation is extended to multiple-antenna channels. SIN can be applied when only a limited number of base stations cooperate; it is shown that SIN under partial network coordination can outperform full network coordination ZF at moderate SNRs.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 23:28:25 GMT" } ]
2009-09-28T00:00:00
[ [ "Ng", "Chris T. K.", "" ], [ "Huang", "Howard", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4575
Narasimha Shashidhar
Aggelos Kiayias, Alexander Russell, Narasimha Shashidhar
Randomness Efficient Steganography
19 pages
null
null
null
cs.CR cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Steganographic protocols enable one to embed covert messages into inconspicuous data over a public communication channel in such a way that no one, aside from the sender and the intended receiver, can even detect the presence of the secret message. In this paper, we provide a new provably-secure, private-key steganographic encryption protocol secure in the framework of Hopper et al. We first present a "one-time stegosystem" that allows two parties to transmit messages of length at most that of the shared key with information-theoretic security guarantees. The employment of a pseudorandom generator (PRG) permits secure transmission of longer messages in the same way that such a generator allows the use of one-time pad encryption for messages longer than the key in symmetric encryption. The advantage of our construction, compared to all previous work is randomness efficiency: in the information theoretic setting our protocol embeds a message of length n bits using a shared secret key of length (1+o(1))n bits while achieving security 2^{-n/log^{O(1)}n}; simply put this gives a rate of key over message that is 1 as n tends to infinity (the previous best result achieved a constant rate greater than 1 regardless of the security offered). In this sense, our protocol is the first truly randomness efficient steganographic system. Furthermore, in our protocol, we can permit a portion of the shared secret key to be public while retaining precisely n private key bits. In this setting, by separating the public and the private randomness of the shared key, we achieve security of 2^{-n}. Our result comes as an effect of the application of randomness extractors to stegosystem design. To the best of our knowledge this is the first time extractors have been applied in steganography.
[ { "version": "v1", "created": "Thu, 24 Sep 2009 23:47:05 GMT" }, { "version": "v2", "created": "Fri, 3 Feb 2012 17:43:49 GMT" } ]
2012-02-06T00:00:00
[ [ "Kiayias", "Aggelos", "" ], [ "Russell", "Alexander", "" ], [ "Shashidhar", "Narasimha", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4588
Marcus Hutter
Marcus Hutter
Discrete MDL Predicts in Total Variation
15 LaTeX pages
Advances in Neural Information Processing Systems 22 (NIPS 2009) pages 817-825
null
null
math.PR cs.IT cs.LG math.IT math.ST stat.ML stat.TH
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The Minimum Description Length (MDL) principle selects the model that has the shortest code for data plus model. We show that for a countable class of models, MDL predictions are close to the true distribution in a strong sense. The result is completely general. No independence, ergodicity, stationarity, identifiability, or other assumption on the model class need to be made. More formally, we show that for any countable class of models, the distributions selected by MDL (or MAP) asymptotically predict (merge with) the true measure in the class in total variation distance. Implications for non-i.i.d. domains like time-series forecasting, discriminative learning, and reinforcement learning are discussed.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 02:57:17 GMT" } ]
2010-12-30T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
[ { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.ST", "description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies", "span": "(Statistics Theory)" }, { "class": "Statistics", "code": "stat.ML", "description": "Covers machine learning papers (supervised, unsupervised, semi-supervised learning, graphical models, reinforcement learning, bandits, high dimensional inference, etc.) with a statistical or theoretical grounding", "span": "(Machine Learning)" }, { "class": "Statistics", "code": "stat.TH", "description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.", "span": "(Statistics Theory)" } ]
0909.4589
Kai Cai
Kai Cai, Rongquan Feng, and Zhiming Zheng
Cross-correlation properties of cyclotomic sequences
null
This paper have been published in IEICE Trans. Fund., 2007
null
null
cs.IT cs.DM math.CO math.IT
http://creativecommons.org/licenses/publicdomain/
Sequences with good correlation properties are widely used in engineering applications, especially in the area of communications. Among the known sequences, cyclotomic families have the optimal autocorrelation property. In this paper, we decide the cross-correlation function of the known cyclotomic sequences completely. Moreover, to get our results, the relations between the multiplier group and the decimations of the characteristic sequence are also established for an arbitrary difference set.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 02:57:51 GMT" } ]
2009-09-28T00:00:00
[ [ "Cai", "Kai", "" ], [ "Feng", "Rongquan", "" ], [ "Zheng", "Zhiming", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4592
Kai Cai
Kai Cai
Autocorrelation-Run Formula for Binary Sequences
18 pages, 1 figure
null
null
null
cs.IT cs.DM math.CO math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The autocorrelation function and the run structure are two basic notions for binary sequences, and have been used as two independent postulates to test randomness of binary sequences ever since Golomb 1955. In this paper, we prove for binary sequence that the autocorrelation function is in fact completely determined by its run structure.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 03:16:07 GMT" }, { "version": "v2", "created": "Sun, 22 Aug 2010 08:05:03 GMT" } ]
2015-03-13T00:00:00
[ [ "Cai", "Kai", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Mathematics", "code": "math.CO", "description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory", "span": "(Combinatorics)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4601
Ning Chen
Ning Chen, Zhiyuan Yan, Maximilien Gadouleau, Ying Wang, and Bruce W. Suter
Rank Metric Decoder Architectures for Random Linear Network Coding with Error Control
14 pages, 12 figures, accepted by IEEE Trans. VLSI Syst
null
10.1109/TVLSI.2010.2096239
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
While random linear network coding is a powerful tool for disseminating information in communication networks, it is highly susceptible to errors caused by various sources. Due to error propagation, errors greatly deteriorate the throughput of network coding and seriously undermine both reliability and security of data. Hence error control for network coding is vital. Recently, constant-dimension codes (CDCs), especially K\"otter-Kschischang (KK) codes, have been proposed for error control in random linear network coding. KK codes can also be constructed from Gabidulin codes, an important class of rank metric codes. Rank metric decoders have been recently proposed for both Gabidulin and KK codes, but they have high computational complexities. Furthermore, it is not clear whether such decoders are feasible and suitable for hardware implementations. In this paper, we reduce the complexities of rank metric decoders and propose novel decoder architectures for both codes. The synthesis results of our decoder architectures for Gabidulin and KK codes with limited error-correcting capabilities over small fields show that our architectures not only are affordable, but also achieve high throughput.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 04:20:29 GMT" }, { "version": "v2", "created": "Wed, 14 Jul 2010 05:35:45 GMT" }, { "version": "v3", "created": "Sat, 22 Jan 2011 06:46:46 GMT" } ]
2016-11-15T00:00:00
[ [ "Chen", "Ning", "" ], [ "Yan", "Zhiyuan", "" ], [ "Gadouleau", "Maximilien", "" ], [ "Wang", "Ying", "" ], [ "Suter", "Bruce W.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4603
James Petterson
James Petterson, Tiberio Caetano
Scalable Inference for Latent Dirichlet Allocation
null
null
null
null
cs.LG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the problem of learning a topic model - the well-known Latent Dirichlet Allocation - in a distributed manner, using a cluster of C processors and dividing the corpus to be learned equally among them. We propose a simple approximated method that can be tuned, trading speed for accuracy according to the task at hand. Our approach is asynchronous, and therefore suitable for clusters of heterogenous machines.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 05:23:33 GMT" } ]
2009-09-28T00:00:00
[ [ "Petterson", "James", "" ], [ "Caetano", "Tiberio", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" } ]
0909.4604
Akbar Ghasemi
Akbar Ghasemi, Abolfazl Seyed Motahari, and Amir Keyvan Khandani
Interference Alignment for the $K$ User MIMO Interference Channel
25 pages, 4 figures, Presented in part at ISIT 2010, submitted to IEEE Transactions on Information Theory, June 2011
null
10.1109/ISIT.2010.5513347
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the $K$-user Multiple Input Multiple Output (MIMO) Gaussian interference channel with $M$ antennas at each transmitter and $N$ antennas at each receiver. It is assumed that channel coefficients are constant and are available at all transmitters and at all receivers. The main objective of this paper is to characterize the Degrees of Freedom (DoF) for this channel. Using a new interference alignment technique which has been recently introduced in \cite{abolfazl-final}, we show that $\frac{MN}{M+N} K$ degrees of freedom can be achieved for almost all channel realizations. Also, a new upper-bound on the DoF of this channel is provided. This upper-bound coincides with our achievable DoF for $K\geq K_u\define\frac{M+N}{\gcd(M,N)}$, where $\gcd(M,N)$ denotes the greatest common divisor of $M$ and $N$. This gives an exact characterization of DoF for $M\times N$ MIMO Gaussian interference channel in the case of $K\geq K_u$.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 18:57:37 GMT" }, { "version": "v2", "created": "Wed, 21 Sep 2011 21:47:24 GMT" } ]
2016-11-15T00:00:00
[ [ "Ghasemi", "Akbar", "" ], [ "Motahari", "Abolfazl Seyed", "" ], [ "Khandani", "Amir Keyvan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4607
Troy Lee
Troy Lee
A note on the sign degree of formulas
7 pages
null
null
null
cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recent breakthroughs in quantum query complexity have shown that any formula of size n can be evaluated with O(sqrt(n)log(n)/log log(n)) many quantum queries in the bounded-error setting [FGG08, ACRSZ07, RS08b, Rei09]. In particular, this gives an upper bound on the approximate polynomial degree of formulas of the same magnitude, as approximate polynomial degree is a lower bound on quantum query complexity [BBCMW01]. These results essentially answer in the affirmative a conjecture of O'Donnell and Servedio [O'DS03] that the sign degree--the minimal degree of a polynomial that agrees in sign with a function on the Boolean cube--of every formula of size n is O(sqrt(n)). In this note, we show that sign degree is super-multiplicative under function composition. Combining this result with the above mentioned upper bounds on the quantum query complexity of formulas allows the removal of logarithmic factors to show that the sign degree of every size n formula is at most sqrt(n).
[ { "version": "v1", "created": "Fri, 25 Sep 2009 05:26:07 GMT" } ]
2009-09-28T00:00:00
[ [ "Lee", "Troy", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.4637
Norbert Schirmer
Ernie Cohen and Norbert Schirmer
A Better Reduction Theorem for Store Buffers
null
null
null
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
When verifying a concurrent program, it is usual to assume that memory is sequentially consistent. However, most modern multiprocessors depend on store buffering for efficiency, and provide native sequential consistency only at a substantial performance penalty. To regain sequential consistency, a programmer has to follow an appropriate programming discipline. However, na\"ive disciplines, such as protecting all shared accesses with locks, are not flexible enough for building high-performance multiprocessor software. We present a new discipline for concurrent programming under TSO (total store order, with store buffer forwarding). It does not depend on concurrency primitives, such as locks. Instead, threads use ghost operations to acquire and release ownership of memory addresses. A thread can write to an address only if no other thread owns it, and can read from an address only if it owns it or it is shared and the thread has flushed its store buffer since it last wrote to an address it did not own. This discipline covers both coarse-grained concurrency (where data is protected by locks) as well as fine-grained concurrency (where atomic operations race to memory). We formalize this discipline in Isabelle/HOL, and prove that if every execution of a program in a system without store buffers follows the discipline, then every execution of the program with store buffers is sequentially consistent. Thus, we can show sequential consistency under TSO by ordinary assertional reasoning about the program, without having to consider store buffers at all.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 08:45:19 GMT" } ]
2009-09-28T00:00:00
[ [ "Cohen", "Ernie", "" ], [ "Schirmer", "Norbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.4642
Marc Scherfenberg
Christian Knauer, Maarten L\"offler, Marc Scherfenberg, Thomas Wolle
The directed Hausdorff distance between imprecise point sets
null
null
null
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the directed Hausdorff distance between point sets in the plane, where one or both point sets consist of imprecise points. An imprecise point is modelled by a disc given by its centre and a radius. The actual position of an imprecise point may be anywhere within its disc. Due to the direction of the Hausdorff Distance and whether its tight upper or lower bound is computed there are several cases to consider. For every case we either show that the computation is NP-hard or we present an algorithm with a polynomial running time. Further we give several approximation algorithms for the hard cases and show that one of them cannot be approximated better than with factor 3, unless P=NP.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 15:25:25 GMT" } ]
2009-09-30T00:00:00
[ [ "Knauer", "Christian", "" ], [ "Löffler", "Maarten", "" ], [ "Scherfenberg", "Marc", "" ], [ "Wolle", "Thomas", "" ] ]
[ { "class": "Computer Science", "code": "cs.CG", "description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.", "span": "(Computational Geometry)" } ]
0909.4686
Haralampos Tsaknakis
Haralampos Tsaknakis and Paul G. Spirakis
A Graph Spectral Approach for Computing Approximate Nash Equilibria
14 pages
null
null
null
cs.GT cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a new methodology for computing approximate Nash equilibria for two-person non-cooperative games based upon certain extensions and specializations of an existing optimization approach previously used for the derivation of fixed approximations for this problem. In particular, the general two-person problem is reduced to an indefinite quadratic programming problem of special structure involving the $n \times n$ adjacency matrix of an induced simple graph specified by the input data of the game, where $n$ is the number of players' strategies. Using this methodology and exploiting certain properties of the positive part of the spectrum of the induced graph, we show that for any $\varepsilon > 0$ there is an algorithm to compute an $\varepsilon$-approximate Nash equilibrium in time $n^{\xi(m)/\varepsilon}$, where, $\xi (m) = \sum_{i=1}^m \lambda_i / n$ and $\lambda_1, \lambda_2, >..., \lambda_m$ are the positive eigenvalues of the adjacency matrix of the graph. For classes of games for which $\xi (m)$ is a constant, there is a PTAS. Based on the best upper bound derived for $\xi(m)$ so far, the worst case complexity of the method is bounded by the subexponential $n^{\sqrt{m}/\varepsilon}$.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 12:58:59 GMT" } ]
2009-09-28T00:00:00
[ [ "Tsaknakis", "Haralampos", "" ], [ "Spirakis", "Paul G.", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4692
Frederic Dorn Harald
Frederic Dorn
Planar Subgraph Isomorphism Revisited
13 pages, 4 figures
null
null
null
cs.DS cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The problem of Subgraph Isomorphism is defined as follows: Given a pattern H and a host graph G on n vertices, does G contain a subgraph that is isomorphic to H? Eppstein [SODA 95, J'GAA 99] gives the first linear time algorithm for subgraph isomorphism for a fixed-size pattern, say of order k, and arbitrary planar host graph, improving upon the O(n^\sqrt{k})-time algorithm when using the ``Color-coding'' technique of Alon et al [J'ACM 95]. Eppstein's algorithm runs in time k^O(k) n, that is, the dependency on k is superexponential. We solve an open problem posed in Eppstein's paper and improve the running time to 2^O(k) n, that is, single exponential in k while keeping the term in n linear. Next to deciding subgraph isomorphism, we can construct a solution and enumerate all solutions in the same asymptotic running time. We may list w subgraphs with an additive term O(w k) in the running time of our algorithm. We introduce the technique of "embedded dynamic programming" on a suitably structured graph decomposition, which exploits the topology of the underlying embeddings of the subgraph pattern (rather than of the host graph). To achieve our results, we give an upper bound on the number of partial solutions in each dynamic programming step as a function of pattern size--as it turns out, for the planar subgraph isomorphism problem, that function is single exponential in the number of vertices in the pattern.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 13:15:31 GMT" } ]
2009-09-28T00:00:00
[ [ "Dorn", "Frederic", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4719
Chinh Hoang
Elaine M. Eschen, Chinh T. Hoang, Jeremy P. Spinrad, R. Sritharan
On graphs without a C4 or a diamond
null
null
null
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the class of (C4, diamond)-free graphs; graphs in this class do not contain a C4 or a diamond as an induced subgraph. We provide an efficient recognition algorithm for this class. We count the number of maximal cliques in a (C4, diamond)-free graph and the number of n-vertex, labeled (C4, diamond)-free graphs. We also give an efficient algorithm for finding a largest clique in the more general class of (house, diamond)-free graphs.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 15:14:46 GMT" } ]
2009-09-28T00:00:00
[ [ "Eschen", "Elaine M.", "" ], [ "Hoang", "Chinh T.", "" ], [ "Spinrad", "Jeremy P.", "" ], [ "Sritharan", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4727
Li-Yang Tan
Ilias Diakonikolas, Rocco A. Servedio, Li-Yang Tan, Andrew Wan
A regularity lemma, and low-weight approximators, for low-degree polynomial threshold functions
23 pages, 0 figures
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give a "regularity lemma" for degree-d polynomial threshold functions (PTFs) over the Boolean cube {-1,1}^n. This result shows that every degree-d PTF can be decomposed into a constant number of subfunctions such that almost all of the subfunctions are close to being regular PTFs. Here a "regular PTF is a PTF sign(p(x)) where the influence of each variable on the polynomial p(x) is a small fraction of the total influence of p. As an application of this regularity lemma, we prove that for any constants d \geq 1, \eps \geq 0, every degree-d PTF over n variables has can be approximated to accuracy eps by a constant-degree PTF that has integer weights of total magnitude O(n^d). This weight bound is shown to be optimal up to constant factors.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 15:54:33 GMT" }, { "version": "v2", "created": "Thu, 6 May 2010 01:37:10 GMT" } ]
2015-03-13T00:00:00
[ [ "Diakonikolas", "Ilias", "" ], [ "Servedio", "Rocco A.", "" ], [ "Tan", "Li-Yang", "" ], [ "Wan", "Andrew", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.4756
Brendan Lucier
Jason D. Hartline and Brendan Lucier
Bayesian Algorithmic Mechanism Design
null
null
10.1257/aer.20130712
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The principal problem in algorithmic mechanism design is in merging the incentive constraints imposed by selfish behavior with the algorithmic constraints imposed by computational intractability. This field is motivated by the observation that the preeminent approach for designing incentive compatible mechanisms, namely that of Vickrey, Clarke, and Groves; and the central approach for circumventing computational obstacles, that of approximation algorithms, are fundamentally incompatible: natural applications of the VCG approach to an approximation algorithm fails to yield an incentive compatible mechanism. We consider relaxing the desideratum of (ex post) incentive compatibility (IC) to Bayesian incentive compatibility (BIC), where truthtelling is a Bayes-Nash equilibrium (the standard notion of incentive compatibility in economics). For welfare maximization in single-parameter agent settings, we give a general black-box reduction that turns any approximation algorithm into a Bayesian incentive compatible mechanism with essentially the same approximation factor.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 18:00:59 GMT" }, { "version": "v2", "created": "Wed, 23 Feb 2011 22:16:38 GMT" } ]
2017-08-21T00:00:00
[ [ "Hartline", "Jason D.", "" ], [ "Lucier", "Brendan", "" ] ]
[ { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.4766
David Gosset
Edward Farhi, Jeffrey Goldstone, David Gosset, Sam Gutmann, Harvey B. Meyer, Peter Shor
Quantum Adiabatic Algorithms, Small Gaps, and Different Paths
The original version considered a unique satisfying assignment and one problematic low lying state. The revision argues that the algorithm with path change will succeed when there are polynomially many low lying states
Quantum Information & Computation, Volume 11 number 3&4, 2011, pages 181-214
null
MIT-CTP 4076, CERN-PH-TH-2009/175
quant-ph cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We construct a set of instances of 3SAT which are not solved efficiently using the simplest quantum adiabatic algorithm. These instances are obtained by picking random clauses all consistent with two disparate planted solutions and then penalizing one of them with a single additional clause. We argue that by randomly modifying the beginning Hamiltonian, one obtains (with substantial probability) an adiabatic path that removes this difficulty. This suggests that the quantum adiabatic algorithm should in general be run on each instance with many different random paths leading to the problem Hamiltonian. We do not know whether this trick will help for a random instance of 3SAT (as opposed to an instance from the particular set we consider), especially if the instance has an exponential number of disparate assignments that violate few clauses. We use a continuous imaginary time Quantum Monte Carlo algorithm in a novel way to numerically investigate the ground state as well as the first excited state of our system. Our arguments are supplemented by Quantum Monte Carlo data from simulations with up to 150 spins.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 19:02:53 GMT" }, { "version": "v2", "created": "Fri, 4 Jun 2010 16:23:21 GMT" } ]
2012-03-30T00:00:00
[ [ "Farhi", "Edward", "" ], [ "Goldstone", "Jeffrey", "" ], [ "Gosset", "David", "" ], [ "Gutmann", "Sam", "" ], [ "Meyer", "Harvey B.", "" ], [ "Shor", "Peter", "" ] ]
[ { "class": "Physics", "code": "quant-ph", "description": "Description coming soon", "span": "(Quantum Physics)" }, { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" } ]
0909.4767
Christine Bachoc
Christine Bachoc (IMB)
Semidefinite programming, harmonic analysis and coding theory
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
These lecture notes where presented as a course of the CIMPA summer school in Manila, July 20-30, 2009, Semidefinite programming in algebraic combinatorics. This version is an update June 2010.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 19:04:18 GMT" }, { "version": "v2", "created": "Wed, 8 Sep 2010 11:37:01 GMT" } ]
2010-09-09T00:00:00
[ [ "Bachoc", "Christine", "", "IMB" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4786
Michael J. Kurtz
Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn Grant, Markus Demleitner and Stephen S. Murray
Worldwide Use and Impact of the NASA Astrophysics Data System Digital Library
ADS bibcode: 2005JASIS..56...36K This is a portion (The bibliometric properties of article readership information is the other part) of the article: The NASA Astrophysics Data System: Sociology, bibliometrics and impact, which went on-line in the summer of 2003
The Journal of the American Society for Information Science and Technology, Vol. 56, p. 36. (2005)
10.1002/asi.20095
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
By combining data from the text, citation, and reference databases with data from the ADS readership logs we have been able to create Second Order Bibliometric Operators, a customizable class of collaborative filters which permits substantially improved accuracy in literature queries. Using the ADS usage logs along with membership statistics from the International Astronomical Union and data on the population and gross domestic product (GDP) we develop an accurate model for world-wide basic research where the number of scientists in a country is proportional to the GDP of that country, and the amount of basic research done by a country is proportional to the number of scientists in that country times that country's per capita GDP. We introduce the concept of utility time to measure the impact of the ADS/URANIA and the electronic astronomical library on astronomical research. We find that in 2002 it amounted to the equivalent of 736 FTE researchers, or $250 Million, or the astronomical research done in France. Subject headings: digital libraries; bibliometrics; sociology of science; information retrieval
[ { "version": "v1", "created": "Fri, 25 Sep 2009 20:31:24 GMT" } ]
2009-09-30T00:00:00
[ [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn", "" ], [ "Demleitner", "Markus", "" ], [ "Murray", "Stephen S.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0909.4789
Michael J. Kurtz
Michael J. Kurtz, Guenther Eichhorn, Alberto Accomazzi, Carolyn S. Grant, Markus Demleitner, Stephen S. Murray, Nathalie Martimbeau, Barbara Elwell
The Bibliometric Properties of Article Readership Information
ADS bibcode: 2005JASIS..56..111K This is the second paper (the first is Worldwide Use and Impact of the NASA Astrophysics Data System Digital Library) from the original article The NASA Astrophysics Data System: Sociology, Bibliometrics, and Impact, which went on-line in the summer of 2003
The Journal of the American Society for Information Science and Technology, Vol. 56, p. 111 (2005)
10.1002/asi.20096
null
cs.DL physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The NASA Astrophysics Data System (ADS), along with astronomy's journals and data centers (a collaboration dubbed URANIA), has developed a distributed on-line digital library which has become the dominant means by which astronomers search, access and read their technical literature. Digital libraries such as the NASA Astrophysics Data System permit the easy accumulation of a new type of bibliometric measure, the number of electronic accesses (``reads'') of individual articles. We explore various aspects of this new measure. We examine the obsolescence function as measured by actual reads, and show that it can be well fit by the sum of four exponentials with very different time constants. We compare the obsolescence function as measured by readership with the obsolescence function as measured by citations. We find that the citation function is proportional to the sum of two of the components of the readership function. This proves that the normative theory of citation is true in the mean. We further examine in detail the similarities and differences between the citation rate, the readership rate and the total citations for individual articles, and discuss some of the causes. Using the number of reads as a bibliometric measure for individuals, we introduce the read-cite diagram to provide a two-dimensional view of an individual's scientific productivity. We develop a simple model to account for an individual's reads and cites and use it to show that the position of a person in the read-cite diagram is a function of age, innate productivity, and work history. We show the age biases of both reads and cites, and develop two new bibliometric measures which have substantially less age bias than citations
[ { "version": "v1", "created": "Fri, 25 Sep 2009 20:29:52 GMT" } ]
2009-09-30T00:00:00
[ [ "Kurtz", "Michael J.", "" ], [ "Eichhorn", "Guenther", "" ], [ "Accomazzi", "Alberto", "" ], [ "Grant", "Carolyn S.", "" ], [ "Demleitner", "Markus", "" ], [ "Murray", "Stephen S.", "" ], [ "Martimbeau", "Nathalie", "" ], [ "Elwell", "Barbara", "" ] ]
[ { "class": "Computer Science", "code": "cs.DL", "description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.", "span": "(Digital Libraries)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0909.4807
Dusan Jakovetic
Dusan Jakovetic, Joao Xavier, Jose' M. F. Moura
Consensus in Correlated Random Topologies: Weights for Finite Time Horizon
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the weight design problem for the consensus algorithm under a finite time horizon. We assume that the underlying network is random where the links fail at each iteration with certain probability and the link failures can be spatially correlated. We formulate a family of weight design criteria (objective functions) that minimize n, n = 1,...,N (out of N possible) largest (slowest) eigenvalues of the matrix that describes the mean squared consensus error dynamics. We show that the objective functions are convex; hence, globally optimal weights (with respect to the design criteria) can be efficiently obtained. Numerical examples on large scale, sparse random networks with spatially correlated link failures show that: 1) weights obtained according to our criteria lead to significantly faster convergence than the choices available in the literature; 2) different design criteria that corresponds to different n, exhibits very interesting tradeoffs: faster transient performance leads to slower long time run performance and vice versa. Thus, n is a valuable degree of freedom and can be appropriately selected for the given time horizon.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 21:30:44 GMT" } ]
2009-09-29T00:00:00
[ [ "Jakovetic", "Dusan", "" ], [ "Xavier", "Joao", "" ], [ "Moura", "Jose' M. F.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4808
Christina Fragouli
Javad Ebrahimi and Christina Fragouli
Combinatiorial Algorithms for Wireless Information Flow
null
null
null
null
cs.DS cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A long-standing open question in information theory is to characterize the unicast capacity of a wireless relay network. The difficulty arises due to the complex signal interactions induced in the network, since the wireless channel inherently broadcasts the signals and there is interference among transmissions. Recently, Avestimehr, Diggavi and Tse proposed a linear deterministic model that takes into account the shared nature of wireless channels, focusing on the signal interactions rather than the background noise. They generalized the min-cut max-flow theorem for graphs to networks of deterministic channels and proved that the capacity can be achieved using information theoretical tools. They showed that the value of the minimum cut is in this case the minimum rank of all the adjacency matrices describing source-destination cuts. In this paper, we develop a polynomial time algorithm that discovers the relay encoding strategy to achieve the min-cut value in linear deterministic (wireless) networks, for the case of a unicast connection. Our algorithm crucially uses a notion of linear independence between channels to calculate the capacity in polynomial time. Moreover, we can achieve the capacity by using very simple one-symbol processing at the intermediate nodes, thereby constructively yielding finite length strategies that achieve the unicast capacity of the linear deterministic (wireless) relay network.
[ { "version": "v1", "created": "Fri, 25 Sep 2009 21:33:35 GMT" } ]
2009-09-29T00:00:00
[ [ "Ebrahimi", "Javad", "" ], [ "Fragouli", "Christina", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4828
Ofer Shayevitz
Ofer Shayevitz and Meir Feder
Optimal Feedback Communication via Posterior Matching
IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce a fundamental principle for optimal communication over general memoryless channels in the presence of noiseless feedback, termed posterior matching. Using this principle, we devise a (simple, sequential) generic feedback transmission scheme suitable for a large class of memoryless channels and input distributions, achieving any rate below the corresponding mutual information. This provides a unified framework for optimal feedback communication in which the Horstein scheme (BSC) and the Schalkwijk-Kailath scheme (AWGN channel) are special cases. Thus, as a corollary, we prove that the Horstein scheme indeed attains the BSC capacity, settling a longstanding conjecture. We further provide closed form expressions for the error probability of the scheme over a range of rates, and derive the achievable rates in a mismatch setting where the scheme is designed according to the wrong channel model. Several illustrative examples of the posterior matching scheme for specific channels are given, and the corresponding error probability expressions are evaluated. The proof techniques employed utilize novel relations between information rates and contraction properties of iterated function systems.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 09:20:00 GMT" }, { "version": "v2", "created": "Tue, 10 Aug 2010 05:53:13 GMT" } ]
2010-08-11T00:00:00
[ [ "Shayevitz", "Ofer", "" ], [ "Feder", "Meir", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4830
Luis Daniel Abreu
Luis Daniel Abreu
Super-wavelets versus poly-Bergman spaces
Preliminar version; 19 pages
null
null
null
math.FA cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Motivated by potential applications in multiplexing and by recent results on Gabor analysis with Hermite windows due to Gr\"{o}chenig and Lyubarskii, we investigate vector-valued wavelet transforms and vector-valued wavelet frames, which constitute special cases of super-wavelets, with a particular attention to the case when the analyzing wavelet vector is related to Fourier transforms of Laguerre functions. We construct an isometric isomorphism between $L^{2}(\mathbb{R}^{+},\mathbf{C}^{n})$ and poly-Bergman spaces, with a view to relate the sampling sequences in the poly-Bergman spaces to the wavelet frames and super-frames with the windows $\Phi_{n}$. One of the applications of the theory is a proof that $b\ln a<2\pi (n+1)$ is a necessary condition for the (scalar) wavelet frame associated to the $\Phi_{n}$ to exist. This seems to be the first known result of this type outside the setting of analytic functions (the case $n=0$, which has been completely studied by Seip in 1993).
[ { "version": "v1", "created": "Sat, 26 Sep 2009 03:46:48 GMT" } ]
2009-09-29T00:00:00
[ [ "Abreu", "Luis Daniel", "" ] ]
[ { "class": "Mathematics", "code": "math.FA", "description": "Banach spaces, function spaces, real functions, integral transforms, theory of distributions, measure theory", "span": "(Functional Analysis)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4858
R Doomun
S. Rathi, K. Thanuskodi
A Secure and Fault tolerant framework for Mobile IPv6 based networks
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
International Journal of Computer Science and Information Security Vol. 5, No. 1, pp. 46-55, 2009
null
ISSN 1947 5500
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mobile IPv6 will be an integral part of the next generation Internet protocol. The importance of mobility in the Internet gets keep on increasing. Current specification of Mobile IPv6 does not provide proper support for reliability in the mobile network and there are other problems associated with it. In this paper, we propose Virtual Private Network (VPN) based Home Agent Reliability Protocol (VHAHA) as a complete system architecture and extension to Mobile IPv6 that supports reliability and offers solutions to the security problems that are found in Mobile IP registration part. The key features of this protocol over other protocols are: better survivability, transparent failure detection and recovery, reduced complexity of the system and workload, secure data transfer and improved overall performance.
[ { "version": "v1", "created": "Sat, 26 Sep 2009 11:24:59 GMT" } ]
2009-09-29T00:00:00
[ [ "Rathi", "S.", "" ], [ "Thanuskodi", "K.", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.4860
R Doomun
Y. Robiah, S. Siti Rahayu, M. Mohd Zaki, S. Shahrin, M. A. Faizal, R. Marliza
A New Generic Taxonomy on Hybrid Malware Detection Technique
6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
Robiah Y, Siti Rahayu S., Mohd Zaki M, Shahrin S., Faizal M. A., Marliza R., International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 56-61, September 2009, USA
null
ISSN 1947 5500
cs.CR
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Malware is a type of malicious program that replicate from host machine and propagate through network. It has been considered as one type of computer attack and intrusion that can do a variety of malicious activity on a computer. This paper addresses the current trend of malware detection techniques and identifies the significant criteria in each technique to improve malware detection in Intrusion Detection System (IDS). Several existing techniques are analyzing from 48 various researches and the capability criteria of malware detection technique have been reviewed. From the analysis, a new generic taxonomy of malware detection technique have been proposed named Hybrid Malware Detection Technique (Hybrid MDT) which consists of Hybrid Signature and Anomaly detection technique and Hybrid Specification based and Anomaly detection technique to complement the weaknesses of the existing malware detection technique in detecting known and unknown attack as well as reducing false alert before and during the intrusion occur.
[ { "version": "v1", "created": "Sat, 26 Sep 2009 11:44:56 GMT" } ]
2009-09-29T00:00:00
[ [ "Robiah", "Y.", "" ], [ "Rahayu", "S. Siti", "" ], [ "Zaki", "M. Mohd", "" ], [ "Shahrin", "S.", "" ], [ "Faizal", "M. A.", "" ], [ "Marliza", "R.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" } ]
0909.4876
Mani A
A. Mani
A Program in Dialectical Rough Set Theory
8 Pages, Brief Version of forthcoming paper. My conference presentation at "Internat. Conf. on Rough Sets, Fuzzy Sets and Soft Computing, Agartala, Tripura University, India, 2009" includes many parts of this paper
null
null
null
math.LO cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A dialectical rough set theory focussed on the relation between roughly equivalent objects and classical objects was introduced in \cite{AM699} by the present author. The focus of our investigation is on elucidating the minimal conditions on the nature of granularity, underlying semantic domain and nature of the general rough set theories (RST) involved for possible extension of the semantics to more general RST on a paradigm. On this basis we also formulate a program in dialectical rough set theory. The dialectical approach provides better semantics in many difficult cases and helps in formalising a wide variety of concepts and notions that remain untamed at meta levels in the usual approaches. This is a brief version of a more detailed forthcoming paper by the present author.
[ { "version": "v1", "created": "Sun, 27 Sep 2009 01:39:27 GMT" } ]
2009-09-29T00:00:00
[ [ "Mani", "A.", "" ] ]
[ { "class": "Mathematics", "code": "math.LO", "description": "Logic, set theory, point-set topology, formal mathematics", "span": "(Logic)" }, { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4888
Mugurel Ionut Andreica
Andrei-Horia Mogos, Mugurel Ionut Andreica
Approximating Mathematical Semantic Web Services Using Approximation Formulas and Numerical Methods
The International Workshop on Multi-Agent Systems Technology and Semantics - MASTS 2009
Proc. of the 17th Intl. Conf. on Control Systems and Computer Science (CSCS), vol. 2, pp. 533-538, Bucharest, Romania, 26-29 May, 2009
null
null
cs.MS cs.NA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Mathematical semantic web services are very useful in practice, but only a small number of research results are reported in this area. In this paper we present a method of obtaining an approximation of a mathematical semantic web service, from its semantic description, using existing mathematical semantic web services, approximation formulas, and numerical methods techniques. We also give a method for automatic comparison of two complexity functions. In addition, we present a method for classifying the numerical methods mathematical semantic web services from a library.
[ { "version": "v1", "created": "Sat, 26 Sep 2009 18:52:59 GMT" } ]
2009-09-29T00:00:00
[ [ "Mogos", "Andrei-Horia", "" ], [ "Andreica", "Mugurel Ionut", "" ] ]
[ { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" } ]
0909.4889
R Doomun
Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed
Hybrid Intrusion Detection and Prediction multiAgent System HIDPAS
10 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/
Farah Jemili, Montaceur Zaghdoud, Mohamed Ben Ahmed, International Journal of Computer Science and Information Security, IJCSIS, Vol. 5, No. 1, pp. 62-71, September 2009, USA
null
ISSN 1947 5500
cs.CR cs.AI cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper proposes an intrusion detection and prediction system based on uncertain and imprecise inference networks and its implementation. Giving a historic of sessions, it is about proposing a method of supervised learning doubled of a classifier permitting to extract the necessary knowledge in order to identify the presence or not of an intrusion in a session and in the positive case to recognize its type and to predict the possible intrusions that will follow it. The proposed system takes into account the uncertainty and imprecision that can affect the statistical data of the historic. The systematic utilization of an unique probability distribution to represent this type of knowledge supposes a too rich subjective information and risk to be in part arbitrary. One of the first objectives of this work was therefore to permit the consistency between the manner of which we represent information and information which we really dispose.
[ { "version": "v1", "created": "Sat, 26 Sep 2009 19:17:37 GMT" } ]
2009-09-29T00:00:00
[ [ "Jemili", "Farah", "" ], [ "Zaghdoud", "Montaceur", "" ], [ "Ahmed", "Mohamed Ben", "" ] ]
[ { "class": "Computer Science", "code": "cs.CR", "description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.", "span": "(Cryptography and Security)" }, { "class": "Computer Science", "code": "cs.AI", "description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.", "span": "(Artificial Intelligence)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4893
Hagai Cohen
Hagai Cohen and Ely Porat
Range Non-Overlapping Indexing
10 pages
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We study the non-overlapping indexing problem: Given a text T, preprocess it so that you can answer queries of the form: given a pattern P, report the maximal set of non-overlapping occurrences of P in T. A generalization of this problem is the range non-overlapping indexing where in addition we are given two indexes i,j to report the maximal set of non-overlapping occurrences between these two indexes. We suggest new solutions for these problems. For the non-overlapping problem our solution uses O(n) space with query time of O(m + occ_{NO}). For the range non-overlapping problem we propose a solution with O(n\log^\epsilon n) space for some 0<\epsilon<1 and O(m + \log\log n + occ_{ij,NO}) query time.
[ { "version": "v1", "created": "Sat, 26 Sep 2009 20:24:19 GMT" }, { "version": "v2", "created": "Tue, 12 Jan 2010 19:40:45 GMT" } ]
2010-01-12T00:00:00
[ [ "Cohen", "Hagai", "" ], [ "Porat", "Ely", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4896
Christian Attiogb\'e
Christian Attiogbe
Modelling and Analysing Dynamic Decentralised Systems
6 pages - two columns (IEEE) - Conference PRDC'2009
null
null
null
cs.SE cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a method to specify and analyse decentralised dynamic systems; the method is based on the combination of an event-based multi-process system specification approach with a multi-facet analysis approach that considers a reference abstract model and several specific ones derived from the abstract model in order to support facet-wise analysis. The method is illustrated with the modelling and the analysis of a mobile ad-hoc network. The Event-B framework and its related tools B4free and ProB are used to conduct the experiments.
[ { "version": "v1", "created": "Sat, 26 Sep 2009 21:38:49 GMT" } ]
2009-09-30T00:00:00
[ [ "Attiogbe", "Christian", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" } ]
0909.4934
Ivan Voras
Ivan Voras, Mario Zagar
Characteristics of multithreading models for high-performance IO driven network applications
null
null
null
null
cs.NI cs.PF
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a technological landscape that is quickly moving toward dense multi-CPU and multi-core computer systems, where using multithreading is an increasingly popular application design decision, it is important to choose a proper model for distributing tasks across multiple threads that will result in the best efficiency for the application and the system as a whole. The work described in this paper creates, implements and evaluates various models of distributing tasks to CPU threads and investigates their characteristics for use in modern high-performance network servers. The results presented here comprise a roadmap of models for building multithreaded server applications for modern server hardware and Unix-like operating systems.
[ { "version": "v1", "created": "Sun, 27 Sep 2009 14:20:46 GMT" } ]
2009-09-29T00:00:00
[ [ "Voras", "Ivan", "" ], [ "Zagar", "Mario", "" ] ]
[ { "class": "Computer Science", "code": "cs.NI", "description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.", "span": "(Networking and Internet Architecture)" }, { "class": "Computer Science", "code": "cs.PF", "description": "Covers performance measurement and evaluation, queueing, and simulation. Roughly includes material in ACM Subject Classes D.4.8 and K.6.2.", "span": "(Performance)" } ]
0909.4938
Tao Zhou
Mingsheng Shang, Linyuan Lu, Yi-Cheng Zhang, Tao Zhou
Empirical analysis of web-based user-object bipartite networks
6 pages, 7 figures and 1 table
EPL 90 (2010) 48006
10.1209/0295-5075/90/48006
null
physics.data-an cs.IR physics.soc-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Understanding the structure and evolution of web-based user-object networks is a significant task since they play a crucial role in e-commerce nowadays. This Letter reports the empirical analysis on two large-scale web sites, audioscrobbler.com and del.icio.us, where users are connected with music groups and bookmarks, respectively. The degree distributions and degree-degree correlations for both users and objects are reported. We propose a new index, named collaborative clustering coefficient, to quantify the clustering behavior based on the collaborative selection. Accordingly, the clustering properties and clustering-degree correlations are investigated. We report some novel phenomena well characterizing the selection mechanism of web users and outline the relevance of these phenomena to the information recommendation problem.
[ { "version": "v1", "created": "Sun, 27 Sep 2009 14:52:30 GMT" }, { "version": "v2", "created": "Sat, 24 Dec 2011 01:21:01 GMT" } ]
2015-05-14T00:00:00
[ [ "Shang", "Mingsheng", "" ], [ "Lu", "Linyuan", "" ], [ "Zhang", "Yi-Cheng", "" ], [ "Zhou", "Tao", "" ] ]
[ { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" }, { "class": "Computer Science", "code": "cs.IR", "description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.", "span": "(Information Retrieval)" }, { "class": "Physics", "code": "physics.soc-ph", "description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).", "span": "(Physics and Society)" } ]
0909.4950
Mikael Vejdemo-Johansson
Vladimir Dotsenko and Mikael Vejdemo-Johansson
Implementing Gr\"obner bases for operads
18 pages, 6 figures
null
null
null
cs.SC cs.MS math.QA
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present an implementation of the algorithm for computing Groebner bases for operads due to the first author and A. Khoroshkin. We discuss the actual algorithms, the choices made for the implementation platform and the data representation, and strengths and weaknesses of our approach.
[ { "version": "v1", "created": "Sun, 27 Sep 2009 16:54:34 GMT" }, { "version": "v2", "created": "Thu, 26 Aug 2010 13:30:08 GMT" } ]
2010-08-27T00:00:00
[ [ "Dotsenko", "Vladimir", "" ], [ "Vejdemo-Johansson", "Mikael", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" }, { "class": "Mathematics", "code": "math.QA", "description": "Quantum groups, skein theories, operadic and diagrammatic algebra, quantum field theory", "span": "(Quantum Algebra)" } ]
0909.4955
Juan Gerardo Alcazar Arribas
Juan Gerardo Alcazar
On the Different Shapes Arising in a Family of Rational Curves Depending on a Parameter
null
null
null
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Given a family of rational curves depending on a real parameter, defined by its parametric equations, we provide an algorithm to compute a finite partition of the parameter space (${\Bbb R}$, in general) so that the shape of the family stays invariant along each element of the partition. So, from this partition the topology types in the family can be determined. The algorithm is based on a geometric interpretation of previous work (\cite{JGRS}) for the implicit case. However, in our case the algorithm works directly with the parametrization of the family, and the implicit equation does not need to be computed. Timings comparing the algorithm in the implicit and the parametric cases are given; these timings show that the parametric algorithm developed here provides in general better results than the known algorithm for the implicit case.
[ { "version": "v1", "created": "Sun, 27 Sep 2009 18:47:17 GMT" }, { "version": "v2", "created": "Fri, 13 Nov 2009 10:14:05 GMT" } ]
2009-11-13T00:00:00
[ [ "Alcazar", "Juan Gerardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0909.4956
Juan Gerardo Alcazar Arribas
Juan Gerardo Alcazar
Local Shape of Generalized Offsets to Algebraic Curves
19 pages, 9 figures
null
null
null
cs.SC cs.MS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we study the local behavior of an algebraic curve under a geometric construction which is a variation of the usual offsetting construction, namely the {\it generalized} offsetting process (\cite {SS99}). More precisely, here we discuss when and how this geometric construction may cause local changes in the shape of an algebraic curve, and we compare our results with those obtained for the case of classical offsets (\cite{JGS07}). For these purposes, we use well-known notions of Differential Geometry, and also the notion of {\it local shape} introduced in \cite{JGS07}.
[ { "version": "v1", "created": "Sun, 27 Sep 2009 19:38:00 GMT" } ]
2009-09-29T00:00:00
[ [ "Alcazar", "Juan Gerardo", "" ] ]
[ { "class": "Computer Science", "code": "cs.SC", "description": "Roughly includes material in ACM Subject Class I.1.", "span": "(Symbolic Computation)" }, { "class": "Computer Science", "code": "cs.MS", "description": "Roughly includes material in ACM Subject Class G.4.", "span": "(Mathematical Software)" } ]
0909.4969
Charalampos Tsourakakis
Charalampos E. Tsourakakis
MACH: Fast Randomized Tensor Decompositions
15 pages, 4 Tables, 6 Figures
null
null
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tensors naturally model many real world processes which generate multi-aspect data. Such processes appear in many different research disciplines, e.g, chemometrics, computer vision, psychometrics and neuroimaging analysis. Tensor decompositions such as the Tucker decomposition are used to analyze multi-aspect data and extract latent factors, which capture the multilinear data structure. Such decompositions are powerful mining tools, for extracting patterns from large data volumes. However, most frequently used algorithms for such decompositions involve the computationally expensive Singular Value Decomposition. In this paper we propose MACH, a new sampling algorithm to compute such decompositions. Our method is of significant practical value for tensor streams, such as environmental monitoring systems, IP traffic matrices over time, where large amounts of data are accumulated and the analysis is computationally intensive but also in "post-mortem" data analysis cases where the tensor does not fit in the available memory. We provide the theoretical analysis of our proposed method, and verify its efficacy in monitoring system applications.
[ { "version": "v1", "created": "Sun, 27 Sep 2009 22:36:17 GMT" } ]
2009-09-29T00:00:00
[ [ "Tsourakakis", "Charalampos E.", "" ] ]
[ { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.4983
Kaibin Huang
Kaibin Huang, Vincent K. N. Lau, and Dongku Kim
Event-Driven Optimal Feedback Control for Multi-Antenna Beamforming
29 pages; submitted for publication
null
10.1109/TSP.2010.2045426
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Transmit beamforming is a simple multi-antenna technique for increasing throughput and the transmission range of a wireless communication system. The required feedback of channel state information (CSI) can potentially result in excessive overhead especially for high mobility or many antennas. This work concerns efficient feedback for transmit beamforming and establishes a new approach of controlling feedback for maximizing net throughput, defined as throughput minus average feedback cost. The feedback controller using a stationary policy turns CSI feedback on/off according to the system state that comprises the channel state and transmit beamformer. Assuming channel isotropy and Markovity, the controller's state reduces to two scalars. This allows the optimal control policy to be efficiently computed using dynamic programming. Consider the perfect feedback channel free of error, where each feedback instant pays a fixed price. The corresponding optimal feedback control policy is proved to be of the threshold type. This result holds regardless of whether the controller's state space is discretized or continuous. Under the threshold-type policy, feedback is performed whenever a state variable indicating the accuracy of transmit CSI is below a threshold, which varies with channel power. The practical finite-rate feedback channel is also considered. The optimal policy for quantized feedback is proved to be also of the threshold type. The effect of CSI quantization is shown to be equivalent to an increment on the feedback price. Moreover, the increment is upper bounded by the expected logarithm of one minus the quantization error. Finally, simulation shows that feedback control increases net throughput of the conventional periodic feedback by up to 0.5 bit/s/Hz without requiring additional bandwidth or antennas.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 01:14:54 GMT" } ]
2015-05-14T00:00:00
[ [ "Huang", "Kaibin", "" ], [ "Lau", "Vincent K. N.", "" ], [ "Kim", "Dongku", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.4995
Marko Jankovic
Marko V. Jankovic
Geometrical Interpretation of Shannon's Entropy Based on the Born Rule
null
null
null
null
cs.IT cs.NE math.IT math.PR physics.data-an
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we will analyze discrete probability distributions in which probabilities of particular outcomes of some experiment (microstates) can be represented by the ratio of natural numbers (in other words, probabilities are represented by digital numbers of finite representation length). We will introduce several results that are based on recently proposed JoyStick Probability Selector, which represents a geometrical interpretation of the probability based on the Born rule. The terms of generic space and generic dimension of the discrete distribution, as well as, effective dimension are going to be introduced. It will be shown how this simple geometric representation can lead to an optimal code length coding of the sequence of signals. Then, we will give a new, geometrical, interpretation of the Shannon entropy of the discrete distribution. We will suggest that the Shannon entropy represents the logarithm of the effective dimension of the distribution. Proposed geometrical interpretation of the Shannon entropy can be used to prove some information inequalities in an elementary way.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 02:47:52 GMT" } ]
2009-09-29T00:00:00
[ [ "Jankovic", "Marko V.", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.PR", "description": "Theory and applications of probability and stochastic processes: e.g. central limit theorems, large deviations, stochastic differential equations, models from statistical mechanics, queuing theory", "span": "(Probability)" }, { "class": "Physics", "code": "physics.data-an", "description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.", "span": "(Data Analysis, Statistics and Probability)" } ]
0909.5000
Hrushikesh Mhaskar
H. N. Mhaskar
Eignets for function approximation on manifolds
28 pages. Articles in press; Applied and Computational Harmonic Analysis, 2009
null
null
null
cs.LG cs.NA cs.NE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Let $\XX$ be a compact, smooth, connected, Riemannian manifold without boundary, $G:\XX\times\XX\to \RR$ be a kernel. Analogous to a radial basis function network, an eignet is an expression of the form $\sum_{j=1}^M a_jG(\circ,y_j)$, where $a_j\in\RR$, $y_j\in\XX$, $1\le j\le M$. We describe a deterministic, universal algorithm for constructing an eignet for approximating functions in $L^p(\mu;\XX)$ for a general class of measures $\mu$ and kernels $G$. Our algorithm yields linear operators. Using the minimal separation amongst the centers $y_j$ as the cost of approximation, we give modulus of smoothness estimates for the degree of approximation by our eignets, and show by means of a converse theorem that these are the best possible for every \emph{individual function}. We also give estimates on the coefficients $a_j$ in terms of the norm of the eignet. Finally, we demonstrate that if any sequence of eignets satisfies the optimal estimates for the degree of approximation of a smooth function, measured in terms of the minimal separation, then the derivatives of the eignets also approximate the corresponding derivatives of the target function in an optimal manner.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 04:25:03 GMT" } ]
2009-09-29T00:00:00
[ [ "Mhaskar", "H. N.", "" ] ]
[ { "class": "Computer Science", "code": "cs.LG", "description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.", "span": "(Machine Learning)" }, { "class": "Computer Science", "code": "cs.NA", "description": "cs.NA is an alias for math.NA. Roughly includes material in ACM Subject Class G.1.", "span": "(Numerical Analysis)" }, { "class": "Computer Science", "code": "cs.NE", "description": "Covers neural networks, connectionism, genetic algorithms, artificial life, adaptive behavior. Roughly includes some material in ACM Subject Class C.1.3, I.2.6, I.5.", "span": "(Neural and Evolutionary Computing)" } ]
0909.5006
Mohammad Ali Maddah-Ali Mr.
Mohammad Ali Maddah-Ali
On the Degrees of Freedom of the Compound MIMO Broadcast Channels with Finite States
null
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Multiple-antenna broadcast channels with $M$ transmit antennas and $K$ single-antenna receivers is considered, where the channel of receiver $r$ takes one of the $J_r$ finite values. It is assumed that the channel states of each receiver are randomly selected from $\mathds{R}^{M\times 1}$ (or from $\mathds{C}^{M\times 1}$). It is shown that no matter what $J_r$ is, the degrees of freedom (DoF) of $\frac{MK}{M+K-1}$ is achievable. The achievable scheme relies on the idea of interference alignment at receivers, without exploiting the possibility of cooperation among transmit antennas. It is proven that if $J_r \geq M$, $r=1,...,K$, this scheme achieves the optimal DoF. This results implies that when the uncertainty of the base station about the channel realization is considerable, the system loses the gain of cooperation. However, it still benefits from the gain of interference alignment. In fact, in this case, the compound broadcast channel is treated as a compound X channel. Moreover, it is shown that when the base station knows the channel states of some of the receivers, a combination of transmit cooperation and interference alignment would achieve the optimal DoF. Like time-invariant $K$-user interference channels, the naive vector-space approaches of interference management seem insufficient to achieve the optimal DoF of this channel. In this paper, we use the Number-Theory approach of alignment, recently developed by Motahari et al.[1]. We extend the approach of [1] to complex channels as well, therefore all the results that we present are valid for both real and complex channels.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 18:38:44 GMT" }, { "version": "v2", "created": "Tue, 29 Sep 2009 19:29:45 GMT" }, { "version": "v3", "created": "Sun, 4 Oct 2009 02:05:21 GMT" } ]
2009-10-05T00:00:00
[ [ "Maddah-Ali", "Mohammad Ali", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5007
Kenneth Shum
Kenneth W. Shum and Chi Wan Sung
Achieving Capacity of Bi-Directional Tandem Collision Network by Joint Medium-Access Control and Channel-Network Coding
Submitted to IEEE Trans. Information Theory
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In ALOHA-type packetized network, the transmission times of packets follow a stochastic process. In this paper, we advocate a deterministic approach for channel multiple-access. Each user is statically assigned a periodic protocol signal, which takes value either zero or one, and transmit packets whenever the value of the protocol signal is equal to one. On top of this multiple-access protocol, efficient channel coding and network coding schemes are devised. We illustrate the idea by constructing a transmission scheme for the tandem collision network, for both slot-synchronous and slot-asynchronous systems. This cross-layer approach is able to achieve the capacity region when the network is bi-directional.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 05:58:47 GMT" } ]
2009-09-29T00:00:00
[ [ "Shum", "Kenneth W.", "" ], [ "Sung", "Chi Wan", "" ] ]
[ { "class": "Computer Science", "code": "cs.IT", "description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.", "span": "(Information Theory)" }, { "class": "Mathematics", "code": "math.IT", "description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.", "span": "(Information Theory)" } ]
0909.5011
Li-Yang Tan
Ilias Diakonikolas, Prasad Raghavendra, Rocco A. Servedio, Li-Yang Tan
Average sensitivity and noise sensitivity of polynomial threshold functions
added proofs for non-multilinear PTFs over Gaussian random variables, added discussion section
null
null
null
cs.CC cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We give the first non-trivial upper bounds on the average sensitivity and noise sensitivity of degree-$d$ polynomial threshold functions (PTFs). These bounds hold both for PTFs over the Boolean hypercube and for PTFs over $\R^n$ under the standard $n$-dimensional Gaussian distribution. Our bound on the Boolean average sensitivity of PTFs represents progress towards the resolution of a conjecture of Gotsman and Linial \cite{GL:94}, which states that the symmetric function slicing the middle $d$ layers of the Boolean hypercube has the highest average sensitivity of all degree-$d$ PTFs. Via the $L_1$ polynomial regression algorithm of Kalai et al. \cite{KKMS:08}, our bounds on Gaussian and Boolean noise sensitivity yield polynomial-time agnostic learning algorithms for the broad class of constant-degree PTFs under these input distributions. The main ingredients used to obtain our bounds on both average and noise sensitivity of PTFs in the Gaussian setting are tail bounds and anti-concentration bounds on low-degree polynomials in Gaussian random variables \cite{Janson:97,CW:01}. To obtain our bound on the Boolean average sensitivity of PTFs, we generalize the ``critical-index'' machinery of \cite{Servedio:07cc} (which in that work applies to halfspaces, i.e. degree-1 PTFs) to general PTFs. Together with the "invariance principle" of \cite{MOO:05}, this lets us extend our techniques from the Gaussian setting to the Boolean setting. Our bound on Boolean noise sensitivity is achieved via a simple reduction from upper bounds on average sensitivity of Boolean PTFs to corresponding bounds on noise sensitivity.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 06:45:31 GMT" }, { "version": "v2", "created": "Mon, 19 Oct 2009 20:43:09 GMT" } ]
2009-10-19T00:00:00
[ [ "Diakonikolas", "Ilias", "" ], [ "Raghavendra", "Prasad", "" ], [ "Servedio", "Rocco A.", "" ], [ "Tan", "Li-Yang", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.5012
Anthony Scemama
Anthony Scemama
IRPF90: a programming environment for high performance computing
18 pages, 14 figures
null
null
null
cs.SE cs.CE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
IRPF90 is a Fortran programming environment which helps the development of large Fortran codes. In Fortran programs, the programmer has to focus on the order of the instructions: before using a variable, the programmer has to be sure that it has already been computed in all possible situations. For large codes, it is common source of error. In IRPF90 most of the order of instructions is handled by the pre-processor, and an automatic mechanism guarantees that every entity is built before being used. This mechanism relies on the {needs/needed by} relations between the entities, which are built automatically. Codes written with IRPF90 execute often faster than Fortran programs, are faster to write and easier to maintain.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 16:46:45 GMT" } ]
2009-09-29T00:00:00
[ [ "Scemama", "Anthony", "" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" }, { "class": "Computer Science", "code": "cs.CE", "description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).", "span": "(Computational Engineering, Finance, and Science)" } ]
0909.5029
EPTCS
Clemens Thielen, Sven O. Krumke
Complexity of Strong Implementability
null
EPTCS 4, 2009, pp. 1-12
10.4204/EPTCS.4.1
null
cs.CC cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider the question of implementability of a social choice function in a classical setting where the preferences of finitely many selfish individuals with private information have to be aggregated towards a social choice. This is one of the central questions in mechanism design. If the concept of weak implementation is considered, the Revelation Principle states that one can restrict attention to truthful implementations and direct revelation mechanisms, which implies that implementability of a social choice function is easy to check. For the concept of strong implementation, however, the Revelation Principle becomes invalid, and the complexity of deciding whether a given social choice function is strongly implementable has been open so far. In this paper, we show by using methods from polyhedral theory that strong implementability of a social choice function can be decided in polynomial space and that each of the payments needed for strong implementation can always be chosen to be of polynomial encoding length. Moreover, we show that strong implementability of a social choice function involving only a single selfish individual can be decided in polynomial time via linear programming.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 07:59:23 GMT" } ]
2009-09-29T00:00:00
[ [ "Thielen", "Clemens", "" ], [ "Krumke", "Sven O.", "" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.GT", "description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.", "span": "(Computer Science and Game Theory)" } ]
0909.5032
EPTCS
Alain Bretto (University of Caen), Yannick Silvestre (University of Caen), Thierry Vall\'ee (University of Caen)
Cartesian product of hypergraphs: properties and algorithms
null
EPTCS 4, 2009, pp. 22-28
10.4204/EPTCS.4.3
null
cs.DM cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Cartesian products of graphs have been studied extensively since the 1960s. They make it possible to decrease the algorithmic complexity of problems by using the factorization of the product. Hypergraphs were introduced as a generalization of graphs and the definition of Cartesian products extends naturally to them. In this paper, we give new properties and algorithms concerning coloring aspects of Cartesian products of hypergraphs. We also extend a classical prime factorization algorithm initially designed for graphs to connected conformal hypergraphs using 2-sections of hypergraphs.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 08:24:08 GMT" } ]
2009-09-29T00:00:00
[ [ "Bretto", "Alain", "", "University of Caen" ], [ "Silvestre", "Yannick", "", "University of\n Caen" ], [ "Vallée", "Thierry", "", "University of Caen" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" }, { "class": "Computer Science", "code": "cs.DS", "description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.", "span": "(Data Structures and Algorithms)" } ]
0909.5033
EPTCS
Konstantinos Papalamprou (London School of Economics), Leonidas Pitsoulis (Aristotle University of Thessaloniki)
Regular Matroids with Graphic Cocircuits
null
EPTCS 4, 2009, pp. 29-41
10.4204/EPTCS.4.4
null
cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce the notion of graphic cocircuits and show that a large class of regular matroids with graphic cocircuits belongs to the class of signed-graphic matroids. Moreover, we provide an algorithm which determines whether a cographic matroid with graphic cocircuits is signed-graphic or not.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 08:29:16 GMT" } ]
2009-09-29T00:00:00
[ [ "Papalamprou", "Konstantinos", "", "London School of Economics" ], [ "Pitsoulis", "Leonidas", "", "Aristotle University of Thessaloniki" ] ]
[ { "class": "Computer Science", "code": "cs.DM", "description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.", "span": "(Discrete Mathematics)" } ]
0909.5038
EPTCS
Olga Tveretina (Karlsruhe University), Carsten Sinz (Karlsruhe University), Hans Zantema (Technical University of Eindhoven, Radboud University of Nijmegen)
An Exponential Lower Bound on OBDD Refutations for Pigeonhole Formulas
null
EPTCS 4, 2009, pp. 13-21
10.4204/EPTCS.4.2
null
cs.CC cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Haken proved that every resolution refutation of the pigeonhole formula has at least exponential size. Groote and Zantema proved that a particular OBDD computation of the pigeonhole formula has an exponential size. Here we show that any arbitrary OBDD refutation of the pigeonhole formula has an exponential size, too: we prove that the size of one of the intermediate OBDDs is at least $\Omega(1.025^n)$.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 08:55:33 GMT" } ]
2009-09-29T00:00:00
[ [ "Tveretina", "Olga", "", "Karlsruhe University" ], [ "Sinz", "Carsten", "", "Karlsruhe\n University" ], [ "Zantema", "Hans", "", "Technical University of Eindhoven, Radboud\n University of Nijmegen" ] ]
[ { "class": "Computer Science", "code": "cs.CC", "description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.", "span": "(Computational Complexity)" }, { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.5045
Emmanuel Polonowski
Emmanuel Polonowski
Deriving SN from PSN: a general proof technique
null
TR-LACL (2006) 1-50
null
TR-LACL-2006-5
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the framework of explicit substitutions there is two termination properties: preservation of strong normalization (PSN), and strong normalization (SN). Since there are not easily proved, only one of them is usually established (and sometimes none). We propose here a connection between them which helps to get SN when one already has PSN. For this purpose, we formalize a general proof technique of SN which consists in expanding substitutions into "pure" lambda-terms and to inherit SN of the whole calculus by SN of the "pure" calculus and by PSN. We apply it successfully to a large set of calculi with explicit substitutions, allowing us to establish SN, or, at least, to trace back the failure of SN to that of PSN.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 09:26:11 GMT" } ]
2009-10-08T00:00:00
[ [ "Polonowski", "Emmanuel", "" ] ]
[ { "class": "Computer Science", "code": "cs.LO", "description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.", "span": "(Logic in Computer Science)" } ]
0909.5064
Norbert B\'atfai
Norbert B\'atfai
A Conceivable Origin of Machine Consciousness in the IDLE process
4 pages
null
null
null
cs.OS cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this short paper, we would like to call professional community's attention to a daring idea that is surely unhelpful, but is exciting for programmers and anyway conflicts with the trend of energy consumption in computer systems.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 10:54:48 GMT" } ]
2009-09-29T00:00:00
[ [ "Bátfai", "Norbert", "" ] ]
[ { "class": "Computer Science", "code": "cs.OS", "description": "Roughly includes material in ACM Subject Classes D.4.1, D.4.2., D.4.3, D.4.4, D.4.5, D.4.7, and D.4.9.", "span": "(Operating Systems)" }, { "class": "Computer Science", "code": "cs.DC", "description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.", "span": "(Distributed, Parallel, and Cluster Computing)" } ]
0909.5087
Stefano Zacchiroli
Davide Di Ruscio (UNIVAQ), Patrizio Pelliccione (UNIVAQ), Alfonso Pierantonio, Stefano Zacchiroli (PPS)
Towards maintainer script modernization in FOSS distributions
null
IWOCE 2009: 1st international workshop on Open component ecosystems, Amsterdam : Netherlands (2009)
null
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Free and Open Source Software (FOSS) distributions are complex software systems, made of thousands packages that evolve rapidly, independently, and without centralized coordination. During packages upgrades, corner case failures can be encountered and are hard to deal with, especially when they are due to misbehaving maintainer scripts: executable code snippets used to finalize package configuration. In this paper we report a software modernization experience, the process of representing existing legacy systems in terms of models, applied to FOSS distributions. We present a process to define meta-models that enable dealing with upgrade failures and help rolling back from them, taking into account maintainer scripts. The process has been applied to widely used FOSS distributions and we report about such experiences.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 13:12:57 GMT" } ]
2009-09-29T00:00:00
[ [ "Di Ruscio", "Davide", "", "UNIVAQ" ], [ "Pelliccione", "Patrizio", "", "UNIVAQ" ], [ "Pierantonio", "Alfonso", "", "PPS" ], [ "Zacchiroli", "Stefano", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]
0909.5091
Stefano Zacchiroli
Ralf Treinen (PPS), Stefano Zacchiroli (PPS)
Expressing advanced user preferences in component installation
null
IWOCE 2009: 1st international workshop on Open component ecosystems, Amsterdam : Netherlands (2009)
10.1145/1595800.1595806
null
cs.SE
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
State of the art component-based software collections - such as FOSS distributions - are made of up to dozens of thousands components, with complex inter-dependencies and conflicts. Given a particular installation of such a system, each request to alter the set of installed components has potentially (too) many satisfying answers. We present an architecture that allows to express advanced user preferences about package selection in FOSS distributions. The architecture is composed by a distribution-independent format for describing available and installed packages called CUDF (Common Upgradeability Description Format), and a foundational language called MooML to specify optimization criteria. We present the syntax and semantics of CUDF and MooML, and discuss the partial evaluation mechanism of MooML which allows to gain efficiency in package dependency solvers.
[ { "version": "v1", "created": "Mon, 28 Sep 2009 13:31:17 GMT" } ]
2009-09-29T00:00:00
[ [ "Treinen", "Ralf", "", "PPS" ], [ "Zacchiroli", "Stefano", "", "PPS" ] ]
[ { "class": "Computer Science", "code": "cs.SE", "description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.", "span": "(Software Engineering)" } ]